diff --git a/.github/workflows/cve-enhancement.yml b/.github/workflows/cve-enhancement.yml index 9edfdbd5169..5bb46e8368e 100644 --- a/.github/workflows/cve-enhancement.yml +++ b/.github/workflows/cve-enhancement.yml @@ -21,7 +21,7 @@ jobs: fetch-depth: 0 - name: Setup Python - uses: actions/setup-python@v5 + uses: actions/setup-python@v6 with: python-version: '3.11' diff --git a/.new-additions b/.new-additions index a63af5e5088..d2ee70f712f 100644 --- a/.new-additions +++ b/.new-additions @@ -2,17 +2,20 @@ dast/ai/ai-code-execution.yaml dast/ai/ai-data-exfiltration.yaml dast/ai/ai-prompt-injection.yaml dast/ai/ai-safety-bypass.yaml +headless/mozilla-pdfjs-content-spoofing.yaml http/cves/2015/CVE-2015-8350.yaml http/cves/2017/CVE-2017-17762.yaml http/cves/2017/CVE-2017-18580.yaml http/cves/2019/CVE-2019-4061.yaml http/cves/2019/CVE-2019-5591.yaml +http/cves/2019/CVE-2019-9082.yaml http/cves/2020/CVE-2020-12832.yaml http/cves/2020/CVE-2020-20627.yaml http/cves/2020/CVE-2020-25200.yaml http/cves/2020/CVE-2020-26836.yaml http/cves/2021/CVE-2021-20617.yaml http/cves/2021/CVE-2021-2135.yaml +http/cves/2021/CVE-2021-22175.yaml http/cves/2021/CVE-2021-24657.yaml http/cves/2021/CVE-2021-24681.yaml http/cves/2021/CVE-2021-25082.yaml @@ -20,6 +23,7 @@ http/cves/2021/CVE-2021-3007.yaml http/cves/2021/CVE-2021-33829.yaml http/cves/2021/CVE-2021-35042.yaml http/cves/2021/CVE-2021-37415.yaml +http/cves/2022/CVE-2022-0765.yaml http/cves/2022/CVE-2022-0873.yaml http/cves/2022/CVE-2022-1029.yaml http/cves/2022/CVE-2022-34305.yaml @@ -32,14 +36,18 @@ http/cves/2023/CVE-2023-38952.yaml http/cves/2023/CVE-2023-45038.yaml http/cves/2023/CVE-2023-6266.yaml http/cves/2023/CVE-2023-7164.yaml +http/cves/2024/CVE-2024-25608.yaml +http/cves/2024/CVE-2024-28200.yaml http/cves/2024/CVE-2024-28253.yaml http/cves/2024/CVE-2024-2862.yaml http/cves/2024/CVE-2024-2863.yaml http/cves/2024/CVE-2024-31223.yaml +http/cves/2024/CVE-2024-33939.yaml http/cves/2024/CVE-2024-35693.yaml http/cves/2024/CVE-2024-35694.yaml http/cves/2024/CVE-2024-39646.yaml http/cves/2024/CVE-2024-47374.yaml +http/cves/2025/CVE-2025-12139.yaml http/cves/2025/CVE-2025-13486.yaml http/cves/2025/CVE-2025-14611.yaml http/cves/2025/CVE-2025-34299.yaml @@ -50,8 +58,10 @@ http/cves/2025/CVE-2025-55749.yaml http/cves/2025/CVE-2025-56266.yaml http/cves/2025/CVE-2025-56819.yaml http/cves/2025/CVE-2025-63387.yaml +http/cves/2025/CVE-2025-68613.yaml http/cves/2025/CVE-2025-9808.yaml http/exposed-panels/cisco-esa-panel.yaml +http/exposed-panels/hpe-oneview-panel.yaml http/exposed-panels/temboard-panel.yaml http/exposures/apis/ambassador-api-diagnostics-exposure.yaml http/exposures/backups/wordpress-db-exposure.yaml @@ -69,9 +79,12 @@ http/exposures/files/wp-w3-total-cache-exposure.yaml http/exposures/files/yarn-integrity-disclosure.yaml http/exposures/logs/bitrix-log-file-disclosure.yaml http/exposures/logs/wp-easy-google-fonts-log-disclosure.yaml +http/exposures/logs/wp-flexible-shipping-log.yaml http/exposures/logs/wp-importer-log-disclosure.yaml http/exposures/logs/wp-pretty-link-log-disclosure.yaml +http/exposures/logs/wp-wps-hide-login-log.yaml http/global-matchers/secrets-patterns-pii.yaml +http/misconfiguration/apache/apache-mod-negotiation-listing.yaml http/misconfiguration/browserconfig-xml.yaml http/misconfiguration/buildpath-file-disclosure.yaml http/misconfiguration/eslint-ignore-exposure.yaml @@ -81,28 +94,42 @@ http/misconfiguration/jetty-directory-listing.yaml http/misconfiguration/jfrog-artifactory-exposure.yaml http/misconfiguration/joomla/joomla-registration-enabled.yaml http/misconfiguration/nexus-repository-anonymous-access.yaml +http/misconfiguration/vscode-slnx-sqlite-disclosure.yaml +http/misconfiguration/wordpress/nextgen-gallery-pro-error-log.yaml +http/misconfiguration/wordpress/wordfence-rules-disclosure.yaml +http/misconfiguration/wordpress/wordfence-waf-logs-disclosure.yaml +http/misconfiguration/wordpress/wordpress-amp-fpd.yaml http/misconfiguration/wordpress/wordpress-cmb2-fpd.yaml http/misconfiguration/wordpress/wordpress-imsanity-fpd.yaml +http/misconfiguration/wordpress/wordpress-storefront-fpd.yaml +http/misconfiguration/wordpress/wp-add-to-any-fpd.yaml http/misconfiguration/wordpress/wp-astra-sites-fpd.yaml http/misconfiguration/wordpress/wp-beaver-builder-lite-version-fpd.yaml http/misconfiguration/wordpress/wp-cookie-law-info-fpd.yaml http/misconfiguration/wordpress/wp-image-widget-fpd.yaml +http/misconfiguration/wordpress/wp-iwp-client-fpd.yaml http/misconfiguration/wordpress/wp-maintenance-mode-fpd.yaml http/misconfiguration/wordpress/wp-members-error-log-disclosure.yaml +http/misconfiguration/wordpress/wp-migrate-db-fpd.yaml http/misconfiguration/wordpress/wp-oceanwp-fpd.yaml +http/misconfiguration/wordpress/wp-pretty-links-fpd.yaml http/misconfiguration/wordpress/wp-rank-math-seo-fpd.yaml http/misconfiguration/wordpress/wp-safe-svg-fpd.yaml http/misconfiguration/wordpress/wp-simple-301-redirects-fpd.yaml http/misconfiguration/wordpress/wp-smushit-fpd.yaml +http/misconfiguration/wordpress/wp-svg-support-fpd.yaml +http/misconfiguration/wordpress/wp-table-of-contents-plus-fpd.yaml http/misconfiguration/wordpress/wp-the-events-calendar-fpd.yaml http/misconfiguration/wordpress/wp-toc-plus-fpd.yaml http/misconfiguration/wordpress/wp-wordfence-fpd.yaml http/misconfiguration/wordpress/wp-wp-mail-smtp-fpd.yaml +http/misconfiguration/wordpress/wp-yith-woocommerce-wishlist-fpd.yaml http/misconfiguration/wordpress/wp-yoast-seo-fpd.yaml http/misconfiguration/x-backend-server-header-detect.yaml http/technologies/fastcgi-test-page.yaml http/technologies/krpano-detect.yaml http/vulnerabilities/cross-site-tracing-xss.yaml +http/vulnerabilities/jira/jira-https-mode-open-redirect.yaml http/vulnerabilities/wordpress/wordpress-meta-box-fpd.yaml http/vulnerabilities/wordpress/wp-acf-fpd.yaml http/vulnerabilities/wordpress/wp-admin-menu-editor-fpd.yaml @@ -112,6 +139,7 @@ http/vulnerabilities/wordpress/wp-astra-fpd.yaml http/vulnerabilities/wordpress/wp-better-wp-security-login-disclosure.yaml http/vulnerabilities/wordpress/wp-buddypress-open-redirect.yaml http/vulnerabilities/wordpress/wp-caldera-forms-xss.yaml +http/vulnerabilities/wordpress/wp-contact-form-7-fpd.yaml http/vulnerabilities/wordpress/wp-contact-form-fpd.yaml http/vulnerabilities/wordpress/wp-duplicate-post-fpd.yaml http/vulnerabilities/wordpress/wp-duracelltomi-google-tag-manager-fpd.yaml @@ -134,3 +162,15 @@ http/vulnerabilities/wordpress/wp-woocommerce-admin-fpd.yaml http/vulnerabilities/wordpress/wp-worker-fpd.yaml javascript/misconfiguration/apache-kvrocks-exposed.yaml network/cves/2025/CVE-2025-47188.yaml +network/detection/ics/allen-bradley/allen-bradley-compactlogix-detect.yaml +network/detection/ics/allen-bradley/allen-bradley-guardplc-detect.yaml +network/detection/ics/allen-bradley/allen-bradley-micro800-detect.yaml +network/detection/ics/allen-bradley/allen-bradley-micrologix-detect.yaml +network/detection/ics/allen-bradley/allen-bradley-plc5-detect.yaml +network/detection/ics/allen-bradley/allen-bradley-slc-500-detect.yaml +network/detection/ics/red-lion-enip-detect.yaml +network/detection/ics/schneider-modicon/schneider-modicon-340-detect.yaml +network/detection/ics/schneider-modicon/schneider-modicon-580-detect.yaml +network/enumeration/modicon-info.yaml +network/honeypot/cpppo-ethernetip-cip-honeypot.yaml +network/honeypot/snap7-honeypot-default-config.yaml diff --git a/code/cves/2019/CVE-2019-0604.yaml b/code/cves/2019/CVE-2019-0604.yaml index 344dee3d4a0..cc256bdb8d6 100644 --- a/code/cves/2019/CVE-2019-0604.yaml +++ b/code/cves/2019/CVE-2019-0604.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-0604 cwe-id: CWE-20 epss-score: 0.94441 - epss-percentile: 0.99987 + epss-percentile: 0.99989 metadata: verified: true vendor: microsoft @@ -156,4 +156,4 @@ code: - 'contains(interactsh_protocol, "dns")' - 'contains(interactsh_request, hex_encode(marker))' condition: and -# digest: 4a0a004730450220600627600e33850058bda0d2fedbccee3cdb29c89da7d07cf44425cfb7d25dcc022100907e0ee946aec1b4d4d686bb6cc22e09c035672c7595e4c2bbfa575c84a58b72:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e3197ee26d9a33ce29fd4c4d0641965e50f542e4fb7bb0f5ba6941627d2dcf0502201f3daf9691d36d40df94de608d0e527a506b79315ccff56abb94fe6d8df1446e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2019/CVE-2019-14287.yaml b/code/cves/2019/CVE-2019-14287.yaml index 415dc0c44ce..dc97244afe4 100644 --- a/code/cves/2019/CVE-2019-14287.yaml +++ b/code/cves/2019/CVE-2019-14287.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2019-14287 cwe-id: CWE-755 epss-score: 0.86126 - epss-percentile: 0.99362 + epss-percentile: 0.99363 cpe: cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* metadata: verified: true @@ -51,4 +51,4 @@ code: - '!contains(code_1_response, "root")' - 'contains(code_2_response, "root")' condition: and -# digest: 4a0a00473045022100f5d6f1c29f7b3636a4732fb28b51323249ff337eee53d5989e440fa9cf735b570220408063459aa47dbac7de7bdc8fed2d17e1ef8ba534daf253db160bf459e823a1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207da3bb682a789a7befbba813fd1ffd86e0b8f4256cb07ef859129b6c5ad2d7b602206521b9e23d2ab773c9a3261121074090d038e2282951efab12bb1d6a0a4fcc7f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2020/CVE-2020-0646.yaml b/code/cves/2020/CVE-2020-0646.yaml index 95a069e3b39..01d4285d662 100644 --- a/code/cves/2020/CVE-2020-0646.yaml +++ b/code/cves/2020/CVE-2020-0646.yaml @@ -106,4 +106,4 @@ code: - 'contains(content_type, "text/xml")' - 'status_code == 200' condition: and -# digest: 490a00463044022041a7ae65857291d9e5e3716a9e3c05795ca37f767229f56e91677546f8f896c20220169ad7d648465aaef9fbb6bcf5f6b78a4f5e21d028419891e139ea45c3be176a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c96573c5a4813321bb19d7fbc07d2cf214ec421e5420d23a865cc2e73a273af7022100d1cdfeb81dd7ddeab0c6b62f36add3be2c6dc9c580b44f5efebb072e31f177d6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2020/CVE-2020-13935.yaml b/code/cves/2020/CVE-2020-13935.yaml index 0914cc82a95..54ec847f32e 100644 --- a/code/cves/2020/CVE-2020-13935.yaml +++ b/code/cves/2020/CVE-2020-13935.yaml @@ -14,8 +14,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H cvss-score: 7.5 cve-id: CVE-2020-13935 - epss-score: 0.91745 - epss-percentile: 0.99663 + epss-score: 0.92155 + epss-percentile: 0.99694 reference: - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html diff --git a/code/cves/2021/CVE-2021-3156.yaml b/code/cves/2021/CVE-2021-3156.yaml index c5272212a85..3e678893722 100644 --- a/code/cves/2021/CVE-2021-3156.yaml +++ b/code/cves/2021/CVE-2021-3156.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2021-3156 cwe-id: CWE-193 epss-score: 0.92391 - epss-percentile: 0.99713 + epss-percentile: 0.99714 cpe: cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* metadata: verified: true @@ -44,4 +44,4 @@ code: - "malloc(): memory corruption" - "Aborted (core dumped)" condition: and -# digest: 490a0046304402205cfcfa397bb2608165b4222e0c38dad3e73fc733e6960656c52df93dd3751f7302207b36084a4b35a19edd4ce94b42f35f00d018ef1fb8f0500424dc04f8a503924b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203df9be461a57614c6b46ca49c35b41fa6b2fb2534c980d84e6236ce47fdb4e8e02204fa5b6af49da2b129dc26e6eb1d3c60fc01f59a836a7940f4ec9e751519fccc5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2023/CVE-2023-2640.yaml b/code/cves/2023/CVE-2023-2640.yaml index a4820667bf9..5aba5938a2a 100644 --- a/code/cves/2023/CVE-2023-2640.yaml +++ b/code/cves/2023/CVE-2023-2640.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.8 cve-id: CVE-2023-2640 cwe-id: CWE-863 - epss-score: 0.91742 - epss-percentile: 0.99663 + epss-score: 0.91622 + epss-percentile: 0.99657 cpe: cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:* metadata: verified: true @@ -55,4 +55,4 @@ code: - '!contains(code_1_response, "(root)")' - 'contains(code_2_response, "(root)")' condition: and -# digest: 4a0a00473045022100d3a5d0c93ae0db1aec4ed3298693356385389c2a3904faa3f1598cf66be17b6a02205f5c6b9982a210c77c649492b93de08b90fefa55aa003c8ad448739ad54586ac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f28c89bda9b71065f22cdb961366a405a7ff70cab3b32fa4121c4c5169b99783022100c4626e893dd6d4d1222bc88cd8ef54de9040c38ec1a28c81b1b6ba16b29bd345:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2023/CVE-2023-2986.yaml b/code/cves/2023/CVE-2023-2986.yaml index b1f4223bf1e..d82e27b6087 100644 --- a/code/cves/2023/CVE-2023-2986.yaml +++ b/code/cves/2023/CVE-2023-2986.yaml @@ -21,7 +21,7 @@ info: cvss-score: 9.8 cve-id: CVE-2023-2986 epss-score: 0.91644 - epss-percentile: 0.99658 + epss-percentile: 0.99657 cpe: cpe:2.3:a:tychesoftwares:abandoned_cart_lite_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -630,4 +630,4 @@ http: - type: status status: - 302 -# digest: 4a0a00473045022008a14b4c6185d0bc2c69d71aaa1b2328762f561452ad966026615e59dbf04990022100ed0e980dcd1616714e09727046b3ca727b8ae8db4b5681477777e454ab7d38ba:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bf5d88244dafec46b9a1c485da172072206337f5b655980de897ee0e8adb2312022100e18f9d073b8719c2450ae08c9a76473cdeadc4726f2024179ccccf156fbb8a2d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2023/CVE-2023-49105.yaml b/code/cves/2023/CVE-2023-49105.yaml index 2a8a95946ce..e3bf90d3ec5 100644 --- a/code/cves/2023/CVE-2023-49105.yaml +++ b/code/cves/2023/CVE-2023-49105.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-49105 cwe-id: CWE-287 - epss-score: 0.89272 - epss-percentile: 0.99519 + epss-score: 0.89605 + epss-percentile: 0.99534 cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -94,4 +94,4 @@ http: - type: dsl dsl: - '"Username => "+ username' -# digest: 4a0a004730450220429ad695a2f91f2466f2451866717b21b5f4b6073a008576bca1243242e85dae022100bba07b4ff0a1d1c16e741c437882baa4da951d53bac7ad7ba1f2a5b1d54c46c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f2c8146f3a68b4e6c557638c0ca3513a594bb918996e84e79d2fea143a0bf17b022100fdd20b9d914958210586cac97c98e3a87edc8527b8d1e2d17804cbb926e6c301:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2023/CVE-2023-4911.yaml b/code/cves/2023/CVE-2023-4911.yaml index a3715d6f38a..be1680b92c6 100644 --- a/code/cves/2023/CVE-2023-4911.yaml +++ b/code/cves/2023/CVE-2023-4911.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2023-4911 cwe-id: CWE-787,CWE-122 epss-score: 0.67806 - epss-percentile: 0.98512 + epss-percentile: 0.98514 cpe: cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ code: - type: word words: - "139" # Segmentation Fault Exit Code -# digest: 490a00463044022076da9c731115d9954b91f459db5225734d74415ab2689f245f727d2c01b2807502206ee633dcd8818546d3be18db948572bf757376d2cbc3f1b057ebbce34110e45e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022022ec2980e8d990ae3cdd528b8cbbdd77a35f173cddff532448d362e5074657ba02201883d9455c8c67e03a6757fb1ae61a88a75baf45995e984c01ef1b45219fe318:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2023/CVE-2023-6246.yaml b/code/cves/2023/CVE-2023-6246.yaml index ca6044d49b2..443cc47ceb0 100644 --- a/code/cves/2023/CVE-2023-6246.yaml +++ b/code/cves/2023/CVE-2023-6246.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.8 cve-id: CVE-2023-6246 cwe-id: CWE-787,CWE-122 - epss-score: 0.29143 - epss-percentile: 0.96409 + epss-score: 0.22922 + epss-percentile: 0.95712 cpe: cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ code: - type: word words: - "127" # Segmentation Fault Exit Code -# digest: 4a0a00473045022100a1a80718f7ac6e9348290a741c745eb5cdf9f0193873f35de00407e0b062c4d60220282d173fd43407415eec2dc95008de9f96440070aa8ed3aa5864ea30ad10516b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022008ea0e1d19e6cd011eda4d8b8dcb960f7a6ba1867bedbadbd2f911734d9050b9022100cc3879611fcd1bb9a5f07c9606501175c03175ea70af86bf5c40a3d0f8cce02d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2024/CVE-2024-10443.yaml b/code/cves/2024/CVE-2024-10443.yaml index 9f97297f35d..9e18a75ccb1 100644 --- a/code/cves/2024/CVE-2024-10443.yaml +++ b/code/cves/2024/CVE-2024-10443.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2024-10443 cwe-id: CWE-77 - epss-score: 0.69055 - epss-percentile: 0.98569 + epss-score: 0.7214 + epss-percentile: 0.98689 cpe: cpe:2.3:a:synology:photos:*:*:*:*:*:diskstation_manager:*:* metadata: verified: true @@ -58,4 +58,4 @@ code: part: interactsh_protocol # Confirms the HTTP Interaction words: - "dns" -# digest: 4b0a00483046022100d3e04b1a81fa1667f85060c9cb2742bf9f20555d72f0c9e1de3b22c3a45ea068022100a2cb03bd80e74158eb2d002a6d73e7bca863c559f21e9679cbdecaa65dcfdb1f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220374d293099f0da779fff1b1ec2eb02947b67221160a226020942362a77ffcb9f02203f1bb6ada3f8683f6b43f51e02f23bad0cdb26510acceb45d50d103b4b9f3d83:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2024/CVE-2024-12356.yaml b/code/cves/2024/CVE-2024-12356.yaml index 8d314e0a515..4351117dd2b 100644 --- a/code/cves/2024/CVE-2024-12356.yaml +++ b/code/cves/2024/CVE-2024-12356.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2024-12356 cwe-id: CWE-77 epss-score: 0.93687 - epss-percentile: 0.99833 + epss-percentile: 0.99832 cpe: cpe:2.3:a:beyondtrust:privileged_remote_access:*:*:*:*:*:*:*:* metadata: vendor: beyondtrust @@ -41,4 +41,4 @@ code: words: - "0 success" - "1 try again later" -# digest: 490a00463044022031883e8523fba2bdc5aa0009e1f9406e252d48f2ad971247895541e6d2503da40220468743f44ef99fdabf662caf744c73b08798ccc56bf68a339658e5a086930fdc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d22f13c871af74d4d54736cd710e0c61d35d86950ea5e2498da77777c49093c602206800f1ce2cd662725e1214dd4bfad26d4c92da140c586d1aa9e20f5a71e6d3f1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2024/CVE-2024-3094.yaml b/code/cves/2024/CVE-2024-3094.yaml index 9c293fe7567..d61bb52c482 100644 --- a/code/cves/2024/CVE-2024-3094.yaml +++ b/code/cves/2024/CVE-2024-3094.yaml @@ -21,8 +21,8 @@ info: cvss-score: 10 cve-id: CVE-2024-3094 cwe-id: CWE-506 - epss-score: 0.86551 - epss-percentile: 0.99382 + epss-score: 0.86337 + epss-percentile: 0.99373 cpe: cpe:2.3:a:tukaani:xz:5.6.0:*:*:*:*:*:*:* metadata: verified: true @@ -63,4 +63,4 @@ code: - type: dsl dsl: - response -# digest: 490a00463044022014fd1e5eb3022a651bf87f38ed8f507a52bc8d6d9f7cb008bfeebe4d5ee404c20220465047efb6aeb95c67015b0ffea815ceac3fbc950ae5737058ae800c9aa36b23:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d88732ff6ab18871a93e119e21aeba1e72ddedab750a2b9839b79cd4dd6a465e022049955049f492403207fa73fbc70f83443388408d57c885d00129bc0bd122c3bc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2024/CVE-2024-4340.yaml b/code/cves/2024/CVE-2024-4340.yaml index f45b0c67ea0..de05cfb4b0e 100644 --- a/code/cves/2024/CVE-2024-4340.yaml +++ b/code/cves/2024/CVE-2024-4340.yaml @@ -15,7 +15,7 @@ info: cvss-score: 7.5 cve-id: CVE-2024-4340 epss-score: 0.16207 - epss-percentile: 0.94586 + epss-percentile: 0.94592 reference: - https://nvd.nist.gov/vuln/detail/CVE-2024-4340 tags: cve,cve2024,py,code,dos,python,sqlparse,vuln @@ -33,4 +33,4 @@ code: part: stderr words: - "RecursionError: maximum recursion depth exceeded" -# digest: 4a0a004730450221008445c5b343b31c7c11cf98927229e3ad5b8f58033c60a49150c0b3caa3261f9a02205055c0578fb3c250b931d4fad851ca15c667b5a831e77c41625df155bb17d899:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b7e5231bb73f5191d7c29e57159b1361c52d90a075c710be2f0211a1ff6cd283022100d78011532136088c72bdbea14135f12af76a6f41755c4b48bd8461bf0d87a799:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2024/CVE-2024-45409.yaml b/code/cves/2024/CVE-2024-45409.yaml index 012e3871336..845682dd625 100644 --- a/code/cves/2024/CVE-2024-45409.yaml +++ b/code/cves/2024/CVE-2024-45409.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2024-45409 cwe-id: CWE-347 epss-score: 0.4139 - epss-percentile: 0.97253 + epss-percentile: 0.97256 metadata: verified: true shodan-query: http.title:"GitLab" @@ -123,4 +123,4 @@ http: - type: kval kval: - _gitlab_session -# digest: 4b0a00483046022100c7f4afb56eeedd4240914948ab5d367f00edf09677838a4fd2e520da8f9c6ba1022100e1f762c58b03c7523ef350ef26844265033e808dbaadc2dec54578866c03d900:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205e1e58c24c7c303ef9f7cd6a7ab5011310029bd59b92e4ac3a9c028d3b5d87c80220238e2e9f37840c9e8288d4f11b42a8fb9ff078ca3359de4904640fc514848805:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2024/CVE-2024-55556.yaml b/code/cves/2024/CVE-2024-55556.yaml index fdbf63be86b..bbf257bb9e1 100644 --- a/code/cves/2024/CVE-2024-55556.yaml +++ b/code/cves/2024/CVE-2024-55556.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2024-55556 cwe-id: CWE-502 epss-score: 0.8111 - epss-percentile: 0.99115 + epss-percentile: 0.99117 metadata: verified: true max-request: 2 @@ -195,4 +195,4 @@ http: - type: status status: - 500 -# digest: 4b0a004830460221008c53a3d6242e7592a9565dc4369af5936aabe40abc249ee5f72208bc90d2b68b022100f5ffb6b426c8d1bcdfb46a0a48d6052d8fa9b115b0c3f6ce8b36a332dfcc8c31:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a9125429fa23be79c8f83ac804947393ed1a038fe8fb9d0a2f2b58d19102effc02204ccdb0294abeb3f2c3a6863fabaa0253f027d386cf62e8afdc56bc0ae5b74224:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2024/CVE-2024-56331.yaml b/code/cves/2024/CVE-2024-56331.yaml index 0138ef4f5f3..eeabe6cd805 100644 --- a/code/cves/2024/CVE-2024-56331.yaml +++ b/code/cves/2024/CVE-2024-56331.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2024-56331 cwe-id: CWE-22 epss-score: 0.41406 - epss-percentile: 0.97255 + epss-percentile: 0.97258 metadata: verified: true shodan-query: http.title:"Uptime Kuma" @@ -124,4 +124,4 @@ code: - type: word words: - "/etc/passwd: {'ok': True, 'msg': 'successAdded'" -# digest: 4b0a0048304602210081e1042706a64b70db0ab64b76d21297329a5341f297f585f63bcfcf21371459022100ba42f7f74b411b08ba3b2f399bf99ee5b72a893a94e7139caac7c3442d8c1e95:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210081d663266d1a8e020034b26b334e6ea9e77d3d9e559d0214133f5597fb95743c022100c3b983222b475d1d5392816cdb463564febf97af2d55971cd5d4d81bcc277872:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2024/CVE-2024-9487.yaml b/code/cves/2024/CVE-2024-9487.yaml index 06b5533f7d6..2a909fc986d 100644 --- a/code/cves/2024/CVE-2024-9487.yaml +++ b/code/cves/2024/CVE-2024-9487.yaml @@ -15,7 +15,7 @@ info: - https://github.com/advisories/GHSA-g83h-4727-5rpv classification: epss-score: 0.55491 - epss-percentile: 0.97963 + epss-percentile: 0.97962 metadata: verified: true shodan-query: title:"GitHub Enterprise" @@ -192,4 +192,4 @@ http: - type: kval kval: - user_session -# digest: 4a0a0047304502207ef2ddc017cd9d473413145910bf3ff9fc85e12eb5bc48ac49855be2ba866d0d022100c9b40bb36975093c598f16088207a0cb1c353bb30c187fe66eb6e57980781498:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c770ceeca2c28599d58e831bb3abb9c1e49ca0e6389596cb27b53dbda677dd2b02207fc9ee2ff8cee94f825f9e7bdcbb424611235b3f8b0bc0fd486e9179b1e24a67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2025/CVE-2025-1550.yaml b/code/cves/2025/CVE-2025-1550.yaml index 6782e3582d6..3df88d6a1ef 100644 --- a/code/cves/2025/CVE-2025-1550.yaml +++ b/code/cves/2025/CVE-2025-1550.yaml @@ -16,7 +16,7 @@ info: - https://towerofhanoi.it/writeups/cve-2025-1550/ classification: epss-score: 0.04785 - epss-percentile: 0.89105 + epss-percentile: 0.89113 metadata: max-request: 1 tags: cve,cve2025,code,keras,rce,ml @@ -77,4 +77,4 @@ code: part: response regex: - "root:.*:0:0:" -# digest: 4a0a00473045022100d7f2d658048610f9bfca12dce3884c7bbc1b71c4725630f3ed362fdc1aa60d2402200ef37aed20f7ab70b95f79e25a13ba76369336a4ee16a3731b40bbfcf258c28c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100aeb9a8661a3c1e41f14d272ea05313fcf68b0b79f351c6602ad4b195f51c2e29022053ea2c3df2f8900e8961ae7ad89cef2e6bd900e1bb27793c9e161716eb46af8e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2025/CVE-2025-25291.yaml b/code/cves/2025/CVE-2025-25291.yaml index e20884c8581..5c50c5c000c 100644 --- a/code/cves/2025/CVE-2025-25291.yaml +++ b/code/cves/2025/CVE-2025-25291.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2025-25291 cwe-id: CWE-347 epss-score: 0.17247 - epss-percentile: 0.948 + epss-percentile: 0.94803 metadata: verified: true vendor: gitlab @@ -80,4 +80,4 @@ http: - type: kval kval: - _gitlab_session -# digest: 4a0a00473045022036bb3cc40046a1ef71a2d32ee557a23427c47ae5bcc8ee0eb5b0775897a785e7022100ef2ae6ac5f8cb4d4c6cc3375d174658974fa65f63d770ed7d3c251eae6fa6703:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220199e22ffc707e5e70a31ea0a473ad005099d5b181b09e23e4c9704e05b1a1b42022100ea364205256ab01eb82189f31c010a392d8c2b60846438c83bff80efcc3dd4e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2025/CVE-2025-32433.yaml b/code/cves/2025/CVE-2025-32433.yaml index bd5f3f8384e..75aafc591c2 100644 --- a/code/cves/2025/CVE-2025-32433.yaml +++ b/code/cves/2025/CVE-2025-32433.yaml @@ -22,8 +22,8 @@ info: cvss-score: 10 cve-id: CVE-2025-32433 cwe-id: CWE-306 - epss-score: 0.36694 - epss-percentile: 0.96978 + epss-score: 0.39914 + epss-percentile: 0.97172 metadata: verified: true max-request: 1 @@ -174,4 +174,4 @@ code: dsl: - 'contains(interactsh_protocol, "dns")' condition: and -# digest: 4a0a00473045022068463b8fc122f93e4c9fa0f160da47eab232fe29596f28b098c068761426c2ea022100c3f55c996013d09e934b2d2c611663fe2a51d337cc02d8e4af28e925ef58e40b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210089caff65890152593d77472891d17c1e5c58752e8b9c2026ddc62cddbdaf2cbc02203d41262aa4b38979d8947b4493eae5763b8c72009a2c5dee2bde4dfd39a6aad1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2025/CVE-2025-54309.yaml b/code/cves/2025/CVE-2025-54309.yaml index 464bba8b166..820be5ad401 100644 --- a/code/cves/2025/CVE-2025-54309.yaml +++ b/code/cves/2025/CVE-2025-54309.yaml @@ -18,7 +18,7 @@ info: cvss-score: 9.8 cve-id: CVE-2025-54309 epss-score: 0.62076 - epss-percentile: 0.98261 + epss-percentile: 0.9826 cwe-id: CWE-287,CWE-362 cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:* metadata: @@ -200,4 +200,4 @@ code: - type: word words: - "VULNERABLE:" -# digest: 4b0a00483046022100a762208b9bde1e0690ea7ea47f89cff74454e4a2a4bbf9b754266aa33d869aa5022100ea0edee48c304bf264f7478c5c168e8393ae5e60cdb0ca31c4fc435ae3fa0e63:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b8b0ff3ae7c02f2f27104534b69a39f7638c48f72b80949f0abf06f53494c2e6022100c9a7bf7331ea4af2a8959faa9352c1db6ee785cc238cdf56b6faa94f9665336d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2025/CVE-2025-6216.yaml b/code/cves/2025/CVE-2025-6216.yaml index 0c8f388882f..f9c0c19e160 100644 --- a/code/cves/2025/CVE-2025-6216.yaml +++ b/code/cves/2025/CVE-2025-6216.yaml @@ -15,8 +15,8 @@ info: - https://alltena.com/en/resources/release-notes/release-notes-for-release-8-1-4-and-release-7-5-2 - https://nvd.nist.gov/vuln/detail/CVE-2025-6216 classification: - epss-score: 0.22305 - epss-percentile: 0.95618 + epss-score: 0.24065 + epss-percentile: 0.95851 cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2025-6216 @@ -115,4 +115,4 @@ code: - type: dsl # type of the extractor dsl: - '"Reset URL: " + code_response' -# digest: 4b0a00483046022100dffd2e7cc6c9f81ce806ade510d18941771962110bed5fa117d9c8e158c3f66d022100c106cc951d5aad29230bd934e578ad72e1e2eb805684b909f17b880e9c97c4d2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bac331e2e9e612056556bf52e03b87accc55b591c0c48083aabc8d819e9ca8b1022011f71b2a8dc89d81088df9d2b68ed1f8cc449420ffd96646c15bff5effeebe2a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2025/CVE-2025-9242.yaml b/code/cves/2025/CVE-2025-9242.yaml index f3a81e5976f..a8d597ee26e 100644 --- a/code/cves/2025/CVE-2025-9242.yaml +++ b/code/cves/2025/CVE-2025-9242.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2025-9242 cwe-id: CWE-787,CWE-362 epss-score: 0.73453 - epss-percentile: 0.98746 + epss-percentile: 0.98749 cpe: cpe:2.3:a:watchguard:fireware_os:*:*:*:*:*:*:* metadata: verified: true @@ -552,4 +552,4 @@ code: - type: dsl dsl: - response -# digest: 4a0a0047304502206612cc63a0a9ecb82c38292247845264fa8f0613eb9f792a5ba27a51d4e6cb4a022100824bd78e8ff4f955048ce2d89638b0b2121986ff219c099bd961cd9c4250e5c3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220595c7b38f61f58887e22c732df7502e6a93a95721db2295487f20a3073d125c2022100e90ed71640aa83d728b09cef604bab554d4b122c1848c296d1ea06e8518e8a09:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cves.json b/cves.json index 9be433a3333..450e2d81956 100644 --- a/cves.json +++ b/cves.json @@ -901,6 +901,7 @@ {"ID":"CVE-2019-8943","Info":{"Name":"WordPress Core 5.0.0 - Crop-image Shell Upload","Severity":"medium","Description":"WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.\n","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2019/CVE-2019-8943.yaml"} {"ID":"CVE-2019-8982","Info":{"Name":"Wavemaker Studio 6.6 - Local File Inclusion/Server-Side Request Forgery","Severity":"critical","Description":"WaveMaker Studio 6.6 mishandles the studioService.download?method=getContent\u0026inUrl= value in com/wavemaker/studio/StudioService.java, leading to disclosure of local files and server-side request forgery.","Classification":{"CVSSScore":"9.6"}},"file_path":"http/cves/2019/CVE-2019-8982.yaml"} {"ID":"CVE-2019-9041","Info":{"Name":"ZZZCMS 1.6.1 - Remote Code Execution","Severity":"high","Description":"ZZZCMS zzzphp V1.6.1 is vulnerable to remote code execution via the inc/zzz_template.php file because the parserIfLabel() function's filtering is not strict, resulting in PHP code execution as demonstrated by the if:assert substring.","Classification":{"CVSSScore":"7.2"}},"file_path":"http/cves/2019/CVE-2019-9041.yaml"} +{"ID":"CVE-2019-9082","Info":{"Name":"ThinkPHP \u003c 3.2.4 - Remote Code Execution","Severity":"high","Description":"ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via the s parameter in index.php through the invokefunction functionality.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2019/CVE-2019-9082.yaml"} {"ID":"CVE-2019-9194","Info":{"Name":"elFinder \u003c= 2.1.47 - Command Injection","Severity":"critical","Description":"elFinder before 2.1.48 has a command injection vulnerability in the PHP connector.\nThe vulnerability occurs when performing image operations on JPEG files, where the filename\nis passed to the `exiftran` utility without proper sanitization, allowing command injection.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-9194.yaml"} {"ID":"CVE-2019-9618","Info":{"Name":"WordPress GraceMedia Media Player 1.0 - Local File Inclusion","Severity":"critical","Description":"WordPress GraceMedia Media Player plugin 1.0 is susceptible to local file inclusion via the cfg parameter.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-9618.yaml"} {"ID":"CVE-2019-9621","Info":{"Name":"Zimbra Collaboration Suite - SSRF","Severity":"high","Description":"Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, and 8.8.x before 8.8.10 patch 7 or 8.8.x before 8.8.11 patch 3 allows SSRF via the ProxyServlet component.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2019/CVE-2019-9621.yaml"} @@ -1274,6 +1275,7 @@ {"ID":"CVE-2021-22054","Info":{"Name":"VMWare Workspace ONE UEM - Server-Side Request Forgery","Severity":"high","Description":"VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain a server-side request forgery vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2021/CVE-2021-22054.yaml"} {"ID":"CVE-2021-22122","Info":{"Name":"FortiWeb - Cross Site Scripting","Severity":"medium","Description":"FortiWeb 6.3.0 through 6.3.7 and versions before 6.2.4 contain an unauthenticated cross-site scripting vulnerability. Improper neutralization of input during web page generation can allow a remote attacker to inject malicious payload in vulnerable API end-points.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2021/CVE-2021-22122.yaml"} {"ID":"CVE-2021-22145","Info":{"Name":"Elasticsearch 7.10.0-7.13.3 - Information Disclosure","Severity":"medium","Description":"ElasticSsarch 7.10.0 to 7.13.3 is susceptible to information disclosure. A user with the ability to submit arbitrary queries can submit a malformed query that results in an error message containing previously used portions of a data buffer. This buffer can contain sensitive information such as Elasticsearch documents or authentication details, thus potentially leading to data modification and/or execution of unauthorized operations.","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2021/CVE-2021-22145.yaml"} +{"ID":"CVE-2021-22175","Info":{"Name":"GitLab CI Lint API - Server-Side Request Forgery","Severity":"high","Description":"GitLab 10.5 and later contain a server-side request forgery caused by insecure handling of webhook requests, letting unauthenticated attackers exploit the server for arbitrary requests, exploit requires sending crafted webhook requests.\n","Classification":{"CVSSScore":"8.6"}},"file_path":"http/cves/2021/CVE-2021-22175.yaml"} {"ID":"CVE-2021-22205","Info":{"Name":"GitLab CE/EE - Remote Code Execution","Severity":"critical","Description":"GitLab CE/EE starting from 11.9 does not properly validate image files that were passed to a file parser, resulting in a remote command execution vulnerability. This template attempts to passively identify vulnerable versions of GitLab without the need for an exploit by matching unique hashes for the application-\u003chash\u003e.css file in the header for unauthenticated requests. Positive matches do not guarantee exploitability. Tooling to find relevant hashes based on the semantic version ranges specified in the CVE is linked in the references section below.","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2021/CVE-2021-22205.yaml"} {"ID":"CVE-2021-22214","Info":{"Name":"Gitlab CE/EE 10.5 - Server-Side Request Forgery","Severity":"high","Description":"GitLab CE/EE versions starting from 10.5 are susceptible to a server-side request forgery vulnerability when requests to the internal network for webhooks are enabled, even on a GitLab instance where registration is limited. The same vulnerability actually spans multiple CVEs, due to similar reports that were fixed across separate patches. These CVEs are:\n- CVE-2021-39935\n- CVE-2021-22214\n- CVE-2021-22175\n","Classification":{"CVSSScore":"8.6"}},"file_path":"http/cves/2021/CVE-2021-22214.yaml"} {"ID":"CVE-2021-22502","Info":{"Name":"Micro Focus Operations Bridge Reporter - Remote Code Execution","Severity":"critical","Description":"Micro Focus Operations Bridge Reporter 10.40 is susceptible to remote code execution. An attacker can potentially execute malware, obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-22502.yaml"} @@ -1801,6 +1803,7 @@ {"ID":"CVE-2022-0735","Info":{"Name":"GitLab CE/EE - Information Disclosure","Severity":"critical","Description":"GitLab CE/EE is susceptible to information disclosure. An attacker can access runner registration tokens using quick actions commands, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations. Affected versions are from 12.10 before 14.6.5, from 14.7 before 14.7.4, and from 14.8 before 14.8.2.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2022/CVE-2022-0735.yaml"} {"ID":"CVE-2022-0747","Info":{"Name":"Infographic Maker iList \u003c 4.3.8 - SQL Injection","Severity":"critical","Description":"The Infographic Maker WordPress plugin before 4.3.8 does not validate and escape the post_id parameter before using it in a SQL statement via the qcld_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2022/CVE-2022-0747.yaml"} {"ID":"CVE-2022-0760","Info":{"Name":"WordPress Simple Link Directory \u003c7.7.2 - SQL injection","Severity":"critical","Description":"WordPress Simple Link Directory plugin before 7.7.2 contains a SQL injection vulnerability. The plugin does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action, available to unauthenticated and authenticated users. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2022/CVE-2022-0760.yaml"} +{"ID":"CVE-2022-0765","Info":{"Name":"WordPress Loco Translate \u003c 2.6.1 - Cross-Site Scripting","Severity":"medium","Description":"Loco Translate WordPress plugin before 2.6.1 contains a stored cross-site scripting vulnerability caused by improper removal of inline events from source translation strings, allowing authenticated users to inject arbitrary JavaScript payloads.\n","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2022/CVE-2022-0765.yaml"} {"ID":"CVE-2022-0769","Info":{"Name":"Users Ultra \u003c= 3.1.0 - SQL Injection","Severity":"critical","Description":"The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2022/CVE-2022-0769.yaml"} {"ID":"CVE-2022-0773","Info":{"Name":"Documentor \u003c= 1.5.3 - Unauthenticated SQL Injection","Severity":"critical","Description":"The Documentor WordPress plugin through 1.5.3 fails to sanitize and escape user input before it is being interpolated in an SQL statement and then executed, leading to an SQL Injection exploitable by unauthenticated users.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2022/CVE-2022-0773.yaml"} {"ID":"CVE-2022-0776","Info":{"Name":"RevealJS postMessage \u003c4.3.0 - Cross-Site Scripting","Severity":"medium","Description":"RevealJS postMessage before 4.3.0 contains a cross-site scripting vulnerability via the document object model.","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2022/CVE-2022-0776.yaml"} @@ -2928,6 +2931,7 @@ {"ID":"CVE-2024-24809","Info":{"Name":"Traccar - Unrestricted File Upload","Severity":"high","Description":"Traccar is an open source GPS tracking system. Versions prior to 6.0 are vulnerable to path traversal and unrestricted upload of file with dangerous type. Since the system allows registration by default, attackers can acquire ordinary user permissions by registering an account and exploit this vulnerability to upload files with the prefix `device.` under any folder. Attackers can use this vulnerability for phishing, cross-site scripting attacks, and potentially execute arbitrary commands on the server. Version 6.0 contains a patch for the issue.\n","Classification":{"CVSSScore":"8.5"}},"file_path":"http/cves/2024/CVE-2024-24809.yaml"} {"ID":"CVE-2024-24919","Info":{"Name":"Check Point Quantum Gateway - Information Disclosure","Severity":"high","Description":"Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.\n","Classification":{"CVSSScore":"8.6"}},"file_path":"http/cves/2024/CVE-2024-24919.yaml"} {"ID":"CVE-2024-25600","Info":{"Name":"Unauthenticated Remote Code Execution – Bricks \u003c= 1.9.6","Severity":"critical","Description":"Bricks Builder is a popular WordPress development theme with approximately 25,000 active installations. It provides an intuitive drag-and-drop interface for designing and building WordPress websites. Bricks \u003c= 1.9.6 is vulnerable to unauthenticated remote code execution (RCE) which means that anybody can run arbitrary commands and take over the site/server. This can lead to various malicious activities\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-25600.yaml"} +{"ID":"CVE-2024-25608","Info":{"Name":"Liferay Portal - Open Redirect","Severity":"medium","Description":"HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.18, and older unsupported versions, and Liferay DXP 7.4 before update 19, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions can be circumvented by using the 'REPLACEMENT CHARACTER' (U+FFFD), which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, (3) `noSuchEntryRedirect` parameter, and (4) others parameters that rely on HtmlUtil.escapeRedirect.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2024/CVE-2024-25608.yaml"} {"ID":"CVE-2024-25669","Info":{"Name":"CaseAware a360inc - Cross-Site Scripting","Severity":"medium","Description":"a360inc CaseAware contains a reflected cross-site scripting vulnerability via the user parameter transmitted in the login.php query string. This is a bypass of the fix reported in 2017\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2024/CVE-2024-25669.yaml"} {"ID":"CVE-2024-25723","Info":{"Name":"ZenML ZenML Server - Improper Authentication","Severity":"critical","Description":"ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-25723.yaml"} {"ID":"CVE-2024-25735","Info":{"Name":"WyreStorm Apollo VX20 - Information Disclosure","Severity":"high","Description":"An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext credentials for the SoftAP (access point) Router /device/config using an HTTP GET request.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-25735.yaml"} @@ -2949,6 +2953,7 @@ {"ID":"CVE-2024-27954","Info":{"Name":"WordPress Automatic Plugin \u003c3.92.1 - Arbitrary File Download and SSRF","Severity":"critical","Description":"WordPress Automatic plugin \u003c3.92.1 is vulnerable to unauthenticated Arbitrary File Download and SSRF Located in the downloader.php file, could permit attackers to download any file from a site. Sensitive data, including login credentials and backup files, could fall into the wrong hands. This vulnerability has been patched in version 3.92.1.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-27954.yaml"} {"ID":"CVE-2024-27956","Info":{"Name":"WordPress Automatic Plugin \u003c= 3.92.0 - SQL Injection","Severity":"critical","Description":"The Automatic plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 3.92.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n","Classification":{"CVSSScore":"9.9"}},"file_path":"http/cves/2024/CVE-2024-27956.yaml"} {"ID":"CVE-2024-28000","Info":{"Name":"WordPress LiteSpeed Cache - Unauthenticated Privilege Escalation to Admin","Severity":"critical","Description":"Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Privilege Escalation.This issue affects LiteSpeed Cache: from 1.9 through 6.3.0.1.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-28000.yaml"} +{"ID":"CVE-2024-28200","Info":{"Name":"N-able N-central \u003c 2024.2 - Authentication Bypass Detection","Severity":"critical","Description":"N-central server versions prior to 2024.2 contain an authentication bypass in the user interface, letting attackers access restricted areas without proper credentials, exploit requires no specific conditions.\n","Classification":{"CVSSScore":"9.1"}},"file_path":"http/cves/2024/CVE-2024-28200.yaml"} {"ID":"CVE-2024-28253","Info":{"Name":"OpenMetaData - SpEL Injection in PUT /api/v1/policies","Severity":"critical","Description":"OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. `CompiledRule::validateExpression` is also called from `PolicyRepository.prepare`. `prepare()` is called from `EntityRepository.prepareInternal()` which, in turn, gets called from `EntityResource.createOrUpdate()`. Note that even though there is an authorization check (`authorizer.authorize()`), it gets called after `prepareInternal()` gets called and therefore after the SpEL expression has been evaluated. In order to reach this method, an attacker can send a PUT request to `/api/v1/policies` which gets handled by `PolicyResource.createOrUpdate()`. This vulnerability was discovered with the help of CodeQL's Expression language injection (Spring) query and is also tracked as `GHSL-2023-252`. This issue may lead to Remote Code Execution and has been addressed in version 1.3.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n","Classification":{"CVSSScore":"9.4"}},"file_path":"http/cves/2024/CVE-2024-28253.yaml"} {"ID":"CVE-2024-28255","Info":{"Name":"OpenMetadata - Authentication Bypass","Severity":"critical","Description":"OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `JwtFilter` handles the API authentication by requiring and verifying JWT tokens. When a new request comes in, the request's path is checked against this list. When the request's path contains any of the excluded endpoints the filter returns without validating the JWT. Unfortunately, an attacker may use Path Parameters to make any path contain any arbitrary strings. For example, a request to `GET /api/v1;v1%2fusers%2flogin/events/subscriptions/validation/condition/111` will match the excluded endpoint condition and therefore will be processed with no JWT validation allowing an attacker to bypass the authentication mechanism and reach any arbitrary endpoint, including the ones listed above that lead to arbitrary SpEL expression injection. This bypass will not work when the endpoint uses the `SecurityContext.getUserPrincipal()` since it will return `null` and will throw an NPE. This issue may lead to authentication bypass and has been addressed in version 1.2.4. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-237`.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-28255.yaml"} {"ID":"CVE-2024-28397","Info":{"Name":"pyload-ng js2py - Remote Code Execution","Severity":"medium","Description":"An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2024/CVE-2024-28397.yaml"} @@ -3021,6 +3026,7 @@ {"ID":"CVE-2024-33724","Info":{"Name":"SOPlanning 1.52.00 Cross Site Scripting","Severity":"medium","Description":"SOPlanning v1.52.00 is vulnerable to XSS via the 'groupe_id' parameters a remote unautheticated attacker can hijack the admin account or other users. The remote attacker can hijack a users session or credentials and perform a takeover of the entire platform.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-33724.yaml"} {"ID":"CVE-2024-3378","Info":{"Name":"iboss Secure Web Gateway - Stored Cross-Site Scripting","Severity":"medium","Description":"A cross-site scripting vulnerability has been found in iboss Secure Web Gateway up to version 10.1. The vulnerability affects the /login file of the Login Portal component, where manipulation of the redirectUrl parameter leads to cross-site scripting. The attack can be launched remotely and the exploit has been disclosed to the public.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2024/CVE-2024-3378.yaml"} {"ID":"CVE-2024-33832","Info":{"Name":"OneNav v0.9.35-20240318 - Server-Side Request Forgery (SSRF)","Severity":"medium","Description":"OneNav v0.9.35-20240318 is vulnerable to server-side request forgery (SSRF) via the url parameter in the get_link_info API. An attacker can force the server to make arbitrary requests, potentially accessing internal resources.\n","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2024/CVE-2024-33832.yaml"} +{"ID":"CVE-2024-33939","Info":{"Name":"Masteriyo LMS \u003c= 1.7.3 - Insecure Direct Object Reference","Severity":"medium","Description":"Authentication Bypass Using an Alternate Path or Channel vulnerability in Masteriyo Masteriyo - LMS. Unauth access to course progress.This issue affects Masteriyo - LMS: from n/a through 1.7.3.\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2024/CVE-2024-33939.yaml"} {"ID":"CVE-2024-3400","Info":{"Name":"GlobalProtect - OS Command Injection","Severity":"critical","Description":"A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.\n","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2024/CVE-2024-3400.yaml"} {"ID":"CVE-2024-34061","Info":{"Name":"Changedetection.io \u003c=v0.45.21 - Cross-Site Scripting","Severity":"medium","Description":"Changedetection.io is a free open source web page change detection, website watcher, restock monitor and notification service. In affected versions Input in parameter notification_urls is not processed resulting in javascript execution in the application. A reflected XSS vulnerability happens when the user input from a URL or POST data is reflected on the page without being stored, thus allowing the attacker to inject malicious content. This issue has been addressed in version 0.45.22. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2024/CVE-2024-34061.yaml"} {"ID":"CVE-2024-34102","Info":{"Name":"Adobe Commerce \u0026 Magento - CosmicSting","Severity":"critical","Description":"Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-34102.yaml"} @@ -3334,6 +3340,7 @@ {"ID":"CVE-2025-11750","Info":{"Name":"Dify - User Enumeration via \"Account not found\" Message","Severity":"medium","Description":"A user enumeration vulnerability exists in langgenius/dify, where the login API leaks information about whether a user account exists or not. When an invalid/non-existent email is used during login, the API returns a distinct error message such as \"account_not_found\" or \"Account not found.\", allowing attackers to identify valid accounts.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2025/CVE-2025-11750.yaml"} {"ID":"CVE-2025-11833","Info":{"Name":"Post SMTP \u003c= 3.6.0 - Email Log Disclosure","Severity":"critical","Description":"Post SMTP WordPress plugin \u003c= 3.6.0 contains an unauthorized data access vulnerability caused by missing capability check in __construct function, letting unauthenticated attackers read arbitrary logged emails, exploit requires no authentication.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2025/CVE-2025-11833.yaml"} {"ID":"CVE-2025-12055","Info":{"Name":"MPDV Mikrolab GmbH HYDRA X, MIP 2 \u0026 FEDRA 2 - Path Traversal","Severity":"high","Description":"MPDV Mikrolab GmbH HYDRA X, MIP 2, and FEDRA 2 \u003c= Maintenance Pack 36 with Servicepack 8 (week 36/2025) contain an unauthenticated local file disclosure vulnerability caused by improper validation of the \"Filename\" parameter in the public $SCHEMAS$ resource, letting attackers read arbitrary Windows OS files, exploit requires local access.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2025/CVE-2025-12055.yaml"} +{"ID":"CVE-2025-12139","Info":{"Name":"Integrate Google Drive \u003c= 1.5.3 - Information Disclosure","Severity":"high","Description":"File Manager for Google Drive - Integrate Google Drive with WordPress plugin for WordPress \u003c= 1.5.3 contains sensitive information exposure caused by improper protection of the get_localize_data function, letting unauthenticated attackers extract Google OAuth credentials and account email addresses, exploit requires no authentication.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2025/CVE-2025-12139.yaml"} {"ID":"CVE-2025-12480","Info":{"Name":"Triofox - Improper Access Control","Severity":"critical","Description":"The Gladinet Triofox solution before 12.91.1126.65588 and CentreStack before 12.10.595.65696 allow unauthenticated access to the /management/admindatabase.aspx endpoint, exposing sensitive database management functionality to anyone with network access. An unauthenticated attacker can remotely access, view, and potentially interact with the database management interface, risking data disclosure or system compromise.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2025/CVE-2025-12480.yaml"} {"ID":"CVE-2025-1302","Info":{"Name":"JSONPath Plus \u003c 10.3.0 - Remote Code Execution","Severity":"critical","Description":"Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534]\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2025/CVE-2025-1302.yaml"} {"ID":"CVE-2025-1323","Info":{"Name":"WP-Recall – Plugin \u003c= 16.26.10 - Unauthenticated SQL Injection","Severity":"high","Description":"The WP-Recall – Registration, Profile, Commerce \u0026 More plugin for WordPress is vulnerable to SQL Injection via the 'databeat' parameter in all versions up to, and including, 16.26.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2025/CVE-2025-1323.yaml"} @@ -3567,6 +3574,7 @@ {"ID":"CVE-2025-64525","Info":{"Name":"Astro - Broken Access Control","Severity":"medium","Description":"Astro 2.16.0 to 5.15.5 contains a broken access control caused by insecure use of unsanitized x-forwarded-proto and x-forwarded-port headers in URL building, letting attackers bypass middleware protection, cause DoS, SSRF, and URL pollution, exploit requires crafted headers.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2025/CVE-2025-64525.yaml"} {"ID":"CVE-2025-64764","Info":{"Name":"Astro - Reflected XSS via server islands feature","Severity":"high","Description":"Astro 5.15.8 contains a reflected XSS caused by improper handling of server islands feature, letting remote attackers execute scripts, exploit requires use of server islands in the application.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2025/CVE-2025-64764.yaml"} {"ID":"CVE-2025-6851","Info":{"Name":"WordPress Broken Link Notifier \u003c 1.3.1 - Unauthenticated SSRF","Severity":"high","Description":"The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.0 via the ajax_blinks() function which ultimately calls the check_url_status_code() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2025/CVE-2025-6851.yaml"} +{"ID":"CVE-2025-68613","Info":{"Name":"n8n - Remote Code Execution via Expression Injection","Severity":"critical","Description":"n8n \u003c 1.120.4, 1.121.1, 1.122.0 contains a remote code execution caused by insufficient isolation in workflow expression evaluation, letting authenticated attackers execute arbitrary code with n8n process privileges. Exploit requires authentication.\n","Classification":{"CVSSScore":"9.9"}},"file_path":"http/cves/2025/CVE-2025-68613.yaml"} {"ID":"CVE-2025-6934","Info":{"Name":"The Opal Estate Pro – Property Management \u003c= 1.7.5 - Unauthenticated Privilege Escalation","Severity":"critical","Description":"The Opal Estate Pro plugin (≤ 1.7.5) is vulnerable to privilege escalation. Due to missing role restrictions in the on_register_user function, users can register with any role. This allows unauthenticated attackers to create administrator accounts.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2025/CVE-2025-6934.yaml"} {"ID":"CVE-2025-6970","Info":{"Name":"WordPress Events Manager \u003c= 7.0.3 - SQL Injection","Severity":"critical","Description":"The Events Manager - Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to time-based SQL Injection via the 'orderby' parameter in all versions up to, and including, 7.0.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2025/CVE-2025-6970.yaml"} {"ID":"CVE-2025-7160","Info":{"Name":"Zoo Management System 1.0 - SQL Injection","Severity":"critical","Description":"Zoo Management System 1.0 contains a SQL injection vulnerability via the username parameter on the login page. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.\n","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2025/CVE-2025-7160.yaml"} diff --git a/cves.json-checksum.txt b/cves.json-checksum.txt index 939ceef772f..5dbac622156 100644 --- a/cves.json-checksum.txt +++ b/cves.json-checksum.txt @@ -1 +1 @@ -585052fa022f0907e9fda9366698eb84 +188004331e3eb2ee19254b46afe3b680 diff --git a/dast/cves/2022/CVE-2022-34265.yaml b/dast/cves/2022/CVE-2022-34265.yaml index 1ded8ad89af..3de589c239f 100644 --- a/dast/cves/2022/CVE-2022-34265.yaml +++ b/dast/cves/2022/CVE-2022-34265.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-34265 cwe-id: CWE-89 epss-score: 0.92734 - epss-percentile: 0.99741 + epss-percentile: 0.99742 tags: sqli,dast,vulhub,cve,cve2022,django,vuln variables: @@ -50,4 +50,4 @@ http: - type: status status: - 500 -# digest: 4a0a00473045022100f69a71a44c810d752ab9b2514958d42ede0ed53da8860ed84585be921d95221e022057b8ae2fbadf3ed438b371c00f5c43a109e68f740fe576683c86b4d9ee32a17b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100dfa2a9468f5b0655e1bfdf4314e2098b4bb72c903848350d1ed02750382946ad022100c8d2ef6e853b8a8b946a406ccc18dd86130a107669e3a80987372d9641d8e7f9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/dast/cves/2024/CVE-2024-2961.yaml b/dast/cves/2024/CVE-2024-2961.yaml index 1eee5fcb507..37cccab2cdc 100644 --- a/dast/cves/2024/CVE-2024-2961.yaml +++ b/dast/cves/2024/CVE-2024-2961.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2024-2961 cwe-id: CWE-787 epss-score: 0.9286 - epss-percentile: 0.99754 + epss-percentile: 0.99755 tags: cve,cve2024,php,iconv,glibc,lfr,rce,dast,vkev,vuln flow: http(1) && http(2) @@ -57,4 +57,4 @@ http: - type: regex regex: - "root:x:0:0" -# digest: 4a0a0047304502204d3e8323f31ae3800deac4616cc0fefbcad9f44eba4de482858fb823fc0080ea022100a0f0cf80959712bef6ea0f201d6474ae9a850086a76ebe18af91b49f67d870fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203546e873a7a46d0bbb69486dd6b801f6e078c2828da6dae801c4f7f760e4a8ac022062afe465758259f7710a4f0a901e7278a80f4926701b9c3de0021e82ebf8bd25:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/dns/soa-detect.yaml b/dns/soa-detect.yaml index 944d17647a6..4250bf0951b 100644 --- a/dns/soa-detect.yaml +++ b/dns/soa-detect.yaml @@ -81,4 +81,90 @@ dns: name: "edge-cast" words: - "edgecastdns.net" -# digest: 4a0a00473045022100824cbf0b2e3fdd94cdf2e11e45435eb10f42bd29a5bc94152c2c52b51151de78022076bc570001930b73605650359eb64ee172ad317e077d53abf78746649ed7a9a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + + - type: word + name: "csc-corporate-domains" + words: + - "cscdns.net" + + - type: word + name: "network-solutions" + words: + - "worldnic.com" + + - type: word + name: "name-services" + words: + - "name-services.com" + + - type: word + name: "ultradns" + words: + - "ultradns.com" + + - type: word + name: "verisign" + words: + - "verisign-grs.com" + + - type: word + name: "ovh" + words: + - "ovh.net" + + - type: word + name: "comlaude" + words: + - "comlaude.com" + - "comlaude-dns.com" + + - type: word + name: "one-dot-com" + words: + - "one.com" + + - type: word + name: "netnames" + words: + - "netnames.net" + + - type: word + name: "dnsmadeeasy" + words: + - "dnsmadeeasy.com" + + - type: word + name: "bluehost" + words: + - "bluehost.com" + + - type: word + name: "managed-ip" + words: + - "managed-ip.com" + + - type: word + name: "gandi" + words: + - "gandi.net" + + - type: word + name: "brandshelter" + words: + - "brandshelter.com" + + - type: word + name: "hinet" + words: + - "hinet.net" + + - type: word + name: "vultr" + words: + - "vultr.com" + + - type: word + name: "switch-ch" + words: + - "switch.ch" +# digest: 4a0a00473045022100b4dad1997875b188a453a6a8b9055c9e1fcf66e49457f37577469ae14628918302207b349f96312120a881fe72369742a9d1b4404e1ae689f07f053ca18ae482eddd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/dns/txt-service-detect.yaml b/dns/txt-service-detect.yaml index 4031e0252db..ae004bf9222 100644 --- a/dns/txt-service-detect.yaml +++ b/dns/txt-service-detect.yaml @@ -223,4 +223,279 @@ dns: name: "whimsical" words: - "whimsical" -# digest: 490a00463044022053d535c4a465d24114fe02771cd054b2056c06853e6ff85526bc2aacfc8b13a502207577ad1c2d10e58d30f961375e14aa6b5f699e681d03e6799d417cb35097bad5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + + - type: word + name: "nintex" + words: + - "nintex." + + - type: word + name: "openai" + words: + - "openai-domain-verification" + + - type: word + name: "mailerlite" + words: + - "mailerlite-domain-verification" + + - type: word + name: "docker" + words: + - "docker-verification" + + - type: word + name: "shopify" + words: + - "shopify-verification-code" + + - type: word + name: "smartsheet" + words: + - "smartsheet-site-validation" + + - type: word + name: "site24x7" + words: + - "site24x7-signals-domain-verification" + + - type: word + name: "dynatrace" + words: + - "dynatrace-site-verification" + + - type: word + name: "cisco-cloud-intelligence" + words: + - "cisco-ci-domain-verification" + + - type: word + name: "infor-cloudsuite" + words: + - "infor-cloudsuite-domain-verification" + + - type: word + name: "postman" + words: + - "postman-domain-verification" + + - type: word + name: "miro" + words: + - "miro-verification" + + - type: word + name: "microsoft-federation" + words: + - "msfpkey" + + - type: word + name: "dynamics-365-marketing" + words: + - "d365mktkey" + + - type: word + name: "zoom-alternative" + words: + - "zoom_verify" + + - type: word + name: "brevo" + words: + - "brevo-code" + + - type: word + name: "perplexity-ai" + words: + - "perplexity-ai-domain-verification" + + - type: word + name: "pexip" + words: + - "pexip-ms-tenant-domain-verification" + + - type: word + name: "anthropic" + words: + - "anthropic-domain-verification" + + - type: word + name: "airtable" + words: + - "airtable-verification" + + - type: word + name: "wrike" + words: + - "wrike-verification" + + - type: word + name: "salesforce-pardot" + words: + - "pardot" + + - type: word + name: "notion" + words: + - "notion-domain-verification" + + - type: word + name: "jetbrains" + words: + - "jetbrains-domain-verification" + + - type: word + name: "onetrust" + words: + - "onetrust-domain-verification" + + - type: word + name: "nulab" + words: + - "nulab-verification-code" + + - type: word + name: "sap-successfactors" + words: + - "successfactors-site-verification" + + - type: word + name: "synthesia" + words: + - "synthesia" + + - type: word + name: "monday" + words: + - "monday-com-verification" + + - type: word + name: "globalsign" + words: + - "globalsign-domain-verification" + + - type: word + name: "heyhack" + words: + - "heyhack-verification" + + - type: word + name: "foxit" + words: + - "foxit-domain-verification" + + - type: word + name: "facebook-workplace" + words: + - "workplace-domain-verification" + + - type: word + name: "pendo" + words: + - "pendo-domain-verification" + + - type: word + name: "stytch" + words: + - "stytch_verification_dns" + + - type: word + name: "mixpanel" + words: + - "mixpanel-domain-verify" + + - type: word + name: "astro" + words: + - "astro-domain-verification" + + - type: word + name: "box" + words: + - "box-domain-verification" + + - type: word + name: "wiz" + words: + - "wiz-domain-verification" + + - type: word + name: "figma" + words: + - "figma-domain-verification" + + - type: word + name: "solarwinds" + words: + - "solarwinds-service0desk-verification" + + - type: word + name: "hubspot" + words: + - "hubspot-domain-verification" + + - type: word + name: "microsoft-domain" + words: + - "ms-domain-verification" + + - type: word + name: "swisssign" + words: + - "swisssign-check" + + - type: word + name: "infoblox" + words: + - "infoblox-domain-mastery" + + - type: word + name: "ahrefs" + words: + - "ahrefs-site-verification" + + - type: word + name: "logmein" + words: + - "logmein-verification-code" + + - type: word + name: "mailru" + words: + - "mailru-verification" + + - type: word + name: "mandrill" + words: + - "mandrill_verify" + + - type: word + name: "nitro" + words: + - "nitro-verification-code" + + - type: word + name: "parkable" + words: + - "parkable-domain-verification" + + - type: word + name: "seculio" + words: + - "seculio-domain-verification-code" + + - type: word + name: "trustpilot" + words: + - "trustpilot-one-time-verification" + + - type: word + name: "esputnik" + words: + - "esputnik-verification" + + - type: word + name: "atlassian-sending" + words: + - "atlassian-sending-domain-verification" +# digest: 4b0a00483046022100e3476fc5074cd4e72fe68c52ad8931f78bb0f1754b8cde42d851c6938d0121f50221009d85ca08cd4c46e0f11b7b9f5530c0c6afbed5f04093d1766ee6cdf50d42de41:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/file/logs/aspnet-framework-exceptions.yaml b/file/logs/aspnet-framework-exceptions.yaml index 15dd988ca46..a9d9f4aa48d 100644 --- a/file/logs/aspnet-framework-exceptions.yaml +++ b/file/logs/aspnet-framework-exceptions.yaml @@ -22,4 +22,4 @@ file: - 'InvalidOperationException' - 'UnauthorizedAccessException' - 'NotFound' -# digest: 4a0a00473045022100ea987a3e09f6b7a2ea7dbf3c8bcae968c2e10e8560c652f62a19c4d53d46ca6c02206ddbe1ad6e1ad96045687d7f40f98fc70bf4aaa6785d80c1151669a9f965d867:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207e69d4fcc176d1366e4cabed756c31009972bb9ed5e46847027dffd12bd1146a0221008cd3523d149c20573d77749093f971a35fb08804fe7f97bd36a2c18b634ecc3c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/file/logs/nodejs-framework-exceptions.yaml b/file/logs/nodejs-framework-exceptions.yaml index 53fb7295757..3d16032816b 100644 --- a/file/logs/nodejs-framework-exceptions.yaml +++ b/file/logs/nodejs-framework-exceptions.yaml @@ -30,4 +30,4 @@ file: - 'BadRequestError' - 'MongoError' - 'SequelizeDatabaseError' -# digest: 4b0a00483046022100c411e376c23ff5e2762c935aecdc7c0599eda6514d3d87a3df89c35fcf80c391022100e674dd7d7abcdbb79ec7745bd505ff4f222694b5721ef959b55891c0478a6bf4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206c82857c3fd3609aac63917c5d01ba9844ef3aca57f3e261da1ef0745204191502210088c8b6e76cc7b7028b26478ed150014f152cf1226e251812aedef2cc5bde90e3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/headless/cves/2018/CVE-2018-25031.yaml b/headless/cves/2018/CVE-2018-25031.yaml index 1dc2ace918c..853ecba36ed 100644 --- a/headless/cves/2018/CVE-2018-25031.yaml +++ b/headless/cves/2018/CVE-2018-25031.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2018-25031 cwe-id: CWE-20 epss-score: 0.83676 - epss-percentile: 0.99248 + epss-percentile: 0.99251 cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:* metadata: verified: true @@ -56,4 +56,4 @@ headless: words: - "swagger" case-insensitive: true -# digest: 4a0a0047304502207c8148d3cfe46ba7abb9c089cfe63e1d46f143fdb05b0aeafad2d2cb41d3a93f02210081d0fe890cf1d8738da4d5faf4674ce4d4cf53d1a1f29511c7b392eb555f6650:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b118d3f77d769169eff4f56af7261fb995e3c33cf30b3fc29e15801cfc9d436102210087ee9263ab00fdcf056be94cc09b1546abad0f0024a76187454b2db6e87b6d3e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/headless/cves/2022/CVE-2022-29455-headless.yaml b/headless/cves/2022/CVE-2022-29455-headless.yaml index ee3029710ee..bddc3b2f70c 100644 --- a/headless/cves/2022/CVE-2022-29455-headless.yaml +++ b/headless/cves/2022/CVE-2022-29455-headless.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-29455 cwe-id: CWE-79 - epss-score: 0.63811 - epss-percentile: 0.98337 + epss-score: 0.58028 + epss-percentile: 0.98083 cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -52,4 +52,4 @@ headless: words: - "elementor" case-insensitive: true -# digest: 490a00463044022039dfddf08678a2a91761d7a2483bcd764634f4fc4ae4ec079876e918c49fe89802206bc16577383a3b0ab59b15bdc0666b3eda6490d35c41277d448546e9d14a063d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009ed9fb433d16b8941e4003ce0a7f74a1f8c366beb9ee2fad2a4e7e1444e15e5802210083d3e36c98aff36039fcc51c7ce56a676eb732aa30f8720f1ea30c526aff8706:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/headless/cves/2024/CVE-2024-29882.yaml b/headless/cves/2024/CVE-2024-29882.yaml index e59fef9305f..e4ff6a92570 100644 --- a/headless/cves/2024/CVE-2024-29882.yaml +++ b/headless/cves/2024/CVE-2024-29882.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2024-29882 cwe-id: CWE-79 epss-score: 0.03404 - epss-percentile: 0.87038 + epss-percentile: 0.87047 metadata: verified: true max-request: 1 @@ -50,4 +50,4 @@ headless: - "ConnectSRS" condition: or case-insensitive: true -# digest: 4b0a00483046022100a4e5053156f6b1ec812a5b3e54d6ecd98c3d4c3e240845ff37aacf991c9ed2070221008ac07d7fa4fde587a7cc3dbe64bdf441fc89f6c3b1186b29764e94f4f4fc129a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502203a00b600a9e6bd7c4c749cacd51b2936dbf62286ceec50ed1d288fbeddff8870022100a4cdce69fbb285ff4bc78caf9f3053a07c848ac23edafaaef7976434a718bf6f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/headless/cves/2024/CVE-2024-38526.yaml b/headless/cves/2024/CVE-2024-38526.yaml index dc9f0a31922..6a0cff81e39 100644 --- a/headless/cves/2024/CVE-2024-38526.yaml +++ b/headless/cves/2024/CVE-2024-38526.yaml @@ -21,7 +21,7 @@ info: cvss-score: 7.2 cve-id: CVE-2024-38526 epss-score: 0.82064 - epss-percentile: 0.99165 + epss-percentile: 0.99167 tags: cve,cve2024,supply-chain,polyfill,vkev,vuln headless: - steps: @@ -60,4 +60,4 @@ headless: - "union.macoms.la" - "newcrbpc.com" part: urls -# digest: 4b0a004830460221009362f42c44c97c0dc89badc86544b68ce358d17c0d25f74deb7856448f911ba3022100a5129053827bceeb3d6b375b7264da843b803eadf04d0b16af96ba14e552b637:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205de9d9228481d4aa73323b32d21c06c55f7a7f9e6a54b3154759ed23415867de022100a714efca8771543f8bf08b65b91c3b9acf2459455f5ff869bbe923f444bf2e8d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/headless/cves/2025/CVE-2025-24752.yaml b/headless/cves/2025/CVE-2025-24752.yaml index 7932d475f42..2b954baebd9 100644 --- a/headless/cves/2025/CVE-2025-24752.yaml +++ b/headless/cves/2025/CVE-2025-24752.yaml @@ -16,7 +16,7 @@ info: - https://github.com/Sachinart/essential-addons-for-elementor-xss-poc/blob/main/poc.py classification: epss-score: 0.03281 - epss-percentile: 0.86787 + epss-percentile: 0.86792 metadata: verified: true max-request: 1 @@ -46,4 +46,4 @@ headless: words: - "{{random_int}}" case-insensitive: true -# digest: 4b0a00483046022100957ebcd707226a5a9b2e7fee9fcd25921178b734881f60dff66d8eb5c7a3fd8d022100c1cc42a655aa59366e7a07bf1ebf819e15be87a7d56fbb9a4f326c65fb381189:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203062b0edba7fef16228c73295c7280e231b13d62827bb04b8b254fea786278e902205d64278af545861fec04830b6aa94d83c720f43a03f3ecf3f5016e2968cac840:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/headless/cves/2025/CVE-2025-25062.yaml b/headless/cves/2025/CVE-2025-25062.yaml index dd0e7aa6c33..ea1584f0859 100644 --- a/headless/cves/2025/CVE-2025-25062.yaml +++ b/headless/cves/2025/CVE-2025-25062.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2025-25062 cwe-id: CWE-79 epss-score: 0.34064 - epss-percentile: 0.9681 + epss-percentile: 0.96813 cpe: cpe:2.3:a:backdropcms:backdrop:*:*:*:*:*:*:*:* metadata: max-request: 7 @@ -190,4 +190,4 @@ headless: dsl: - reflected_text_xss_type - reflected_text_xss_message -# digest: 490a00463044022060ca7c71452d7a0963018fd0f6261d86c37ebd0e7bb6a071c63b3c37500ad1a302204ff17da9e7e71e6ceb42485df40d9b9117a356d5828a58a252dfdb11b25d9ba2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204a5958ad80a1b771f7697ed41c0a53cf4645b225385e8c5eea9a46ab9d2dbcc8022100ebdabcb26d2fd47f8a0716e7652baa06da5191fee5bdf89d564e930ed9defae4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/headless/cves/2025/CVE-2025-29927-HEADLESS.yaml b/headless/cves/2025/CVE-2025-29927-HEADLESS.yaml index 42eb91af8d3..b1f7daffc3e 100644 --- a/headless/cves/2025/CVE-2025-29927-HEADLESS.yaml +++ b/headless/cves/2025/CVE-2025-29927-HEADLESS.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.1 cve-id: CVE-2025-29927 cwe-id: CWE-285 - epss-score: 0.9253 - epss-percentile: 0.99723 + epss-score: 0.93093 + epss-percentile: 0.99775 metadata: vendor: vercel product: Next.js @@ -59,4 +59,4 @@ headless: - "compare_versions(nextjs_version, '> 14.0.0', '< 14.2.25')" - "compare_versions(nextjs_version, '> 15.0.0', '< 15.2.3')" condition: or -# digest: 490a004630440220267f8e765dacb9bfba541f9b7ff78e55f28433741c36d42ec64da6488b00a62102201b8b3d42971a0d8549cccc3a89c04e83d0b34270f5f543e94b784838cd23447b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b060430bc18f9636a100f77b84656c90378e3ca0e1d63c89e585bee2c2a6506d022100d439e6aff19a12aabdd96afbe8c6160b91cafedafe7767030eccf8b0ab2901d5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/headless/cves/2025/CVE-2025-8191.yaml b/headless/cves/2025/CVE-2025-8191.yaml index 17620e2ab8d..dade64e6044 100644 --- a/headless/cves/2025/CVE-2025-8191.yaml +++ b/headless/cves/2025/CVE-2025-8191.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2025-8191 cwe-id: CWE-79 - epss-score: 0.01236 - epss-percentile: 0.78728 + epss-score: 0.00915 + epss-percentile: 0.75332 cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:* metadata: verified: true @@ -69,4 +69,4 @@ headless: words: - "swagger" case-insensitive: true -# digest: 490a0046304402203cf791e722536eeb2aba6c35702524df83f5244b7f24949bfd13dcb9dbafa8860220102a6fe81c11b3b7387e2b2aa0822eeacbde78aded0d2de90e64dd5811fc4fd4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b3374204633e470d7a87d8dfdce4444c527b850745d168d1ff80de654f2e44790221008c28c3c726ccb605213cf423cbfbbdf4ee9187cc4888a665f1ade1cab4324647:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/headless/mozilla-pdfjs-content-spoofing.yaml b/headless/mozilla-pdfjs-content-spoofing.yaml new file mode 100644 index 00000000000..01df4ff8e39 --- /dev/null +++ b/headless/mozilla-pdfjs-content-spoofing.yaml @@ -0,0 +1,57 @@ +id: pdfjs-content-spoofing + +info: + name: Mozilla PDF.js - Content Spoofing + author: 0x_Akoko + severity: medium + description: | + Detected PDF.js viewer loads and renders external PDF files without proper origin validation. Versions < v1.3.91 are vulnerable to content spoofing attacks. + reference: + - https://groups.google.com/g/mozilla.dev.pdf-js/c/_WdU9T0TRfo + - https://github.com/mozilla/pdf.js/issues/6920 + classification: + cwe-id: CWE-451 + metadata: + verified: true + max-request: 5 + tags: pdfjs,spoofing,headless + +headless: + - steps: + - args: + url: "{{BaseURL}}/{{path}}?file=https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/main/helpers/payloads/mozila-content-spoof.pdf" + action: navigate + + - action: waitload + + payloads: + path: + - "pdf.js/web/viewer.html" + - "pdfjs/web/viewer.html" + - "web/viewer.html" + - "pdfjs-dist/web/viewer.html" + - "uiFramework/js/pdfjs/web/viewer.html" + + stop-at-first-match: true + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "mozila-content-spoof.pdf" + + - type: word + part: body + words: + - "pdf.js" + + - type: word + part: body + negative: true + words: + - "file origin does not match" + - "blocked" + - "Not Found" + condition: or +# digest: 490a0046304402207dc1eb1cfd5bc25039d729f591a15f5a9a37667ed6ad50d1c1c73fe20004b9a8022071080c75bcced708e51b213a2d9887954d7145d3666a5b1de77a04eb08905a67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/helpers/payloads/mozila-content-spoof.pdf b/helpers/payloads/mozila-content-spoof.pdf new file mode 100644 index 00000000000..65570184ac8 Binary files /dev/null and b/helpers/payloads/mozila-content-spoof.pdf differ diff --git a/http/cves/2000/CVE-2000-0114.yaml b/http/cves/2000/CVE-2000-0114.yaml index 7489478fd79..f44a82feae8 100644 --- a/http/cves/2000/CVE-2000-0114.yaml +++ b/http/cves/2000/CVE-2000-0114.yaml @@ -19,7 +19,7 @@ info: cvss-score: 5.3 cve-id: CVE-2000-0114 epss-score: 0.05458 - epss-percentile: 0.89866 + epss-percentile: 0.89875 cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -62,4 +62,4 @@ http: group: 1 regex: - 'version:([0-9.]+)' -# digest: 490a004630440220260fd699ef4e76b5933bfa0d5ab73b4afda232f53d80f5409151d0c9527e105a02203ca279991ac601422b9d067fbf74bd7883c4b58c1955cd39af845e10136be178:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200711109f7c6b10e5264147f11552fec1a1c2b657291c5db4efe3f61484e986cd022100e2fefe1823a38fcd37cbe06171c8075776b8c4e60e2988f83f1fb3acf75a545a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2000/CVE-2000-0760.yaml b/http/cves/2000/CVE-2000-0760.yaml index 7485728e530..10144e63a6f 100644 --- a/http/cves/2000/CVE-2000-0760.yaml +++ b/http/cves/2000/CVE-2000-0760.yaml @@ -18,7 +18,7 @@ info: cvss-score: 6.4 cve-id: CVE-2000-0760 epss-score: 0.33099 - epss-percentile: 0.96732 + epss-percentile: 0.96733 cpe: cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:* metadata: verified: true @@ -55,4 +55,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204abf69b3064d8cdcbb42f13e903ce6853b86468dc22288a4d534c7fb574886cb0220405f81c5d45eb921de8da4629cf2e7ed6c82159a656a05de662701e75a373854:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009e5a640328d68806c25d03c46df900ad061b3a30eb24b228aeced973219e20b9022100edf7fe83f071b4e9d3d5fd2003b8d4a6829b67aa041ee27219720bac65458e79:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml index 86fe097db17..0978b793909 100644 --- a/http/cves/2002/CVE-2002-1131.yaml +++ b/http/cves/2002/CVE-2002-1131.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2002-1131 cwe-id: CWE-80 epss-score: 0.03877 - epss-percentile: 0.87874 + epss-percentile: 0.87882 cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* metadata: max-request: 5 @@ -60,4 +60,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204c5d0e0d6c5bd60f07bd2f9a518cb1bf2083da2fb5ab9b7519c505a2a1d7ffac022100f141b44c9776c16fa341763ef0827d9bb2301719428e11e73dae54fef017f8d9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c1db632ad5af690924448aac91337a35f8af2e7d82082062d13cbfaac99f6c00022100929973ec2c442268b5390b806d1ad66a1905407e4b8537797ed09cd8b9fe7d78:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2004/CVE-2004-0519.yaml b/http/cves/2004/CVE-2004-0519.yaml index 7e037cf488e..76afdd99c87 100644 --- a/http/cves/2004/CVE-2004-0519.yaml +++ b/http/cves/2004/CVE-2004-0519.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2004-0519 cwe-id: NVD-CWE-Other epss-score: 0.00124 - epss-percentile: 0.3245 + epss-percentile: 0.32411 cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022002cd5cc7ced1f64e417b2dbe530a353a24b31e69ffe5c7bcba3e695688b6cd3702206e40c6f14913a602c00bbba3cab4792689ab9628192ed979d3727e05fb714735:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c846bdf542963edd0b35a4601154bd428e10fce18e6ed0849cf65e4e72c9a797022064ab41a8b825bfd5f0712be975833aedbed9c05940b8e9032af83428bdb10277:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2004/CVE-2004-1965.yaml b/http/cves/2004/CVE-2004-1965.yaml index cc333477216..c28e0064091 100644 --- a/http/cves/2004/CVE-2004-1965.yaml +++ b/http/cves/2004/CVE-2004-1965.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2004-1965 cwe-id: NVD-CWE-Other epss-score: 0.00265 - epss-percentile: 0.49803 + epss-percentile: 0.49795 cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4a0a00473045022100a6cc300f91aeeffe8d1722acacce113aaec60ea2eda57523fab3d4d0d32e7d64022044e438c0fea4211af95d4383b315024e4d0e8fd6a7cde9ba4132a9576c1fbf87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202ddaa102e2f7d3a7db97dad8e7f54a0421325012f23adccd29b123920d8e9970022100b9231bfc39ee20d3289fe84641e9ae3d3cf0b27bb8a8f9f90f40c2a0ebab1cbf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-2428.yaml b/http/cves/2005/CVE-2005-2428.yaml index cbe0b95652b..e541614cd65 100644 --- a/http/cves/2005/CVE-2005-2428.yaml +++ b/http/cves/2005/CVE-2005-2428.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2005-2428 cwe-id: CWE-200 epss-score: 0.08605 - epss-percentile: 0.9212 + epss-percentile: 0.92126 cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100aa77a20ce88ddc263c3261f4a8171b70e3bb0e1914971c93cdb486a19a10e1e702207f9dc7f304fc2c1c787f92b09d964374aad802ff7d64b1cb5f49cd4e2c9823f7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009fdd317b2994322aa976ace12875345904a5539bb3b37935d6b5588ec6960a6f022100af2198637a557ac01fa951c36d434157acb83f9c37eeb8e46754bcbd1a939a61:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-3128.yaml b/http/cves/2005/CVE-2005-3128.yaml index f8f2c117b95..44ad2fae7e7 100644 --- a/http/cves/2005/CVE-2005-3128.yaml +++ b/http/cves/2005/CVE-2005-3128.yaml @@ -17,7 +17,7 @@ info: cvss-score: 5.4 cve-id: CVE-2005-3128 epss-score: 0.01733 - epss-percentile: 0.81984 + epss-percentile: 0.81993 cwe-id: CWE-80 metadata: max-request: 1 @@ -44,4 +44,4 @@ http: part: header words: - "text/html" -# digest: 4a0a00473045022041eda0c733f68ba29c7e6e334ed84dfa9dcc5fb0346fd647d38cbacba913bcff022100eade3928070ff1d01f18661d614e1ef3a6d6a6f6b39a799308ee75125b450337:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202e2e03d41fe250d141953b79c70eab59210686753a6a1be0a378cb1f84b5f51302203ae35f9a27d4f615896ae8d4a103407c091eb08af7a4c0094377f90dd472c7e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-3344.yaml b/http/cves/2005/CVE-2005-3344.yaml index b60568f5a2a..18469cdac19 100644 --- a/http/cves/2005/CVE-2005-3344.yaml +++ b/http/cves/2005/CVE-2005-3344.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2005-3344 cwe-id: NVD-CWE-Other epss-score: 0.1015 - epss-percentile: 0.92858 + epss-percentile: 0.92859 cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:* metadata: max-request: 2 @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220400f8a213d4f541a379e2d6f195ca7ecb44cc1a4eb24f4430f16610e607a0ee502203f0f5ccc1039b7539e217dbb62190a88a85c8bdd3669b0590f02490623d9f012:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100960666d9e249ef6973ee6aec55aa7cce5f44e1800cfe65c15dcaf3171ceef9580220136ae5bc95ddc04ffaaceeaee5d798e6bce601461100096ee2a47e1687847490:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-3634.yaml b/http/cves/2005/CVE-2005-3634.yaml index 8ed2cf7ae4f..c3c36691e29 100644 --- a/http/cves/2005/CVE-2005-3634.yaml +++ b/http/cves/2005/CVE-2005-3634.yaml @@ -23,7 +23,7 @@ info: cve-id: CVE-2005-3634 cwe-id: NVD-CWE-Other epss-score: 0.01653 - epss-percentile: 0.8156 + epss-percentile: 0.81572 cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 490a004630440220489d3cf927d2958335e235025f939a563b3bba1caeea0a52a66cedc30b6893a702206558c8ca6409ea78909f1f4630e616abf79539c38f78f765b85003c408adbecb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e05602f2551da5143909f529ad2966582ab8dd8d01419e92859577602650fbfb02203d34d4ce4f4a488bcf6af38d2c264b6d6b237eb4237b3d9c8a6c2cc0df1a61c0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-4385.yaml b/http/cves/2005/CVE-2005-4385.yaml index 6fc97a86156..926cb9d22d7 100644 --- a/http/cves/2005/CVE-2005-4385.yaml +++ b/http/cves/2005/CVE-2005-4385.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2005-4385 cwe-id: NVD-CWE-Other epss-score: 0.00373 - epss-percentile: 0.58393 + epss-percentile: 0.58398 cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022072ae0a8c72dd7bcd52b8d139c351ecc2e50a9e47aa9a2a152e7419646ca8d7ae0220496b4c6b27c5f0c6a948566d6145e7ba500303766a8277e82638c20849879221:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022004b44869dcc46bdabde180a8b0487678d39445e54a1a5ce32de63bd66cbbba23022100b3fd3acdb24e55c96968c52b61d699d76b5b99e8baafdd2f6a510cba3dca478e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2006/CVE-2006-1681.yaml b/http/cves/2006/CVE-2006-1681.yaml index 2922913a364..59b86c7fcb5 100644 --- a/http/cves/2006/CVE-2006-1681.yaml +++ b/http/cves/2006/CVE-2006-1681.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2006-1681 cwe-id: NVD-CWE-Other epss-score: 0.00299 - epss-percentile: 0.52862 + epss-percentile: 0.52853 cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -62,4 +62,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210089f371ffb5caede7df998fdd5ffcb52468c988519920070558ffa7463e4f5dda022100fb9e4ff16f6d115b34ae75dade937ceb7db83c7319bde1163568dd3a4e9b0c15:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c30aee3d70c6991533c711d0898365fcdc2dacfd59a5a285253599497c597b8c02201aa55759fe8f1fb81c3ce3b52d9259254c070a7f459fa3948f12af29db1c9abe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2006/CVE-2006-2842.yaml b/http/cves/2006/CVE-2006-2842.yaml index d53d0d66d1e..a7ada175c5d 100644 --- a/http/cves/2006/CVE-2006-2842.yaml +++ b/http/cves/2006/CVE-2006-2842.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2006-2842 cwe-id: CWE-22 epss-score: 0.0094 - epss-percentile: 0.75644 + epss-percentile: 0.75654 cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022017bdc8b0734f3bab5b0d52dba11e96165724f67c78f92a074b77a6636dcfac9002210081c610ec0da4caf133ba514019f04b141eeb75ff7d9409cc6551c2c7435d428f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220503df203b72737a2f101b1be895e7fa766078fb75b7645f14a19c178004a5bfc022007d4d494739ad3a644386462aee62aa57d4695423bb4bd7d7b351f55e2daeb32:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-0885.yaml b/http/cves/2007/CVE-2007-0885.yaml index eb49836fd17..45fd9f3d783 100644 --- a/http/cves/2007/CVE-2007-0885.yaml +++ b/http/cves/2007/CVE-2007-0885.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2007-0885 cwe-id: NVD-CWE-Other epss-score: 0.02133 - epss-percentile: 0.83692 + epss-percentile: 0.83704 cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204a59fc38165e03502e57acf2665116d335bff3eadb9d8f5d8e746d85d391bf45022100c66baf6fd492025ddfee8385d198a189a6081cd5a25a0b03a932461985383e4e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009926810628549a92e2c497bbd2b459f920f7d75b79faa535532df69f19b076fd022100d57573121fd8b00f91175d2db278d12d420989ce16514d48a3bb22508f77a1db:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-2449.yaml b/http/cves/2007/CVE-2007-2449.yaml index d3a2016e540..61d79f15e3e 100644 --- a/http/cves/2007/CVE-2007-2449.yaml +++ b/http/cves/2007/CVE-2007-2449.yaml @@ -18,7 +18,7 @@ info: cvss-score: 7.2 cwe-id: CWE-79 epss-score: 0.80643 - epss-percentile: 0.99093 + epss-percentile: 0.99095 metadata: max-request: 1 verified: true @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205afc19f41dd262ac97100583927f037be17a7f1dafdae34822568d63c52e6dbc0221008cc1cc253a50f1a672ab2dde8b24b086208c4e651c05daf2a9e86ad64384d110:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008bb33f6dc9dc4405974e21b20075c2ff00c6763db8229c3756bc1694d2d547df022100edb02f35d86fbffcc16d09b07cd7e0a66089bf0ec90f4ed87dfa95b69f4492db:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-3010.yaml b/http/cves/2007/CVE-2007-3010.yaml index fffe3e6614a..1595ae873e2 100644 --- a/http/cves/2007/CVE-2007-3010.yaml +++ b/http/cves/2007/CVE-2007-3010.yaml @@ -21,8 +21,8 @@ info: cvss-score: 10 cve-id: CVE-2007-3010 cwe-id: CWE-20 - epss-score: 0.93855 - epss-percentile: 0.99859 + epss-score: 0.94007 + epss-percentile: 0.99884 cpe: cpe:2.3:a:alcatel-lucent:omnipcx:7.1:*:enterprise:*:*:*:*:* metadata: verified: true @@ -59,4 +59,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ad8d0b5c2eeac17d3e1672daca58ec5d78d466de6ce0fdbc65d628b2e9d51f000220350b19eee8ed703ad9c60b00b4968260c25e86bb4ee062ba0bcd684380e5f5af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220169ef0aa83ea95dfbfdb66f63021da282712bcc917aacc55d439716a2cf2e947022100ddc42a31e7773aa53a4ebe5f583f474e7464f2b07a4c00ced265fd2b2d1eaea0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-4504.yaml b/http/cves/2007/CVE-2007-4504.yaml index 8b8a69c4053..1dcb1ed7bd6 100644 --- a/http/cves/2007/CVE-2007-4504.yaml +++ b/http/cves/2007/CVE-2007-4504.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2007-4504 cwe-id: CWE-22 epss-score: 0.00177 - epss-percentile: 0.3968 + epss-percentile: 0.39676 cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200cca115bf0cffddb1c464cc15573b0f8f624931d12bdc1e332ff79d6c3c103e30221008cfcd7dbd23e710a5e7864b600ba985f1ee36fb57b8efbe210a50404c38f9e57:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f1263581e0954a5de2bd892b8aa95e3a7abe4e09c59275241f75d388440a0afe0220396b62d9ae929475a97f4eac35fb985136c8198cfc6d79d1c0a13166e1e8d3f1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-4556.yaml b/http/cves/2007/CVE-2007-4556.yaml index 80e8bfd5ec1..8aac02251b6 100644 --- a/http/cves/2007/CVE-2007-4556.yaml +++ b/http/cves/2007/CVE-2007-4556.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2007-4556 cwe-id: NVD-CWE-Other epss-score: 0.02359 - epss-percentile: 0.8447 + epss-percentile: 0.84481 cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -51,4 +51,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b1d11d4afca0c61140e1f54cac940e19c7adfeb04ff1ad968b765c39af4bc73d022100af99986832727a0df67058c8a62794e7f79e501f45737b97be4ca404fdd0ed0d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220173f44282db02bf5b8ad23ce9562ad2df355a5aa0ee816a4685b3a99954e9bab0220262e6272569d33687713d799bb8e497af7f0f4ce9b16a69dbf8b3d511538b555:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-5728.yaml b/http/cves/2007/CVE-2007-5728.yaml index 5125feb7dbf..e49fd50fd83 100644 --- a/http/cves/2007/CVE-2007-5728.yaml +++ b/http/cves/2007/CVE-2007-5728.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2007-5728 cwe-id: CWE-79 epss-score: 0.00523 - epss-percentile: 0.66244 + epss-percentile: 0.66245 cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -57,4 +57,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e29810688c1dec9ffae4828c93805a11b3168eb2fad049c16515d19a5b6decf702206c06004395cf97de84e6198a05bc9a435f62db00a7e1c91391a25602d0503aae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ab302fb3593c43da2bce9006403ddf45a2856ca903f4502d973191e4ffc1c3310220674836613f3b61ac4f9ee5878542b25572e2be8870ff3e2fd95d59e44425f336:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-1059.yaml b/http/cves/2008/CVE-2008-1059.yaml index fe3451d4060..4ddd7d82fde 100644 --- a/http/cves/2008/CVE-2008-1059.yaml +++ b/http/cves/2008/CVE-2008-1059.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2008-1059 cwe-id: CWE-94 epss-score: 0.00265 - epss-percentile: 0.49828 + epss-percentile: 0.4982 cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009f84826dd13479d0a055f9157bae1356362e945ec569583e38d0375c54a8a88c022064b49ebd3ffc29d1c55d0d0fa600d8103b6c9f4b58e76d7c727648d086d3337e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220793ad8c93ae543707c56967e19d8b16604f283fe1af1e6441299e66ca56dd5f5022100875da0afcdb71673f385fa082dc02bba139f05e1936c43af13034c042506d3b4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-1061.yaml b/http/cves/2008/CVE-2008-1061.yaml index 37364f739b8..9e057997fa6 100644 --- a/http/cves/2008/CVE-2008-1061.yaml +++ b/http/cves/2008/CVE-2008-1061.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2008-1061 cwe-id: CWE-79 epss-score: 0.00158 - epss-percentile: 0.37243 + epss-percentile: 0.37232 cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:* metadata: max-request: 2 @@ -62,4 +62,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ad126dfddcad164bb65696a2c82b3987d6eeb79380ebde9893871afb67693900022100b41cba505d26af15418d43e344440323190bdc27da1c9bb268f12b1b3979ee1a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205c3557b8beda35f65300c873b8e148524c8ed399d709baa3f9226258c304c7bb02210086052e8ad0b4340ba3ffdb8666ccf35df81a9f209f37e8730d027a5860276f31:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-1547.yaml b/http/cves/2008/CVE-2008-1547.yaml index 7bcb1eed900..ccd8948c2d7 100644 --- a/http/cves/2008/CVE-2008-1547.yaml +++ b/http/cves/2008/CVE-2008-1547.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2008-1547 cwe-id: CWE-601 epss-score: 0.6311 - epss-percentile: 0.98308 + epss-percentile: 0.98306 cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:* metadata: max-request: 2 @@ -51,4 +51,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4b0a0048304602210090d6f738cf27891b1ddd334266fe2f618890df3291b4c9ac07b23a934f8ce190022100b31bfc0ce0639ba011af8f5dd6b20a046417529d36652626ffd9664dc982e4f4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200cd7c3f3b8285afb68a6e294c2305a9f8398de7f33bf44f5295227209ab61c27022100e3cb2e01de4de3de1034eb961db0c2e3b7e892bd0814ef96e0a048fe4f24400f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml index 6b3f0cb6922..5a741f4ea7c 100644 --- a/http/cves/2008/CVE-2008-2398.yaml +++ b/http/cves/2008/CVE-2008-2398.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2008-2398 cwe-id: CWE-79 epss-score: 0.00437 - epss-percentile: 0.62452 + epss-percentile: 0.62468 cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204ee76dead34c94043843eb6071dc73629e2c3dfd2ad71143a0a1ecb8dcce6b350220597e6c5ab4b6b2c1e4e5a3a73085a2a17871dc6ec3a7abe0db1fcb4b9aeb58ba:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502203412b06751578553117d3287d4db8fbf58488828acc83776d93ec34795dc5dd7022100c4315fa2d8bcb3a736e21780cb22a1414d6acbaa3436d2d05f50c1cdcdf50cee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-2650.yaml b/http/cves/2008/CVE-2008-2650.yaml index e7687b81af5..c569598b918 100644 --- a/http/cves/2008/CVE-2008-2650.yaml +++ b/http/cves/2008/CVE-2008-2650.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2008-2650 cwe-id: CWE-22 epss-score: 0.01643 - epss-percentile: 0.81496 + epss-percentile: 0.81508 cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022003e6fafddf4bda555fbde739e82e3bbd1e9bfe56c752f4e43b3a78b8dc572c260220194143dfa32ea79a5443b19cfe1f50fa0e795f3909053c89162e5d954ea1d4fa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203acb658827ec83e52fa2778d166230a0aa754328f1a2aba47e6a6973df0115cd022023d306797a3d1d67cbbc0b9cae67e4754006b90b6ec80eb9b392e50a0fdb08d2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-4668.yaml b/http/cves/2008/CVE-2008-4668.yaml index fc49a5023e7..1e8471b9038 100644 --- a/http/cves/2008/CVE-2008-4668.yaml +++ b/http/cves/2008/CVE-2008-4668.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2008-4668 cwe-id: CWE-22 epss-score: 0.00144 - epss-percentile: 0.35302 + epss-percentile: 0.35267 cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204c9289a240644f8f1381fcd0a45bfd3181fa17bacdb28103d065e736e259c93602204725b3931f8bc671853ee0243bd48a0e5719a9c7aa2be50fb7bdd4a84b6ad4e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220251fbd2ac0bd354b7376ed0cfc6fc7240fce6dac755cfbd902233198aabdaabb02206168165b672b97dc82690a11e6da80639caae30849b0eb12ee06b7cc992710d3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-4764.yaml b/http/cves/2008/CVE-2008-4764.yaml index 4ce564c1a02..ec32cf31007 100644 --- a/http/cves/2008/CVE-2008-4764.yaml +++ b/http/cves/2008/CVE-2008-4764.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2008-4764 cwe-id: CWE-22 epss-score: 0.01041 - epss-percentile: 0.76903 + epss-percentile: 0.7691 cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220048bee68c22e7965353b6696b02b41b3227b5252cfdefaa682dc885a167bc91f0221009fc5cea75ee9e517c2f84d072559ece4d92044a74d02a782c6adafc5f210d3ce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202ac1379f3da328300a7c8c5473f6598e174b1613b7be5b29cd145286173adfb502210082c4c996c13e3b68cfa5bb5079d71454c9747d1d9bf35d0e7cf4c7edfcbf7e52:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-5587.yaml b/http/cves/2008/CVE-2008-5587.yaml index 390b5ab337a..3496f794fc7 100644 --- a/http/cves/2008/CVE-2008-5587.yaml +++ b/http/cves/2008/CVE-2008-5587.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2008-5587 cwe-id: CWE-22 epss-score: 0.01986 - epss-percentile: 0.83129 + epss-percentile: 0.83145 cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201cf823c974cba30096a5272c0efa6cad4dfe814d5705d173f18c14f0ace3842802207936b58f91ad0b0fa91bfc0810d3d93f49cbc09c0263500716f6e9883dcde5a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205a9523376e0cda6bb7c6ecdc9f04669cf1def7a72fe7c4fb8997e10faf15204c02210097a846291e5e62de769ae96142868a028276f3012aa86a48f69d9e0cc1318614:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6080.yaml b/http/cves/2008/CVE-2008-6080.yaml index 541c32ca8ce..1ba71ef76fb 100644 --- a/http/cves/2008/CVE-2008-6080.yaml +++ b/http/cves/2008/CVE-2008-6080.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2008-6080 cwe-id: CWE-22 epss-score: 0.06734 - epss-percentile: 0.90956 + epss-percentile: 0.90969 cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204e2658c746d3ac1fdb5064ce1b12c3a652bd59f2a0c282bbcf84c2a7be4f48c202201739eed0e7a55fb2b4099f7dd3f7294958dc73b513899c631779fc5296f9ddff:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d4aeb4a9760acdfb0dbd70044316b27f18d23612556b5b4d631fda94e8ad9c71022069a7e46188b65774bd9339d560b2156058b035942422ec718c6377a830ecc73d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6172.yaml b/http/cves/2008/CVE-2008-6172.yaml index ff96b251581..c3ab70cb169 100644 --- a/http/cves/2008/CVE-2008-6172.yaml +++ b/http/cves/2008/CVE-2008-6172.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2008-6172 cwe-id: CWE-22 epss-score: 0.05386 - epss-percentile: 0.89789 + epss-percentile: 0.89799 cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220276367eeba4eb97664579a27bd3f76e34a0d6366a2b8971affa95590eafd4765022100eba9ec4e1036985d6a4f0d7f2d49cdcf0be8275a5b37d237c8c30179d4cfeb09:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022020941a512e9463daf4e188b41ea3847ee17335a3f42e3b91dbea3711506d31e1022100ceb2e9e4ee80f29f8b48125b4524ef84c9a0ae460275ef8d99de2ad32377766f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6222.yaml b/http/cves/2008/CVE-2008-6222.yaml index 39e557fc8e2..395c59da87e 100644 --- a/http/cves/2008/CVE-2008-6222.yaml +++ b/http/cves/2008/CVE-2008-6222.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2008-6222 cwe-id: CWE-22 epss-score: 0.03072 - epss-percentile: 0.86323 + epss-percentile: 0.86322 cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022030f5f118d40ab7b04e5affdb579ceb817d293a7be7bb7539593aacf10a10b53f0221009c90393f73f46b76004a1b6bb46997afae1bfa901cc1892e869052cba7e3ff0a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205b22c6dbeb4cc64a4b2091812c9e202a88a4be66788a70bff9fdc62dfec9861902200413419b8a189eb4db60bdb2e1da52154ebe66bf79c4c06fa5063896c5a2e158:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6465.yaml b/http/cves/2008/CVE-2008-6465.yaml index 9dd7926baee..876d2a993e3 100644 --- a/http/cves/2008/CVE-2008-6465.yaml +++ b/http/cves/2008/CVE-2008-6465.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2008-6465 cwe-id: CWE-79 epss-score: 0.01157 - epss-percentile: 0.78052 + epss-percentile: 0.78069 cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:* metadata: verified: true @@ -63,4 +63,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402206432d5ed4ed2e76d5642dde083c08a45be73d992f2b104f1ca458ad7a6beb67d0220647ab8a9d9f6f271663823d2d5f06cbe14d4830320eda06aef52a2ef54a6faee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205213c3a9d5bc3b30c046c90dced75ac1f907dbb56d4b761f0f3ca32093eedce7022100e6a7d1d654a480d1aa21dff2fd9c6c6c02d852abfadf4ba6e8467b6df64e0e97:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml index c0fb10e290f..66c2c33214d 100644 --- a/http/cves/2008/CVE-2008-6668.yaml +++ b/http/cves/2008/CVE-2008-6668.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2008-6668 cwe-id: CWE-22 epss-score: 0.00573 - epss-percentile: 0.67973 + epss-percentile: 0.67979 cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008e5c0f9509e8121d7f84c6ffece264072600e104bdde091e1dbf8332664e1045022100b48e955879ba56655e6a50bd6d2786913fbae9784e14826b4c03207615778389:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022029489f761e1bf8c19fc772bfd7bc076c83ba3710a141f8ab5b7f80d47f0ca614022020e2954e1bbf51234f1f182d9b3c6c6f7d7db9d178fe555a26848aad80e5a2f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6982.yaml b/http/cves/2008/CVE-2008-6982.yaml index 072782b6cf3..ba675b7c797 100644 --- a/http/cves/2008/CVE-2008-6982.yaml +++ b/http/cves/2008/CVE-2008-6982.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2008-6982 cwe-id: CWE-79 epss-score: 0.08587 - epss-percentile: 0.92112 + epss-percentile: 0.92117 cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:* metadata: verified: true @@ -51,4 +51,4 @@ http: - type: status status: - 500 -# digest: 490a0046304402200880553a158963025b0e52c6ef9c86876f1e73d7d84ef4894cbab817855306ee0220031bcf74369629b092c88395132b08928576b63850766584df30517f0b46c8f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e6d1f0e33221c75142743a3da0e994642f07f59d1531e0ee7778c9a6f7d329fe022045ab7386a26689240123d4d847471e808d594623027d5f4b11e0e02376763267:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-7269.yaml b/http/cves/2008/CVE-2008-7269.yaml index fa4e2a2a4cf..5822ac751ea 100644 --- a/http/cves/2008/CVE-2008-7269.yaml +++ b/http/cves/2008/CVE-2008-7269.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2008-7269 cwe-id: CWE-20 epss-score: 0.03171 - epss-percentile: 0.86521 + epss-percentile: 0.86525 cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:* metadata: verified: "true" @@ -43,4 +43,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022016c3c87ec12896066229393842aa2ed9ca27fca94ae4a8efea6a28b46b012bab022100f7a79d885ff87e4cfc666baa1a1f4fb8b1f1cac1adc89c07be5fb04b2f8a9e06:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022060c6b75f26fd7e00042278ead7e21a1109d69aa7d411a19ec38444a64a6afb1c022100e06f5eb27ea1123d82cff50da08156186f19561b12de5f093f4b190acee5bdf8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-0347.yaml b/http/cves/2009/CVE-2009-0347.yaml index 5a32692e419..870511cfe06 100644 --- a/http/cves/2009/CVE-2009-0347.yaml +++ b/http/cves/2009/CVE-2009-0347.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2009-0347 cwe-id: CWE-59 epss-score: 0.03639 - epss-percentile: 0.87467 + epss-percentile: 0.87479 cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a0046304402201d1c201c7f5dff0d949b94dc6b19ee842bda2af6537e8524fc1203c18bb20d350220703396261b1693452c80d8cf36c46eb1a0e0259d5fb7886dd319297587d8e1d3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a3281313a5c0bde52203c87cf3332fa3bbefc645503703a7665332f229301ab30221008eb6a77f43c94dde84fe9fdbc49d05a8b919a5eb978efb274d84a08d4680e393:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-0545.yaml b/http/cves/2009/CVE-2009-0545.yaml index 4a0f1449c52..5b51f734083 100644 --- a/http/cves/2009/CVE-2009-0545.yaml +++ b/http/cves/2009/CVE-2009-0545.yaml @@ -20,8 +20,8 @@ info: cvss-score: 10 cve-id: CVE-2009-0545 cwe-id: CWE-20 - epss-score: 0.94134 - epss-percentile: 0.99907 + epss-score: 0.94006 + epss-percentile: 0.99883 cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 490a0046304402200234060c97ce6b563f00be797a2f65ea9db6429e07e1be281465b046bd6edfed02206424558216d047332054df5aeb4c7dbebdadb04fd0924e5017eb0c936754c9cd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009d95530541d737bfb99a88ec6bcb71318aa34af4276c6425b3006277bd4856cb022100e6719ebd498e0e5c46c7f98582f8e675eefd51ae55d79700b1b1c4aef2fd3a7f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-0932.yaml b/http/cves/2009/CVE-2009-0932.yaml index f32022dc675..54862c1c3b3 100644 --- a/http/cves/2009/CVE-2009-0932.yaml +++ b/http/cves/2009/CVE-2009-0932.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-0932 cwe-id: CWE-22 epss-score: 0.05612 - epss-percentile: 0.90017 + epss-percentile: 0.90025 cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bcbccee0a6166de201fa428b268940669ce0d082b0478249c684aa9a77d18f2b02204c830c45badeaed2599cc016013fbf9c22d04cc0b4754f2457554188f3eb6013:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bac1cf6fd6b80a706f0c17728c605e9bfe4adb318f1f249d34c58797e3ab2d57022100e44358b804a06f7994f123427f5828bd8efcbe4cc987bb6f214f069d8443c4e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1496.yaml b/http/cves/2009/CVE-2009-1496.yaml index 464e7c688b6..9e35d3b9d0f 100644 --- a/http/cves/2009/CVE-2009-1496.yaml +++ b/http/cves/2009/CVE-2009-1496.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2009-1496 cwe-id: CWE-22 epss-score: 0.01473 - epss-percentile: 0.80471 + epss-percentile: 0.8049 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207d6ebbc46fded1afa9bfdf244e893db917fef5898a6168a9ae6f43102ffedf03022067ed50e8902cca1f0437ee4f0a37c7b89ecc375f6c81228de4f2136c9c745235:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e25e941829350f084b098b4d611386d08e1360580eae72172adf8f3e38e2e5b602204116d5b78e1d593f6b07e1ff344c29d0fd6a69453f4ed55a848b5c8a5bf7bc48:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml index d438c5b431f..f492c8c9eca 100644 --- a/http/cves/2009/CVE-2009-1558.yaml +++ b/http/cves/2009/CVE-2009-1558.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-1558 cwe-id: CWE-22 epss-score: 0.09101 - epss-percentile: 0.92379 + epss-percentile: 0.92384 cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100dff9dea5a1d3392126f2bd6a8cb72fc1fe3bc8fd5198dbc950068825e0460eb80221008aa256bd8088234677cb154d9c0b49bc7fadfc224d282bfc4d8b2fb6a6fe6157:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e4aef94d0a1a6dbbe606d3cef73946298ee442a7df259ce628a3b74504d157c6022100ca65c39c2a8560da0dcf08a6656299a7408a4e247bf72418350e34403f42ca00:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml index c06e75646cd..d5620d72210 100644 --- a/http/cves/2009/CVE-2009-1872.yaml +++ b/http/cves/2009/CVE-2009-1872.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-1872 cwe-id: CWE-79 epss-score: 0.08673 - epss-percentile: 0.92156 + epss-percentile: 0.92161 cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* metadata: verified: true @@ -59,4 +59,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210093da2b0ded3e6d5ab5c1bf8939069945c3e637e13743527c3c17e159b2922c8d022100d0cbbec49bc9a3876823bcebe10530803f60a7b4ae7936b62e7079fc57e7a206:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206195d2bc338b97d5980b739b3cba14d178c7156e11a1049fc1423cbb05ee86580220315dfc3d7a220635e1f7dadd35e297372f85e0889a3935561dd545bf36109f85:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-2015.yaml b/http/cves/2009/CVE-2009-2015.yaml index 2e45b0f234e..09462108a92 100644 --- a/http/cves/2009/CVE-2009-2015.yaml +++ b/http/cves/2009/CVE-2009-2015.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2009-2015 cwe-id: CWE-22 epss-score: 0.01674 - epss-percentile: 0.81667 + epss-percentile: 0.81678 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f7eec341fbaff2092964c8135afe18a025754ceaefb08d57a2ab1b766e04586f022100c84a8cdc45c77e46d4d4b4cce53b799bb2928e0afd5b5f732855ca85e77f5c67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022004a48d2ee3d8d3cd28865a1535c86eb9417a3bbe38409df97366b36ca6ea2f090220472e06a9329024edc2f0e50cd0cc5023510ec0be3adb834ec986f1abea280651:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-2100.yaml b/http/cves/2009/CVE-2009-2100.yaml index f5b590da209..86bb2fdbc5f 100644 --- a/http/cves/2009/CVE-2009-2100.yaml +++ b/http/cves/2009/CVE-2009-2100.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2009-2100 cwe-id: CWE-22 epss-score: 0.01877 - epss-percentile: 0.82643 + epss-percentile: 0.82659 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100957fbdd32adbdba9382c14b53145a5bb63f9a98b6e2b65761f38cf3de646668402210083c78a2cd3d4c65ec0286dd175e2abb4b52db122d9fbd595f0724667179b449c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008d87eb28acfafc98d40f9182c509b6ce137455c7cd3149329414d0c3516f47b1022100a2cfc6b82504fbb68ae3e90cadea0aa62605f6ec98b9b5c6192cbcb853b07828:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-3053.yaml b/http/cves/2009/CVE-2009-3053.yaml index a1994098ffa..3ff183eaee7 100644 --- a/http/cves/2009/CVE-2009-3053.yaml +++ b/http/cves/2009/CVE-2009-3053.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-3053 cwe-id: CWE-22 epss-score: 0.01573 - epss-percentile: 0.81079 + epss-percentile: 0.81093 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202095bcce6fc06838c1962460ac0fdce131e0820c24ae14543547a5e82e90f48e022100cdcfda020e0b9f0c8a9a970ae0c54d2ea1e7b0fc03753066ab82b4bb1be9ca1a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100af5af060a6b9ece3ed363111d60234490ba129348c2f854eb0f2d2d00cb5b0ed022100f6859ebe0dd362f82fd095e18235951b4af10bc6817d11c1c74ed196a46d0545:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-3318.yaml b/http/cves/2009/CVE-2009-3318.yaml index 0304785a290..1e9edac1dbd 100644 --- a/http/cves/2009/CVE-2009-3318.yaml +++ b/http/cves/2009/CVE-2009-3318.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2009-3318 cwe-id: CWE-22 epss-score: 0.01442 - epss-percentile: 0.80264 + epss-percentile: 0.80282 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202634da17a95d0a2d97984f79595c033b38fc7c3b3bee4bd85ace26d8a90f719e022100f4b876fe5b13c3b63b6c9208d331d50ae96c1aa0370798eea1257461df04561c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c2abbc4cbd78a0d1a5c5fe3a6349c31bc378d81e93ae798a8eaba84d092c02c1022100ab3a7841ffe4707554f38a3a1ea73159c2ace01caa2339dd28d296b5cb6de6d6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-4202.yaml b/http/cves/2009/CVE-2009-4202.yaml index 84acd47c7bd..edc28c1a79b 100644 --- a/http/cves/2009/CVE-2009-4202.yaml +++ b/http/cves/2009/CVE-2009-4202.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-4202 cwe-id: CWE-22 epss-score: 0.04947 - epss-percentile: 0.89284 + epss-percentile: 0.89293 cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f3ec0f7a823e27cbef3cf532055a799f1fb379deedd07698b3bf3a29f4d644d2022100bb383e617d571aa0bbfd3af9b557b2407548de2feb4854a701d8e1fa62702dc2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f52ba631d2bc895f685566e1d36bf666c788198edbcca1e8031758952ed06408022100bb3e0990176ff89fc2847b150680321065885b1c507133a8f4bb4a686adf7a2b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-4223.yaml b/http/cves/2009/CVE-2009-4223.yaml index 80c3e4753a1..36167efa50d 100644 --- a/http/cves/2009/CVE-2009-4223.yaml +++ b/http/cves/2009/CVE-2009-4223.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-4223 cwe-id: CWE-94 epss-score: 0.04261 - epss-percentile: 0.8844 + epss-percentile: 0.88447 cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203e618107ab5be71c584d97640758db8b64a8cc5892ec2c73731d9c59654d27670221008a8fdb8e04bbbb779c29f7a92fe81c48f1c7ffd03b56eff8e591ec89ef76f534:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100fcba094f94ea03d029adb10f46f5eb999ff97122e5f2bbc41915a8bd53b4e6d70221008d673ba5bfeef29aa44430c057d127948f5dfd5b8fbe87692c2f81f3b76d970f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-4679.yaml b/http/cves/2009/CVE-2009-4679.yaml index 55ece1a8cec..e1b56bd06de 100644 --- a/http/cves/2009/CVE-2009-4679.yaml +++ b/http/cves/2009/CVE-2009-4679.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-4679 cwe-id: CWE-22 epss-score: 0.23302 - epss-percentile: 0.95762 + epss-percentile: 0.95767 cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220456bb978a8a1429bb6320fbcbcb8c4aa7a06dada7fb57744c3bb5be0cee2ba090221009aff48887039929e0522b60b85e6c6db7f46cf36b1c3cc4bd1a5da3f67497407:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009a1a8505c93440b316a0dccf36e22c6c9cbdf58d8575455fac70520afdff56b6022100bdb5e8cddcbd7c359a30470401bccb7d262efedbc80304119856fc4fda709c68:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-5020.yaml b/http/cves/2009/CVE-2009-5020.yaml index 3d15579fc50..3ff54800f89 100644 --- a/http/cves/2009/CVE-2009-5020.yaml +++ b/http/cves/2009/CVE-2009-5020.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2009-5020 cwe-id: CWE-20 epss-score: 0.01389 - epss-percentile: 0.79884 + epss-percentile: 0.799 cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -39,4 +39,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a0047304502203cd55a73fff27c550dac22488ce9c405303da599cfae64f7fdc9527d47703ee9022100c55ad331e5ba88a5dcee892a3143967fb14d24d06640d986e9c8a648622843b0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204c73f63bb4ccf74c0a2410bc6558802e0cfc21207b09a59afa46addbc9f27cda022100b7a5619e1e29eb308dbcd616b9d3bbe898c7097f3d4a5c8166fe5e888ff18d67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-5114.yaml b/http/cves/2009/CVE-2009-5114.yaml index 178f2f78fb3..9e71921830b 100644 --- a/http/cves/2009/CVE-2009-5114.yaml +++ b/http/cves/2009/CVE-2009-5114.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2009-5114 cwe-id: CWE-22 epss-score: 0.08663 - epss-percentile: 0.92152 + epss-percentile: 0.92157 cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022046e4449b738424e2b62bea0b8cee5e6aa73c0b6c7106029785c7610c1d8797c102200156da1fc2988701e4144f3ca68781929694f05ecb38658359ce884911bd044a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c1f70b486e9ff0984944c5c6ece865f6dd3dcbb15cae6dc4a70155b09df52334022013d02a5edf6cca632108fe6e975073ad797c53aa9f3c26df8867176139eabd57:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0157.yaml b/http/cves/2010/CVE-2010-0157.yaml index eb60c5b2e9f..7b00e52271a 100644 --- a/http/cves/2010/CVE-2010-0157.yaml +++ b/http/cves/2010/CVE-2010-0157.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-0157 cwe-id: CWE-22 epss-score: 0.06394 - epss-percentile: 0.90681 + epss-percentile: 0.90695 cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220379f97cbab0c6984fd5d695e07c61286eb96ad444a6cda95b5376b0f71f20dd50221008986956aedbe066ce4cfcd452b6adf5c30d84bb10d1e77506648a46539e67579:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022015a945bb924136011df92b735e28d24de24106ce61c39eb3963d6e80c6082e2f02201c2a81a5ba0eecd768e3d763f75e0b5c9dfee2bd6f61c46787ffc6cc8f108456:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0467.yaml b/http/cves/2010/CVE-2010-0467.yaml index 75785a4af59..471eaee93eb 100644 --- a/http/cves/2010/CVE-2010-0467.yaml +++ b/http/cves/2010/CVE-2010-0467.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022072009c07defdac935ff37697ffa32d41cef70a77f6e57bc3dcb316a1432e4406022100d5fa8f040d1bdd47701600de947e832fd80c957cdf7852b74cc2a151b1578fae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201c66734a12a9a02586a9ad489be33b2199028e06c60c2f702f123a610b185a3c022010d3d2a5a99a95e21c80b05a3a89610fb0191115640d7c5bdc15d26840ba6a2f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0696.yaml b/http/cves/2010/CVE-2010-0696.yaml index b7720b79816..5a11f1351cf 100644 --- a/http/cves/2010/CVE-2010-0696.yaml +++ b/http/cves/2010/CVE-2010-0696.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-0696 cwe-id: CWE-22 epss-score: 0.25498 - epss-percentile: 0.96028 + epss-percentile: 0.96033 cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009eef439beef50adf87923450c42a7a9829cea22f024a0c0900fa164939aadbb4022100ccb037b15688366d63dd243fe7c9dad572b7a49cbb2332e2ae2451dac0988b60:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e832a4e23e2d937d311b9e78ad33abc9df5d200a2c2fd741391403b40b9e9fe2022054e1d8b31d55ec8c6c35bfd39aa8fab7fb1b0019aada7b0f1e4c6703fde52b88:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0759.yaml b/http/cves/2010/CVE-2010-0759.yaml index f5f22cf4680..b9c9791539b 100644 --- a/http/cves/2010/CVE-2010-0759.yaml +++ b/http/cves/2010/CVE-2010-0759.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-0759 cwe-id: CWE-22 epss-score: 0.06605 - epss-percentile: 0.90841 + epss-percentile: 0.90854 cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022017c4fa3f8c595eb8fa4c6565c6a013b7936cc6d05584a7de91edcd51b0afee22022100db0baf3ee18948970ee3fc772f521256a9f266762463d42d72567516b85b0e18:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e3230b0c4c2a8bcb01307a089aaecfd520acc62573489672f628aa7e1f032e950220013f635049c5922407af36d41a3b56d3cbe584d56b6a9daf782cf3cbad20b4d9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0942.yaml b/http/cves/2010/CVE-2010-0942.yaml index c61637f08bb..2f0836b4ecb 100644 --- a/http/cves/2010/CVE-2010-0942.yaml +++ b/http/cves/2010/CVE-2010-0942.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5 cve-id: CVE-2010-0942 cwe-id: CWE-22 - epss-score: 0.04088 - epss-percentile: 0.88205 + epss-score: 0.1146 + epss-percentile: 0.93355 cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220581a554980036130fed8a8b9264122faff2cdf9e54254c105bf95dd881a8a17d022100d92abba6d9f9473e3abb6827857ca779ec769f6d7d66061daed77b74351071ad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220035f405746decef7243b4261c084a7c782ef8caf03daefeb7fb6d39f766ac6ad022077350ef5a782415dbc1d66fcd04414248114b4bf82483245a23d7dd911171232:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0943.yaml b/http/cves/2010/CVE-2010-0943.yaml index 9e2df59fe88..b88b0229147 100644 --- a/http/cves/2010/CVE-2010-0943.yaml +++ b/http/cves/2010/CVE-2010-0943.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5 cve-id: CVE-2010-0943 cwe-id: CWE-22 - epss-score: 0.01978 - epss-percentile: 0.83098 + epss-score: 0.14795 + epss-percentile: 0.94278 cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204e8aa992533291ba97e06f804ad2508b2de05114c565b6aaa2181bdad41e9d2b0220496c6372aae31f8a2ca66bdd6a8a34abd3c9f9ec0802c097865016995375ebe7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202f6b34cd30a3ffc3cfbc2ca1caac1671f8cbffbd8c0dce29aac905a2805b6dad022032e0681548ac45a7d43a0fa7d5d61a111575999f2cf267c1fb9b7ac979bfe12a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0944.yaml b/http/cves/2010/CVE-2010-0944.yaml index 9d2437fc57d..d5a5665bd36 100644 --- a/http/cves/2010/CVE-2010-0944.yaml +++ b/http/cves/2010/CVE-2010-0944.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-0944 cwe-id: CWE-22 epss-score: 0.01386 - epss-percentile: 0.79869 + epss-percentile: 0.79886 cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210092bc9bcf9e57bbf79922ecf243587006040163631f07ba984f44ed383ac9f30302210081a300bc9985be9fdbde5ba7fa6f4567fb251ab2d46acaed3147c4398f13d919:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ff63d8a560f2a73b5a016b666d0923726093611b55f788d1344c0df1f103191a0220663ac4ccf285ab36f84a937bf8c2f7d15472b64ffc9d3194b8bbdafb362ce12d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0972.yaml b/http/cves/2010/CVE-2010-0972.yaml index 3acd70141ae..2e15e196461 100644 --- a/http/cves/2010/CVE-2010-0972.yaml +++ b/http/cves/2010/CVE-2010-0972.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-0972 cwe-id: CWE-22 epss-score: 0.04611 - epss-percentile: 0.88887 + epss-percentile: 0.88894 cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008f72bf8fcb8a974114a13fe237dbc94d7c7b65c65d7a012b338a1271b0ccfb09022100adc460c30b5458e94d2d84e341cd2dbf4b509830197cc311759c53cba7f6cd25:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d133b477f9c30403fd37358db1349c93fc1b38c9f25407cc3bba40a9511ae11b022100a2dd160e1cfc514b21b46c4b20077120e0336abdbb85333f83e847ec09d6559c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0982.yaml b/http/cves/2010/CVE-2010-0982.yaml index 729eca7eaeb..7ae3f33a4ce 100644 --- a/http/cves/2010/CVE-2010-0982.yaml +++ b/http/cves/2010/CVE-2010-0982.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-0982 cwe-id: CWE-22 epss-score: 0.11 - epss-percentile: 0.93174 + epss-percentile: 0.93179 cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210090d46264b9461398e3e6f013781e0d41efd67dcff9149ae1d23d58717795f5610220030a0f50fe174f1019095ecf239162eade0e3f39e3892bb005efbc1dc326fefd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ebbffa9d49a0624f053c8434312111b4bb98e48d0329d7e4433e4c6ee12f42aa022100b883d37d035e7c9b49141c1273b6287c1267a2c1509c1a8b6424ffb633069c05:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0985.yaml b/http/cves/2010/CVE-2010-0985.yaml index b9d110fc0be..d5e2c6cf67e 100644 --- a/http/cves/2010/CVE-2010-0985.yaml +++ b/http/cves/2010/CVE-2010-0985.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-0985 cwe-id: CWE-22 epss-score: 0.21353 - epss-percentile: 0.95501 + epss-percentile: 0.95505 cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210094db605c7e91e167a7931e5f1de733cac918886626fac3a14280d78e8b60413d02210087a113610de76add9b3d6ace49979309107368ce731e8aba7f6b8685ee72a2e3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220375a5a8ee6d6192e524ef358046f6cf1be7ff3edcfd9fcf6e38dd06cbb77751f022100e607e123edc67060b3da6c2f403c1f5d7d8ac13c06d198a055f046bf1246bb34:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1056.yaml b/http/cves/2010/CVE-2010-1056.yaml index 802d6160cf7..4ed7558bfe7 100644 --- a/http/cves/2010/CVE-2010-1056.yaml +++ b/http/cves/2010/CVE-2010-1056.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1056 cwe-id: CWE-22 epss-score: 0.04792 - epss-percentile: 0.89116 + epss-percentile: 0.89124 cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207fc43e5a854201f13935a1e187a97a857d23912eadc4af2ae3ece73b4a6413d502203f09f2c02532ab0b225f060673813964a1d324b3da56fd31b8d0d3d48b195ba4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009ee4b0b37f31c97def98283bf68e26470e6e06393b89ec6b5ab62b03ef9fa0f202210097290ddbc036ccae3cccfedc165668f43d10fa70a18d030f8c9be1632a5bee85:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1081.yaml b/http/cves/2010/CVE-2010-1081.yaml index 8fa55490f20..efb80e6b050 100644 --- a/http/cves/2010/CVE-2010-1081.yaml +++ b/http/cves/2010/CVE-2010-1081.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1081 cwe-id: CWE-22 epss-score: 0.05904 - epss-percentile: 0.90279 + epss-percentile: 0.90289 cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220581a797ebb687fe7a6736eb4e6b38a80dbbe0dafaa1eb0ed779c9329898eb911022043708227888d3f75d4d325a95c8c4c72cd717a6804321609ed391d8ccd78f90a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ace98ad8925ac9d06a7709d9df950b2802fb5165d90fd6741877f4ae86b4e4d102207d57ef6540b1b0c7a62d65e91222a74f0f88428b18255dec414c228a895c3edc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1217.yaml b/http/cves/2010/CVE-2010-1217.yaml index 7bbefe6432a..55d445ae00f 100644 --- a/http/cves/2010/CVE-2010-1217.yaml +++ b/http/cves/2010/CVE-2010-1217.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1217 cwe-id: CWE-22 epss-score: 0.07857 - epss-percentile: 0.91697 + epss-percentile: 0.91705 cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022073d44f2f0d13060aa69b14ee21ab2d7fe97ba619717a6544f4634b6ec933ccac022056a686f669481ad1b49e6c89a3d198c9bec86c22c5f455b79c26d23ce3ba6cd9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022027617c2ff65bd8e3719e378c6495176937d41703017e2c21c87be3d3fbee68ef0221008f447854f327eb1aad175d23555d532c58af639c3ca797017786c76080de5463:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1219.yaml b/http/cves/2010/CVE-2010-1219.yaml index 92c0404b3c4..cf79933e3db 100644 --- a/http/cves/2010/CVE-2010-1219.yaml +++ b/http/cves/2010/CVE-2010-1219.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.8 cve-id: CVE-2010-1219 cwe-id: CWE-22 - epss-score: 0.0759 - epss-percentile: 0.91526 + epss-score: 0.27216 + epss-percentile: 0.96221 cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210095f06e6bc8cec94526370844370077adb37fae8c5e0676a4253156e3b86e4b5102206c9d6e0adc872c424ff02339d7c24f6de4f21c6f45463009849abf67b82bff43:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210090b67e1126e7c1c4bab20a6579935b3e24461aafe7725822d13f32373c667a72022100e00399ae569e163cf8b1be4f7da47268c09596f6fcd768671773265549b625c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1302.yaml b/http/cves/2010/CVE-2010-1302.yaml index f64e64669b2..950dfdb5b0e 100644 --- a/http/cves/2010/CVE-2010-1302.yaml +++ b/http/cves/2010/CVE-2010-1302.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5 cve-id: CVE-2010-1302 cwe-id: CWE-22 - epss-score: 0.04863 - epss-percentile: 0.8919 + epss-score: 0.13471 + epss-percentile: 0.9397 cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008f07ebfc97c407bf63dbd89d0f556ae8077ab8984113c4270f4f1b207bbb4968022037167fd6968e2fb6b0bfcdc10fbe14cc5d7c632ee217f0d15501c14933f399db:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202788f987f5ccba0eaafef98058723f657fbfdee12d06bdbcdc4b57e9919e66f3022100f9c9ff52f971b17c162d804bb03d4a5a3b878ae080d487d4f362349508c1f5e3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1304.yaml b/http/cves/2010/CVE-2010-1304.yaml index bee0b08a9ee..0dd8ff0e919 100644 --- a/http/cves/2010/CVE-2010-1304.yaml +++ b/http/cves/2010/CVE-2010-1304.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1304 cwe-id: CWE-22 epss-score: 0.0324 - epss-percentile: 0.86701 + epss-percentile: 0.86707 cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200709ecea5d22e3c5394bee2801f0e208f5f68af778e0068da9d81eb0faa1ed7502210097a0663c8dbeebfc56e4fecb72549312e24af5c8e8ec18894554079e92370933:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022063cb3eeabd70bc4fed0b2a424417eac1810b90b0406767ad4b990872f9dafc3b0220660929b61465b6f61f25aaa06d62c1977774e031d454296dbdbb6d7780771e26:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1305.yaml b/http/cves/2010/CVE-2010-1305.yaml index 31cf7689ca2..2c06fe066ab 100644 --- a/http/cves/2010/CVE-2010-1305.yaml +++ b/http/cves/2010/CVE-2010-1305.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1305 cwe-id: CWE-22 epss-score: 0.08442 - epss-percentile: 0.92025 + epss-percentile: 0.92032 cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100869ec5df20d6f96489667d46d34031b2c86f063791a325182e129ef34440c7ad0221009cbce33f5343e54cb63d6d46bfcf33a466875b64d3c83f0a622ccfd13edab84d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e1aef11b980cab436a6ae7d83779e1397261b6b1737c9d11c50832ffd739957b022100d3bbc48152a003f309527d219e01db29256ed54fe5ed2f5fdadc085c6b381255:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1306.yaml b/http/cves/2010/CVE-2010-1306.yaml index 516e8a2c55c..e89181460ed 100644 --- a/http/cves/2010/CVE-2010-1306.yaml +++ b/http/cves/2010/CVE-2010-1306.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1306 cwe-id: CWE-22 epss-score: 0.05165 - epss-percentile: 0.89535 + epss-percentile: 0.89541 cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c51ffa0aa1bff86d83a5cdf89859c74185d61695ca2104cb7227ffb3283b871d022067c2dccc105699d9b579842bc50c4eacc8089d9384713173a52ee52225f618c5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220710a70f5e8a63555bf7276652f8cac11148839fb3b4bdf04080aae2abfbe816a022100f6d97874a070310063a5868d9983096b8fbc4ac505ef526f4e861df2867b7d35:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1307.yaml b/http/cves/2010/CVE-2010-1307.yaml index 4626c2379d0..e043c4d128c 100644 --- a/http/cves/2010/CVE-2010-1307.yaml +++ b/http/cves/2010/CVE-2010-1307.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1307 cwe-id: CWE-22 epss-score: 0.0609 - epss-percentile: 0.90436 + epss-percentile: 0.90449 cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022035fd781bf54c86558bbdeb3a9d2d07dc93b26f1537ecf5f683ee6ef7c797395c0221009ef00bbd4249ced6da8953534c48be03bb0824620dde15c8255d025a207dd659:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202d531aff7f261a79520f76026a15ffdca443aca496fee416804a98b98bf3ae630220710e8e028871a2d3bf9310e723a3768f2aceeee990cc13794b86010b3f2d2702:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1308.yaml b/http/cves/2010/CVE-2010-1308.yaml index 02c8ee5f40a..9c1e1e62bfe 100644 --- a/http/cves/2010/CVE-2010-1308.yaml +++ b/http/cves/2010/CVE-2010-1308.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1308 cwe-id: CWE-22 epss-score: 0.06232 - epss-percentile: 0.90551 + epss-percentile: 0.90564 cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b0503bb7645b6e82e2dc01cda878254cf0965db66fd17e9983fd8113ac9c03bf02210080ff5ceff1d453ed842d49ce636e7d869e12017bc7226a7a9b750d74208f3359:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a2857fee8aac6a1bf1e942a7111d951a64b2a3512415191760e176bd1774ee0f02202e4ad8745cfcae09084729891b19d4d0d5af6bed4372e9a9d7999eba7815bf46:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1312.yaml b/http/cves/2010/CVE-2010-1312.yaml index bea84d87fc2..b512d0c2ef7 100644 --- a/http/cves/2010/CVE-2010-1312.yaml +++ b/http/cves/2010/CVE-2010-1312.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1312 cwe-id: CWE-22 epss-score: 0.04403 - epss-percentile: 0.88623 + epss-percentile: 0.88631 cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210099a35cc628b76e279d184fa07758dd3cd40199ae80e8ca2353634cefe7c2dd8f02210085d917fca413a29acab6bba93a35f7335bc163322c7418397f63d0e8c05aaf30:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022043bdca519326108b34232d6741aee8fb1c689b4e7b5af69a8c4a3e49863dbcb5022100bccd0b731e9dbde8631f417831822814e6fde8f60658bb3fcdf625f73b793041:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1313.yaml b/http/cves/2010/CVE-2010-1313.yaml index 18def978ce8..c4bc1af7038 100644 --- a/http/cves/2010/CVE-2010-1313.yaml +++ b/http/cves/2010/CVE-2010-1313.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1313 cwe-id: CWE-22 epss-score: 0.02571 - epss-percentile: 0.85098 + epss-percentile: 0.8511 cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100cbb4cecf346089e9f88fac792262b81c60e686ddefbef691803a27716409ce1402205495cafce4666bd9bff40dfaff78eebf22d5aeb8003f52fa47d37c89fb761eee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b0b51a8ecc711f8ba2d3378c9ed76236671a1696afd0c56ac516ef152292b9e3022100942b0b1d45735ce2ef3e7e714ae31b5526d6e0ce36046330146c9afa73ccc430:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1314.yaml b/http/cves/2010/CVE-2010-1314.yaml index da2a1c4cc23..4e81947ae05 100644 --- a/http/cves/2010/CVE-2010-1314.yaml +++ b/http/cves/2010/CVE-2010-1314.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1314 cwe-id: CWE-22 epss-score: 0.01964 - epss-percentile: 0.8304 + epss-percentile: 0.83056 cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201be54f9a5f92f60f21c87bda01d8fb312a5eb36d289721d98e97a5a66e37fa2202204d328df69eaad801d7ad2b6a64152dbd1e64b103397f882ae99be3d8d46b29f7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204cf3277851678fea2152f4c4ca865dfcb3b8d00476c4114ce43b79c5c463f11b022039b811e3af7936cd6a6ac27345b99592d4148a3a8ee22dbf4fc9f4b651c9d756:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1315.yaml b/http/cves/2010/CVE-2010-1315.yaml index 11ec36c3331..982389dead2 100644 --- a/http/cves/2010/CVE-2010-1315.yaml +++ b/http/cves/2010/CVE-2010-1315.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1315 cwe-id: CWE-22 epss-score: 0.05809 - epss-percentile: 0.90189 + epss-percentile: 0.90202 cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207618c5af5f9312e6dca8199547c85cd741fc9c9febe0449ce043bd82819e89cc02206708835d4c73704a2e89924c69a189bb692e8b6fea564b264066e696114162d2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220654fdda1e8a3475c7876238ff39ec0a94d46d5fd373b81c97dcd2666ba85a327022100d29ea37e0700190954295f69ff1b2886ffafc03e5b721c90d7e5a2b1f96df000:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1340.yaml b/http/cves/2010/CVE-2010-1340.yaml index 8745d28f194..6c7f9f1b3cf 100644 --- a/http/cves/2010/CVE-2010-1340.yaml +++ b/http/cves/2010/CVE-2010-1340.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1340 cwe-id: CWE-22 epss-score: 0.03958 - epss-percentile: 0.87987 + epss-percentile: 0.87995 cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a1dc9edc306ce914dbab599a205a20a815cdfd7ce6f54371b5c0ad4d073d64a002200807c4ca06c46a39179547ad813aa8ce0a279342c845174da6c9cb1d38c52bb7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220504a20ac0cbd39b1c57bb78f948a72923219a0bd6170648f9c544e0c8b66a880022100b7ccadd645de89d44f7289e2d3a2b6e28357eb6ec50fc1d10b7c8f9a666927a6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1345.yaml b/http/cves/2010/CVE-2010-1345.yaml index a0d38ec9874..ce848a7953a 100644 --- a/http/cves/2010/CVE-2010-1345.yaml +++ b/http/cves/2010/CVE-2010-1345.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1345 cwe-id: CWE-22 epss-score: 0.04141 - epss-percentile: 0.88289 + epss-percentile: 0.88296 cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009d973ce3d0392d825c392089231edbc19bb0111cb647babee243fb89689a4ed902206b4c0a66d6f9914dfcedf0e32bd854396bb7308ebdef5d666ade30ab81d57274:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202bfd2f9a843d72bcd2d11263bc107decec05fefb489b171cadea34b5e477f382022100d712825815ac27324f53d191e296d7c1dc8a2035a0eafe774acc50d0c571b753:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1352.yaml b/http/cves/2010/CVE-2010-1352.yaml index f259fe45dbe..c15feb3f235 100644 --- a/http/cves/2010/CVE-2010-1352.yaml +++ b/http/cves/2010/CVE-2010-1352.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1352 cwe-id: CWE-22 epss-score: 0.04773 - epss-percentile: 0.89092 + epss-percentile: 0.89101 cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ed8dd3ed59a300dadd53aff57470e5a262bde69e9d81469c07c1f5b6ff9ce94902200c4c4498c8aad3ff995febd62216f64ae4db7d09a46a9e0c88f7ae61e5a0f4d6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c7ffae4f93ddb172721dc5ef9453f644da51a6d713c712d17d7c25c789c8fbc802207111005de9ea6474dfd3b03891ec2dd473f43c4c160bf09199a81c6197931e45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1353.yaml b/http/cves/2010/CVE-2010-1353.yaml index b87736868ea..19aee80c56b 100644 --- a/http/cves/2010/CVE-2010-1353.yaml +++ b/http/cves/2010/CVE-2010-1353.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1353 cwe-id: CWE-22 epss-score: 0.01501 - epss-percentile: 0.80686 + epss-percentile: 0.80704 cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202dca9c02a1eadd5428906d5a8df3065f8ea9deb6966f1533deda016efc07809c022100af7009349b791f877fbf9afa4803dd4a6cd5e4e63ffde55e945021a6c5f5870f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a2c331142cdecaf1fa4d82e025cbc909146d0d8039fe3ff22f073aaa48587ffa022025f8f721d4338b6bfa587a1455bc9f34b23f98fb3afc65f35d30acf6ec7f97d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1354.yaml b/http/cves/2010/CVE-2010-1354.yaml index 24e7299fd56..bd4a5e8d45f 100644 --- a/http/cves/2010/CVE-2010-1354.yaml +++ b/http/cves/2010/CVE-2010-1354.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1354 cwe-id: CWE-22 epss-score: 0.05644 - epss-percentile: 0.90047 + epss-percentile: 0.90056 cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200d7cd3e3394e4c58a1bc286032da2f725fbe0a1f60021aeb2d4e5437bc64f188022100fd42f70b2edd9944ed251645b56a43e856fe8fc345a62fef282cbf86975d39d5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022069387027b41fbe3d27a7bcebbafb786669da6acd663eb12edc0623d44d9b4f92022100c9c7a2c0079247431f1e3bb3aff5330c740c449f16941c84044dedb25aedfed4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml index 7b208b91ffb..523e32bd1d0 100644 --- a/http/cves/2010/CVE-2010-1429.yaml +++ b/http/cves/2010/CVE-2010-1429.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2010-1429 cwe-id: CWE-264 epss-score: 0.27359 - epss-percentile: 0.96234 + epss-percentile: 0.96238 cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:* metadata: verified: true @@ -54,4 +54,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220421792601c95171af9d3181ef2afec638907da81f7f10fd62cc8c3bbfc6d118c022079e56769a744a688384f1fe1b1baa5f9fb3251e8a8141be6b3f349a1870f327d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022079ec4e4a1d4e5743b236b9f826d1b2f12d3b4435ff24b860f8946330fa307dd0022100eafae4667a8d6d3734969392f498250bf9a86a31790b9fe8554dbafcbae1f3a5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1461.yaml b/http/cves/2010/CVE-2010-1461.yaml index efcd9af8038..361b6b154e7 100644 --- a/http/cves/2010/CVE-2010-1461.yaml +++ b/http/cves/2010/CVE-2010-1461.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1461 cwe-id: CWE-22 epss-score: 0.05776 - epss-percentile: 0.90163 + epss-percentile: 0.90175 cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207a8a47dda56ff41a8bfb22cd35ff7e67721bc59950870ef0c1444f05d1d5e52b02203e992f673b7c5dcbf07af623ff8b944416b4bb00890bfac489c8083221242aa6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206e03c860b4b758479af20714989e6665b3588eb0e8679d4c746da489073e54f302207f08e7f34f710343086b8a0008693be1a7c1a435f8eadb10491cf22244b41093:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1469.yaml b/http/cves/2010/CVE-2010-1469.yaml index 9185191a92a..1a16f83a193 100644 --- a/http/cves/2010/CVE-2010-1469.yaml +++ b/http/cves/2010/CVE-2010-1469.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1469 cwe-id: CWE-22 epss-score: 0.04188 - epss-percentile: 0.88349 + epss-percentile: 0.88355 cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b196f674ae6f0bc1dd8c511a2c3b43b296ef815c944d74502b3632745c0fe4e4022100b5dad7817aab978f828545baa04911f2e486099b34d78eb799fe4394149914bf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205440db5caeb74903e899bc29088ecd8d262d9dc90b6f4a925bca21700c2621cf02203392b3944fc74ee112a075ed5b95c22291088b0c6bf4e95dd4acf021545df09d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1470.yaml b/http/cves/2010/CVE-2010-1470.yaml index 80b2fd5ac10..2352ff94f2e 100644 --- a/http/cves/2010/CVE-2010-1470.yaml +++ b/http/cves/2010/CVE-2010-1470.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1470 cwe-id: CWE-22 epss-score: 0.07329 - epss-percentile: 0.91373 + epss-percentile: 0.91383 cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022072f4e1291db68412f4c5bbd5638344cd0b25ec82f134b3848e4f94dcef7477e902201365a33356404404ca70c150f1c1f90a26672441908ecca1151dfedbe45e98dc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022022461688f4cc0f6a7f5bfad40e56e8177857e6f4770e2d6706ecc5468163fc6a022100a51370f0ae5f8acba14d160a890f9b7197a8f055ed704d4f187579fb6360d255:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1471.yaml b/http/cves/2010/CVE-2010-1471.yaml index 18771e61819..d2ff6fa752d 100644 --- a/http/cves/2010/CVE-2010-1471.yaml +++ b/http/cves/2010/CVE-2010-1471.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1471 cwe-id: CWE-22 epss-score: 0.10651 - epss-percentile: 0.93045 + epss-percentile: 0.93048 cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220484f52991bba19ddea44b51ebc3206c5a040f4c7700b1df1c7bd5783b622f0fd0220138a8c155af4dab13263eb7aa684fc421c23d3c2ed5d8fdb55b77420a9738888:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205dec9287ccec44936f26a4b2bafdaa2ad36ae7fc79a0b8cffaf90a78612524460220219d835b95a71bfa3086a51258aeaca6edc41c7396d6307569b61184b5c4898a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1472.yaml b/http/cves/2010/CVE-2010-1472.yaml index 102e8e5582e..37accea29c1 100644 --- a/http/cves/2010/CVE-2010-1472.yaml +++ b/http/cves/2010/CVE-2010-1472.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1472 cwe-id: CWE-22 epss-score: 0.07018 - epss-percentile: 0.91151 + epss-percentile: 0.91164 cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022058a4833649fd0549888fd59e8f02642315b6fcf165ba31fd4644a537ea6bfd2a0220300163859df5cf4a6849104e0ca2d5d0abf68d62754393e6fda078429547ee9b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c2b3fe6cbb8c4869f5a76752966ebe51251f0c0f369a11a59c93217cf24e731b0221009b3c9c21b3d3d2acfd9ee28a42a634860f47783500d5a651542c83bff617754e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1473.yaml b/http/cves/2010/CVE-2010-1473.yaml index 7d42bfc85f5..abab2286243 100644 --- a/http/cves/2010/CVE-2010-1473.yaml +++ b/http/cves/2010/CVE-2010-1473.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1473 cwe-id: CWE-22 epss-score: 0.02914 - epss-percentile: 0.85949 + epss-percentile: 0.85951 cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022053cb011a8f00adedfc62a42f665ae71c39284c135531e83cc8df5178c1ad3ce602207097bad6cf5bec25ff6fbf671bded2ffffa02768dacc74c39401dd261e68d14a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100efd3a5e32d74f74aac91adbee99f60c9ad51ad8d01a60e712b89fc227f86838a02201f4eedd94c186290a7a9fcb1d65b90c8b8b492c386f3092bc7497de206fcd456:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1474.yaml b/http/cves/2010/CVE-2010-1474.yaml index 712973ccf1f..275c2c4af38 100644 --- a/http/cves/2010/CVE-2010-1474.yaml +++ b/http/cves/2010/CVE-2010-1474.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1474 cwe-id: CWE-22 epss-score: 0.01519 - epss-percentile: 0.80787 + epss-percentile: 0.80803 cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207becd5cbb8289b86e1540fcc724c77d0675979727371d80f07344132d8d88122022100859f8d5fb61ad1982753265732cca1faa82682468c68e30d0407234051b4b80f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210081bf9cc265d0b373c49c019424d646cf22f93ddd8740a64c44a8a88b478c713202204148341949b2e01e5cb7ecce344d5835080ef506eac5c0e3358a04fe10a913fa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1475.yaml b/http/cves/2010/CVE-2010-1475.yaml index c4fcc7bf582..b4095668e00 100644 --- a/http/cves/2010/CVE-2010-1475.yaml +++ b/http/cves/2010/CVE-2010-1475.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1475 cwe-id: CWE-22 epss-score: 0.02478 - epss-percentile: 0.84842 + epss-percentile: 0.84852 cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207bc137858d371eb02b36dc4045e5f1f6f70f67487a382d6cdab07c38924a059f02205a2de627b147b5f3cc7a4c8ec6f1ca4ff0fb8946946d3e7543e7eda8947efc23:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022016f536bd67642a53865cf748d1bcd6c6f6d0d29a99a5f15c32ef7e8c6a94c62a022100c7e8c83b7999a4fde856f80177ccd451ba212dbfccdd017bc52a6ce43f92a1f5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1476.yaml b/http/cves/2010/CVE-2010-1476.yaml index ebd3f7a530f..57fec4a4b94 100644 --- a/http/cves/2010/CVE-2010-1476.yaml +++ b/http/cves/2010/CVE-2010-1476.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1476 cwe-id: CWE-22 epss-score: 0.05349 - epss-percentile: 0.8974 + epss-percentile: 0.89753 cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201d67a59444c8f181963491f84fe86cc7d339cbfb24511e53848d1953b9b0661d022100c742bfaa0a1f1e8531d63bebfa07d46e023840d3caa35bb13eb5dc86a1bc9585:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bb97a75028d5b4f9fec42db3dbaa7bdc1f95de2863fba94e994923a585d2ed4c022100e2080a68fe4c8a324f4048a9abf861d202f1ca8b3f04e0a55bf2da73e14ca349:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1478.yaml b/http/cves/2010/CVE-2010-1478.yaml index c59983b7128..f6ef834c1a9 100644 --- a/http/cves/2010/CVE-2010-1478.yaml +++ b/http/cves/2010/CVE-2010-1478.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1478 cwe-id: CWE-22 epss-score: 0.02405 - epss-percentile: 0.84621 + epss-percentile: 0.84635 cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220625546196e9a3d8886f078aadd5cba73512bb02d67bd22ad1e643419b568c0af022057e5798c586c0c9fb55d3c467c4d22869d02d50e44cc9e8462c6b2228e2dc6e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220088e7517b71ebebb04a0b3afcbc7cf0a57208e52f40541cf59dd1e0aa004e0860220194ea17289ea25d45c5c240f739e90c64fd7c878cf761f3e83600a16bcbd55d6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1491.yaml b/http/cves/2010/CVE-2010-1491.yaml index 97cd5b7af70..538c4513c70 100644 --- a/http/cves/2010/CVE-2010-1491.yaml +++ b/http/cves/2010/CVE-2010-1491.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1491 cwe-id: CWE-22 epss-score: 0.04773 - epss-percentile: 0.89092 + epss-percentile: 0.89101 cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e5f84b23a77c3d0dfb9b01e3f94503d5b1802a20ea51818ad297b2a075b6b285022100bcb88f9a31799ff394407493a9ebe8a2b8c6f3524a2db07734f06645e678ddfa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a6406457c42d491cafa396011d4bb00be29df7735dd44242b2c2d7ccdbabd05502204bee629c8b1d5cd93739820e9457615f6508a24177e2c66ccf84de1b1e3c019f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1494.yaml b/http/cves/2010/CVE-2010-1494.yaml index 48cc8f6190e..9319782c051 100644 --- a/http/cves/2010/CVE-2010-1494.yaml +++ b/http/cves/2010/CVE-2010-1494.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1494 cwe-id: CWE-22 epss-score: 0.04579 - epss-percentile: 0.88846 + epss-percentile: 0.88853 cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b4534e76fc81ab137a36cfce1153dd79680fa7bb72c37fc16f54243ade5e5af9022100b71dc6771ea48b87837da06340fa2c9dcd0010bb30bc51efa380de05a458848d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200ad84ae5f2675b11cd3c4399c960addb2334dbfbbcca44e0d915e0419227db2e022100cacaf376bae24a48f1b563b928220b95161e7b245d7376e998563727f8c9e502:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1495.yaml b/http/cves/2010/CVE-2010-1495.yaml index c5468ed88dd..b41166ee1c6 100644 --- a/http/cves/2010/CVE-2010-1495.yaml +++ b/http/cves/2010/CVE-2010-1495.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1495 cwe-id: CWE-22 epss-score: 0.01547 - epss-percentile: 0.8094 + epss-percentile: 0.80955 cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210098a3930642fb79518cf71b023317f86d4f0106a599136772c1064c1d131386cc02202a68b48eac8dd5b7c85b0629954dd59faf5d0fed0d1adef100d8058d6de696bb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008261c8c13f7c75b5f752627d5ba94655ea197a263d422595d21cebee2829456302206093e741e82a9def0f04f5484b2dafb4f36d158272869f60d436c61e6af900a2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1531.yaml b/http/cves/2010/CVE-2010-1531.yaml index 78ca354ac77..1271f21dcab 100644 --- a/http/cves/2010/CVE-2010-1531.yaml +++ b/http/cves/2010/CVE-2010-1531.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1531 cwe-id: CWE-22 epss-score: 0.15925 - epss-percentile: 0.94529 + epss-percentile: 0.94534 cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cddd409dc9997d07b42d2b395706d1d4a3b93bf49f3a6574c28aa0cab2b22901022100e9bcfcad042a5b6f6e47111a32e53e93d2b86d2e125d13d59670825866f54672:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d632fd915e4d9ebf3ddcb252c4df97ece14e5b848c14155b8173ae501ffb1a37022060bad7ee6afb5ebca6f4eea3c32fc0df13a004e242c7e20b694929020eff3ff0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1532.yaml b/http/cves/2010/CVE-2010-1532.yaml index 30b52f0025e..54af6ff5639 100644 --- a/http/cves/2010/CVE-2010-1532.yaml +++ b/http/cves/2010/CVE-2010-1532.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1532 cwe-id: CWE-22 epss-score: 0.02396 - epss-percentile: 0.84587 + epss-percentile: 0.846 cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a97d13d0173683df9a99603dba7b6fc9f06491afe2a973a8142741a6939b1f7202205bae2e65b0466527fbcf84411368fea954e86909e63d074918fd079fa5cabe1c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205234033e40e40e0b84a910aaacfff09cac26f2b9ff25b01242f948a91491e0fa022019cf4a25ff4a15e95c75133a6bd612d537fbf3113bcc14b57b1a0a742ea9872e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1533.yaml b/http/cves/2010/CVE-2010-1533.yaml index ca1f1390d91..89a2d870bc5 100644 --- a/http/cves/2010/CVE-2010-1533.yaml +++ b/http/cves/2010/CVE-2010-1533.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1533 cwe-id: CWE-22 epss-score: 0.01114 - epss-percentile: 0.77643 + epss-percentile: 0.77655 cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ba6e840f65963d1e5f2ac1f2084084cc48d5ff84a80e2f553d0bf6a9f5e2cd1602202987d231163cf5824d41d3d6086cb10fd85a62057f41957d20b123f74c76560e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e1f3e51c54cffc7f3715d051641256f286bf6641443777cb10fdb81843954fb0022100e55572197a01cd3ee3339b0e4849ed376e5800adeb175d00abd9f31326d7d767:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1534.yaml b/http/cves/2010/CVE-2010-1534.yaml index 05cfe689259..4839e2f56e9 100644 --- a/http/cves/2010/CVE-2010-1534.yaml +++ b/http/cves/2010/CVE-2010-1534.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1534 cwe-id: CWE-22 epss-score: 0.0317 - epss-percentile: 0.86517 + epss-percentile: 0.86523 cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220357ea5b869ef713ab99ffcb18e719334ba1c4d06c30194bc2455c9fc89f172210221008f931dcd832691fcdef5e4efd06b100a8a622c908910ace9687d34026e41da5b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207af9bf6bd3145836be51384cd92aa30c5f4a5ca3f4b02086890053667c5057f4022100d051144bdc4fef6f167eb465e0e28ef51dcb004c766553d40b2183507f8a7aac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1535.yaml b/http/cves/2010/CVE-2010-1535.yaml index 3628903b9ed..04ee5f09a39 100644 --- a/http/cves/2010/CVE-2010-1535.yaml +++ b/http/cves/2010/CVE-2010-1535.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1535 cwe-id: CWE-22 epss-score: 0.03024 - epss-percentile: 0.862 + epss-percentile: 0.86203 cpe: cpe:2.3:a:peter_hocherl:com_travelbook:1.0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a356b8e04f93212255fc5205550f1ae79c41e72ff4de1b4c11e4d7dd6ed74a26022100a59cd3fe175a730ed5d4dc46f202f9805533e6d83eb643bedc48a2b782e4b280:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a199901e8b233ca5f5e924afb4241d7a47817a2b492866ccda2b1bf3e99126f00220491d502347e79b7e3be14925e844120673b0e524e7c79c8cfed41cc6bbbf189d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1540.yaml b/http/cves/2010/CVE-2010-1540.yaml index b049b3ef61f..8d665e0bd23 100644 --- a/http/cves/2010/CVE-2010-1540.yaml +++ b/http/cves/2010/CVE-2010-1540.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1540 cwe-id: CWE-22 epss-score: 0.16311 - epss-percentile: 0.94621 + epss-percentile: 0.94627 cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d08644d51eb958e6121aa12f09d4a75a9d65b85ffc769b7735d51410266dc46f022100a92599f31fca9fe69d61626f7b75799e55e9751da25db777ada6d41837a5af6f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022030be8f1ff87014d22da8421608df5c01426465793a227812c3164a9e8dca2492022100dd311851177f266568933a6799df32f573d5657888fb9d2c8a4b27903d0acdfe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1586.yaml b/http/cves/2010/CVE-2010-1586.yaml index cef706be2cd..d94e17bb232 100644 --- a/http/cves/2010/CVE-2010-1586.yaml +++ b/http/cves/2010/CVE-2010-1586.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1586 cwe-id: CWE-20 epss-score: 0.00524 - epss-percentile: 0.66259 + epss-percentile: 0.66261 cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022074e98d5a209a15b68372ef633b29d66695c2bc12ce5551c709e8a9718ef29efa022100a06ee52454f588bcb4331fc46cccaa2cbc8dfa8ec2cf52efa4afb290921e02fe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204a841e8284d0e1f6a9a130021119456356f2dd6fcd7b42e44def4e041d585138022100aec06a7dad4a4461b62319a6090b193cb0ed5e62449db5366f2ca63220c3c413:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1601.yaml b/http/cves/2010/CVE-2010-1601.yaml index b9205b9e9e2..32300f5af19 100644 --- a/http/cves/2010/CVE-2010-1601.yaml +++ b/http/cves/2010/CVE-2010-1601.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1601 cwe-id: CWE-22 epss-score: 0.06083 - epss-percentile: 0.90428 + epss-percentile: 0.90441 cpe: cpe:2.3:a:joomlamart:com_jacomment:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cba2c28a0220ce2202960fd80d258e274bafbe04deea56c90372344ab5fdc804022100812a40edc1d1c7a582adf15bf995cd4ad45d04ec38ce795823b4ad027f6d67a5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022076a9d601a44440c7aa4865de5968710e7ef9594a5c1d89f4fbf23dea21bad35f022048b3ad67d04fd344ad27af96d98913b0f6943e90861db29b4ee4fac3addebfdd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1602.yaml b/http/cves/2010/CVE-2010-1602.yaml index f2c95047663..065a3c4054b 100644 --- a/http/cves/2010/CVE-2010-1602.yaml +++ b/http/cves/2010/CVE-2010-1602.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1602 cwe-id: CWE-22 epss-score: 0.02228 - epss-percentile: 0.84058 + epss-percentile: 0.84068 cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fa1fd4e25b92254aad9b08fcc1d2e974dc9431ed8888d1995a6b908e27b8f52d02203ea4a88f462c0f0a83713be1eeb81533eeba78b8c370724a834556b497b05fa4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b940ae16e541cd024d50f2f256d5aa85cafe36120ad78e5824099c1eb9b824270221008cbd0bef389470cd8c2b95390a2291b2c81d4b011863c6d25eca0d4e412ed27b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1603.yaml b/http/cves/2010/CVE-2010-1603.yaml index 34df59a0e34..59eb56119e4 100644 --- a/http/cves/2010/CVE-2010-1603.yaml +++ b/http/cves/2010/CVE-2010-1603.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1603 cwe-id: CWE-22 epss-score: 0.06069 - epss-percentile: 0.90412 + epss-percentile: 0.90426 cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203dd04682122d99d4764c6e68ff8282ad18779565c27260c67851f41c98b91e49022100fa5c4f928ffd2da2880f8ff0bea3f7f978df987ee6f69fe3ce31190c1e175fc5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202da1e2db048f66b9674a33914973507a997fd81591e96beb0229aeb546c0a6470220212c4d16fbd7bb60e9f779d21552b3a736f0d2bb238b130ecf42c98024c9582e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1607.yaml b/http/cves/2010/CVE-2010-1607.yaml index 847c0c2a8a7..4c021c46bda 100644 --- a/http/cves/2010/CVE-2010-1607.yaml +++ b/http/cves/2010/CVE-2010-1607.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1607 cwe-id: CWE-22 epss-score: 0.02237 - epss-percentile: 0.8408 + epss-percentile: 0.84092 cpe: cpe:2.3:a:paysyspro:com_wmi:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205b423164663b5d1e4f6d1dd7c697324c66f2dd55f460a65f3b1b1bdd8318e551022100e4c135b4778bd1695f8c4444b8c3c20f9eecf61fc9c90ad5a4bbd37e29663591:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009fcadd04164275d960c642ed9c331febf2e15e0d7249795f517cade59d192036022019af9645eeaef450e780cb469bd4cf6366f0d7c04a21448d5564e55c6dd1c6f8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1653.yaml b/http/cves/2010/CVE-2010-1653.yaml index 3247aebf6da..1801723f864 100644 --- a/http/cves/2010/CVE-2010-1653.yaml +++ b/http/cves/2010/CVE-2010-1653.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1653 cwe-id: CWE-22 epss-score: 0.05171 - epss-percentile: 0.89541 + epss-percentile: 0.89546 cpe: cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bda0155d2758a91ec8034b7f53de68d64239f0be6562e5a4e97cfbec448d15bb022016071f0f017664b4cdeddacc39b551b12730d099a1913586a92afabcee180128:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206b753d9bb78b1df1360303ebf06fc8e0bfc7777ad3c0e9fb85c9b862b3bf6c15022100e2ab1446e5cee22c74a93fc38fd2aeb2947a5403664f2b9c5fa50d7c491aa0e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1657.yaml b/http/cves/2010/CVE-2010-1657.yaml index 1b53a7a3900..45debb88a2a 100644 --- a/http/cves/2010/CVE-2010-1657.yaml +++ b/http/cves/2010/CVE-2010-1657.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1657 cwe-id: CWE-22 epss-score: 0.01501 - epss-percentile: 0.80686 + epss-percentile: 0.80704 cpe: cpe:2.3:a:recly:com_smartsite:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e0407eb6a9134a95c3c800d933c8973b4c74c222bfe94509d3f090a1c55ef48602210089f72272cb484960927decdcbf1542c036296c69a338d4ef16fab9419dd81c77:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008ad661f34287a7dd88d984bde41bac9572f157df578feb9f7936bf11b129a59b022100e2e89d840e6457e20c2f232e76a638d088834b1fa60278062f308f7e67d03807:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1658.yaml b/http/cves/2010/CVE-2010-1658.yaml index 707faf0fffb..422fe36df39 100644 --- a/http/cves/2010/CVE-2010-1658.yaml +++ b/http/cves/2010/CVE-2010-1658.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1658 cwe-id: CWE-22 epss-score: 0.04579 - epss-percentile: 0.88846 + epss-percentile: 0.88853 cpe: cpe:2.3:a:code-garage:com_noticeboard:1.3:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b34cfb786b5532ba74efc0f5d2858747f371d87805bd728c47da89583d4a1b23022100b832051f57e89b3518f3f61dc73f4998d84435711cf4781548d07f2e1269000c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a2d315d63ff2004144f8ca7b018b6676aa1ef786f6d7d4fc715331cc87a129c4022035bd3baff5da2f9bca74b2e8306928e5f66c10d3120e09b9c698dda383fe0124:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1659.yaml b/http/cves/2010/CVE-2010-1659.yaml index 8a29c9de3ee..4fa28a90c25 100644 --- a/http/cves/2010/CVE-2010-1659.yaml +++ b/http/cves/2010/CVE-2010-1659.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1659 cwe-id: CWE-22 epss-score: 0.04574 - epss-percentile: 0.88838 + epss-percentile: 0.88846 cpe: cpe:2.3:a:webkul:com_ultimateportfolio:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ac3b5316e86aa64e7b3e07117724436de78ba82bbdc573d3c09063492950c4a5022100e22e3c50275903a6ab9c5ce1fb8489c9099d3d0458b5ef7e7daf4369debacc58:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200e5e9d4758b09c3749932ff97bf2ffaa28d726e236299eeb36d92e8319d5a9b0022100bafe22befec0517a44b98a5d16c19cb255596d5a3e1f479afc340fd0162f358a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1714.yaml b/http/cves/2010/CVE-2010-1714.yaml index 40872299547..667c33d1639 100644 --- a/http/cves/2010/CVE-2010-1714.yaml +++ b/http/cves/2010/CVE-2010-1714.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1714 cwe-id: CWE-22 epss-score: 0.07007 - epss-percentile: 0.91142 + epss-percentile: 0.91154 cpe: cpe:2.3:a:dev.pucit.edu.pk:com_arcadegames:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204dd13a6da8028319dbd1605b923f65e11ce7cf4753b30257d3e120dd89246ddd022025093174e3cd7829d4d381d24b0c2a64aaade6a45305f4a4806d8eff428cd440:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f92cc687fd545f00709e74b15d904c777ea2b0fb14e01c1405f3c0eea29327ce0220634ee0190792047580f28170f7a74d154d078f3b76178382b3e8bc9d0469d13c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1715.yaml b/http/cves/2010/CVE-2010-1715.yaml index 4f29591eff1..b912eee6845 100644 --- a/http/cves/2010/CVE-2010-1715.yaml +++ b/http/cves/2010/CVE-2010-1715.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1715 cwe-id: CWE-22 epss-score: 0.02135 - epss-percentile: 0.83702 + epss-percentile: 0.83714 cpe: cpe:2.3:a:pucit.edu:com_onlineexam:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201121fc26626f1213eb94f5587cf326ef451b8840e117274288d71c7f6080aecf022100e672802735861d0f86a43a0c7e340c1b49ac23706165304a3f2a65f024eaf87c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c048cf75ffce37364980a2619523463bc806c7f14a2f4608a1c803a548ae8131022100ed0a201f682a91376bc8389ba4bda0031369efa802cb525b0e6b2582b9216610:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1717.yaml b/http/cves/2010/CVE-2010-1717.yaml index 9422198ff8b..616c4bb0874 100644 --- a/http/cves/2010/CVE-2010-1717.yaml +++ b/http/cves/2010/CVE-2010-1717.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1717 cwe-id: CWE-22 epss-score: 0.04997 - epss-percentile: 0.89341 + epss-percentile: 0.89349 cpe: cpe:2.3:a:if_surfalert_project:if_surfalert:1.2:*:*:*:*:joomla\!:*:* metadata: max-request: 1 @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c4268361507af59132537e56c6dc50f94355724a6ea2c6937b9c0f134e54c9ff022100a05e9a8439a220622724168a858391e5616b3a2921092faaa8876697fe5805b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bb7a6a3844f1efc4f5d9b3cc472d46e6ed46e90c3b04a978bce7529b09d80a6e022100ea5d4add477e2d3dc921f02b214f4debf783e3e51c6e9ebd74cd870cf26a06ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1718.yaml b/http/cves/2010/CVE-2010-1718.yaml index 4bd11519687..67cd9ff1168 100644 --- a/http/cves/2010/CVE-2010-1718.yaml +++ b/http/cves/2010/CVE-2010-1718.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1718 cwe-id: CWE-22 epss-score: 0.0208 - epss-percentile: 0.83504 + epss-percentile: 0.8352 cpe: cpe:2.3:a:lispeltuut:com_archeryscores:1.0.6:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220691e2b2bf3af48948d81b9d018ddf22fd4e2c90629b0335b9d23123c11795883022012b28bcfd75939b6919aac79001bbb8f790f4d295509920d87daea0d169aff1a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bf1b36326e522a36bcf3328360a9e9e93c17fa3b1947fc6749a5561cd6d3d8a00220785ce19b93182c77ee1b1dc9595d018589c245bf96e507f8836b749435cab5d8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1719.yaml b/http/cves/2010/CVE-2010-1719.yaml index c8dbd83034d..387755d3461 100644 --- a/http/cves/2010/CVE-2010-1719.yaml +++ b/http/cves/2010/CVE-2010-1719.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1719 cwe-id: CWE-22 epss-score: 0.02873 - epss-percentile: 0.85844 + epss-percentile: 0.85849 cpe: cpe:2.3:a:moto-treks:com_mtfireeagle:1.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022069356598fd59da8303e332625afdb740d4776d8309b0c93af58af6fb20330b6602206817de2468df9da9244cf3ad51b0533033f1f84300b2de2c633c8fd32b6d2e77:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202238f90e8361b69b3aae98fdc31b273087e54dc104f67360a4c481b4cefd86c5022100be57894e3b985a7aa1c3108956128620cc9626b38d2b34cbf59c96f43e5d6303:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1722.yaml b/http/cves/2010/CVE-2010-1722.yaml index 2d82877bdf9..795b910b7d3 100644 --- a/http/cves/2010/CVE-2010-1722.yaml +++ b/http/cves/2010/CVE-2010-1722.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1722 cwe-id: CWE-22 epss-score: 0.01519 - epss-percentile: 0.80787 + epss-percentile: 0.80803 cpe: cpe:2.3:a:dev.pucit.edu.pk:com_market:2.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207771c74ac7eb7bbb2d2f90aa357b50a74cd9755eae12cda6ce7ad2417a13e3b1022100915c26c16076c7b4bd303dd4277dbb53fde84dd03b976316d8f060a2cab3078f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a9af5b7bf54f04873eab3867199ab3a333d9f1c5c02757594abaf6793d82c44d022100dbfb10b9842799b5a2aed1e48cec0365cbee6d666806f79d830f10fde6194dd6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1723.yaml b/http/cves/2010/CVE-2010-1723.yaml index 3b355a207c4..41a5e283408 100644 --- a/http/cves/2010/CVE-2010-1723.yaml +++ b/http/cves/2010/CVE-2010-1723.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1723 cwe-id: CWE-22 epss-score: 0.0469 - epss-percentile: 0.8898 + epss-percentile: 0.88987 cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_drawroot:1.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100814bd5fb073be4cc17c693340c5edd6dbb0a3376495b4774ab58230262ff3c11022022359679e5b46e9c2e5e5bd3c717b396d88a3135275c13baaaf6057796a1851c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205ebd6bccb4438af3d1635525dc88c9adaf5722ae0301deda93954222b199a5b0022100a8f73681fcd8b0d687fb84ce34c23b9b3103c9fd9d2745687ab6af5578a1d0f7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1858.yaml b/http/cves/2010/CVE-2010-1858.yaml index 401ac972129..c0871f685c6 100644 --- a/http/cves/2010/CVE-2010-1858.yaml +++ b/http/cves/2010/CVE-2010-1858.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1858 cwe-id: CWE-22 epss-score: 0.03621 - epss-percentile: 0.87427 + epss-percentile: 0.87439 cpe: cpe:2.3:a:gelembjuk:com_smestorage:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022051a3890874bc8678aeafb1bfdfd29bd19e72d937f7d89a1eaaf80953960f7ebe022100f8c60b5a66ddd05d39334579124fceee478690a2aef19f1f69e6fca0ae7ae33a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009bb136628f17fb237d2c6d349996c045157bf62fe010155df46083d8046d6240022100f6626ce7f7f1fee98821d143faae8a721fdb9ff8577916cbb3922a42f07296bb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1875.yaml b/http/cves/2010/CVE-2010-1875.yaml index 0000a454f49..b50bd6b3d63 100644 --- a/http/cves/2010/CVE-2010-1875.yaml +++ b/http/cves/2010/CVE-2010-1875.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1875 cwe-id: CWE-22 epss-score: 0.01575 - epss-percentile: 0.81086 + epss-percentile: 0.811 cpe: cpe:2.3:a:com-property:com_properties:3.1.22-03:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200eba29a73ae2c477786e8db64a18102342ea8e8bdb675b1882cb0407cfc1d2780221008659c4193572ce95c7de07b23d8d659a33449a7995253c4ea86913be3f37e511:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b9f41bac8c7b19737eed81b8289efab9dd86767ee712ce8f188db7e9ebd6781702210089d92e09e379256acdf024f2c63a73ad8fbcc90ce2daf1914878849dbbe70497:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1878.yaml b/http/cves/2010/CVE-2010-1878.yaml index bdc30001035..28dc77d4b2f 100644 --- a/http/cves/2010/CVE-2010-1878.yaml +++ b/http/cves/2010/CVE-2010-1878.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1878 cwe-id: CWE-22 epss-score: 0.02797 - epss-percentile: 0.85641 + epss-percentile: 0.85652 cpe: cpe:2.3:a:blueflyingfish.no-ip:com_orgchart:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220263dd4b33665758fe1254774f7a520f8fd5f07ee3926a087d46bc80a961b037a022039c875377fa26826ac91af5ffd7c53a1724621a5ab7f19564a7e7f32a235aeef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f7744ef5f24b125c53390202b06a0e1496b34434d284ddb69befadd6450c0d9e022100ad87d7b1dc9cd63a61f69d6f6bb98e4b2bc92c6e913ef889c8682df28e80ffb6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1952.yaml b/http/cves/2010/CVE-2010-1952.yaml index 5de79943b16..cdd6177dbc4 100644 --- a/http/cves/2010/CVE-2010-1952.yaml +++ b/http/cves/2010/CVE-2010-1952.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1952 cwe-id: CWE-22 epss-score: 0.03339 - epss-percentile: 0.86906 + epss-percentile: 0.86913 cpe: cpe:2.3:a:cmstactics:com_beeheard:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220267983da1c31d4168e6d37e012f612b8f326c0eab69e7c52aa2a83e924bc472d022100acfa96c32efb78dc582e6578153228e0bfa3c7827784841a82ea83e642103e00:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e5a586ad1ffe9fb5945e6dd4d2fe5cacc63f6879b8c9792853a7a912545c1236022100f395850e533e7fec4da3f5c06c9ee3b11730f5cf965326ac6f44aa9e69f890a1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1953.yaml b/http/cves/2010/CVE-2010-1953.yaml index 5f881e8a750..5a1f89f24b1 100644 --- a/http/cves/2010/CVE-2010-1953.yaml +++ b/http/cves/2010/CVE-2010-1953.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1953 cwe-id: CWE-22 epss-score: 0.02922 - epss-percentile: 0.85965 + epss-percentile: 0.85966 cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_multimap:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100aa12c9641b8d53cd7f35108a78407d57fceb6b7967fb1f0d13bfc80b66c6dea40221009dd44a276537b871c9c08c070526cfa2db45b1019d0e906896c36fc857688166:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009f7112856d87b781a004d9a349f2d5e37b8a1d305e0c2d3d2b130fc631873b4d02202f5291f01843540a25ebb4a5d7d6caeacdce899605604a2ad7d8bf8f5e04101f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1954.yaml b/http/cves/2010/CVE-2010-1954.yaml index 5732acc861c..ddc0107e24d 100644 --- a/http/cves/2010/CVE-2010-1954.yaml +++ b/http/cves/2010/CVE-2010-1954.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1954 cwe-id: CWE-22 epss-score: 0.0982 - epss-percentile: 0.92708 + epss-percentile: 0.92711 cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_multiroot:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022043d3097934626683a8d65a5e0d245297fb262cf4960a01ad70be4e069b249893022100c7691fb1cca2d9913e0e6bfed49e9146fc16c81577f2d16b487e1f5b35895cd9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220341e7c21617561e2744a33d32a570829431d8e4b70e874da4f21fd759aa2daf802205d98bbaeab95d4aa8e7c63c2714018448c7befaddc65e7fcd34da2059696e81a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1955.yaml b/http/cves/2010/CVE-2010-1955.yaml index 46c183888c5..6ed521bb7e6 100644 --- a/http/cves/2010/CVE-2010-1955.yaml +++ b/http/cves/2010/CVE-2010-1955.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1955 cwe-id: CWE-22 epss-score: 0.02663 - epss-percentile: 0.85332 + epss-percentile: 0.85342 cpe: cpe:2.3:a:thefactory:com_blogfactory:1.1.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204feca44da890652a947c522a516292f2ec11cc349e928d4e5aa183bb83229c0802210083c7cd4c387c7cbda6ca0952db7177a33131f8a2980407f5238bf169a20b5e37:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207d09e9f3a881b7286e11db3d12da5d6ca6392341e71ab45261fcc3612f5bd77e02202a812fe759d02b33f6feae98c8fc647f4843babeb963a32337a76227578818ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1956.yaml b/http/cves/2010/CVE-2010-1956.yaml index f5fc892393d..06c0f456da1 100644 --- a/http/cves/2010/CVE-2010-1956.yaml +++ b/http/cves/2010/CVE-2010-1956.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1956 cwe-id: CWE-22 epss-score: 0.05092 - epss-percentile: 0.89452 + epss-percentile: 0.8946 cpe: cpe:2.3:a:thefactory:com_gadgetfactory:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202205189a960523db9eb7531fe658b189217dd1e2078dc269575c2b0d3dc4b4ab022005d903ae4b652a2b67820211ce3eb175d1420fe2b38e938fb60ae1df692f8f53:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100fc07bc8ee296b1ebc904d2babfc38cf0af506ee2bf14299747ca52bac21ddce0022021adcc0c02d15efe02b31404c53c9c2721380995760f1d52b5c96b00ecc003a6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1957.yaml b/http/cves/2010/CVE-2010-1957.yaml index d977250ed66..27fe514a00f 100644 --- a/http/cves/2010/CVE-2010-1957.yaml +++ b/http/cves/2010/CVE-2010-1957.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1957 cwe-id: CWE-22 epss-score: 0.05954 - epss-percentile: 0.90326 + epss-percentile: 0.90336 cpe: cpe:2.3:a:thefactory:com_lovefactory:1.3.4:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402205674a8560ab9587f8eeb2180e5dc34c2787b4a928082fe13311ddf4563127e0202204de009bb875f7fcb373a7d87f9a4a8d5ce51d079e284996a9aecd92e465a4f1e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022017dc5092c0d98a85ba76bcf4677d8447b76ef995fa74959a40bd32b311f2c122022066cd0f3c59f8a2832d345913a777755c29701ed83a578962eba2f62210ae97b1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1977.yaml b/http/cves/2010/CVE-2010-1977.yaml index 0f069ff1393..d677ff419f0 100644 --- a/http/cves/2010/CVE-2010-1977.yaml +++ b/http/cves/2010/CVE-2010-1977.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1977 cwe-id: CWE-22 epss-score: 0.05563 - epss-percentile: 0.89968 + epss-percentile: 0.89977 cpe: cpe:2.3:a:gohigheris:com_jwhmcs:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210080f2f5c41830fcb80aa1aacc1f68208234a840c98ac81b355ed098a89f3a13d002202049cd83973a38552ed3eb30fec0a3e8f333dbb6b7a0a091c44965c066ee2bd8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205d036a84d21221f42621d39541c844cf746fc32ce3a87f3f0846eb93df177902022100a292af6fc0c736baf261685d6f6bfdfb0ce376a5190432ea3d7406968a463f6a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1979.yaml b/http/cves/2010/CVE-2010-1979.yaml index 5b7a8e78084..e4a2fef709a 100644 --- a/http/cves/2010/CVE-2010-1979.yaml +++ b/http/cves/2010/CVE-2010-1979.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1979 cwe-id: CWE-22 epss-score: 0.02865 - epss-percentile: 0.85826 + epss-percentile: 0.85832 cpe: cpe:2.3:a:affiliatefeeds:com_datafeeds:build_880:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f928d27a619ddda89154943223dce86c77ae267e167ea647b8a2b4b9bc8416a70221008bac66b7121a95a46836c23d4a976c00fbe63ac83411dd6e9f09b668ac6fd22e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205d68ced5aecd54e31daa69dac7490df519866e4b00735b1e1c8966a870bcb763022011edb0368cea036e934b7dae51391d9f548945fef1f9e08df36d7dc93b2eba93:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1980.yaml b/http/cves/2010/CVE-2010-1980.yaml index a219f4024c5..5997624f666 100644 --- a/http/cves/2010/CVE-2010-1980.yaml +++ b/http/cves/2010/CVE-2010-1980.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1980 cwe-id: CWE-22 epss-score: 0.06951 - epss-percentile: 0.91098 + epss-percentile: 0.91111 cpe: cpe:2.3:a:roberto_aloi:com_joomlaflickr:1.0.3:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204365dc4961ddf9896555bc146cafa287f703cceed8eef5a2472487de8990f87902200f54e3f342a23a4f3459e31a319dfef79e3ceaa52714b9ec71b1145c9a08f43f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100eef7cb353c92f4c51bb625233260e69e8ec71a02a9e956b94fbd6fe63cdb01a802201256a5486afc1a5650a1d20e4c566cb8399d91a5e07fba7d8cf480a0da694952:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1981.yaml b/http/cves/2010/CVE-2010-1981.yaml index d6975f61214..530eda878ed 100644 --- a/http/cves/2010/CVE-2010-1981.yaml +++ b/http/cves/2010/CVE-2010-1981.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1981 cwe-id: CWE-22 epss-score: 0.01654 - epss-percentile: 0.81566 + epss-percentile: 0.81578 cpe: cpe:2.3:a:fabrikar:fabrik:2.0:*:*:*:*:joomla\!:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022009ce20cf15ab02a3d07ad31ebae46e5195dbf0451a1b44b7c630721a32b6a3e602210085d75ae13877f25c59fc11881a3d9c89dcb2e78f17ea3c43dd69271a7873cc6d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bc32e96d888eba1ae9220cb7ac117fdae38da21ee09a25bb533f390b78a2ee0d022100bc5ed624fc4e074c72dd8b22377ab61378d0da07197a3f3a64f344878c2e2397:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1982.yaml b/http/cves/2010/CVE-2010-1982.yaml index 16587644324..6db8ae586c1 100644 --- a/http/cves/2010/CVE-2010-1982.yaml +++ b/http/cves/2010/CVE-2010-1982.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1982 cwe-id: CWE-22 epss-score: 0.0836 - epss-percentile: 0.91983 + epss-percentile: 0.91989 cpe: cpe:2.3:a:joomlart:com_javoice:2.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022058eee14732fe874bbd92549e134501f8c54c5aef7cf92fc4c863a632cde51fa9022100ea82311f646396d03ed7e3cb077455cc47a64717c9dcec7ff7e5dc546546a71f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201c58116451124578ecd9c0819b61916824a7f08c5d4d158ddb5b422a90a0be81022032e9b575cf6774b0356099ad57cde1a90c0970f8279efd3a7bb3d0a57a1c3c04:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1983.yaml b/http/cves/2010/CVE-2010-1983.yaml index 1c7bdf2fdab..b5e6b4f17da 100644 --- a/http/cves/2010/CVE-2010-1983.yaml +++ b/http/cves/2010/CVE-2010-1983.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1983 cwe-id: CWE-22 epss-score: 0.03413 - epss-percentile: 0.87053 + epss-percentile: 0.87062 cpe: cpe:2.3:a:redcomponent:com_redtwitter:1.0b8:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022059dba8136411d5b0dc9069664b7bd749dce96f3ad521708b955676068f19c1c7022100dd4571915e0238fdf78358f4191adb5ef1e2fd89f07c0c3a939e5a8e227eb883:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ee90a01cad0feca80c4bbbcd9345bcf621583a633da083eacbe90ea11ffbff5202201dfd400b9d944b83f9b6bde616508792039c6d0affd9dcc17f776358dcf22d82:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2018.yaml b/http/cves/2010/CVE-2010-2018.yaml index fcb6b404196..a1c984673c8 100644 --- a/http/cves/2010/CVE-2010-2018.yaml +++ b/http/cves/2010/CVE-2010-2018.yaml @@ -18,7 +18,7 @@ info: cvss-score: 7.5 cve-id: CVE-2010-2018 epss-score: 0.00334 - epss-percentile: 0.55696 + epss-percentile: 0.55687 cwe-id: CWE-22 metadata: verified: true @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bb08e9022c929825a65a0fae22c6ac3530664192814a729996362aafd8e62a3d02203365089a83e8c9d81aebe42e2abac515ba0218608225a242c619c6a6d549c9a8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ee3f6d6c2f11c0c726bab87d807e5e747176ce394e255c49d6ed0567ad8f389d0220091d1deca8370cfaa7cfb02400ccb67a41ad0269405552e84c6c95b013081388:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2033.yaml b/http/cves/2010/CVE-2010-2033.yaml index b0f4f7a6a86..1b412d0d65d 100644 --- a/http/cves/2010/CVE-2010-2033.yaml +++ b/http/cves/2010/CVE-2010-2033.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-2033 cwe-id: CWE-22 epss-score: 0.01378 - epss-percentile: 0.79809 + epss-percentile: 0.79826 cpe: cpe:2.3:a:percha:com_perchacategoriestree:0.6:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220335d1e9531eb7d1b04c3f992c6b14305e180cde1619ae701f075e12142dd0b94022100a856991f566fa3fb225d425d2851278ca610aa1efde17da7c0ec5d9d604bd5d4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f6f809afa2d2ea0502f6fd4ca6d68de565cc3b36ee550e9117ffe91bf7c731c602210091c6d163eb7a036297279c66ec1381c5235a297994b4a1b5f85ba342fa08270b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2034.yaml b/http/cves/2010/CVE-2010-2034.yaml index 6c6f4619cf4..89402ddb84d 100644 --- a/http/cves/2010/CVE-2010-2034.yaml +++ b/http/cves/2010/CVE-2010-2034.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2034 cwe-id: CWE-22 epss-score: 0.01646 - epss-percentile: 0.81513 + epss-percentile: 0.81527 cpe: cpe:2.3:a:percha:com_perchaimageattach:1.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022003870029946db50791138b278d5c0d5e0de4e50cab5e9907467f439188a6ef9a022100fbd38dbdbd0c22844f8d7039497e160724221366624e1880714d3942abc29bbc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022014048896fee69d6422fff175ef62ac7eca410bf9ed6919a005b988d96bc1aad702206f6b2a8ecfb6387d8f5326c3cf77338114ac9f6c9b91640ad2c0dd9783d7126d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2035.yaml b/http/cves/2010/CVE-2010-2035.yaml index df8d8691db8..a49e1705b7e 100644 --- a/http/cves/2010/CVE-2010-2035.yaml +++ b/http/cves/2010/CVE-2010-2035.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2035 cwe-id: CWE-22 epss-score: 0.01646 - epss-percentile: 0.81513 + epss-percentile: 0.81527 cpe: cpe:2.3:a:percha:com_perchagallery:1.6:beta:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008939ecd7b40e06eb1e96f86278ca6b3ec539baf7727d685923d049bcb610d0f402204ec4af870abb5c43505cc4eddd7b1ce5dc426446befe06decbce2ee4dcfaa352:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008136d2fe67ebe63331b08fff90ce54772346f4e90d6b401af749cf2d08edb88802201687151106e077fa159929229dc97cc3547ac726d51d6ae9ea2070c669fc0cbd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2036.yaml b/http/cves/2010/CVE-2010-2036.yaml index 28cbd4d5cda..5e184968e10 100644 --- a/http/cves/2010/CVE-2010-2036.yaml +++ b/http/cves/2010/CVE-2010-2036.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2036 cwe-id: CWE-22 epss-score: 0.00598 - epss-percentile: 0.68709 + epss-percentile: 0.68716 cpe: cpe:2.3:a:percha:com_perchafieldsattach:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a38e569e7a719df5d5394959cfa6adca6762ba5eb20f082eb1c6267f9eb1361102210091732893dd169eaedc6fedbf1fd8e4db70570dd4bfa08e9fa1bba14e2ed332d7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200da4ff0b88208f353a31bded79f10152e61580730a4e960f9cdff66f24621ccc02200392581cf27c18aecb35fd6f29cec5187ec5e4122f663b425b058c3950f860cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2037.yaml b/http/cves/2010/CVE-2010-2037.yaml index 7d3dc8d0951..d7a18acb865 100644 --- a/http/cves/2010/CVE-2010-2037.yaml +++ b/http/cves/2010/CVE-2010-2037.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2037 cwe-id: CWE-22 epss-score: 0.01646 - epss-percentile: 0.81513 + epss-percentile: 0.81527 cpe: cpe:2.3:a:percha:com_perchadownloadsattach:1.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220289add10bc00421fef4bdd4d8db7fdec69572e1d7148bbc48edac7bace73404302201805a43914f6c2197d98b2912fe5518516854a745b060e91e6dc21be847263d4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100dfa2afa89d1ced623d027f031f3907397f402e822ce0148b69f9b0a739e6643702206de80df583eab930253066ce68ed45f22147b963630de09ae7399a2cad5d3840:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2045.yaml b/http/cves/2010/CVE-2010-2045.yaml index bae1d132370..fa30dd710fa 100644 --- a/http/cves/2010/CVE-2010-2045.yaml +++ b/http/cves/2010/CVE-2010-2045.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2010-2045 cwe-id: CWE-22 - epss-score: 0.04042 - epss-percentile: 0.88142 + epss-score: 0.09628 + epss-percentile: 0.92622 cpe: cpe:2.3:a:dionesoft:com_dioneformwizard:1.0.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100846984451f4dd84e138ac090137880d29c8434fd1d1347be1f68febd185127e4022100a70bd222151abf54fbef1ca60b11f15640cbca915b3ecdd7edda59fd1eedae36:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e81ce8f3299599f360908a0d896e5b4e9566be182d4815199b6f1f64a275693c02210086642fa779a022aad8c05524f2eb23c9aafe97a217beeea4e7e881908cf89b1f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2050.yaml b/http/cves/2010/CVE-2010-2050.yaml index 9416741a520..38c14279494 100644 --- a/http/cves/2010/CVE-2010-2050.yaml +++ b/http/cves/2010/CVE-2010-2050.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2050 cwe-id: CWE-22 epss-score: 0.03017 - epss-percentile: 0.86185 + epss-percentile: 0.86188 cpe: cpe:2.3:a:m0r0n:com_mscomment:0.8.0:b:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100da6f86013d5d2656e1bc78c217c1e3638221570032490fbda9c193a1c0eb9810022023d59ebe1302d4745932ef945696d0643743db7a64ad440a8a0403a6422f35f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203b517220c153fc6b75840dae8b71652f9d8e56f58c3b95e259caea88c0dc324b022026beaf66628a2db5a3dca46384d2fbb235a582d1fed6170579bfc83e42113d2a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2122.yaml b/http/cves/2010/CVE-2010-2122.yaml index 3f98aca033a..d8aa08082f1 100644 --- a/http/cves/2010/CVE-2010-2122.yaml +++ b/http/cves/2010/CVE-2010-2122.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2122 cwe-id: CWE-22 epss-score: 0.01818 - epss-percentile: 0.82384 + epss-percentile: 0.82403 cpe: cpe:2.3:a:joelrowley:com_simpledownload:0.9.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c49bf613923c5fd338f25828166805b836ad1505eced3dc45034b7aa3fa4384d02206ca2a4fbb0a2131d12bb4715109533e0d7b793517046cf915de248d5c552c80e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022020e443d511b131ba3fa6b9c2e4f6beb5c5eea643081c8e239fba6011e0eded660220597898bd5f9fab3593c9bef18789ba863cac36f98e3959f48b7a4903dc55f5a7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2128.yaml b/http/cves/2010/CVE-2010-2128.yaml index c05505987aa..4b368ac907f 100644 --- a/http/cves/2010/CVE-2010-2128.yaml +++ b/http/cves/2010/CVE-2010-2128.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2128 cwe-id: CWE-22 epss-score: 0.03923 - epss-percentile: 0.8794 + epss-percentile: 0.87948 cpe: cpe:2.3:a:harmistechnology:com_jequoteform:1.0:b1:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bc75bc0967ee2e48972659d6f3fa5d8a9652b63358a064f4b2de97b1a78da3fc022025af3888a36cab623c2c9637d7bab6b27b8c3770b507aebecbdc1ba1197dc76d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b01be0f97ea835afc627d2470f73dfb8ad25fb2e01346107f011689c0d9244ed02200e290938f38d2889706a45b82395c2f5fa680748255c2198d0d31c351f7af702:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2259.yaml b/http/cves/2010/CVE-2010-2259.yaml index d72c41fc1b2..2bce0445a49 100644 --- a/http/cves/2010/CVE-2010-2259.yaml +++ b/http/cves/2010/CVE-2010-2259.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2259 cwe-id: CWE-22 epss-score: 0.03018 - epss-percentile: 0.86187 + epss-percentile: 0.8619 cpe: cpe:2.3:a:tamlyncreative:com_bfsurvey_profree:1.2.6:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220511d1ff4ab1a23ef8f73850ffcfef1a2fe5e85f35cba68ffbd491d4f4e59df01022025a4baa384b877c28f96a4cc285ca8cdce42e58770b89ad2a9c7a2bee283623f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210080b71ff6fa58c89b5f7e41a3255ee9648081a059a3edd78f7bf1b817c3495de1022100b1f1e479ee21d50d01b5d4cf4fd2349129ee802516bd9e76c9f60bd879fe0c45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2307.yaml b/http/cves/2010/CVE-2010-2307.yaml index 3671b0e549d..99d868459a2 100644 --- a/http/cves/2010/CVE-2010-2307.yaml +++ b/http/cves/2010/CVE-2010-2307.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2307 cwe-id: CWE-22 epss-score: 0.0285 - epss-percentile: 0.85793 + epss-percentile: 0.85799 cpe: cpe:2.3:h:motorola:surfboard_sbv6120e:sbv6x2x-1.0.0.5-scm-02-shpc:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022056fdf31a64549f3f4b8e8117f8bbc477840174374daf7dd6ab7ae75b72ea3238022003ce97348fe11e4eb2b6967c441e6378a002c5b69bf35f8718a4c47bce39c69e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210080f7abfdeef0a4a87abf08386276b20c002b9a48a487e15b4ab0ad80ac32abcb0220018e06b0350049e35736ba9a7a79787d483e37a3973387142025651fd5fb19ce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2507.yaml b/http/cves/2010/CVE-2010-2507.yaml index be871a62181..a925c6d4fa5 100644 --- a/http/cves/2010/CVE-2010-2507.yaml +++ b/http/cves/2010/CVE-2010-2507.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2507 cwe-id: CWE-22 epss-score: 0.0193 - epss-percentile: 0.82905 + epss-percentile: 0.82923 cpe: cpe:2.3:a:masselink:com_picasa2gallery:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206943de32c337b7633d9251a6303c26c9e89718bf9084bfd79fe7fdd160a75ddc02210098e3bfd06560355b463e71d0af92052a5d491eb733742f018de63fc09b9239a1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210099ebeb4b4d792506c05f1b3f586150d3b667124d3494b54755d283b834465c5b02201117a49109e4102ec142da8dcfee842c961b3100463ff9795e5f112b7ec44686:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2680.yaml b/http/cves/2010/CVE-2010-2680.yaml index a23cfa16af9..6119a6e62aa 100644 --- a/http/cves/2010/CVE-2010-2680.yaml +++ b/http/cves/2010/CVE-2010-2680.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-2680 cwe-id: CWE-22 epss-score: 0.00997 - epss-percentile: 0.76399 + epss-percentile: 0.76405 cpe: cpe:2.3:a:harmistechnology:com_jesectionfinder:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022075ce46b2ada3ab36f557f60ea376ad3aa74c18ecb34ffde35aa8f1c4edfdc2de022100d81b538eea554bbc2894cf7ee5ffb1f76c9438a88ed44b361e70188c8162f0cf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e0195a27c8f5a44304930995925564071f4892304d1722ff193b35903717e153022100a04a068093266ac41a6dad52781f5759faed8572d3bdd1b439fa8238cdabb410:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2682.yaml b/http/cves/2010/CVE-2010-2682.yaml index 119ad9fd496..a9e75f53e81 100644 --- a/http/cves/2010/CVE-2010-2682.yaml +++ b/http/cves/2010/CVE-2010-2682.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2682 cwe-id: CWE-22 epss-score: 0.00584 - epss-percentile: 0.68325 + epss-percentile: 0.68328 cpe: cpe:2.3:a:realtyna:com_realtyna:1.0.15:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bc4c4b71d3fce2642f7c1c483ae1ab2fd1427ad53b750af095f6ce9de1ddd8b0022043e21d6e27eda49dc67930da03229c23530e355113d5684c309b08322c8623d0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207c3415079748de700be061fff50b715eebc468b60f2c46ccba75226843ababea02201f5d0d0989327da89cb66a7210d2a68c59ae0bcbf60e08388018021490b194a4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2857.yaml b/http/cves/2010/CVE-2010-2857.yaml index b0c29dd3c82..91b0ac8ea16 100644 --- a/http/cves/2010/CVE-2010-2857.yaml +++ b/http/cves/2010/CVE-2010-2857.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2857 cwe-id: CWE-22 epss-score: 0.00997 - epss-percentile: 0.76399 + epss-percentile: 0.76405 cpe: cpe:2.3:a:danieljamesscott:com_music:0.1:-:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e92e9873cf36ec224ef488579d2cf15f787d98f96ed24e923579f1374f141bb402205a2e126a21b34a83a5b7cf3748c34b991865371685110b5c2b344b76bc1d49c7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a728a24f193a49253bfcd8cf37be4a86b6612d0dabecff4ab3f33d71a6a289ec022008b6ba8d957125e1d03620c16a2b2ea6ee8d5d2ecb181883d789825971502772:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2918.yaml b/http/cves/2010/CVE-2010-2918.yaml index 317459afb61..d4f6bd84476 100644 --- a/http/cves/2010/CVE-2010-2918.yaml +++ b/http/cves/2010/CVE-2010-2918.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2918 cwe-id: CWE-94 epss-score: 0.01604 - epss-percentile: 0.81265 + epss-percentile: 0.81276 cpe: cpe:2.3:a:visocrea:com_joomla_visites:1.1:rc2:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220290f148aafa34eaa9f4236609d56c888049d4ac8de06587741051f2f100820e8022100a4b6134218f716fdba806c6b4d1ae83e4e386cfc86484675839290caa27cdbf1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d5c80b351af7a9f50524b91ec12ae5c6ec7e4bf264ad7894b5fdd6c023e1469a022100bc1da666b9325dcebeed311d3709c1b0f3fbbebb352b9eb02c95860ba5ce024e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2920.yaml b/http/cves/2010/CVE-2010-2920.yaml index b32c99e115b..80e608a1b6c 100644 --- a/http/cves/2010/CVE-2010-2920.yaml +++ b/http/cves/2010/CVE-2010-2920.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.8 cve-id: CVE-2010-2920 cwe-id: CWE-22 - epss-score: 0.01429 - epss-percentile: 0.80185 + epss-score: 0.03584 + epss-percentile: 0.87383 cpe: cpe:2.3:a:foobla:com_foobla_suggestions:1.5.1.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022026feccd743f65c7619c438c7b257f3dd919077bf61eaf3cd347e6b5827f6521d0220113cea12bfa0a6ea31be902e6e31703753e42ec2f45392b7efe8fb1d1774c1d8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220378ab70ebdb7394b04287a6f9556d092c08033784de3e0f67d67c8257f0c62a702205c2c99b2d44ad543cc3d5672df694496dc445e5a154394472736cbb1a44d080c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-3203.yaml b/http/cves/2010/CVE-2010-3203.yaml index 4f4dbb9d2be..b291302b7c2 100644 --- a/http/cves/2010/CVE-2010-3203.yaml +++ b/http/cves/2010/CVE-2010-3203.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-3203 cwe-id: CWE-22 epss-score: 0.01836 - epss-percentile: 0.82452 + epss-percentile: 0.82468 cpe: cpe:2.3:a:xmlswf:com_picsell:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100beb87e5f7bbd01f2f845ce8db7e67c42d4d4ab658818b04c0803f47c14b29d5a022100a9b3e25fd7bf18703fd2a2efcd1d255fca65760dd379144be74294a551114794:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008dd5ac01263362989514d39313f23dccb3f38d3866bc6ecfdcff1201cea41f430220542b6835353510e7d03a5bba61559b4bcddff731e1dfaea6178d2ce31f63c076:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-3426.yaml b/http/cves/2010/CVE-2010-3426.yaml index ea3f8f75387..50a7471833e 100644 --- a/http/cves/2010/CVE-2010-3426.yaml +++ b/http/cves/2010/CVE-2010-3426.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-3426 cwe-id: CWE-22 epss-score: 0.00555 - epss-percentile: 0.67394 + epss-percentile: 0.6743 cpe: cpe:2.3:a:4you-studio:com_jphone:1.0:alpha3:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d6c47d4986471e6e7771686c0efdcb3e291608f84c16cc5c7a24a4995b06155702203a7cc88bb00def81cb949dd260a77367024b28c06f14a42dbf668692915c9c10:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100897260d5f8ddcd9eb96fb9e966adbce76cfbd01c56b196b978eaf138bcca60de022044c2cd04dc28ed3bdcff645271468198f8fec15b73e1a9f6066445306898a652:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4231.yaml b/http/cves/2010/CVE-2010-4231.yaml index 3a1de7cb2f2..bd04de328fc 100644 --- a/http/cves/2010/CVE-2010-4231.yaml +++ b/http/cves/2010/CVE-2010-4231.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-4231 cwe-id: CWE-22 epss-score: 0.02497 - epss-percentile: 0.84886 + epss-percentile: 0.84896 cpe: cpe:2.3:a:camtron:cmnc-200_firmware:1.102a-008:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201a9606574b27f63269a4964f1ebfc3f45e44c46fa6a4f164518c7a2dc1bba5820221009633c10f07dfc442499b5daff1d1e817d33eab3449cb0762d4abbb92c1c1b640:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210093d31abe998dfbcaad482f5010f53b1093c7a01806a066dcb9ccd894212aea0b02204de586d59675dc8b26c94408dceaebca088db486cf56db5ebff37dcab8231968:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4239.yaml b/http/cves/2010/CVE-2010-4239.yaml index 34bc885560f..7315d49a9f1 100644 --- a/http/cves/2010/CVE-2010-4239.yaml +++ b/http/cves/2010/CVE-2010-4239.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-4239 cwe-id: CWE-20 epss-score: 0.55795 - epss-percentile: 0.97981 + epss-percentile: 0.97979 cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,4 @@ http: - "fonts" - "extensions" condition: and -# digest: 4a0a004730450220154f4a3b3d66447591c75101572fbfe3eee525a2aaad195291a2f0b3faaadbc90221009440b7dbabb2529ea03398d55b7b0da1453afeb79a13493bafb80bff9a1ac525:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a49f408e782b166333b4716b03fd2b6bdbfbe5069efffe1dac78a28da39a8d7f022100b6a928a5794e0e9ef54ba502a3c3090bce530d925f9bc2d99a03fee7931f3f47:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4282.yaml b/http/cves/2010/CVE-2010-4282.yaml index 3805ed5d080..3e7549a9e90 100644 --- a/http/cves/2010/CVE-2010-4282.yaml +++ b/http/cves/2010/CVE-2010-4282.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-4282 cwe-id: CWE-22 epss-score: 0.03744 - epss-percentile: 0.87639 + epss-percentile: 0.87648 cpe: cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022002331cf59f915fc5d38e1bc5e422b0889d2d3a741a619b772ba223cf06ff4ae4022100a91ba23c8aa77e576d2b71323291ca0b9077b3aae2f4f2a1a5817e5b865feaab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022012f73da852944becc91d4a1e810fb5885e6d2d080d52a74b89fa7ff6c5b5cd620220436c315f6da8f4a722e15d4c3469d0f782312e66d52bd649240f23100592258b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4617.yaml b/http/cves/2010/CVE-2010-4617.yaml index 6e0fd0c0865..2755b1dbbb3 100644 --- a/http/cves/2010/CVE-2010-4617.yaml +++ b/http/cves/2010/CVE-2010-4617.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-4617 cwe-id: CWE-22 epss-score: 0.00377 - epss-percentile: 0.58611 + epss-percentile: 0.58622 cpe: cpe:2.3:a:kanich:com_jotloader:2.2.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402205b0d2373bd39c7787f14f38f4f91783b7124efcb8082476e9217764aa4cb916f02202082bd5ef8dcc221c647f1c19904ac883e4e9fbe3e548243bbff20980b20b957:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220560b0ff0a70715bc740fb49e169fe159130c99d89f1dc806d08fc3d3d1b39b97022100f05ca6253ef6ead8c47e02b37b64061aa59b201c5c04230e35449feb93682ff8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4719.yaml b/http/cves/2010/CVE-2010-4719.yaml index 47c42f71735..fa6a1f8ca62 100644 --- a/http/cves/2010/CVE-2010-4719.yaml +++ b/http/cves/2010/CVE-2010-4719.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-4719 cwe-id: CWE-22 epss-score: 0.03407 - epss-percentile: 0.87043 + epss-percentile: 0.87051 cpe: cpe:2.3:a:fxwebdesign:com_jradio:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201a8d422d666f33ef2912fd5aa397da4ddaff48eb575d86bcc828db9b89e58c140220562afb5b08f259ab1e056821a1c99921bb14503697bb30289b1215312876608d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220497e12070254670bf954b3093d26eb72887241b0f58a685e86cbca898e4157af02207b2f38ac3a5f07a28fcc34eb837c7b7c47cda1f56be966c0804456d85df61b97:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4769.yaml b/http/cves/2010/CVE-2010-4769.yaml index beb2dc3309c..7883b333ba4 100644 --- a/http/cves/2010/CVE-2010-4769.yaml +++ b/http/cves/2010/CVE-2010-4769.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-4769 cwe-id: CWE-22 epss-score: 0.02614 - epss-percentile: 0.85205 + epss-percentile: 0.85216 cpe: cpe:2.3:a:janguo:com_jimtawl:1.0.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206f48040df26d9e9bb05d72bf00c97f2e89fe9b19fc124ccde17e60a2e9d16685022100b0605587b4cd37949ddb74263768aaa57cd1eaddca6dce1b5b061a34b35c66c4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100cb06abcda1698d6cbe0ff6629dda5ecb71ce770d6485b17c1316be18671e874e02200d81a65c5c2c51a96021c5d027ae0e99fdd9ad2ee459e9297cede00444e4493b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4977.yaml b/http/cves/2010/CVE-2010-4977.yaml index 5ae2363bf73..00c86822235 100644 --- a/http/cves/2010/CVE-2010-4977.yaml +++ b/http/cves/2010/CVE-2010-4977.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-4977 cwe-id: CWE-89 epss-score: 0.01559 - epss-percentile: 0.81005 + epss-percentile: 0.8102 cpe: cpe:2.3:a:miniwork:com_canteen:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210082522408079a178dce91a023dea1f51ccb273e617abf78267252b3caf6076214022100dfa9a94cab4b13ad79969a8044e0a67f4f6e960436b9de4a0aec4610fbd926b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022016148d16cf233c6e6a801658ed54be59e7e1e8c2461245881018da530004d70602204b6e8596da64224d6b0b9828b088e3058c2f7f8f2a4fca7268df093a1646730c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-5028.yaml b/http/cves/2010/CVE-2010-5028.yaml index a493c7a59e0..a62254e828a 100644 --- a/http/cves/2010/CVE-2010-5028.yaml +++ b/http/cves/2010/CVE-2010-5028.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-5028 cwe-id: CWE-89 epss-score: 0.02985 - epss-percentile: 0.86098 + epss-percentile: 0.861 cpe: cpe:2.3:a:harmistechnology:com_jejob:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bb2edb77a4bc811510cae62c3b1f205ab5718fa738fbf9ca35a78fa50acd4f24022007a1f29863117672354e3840be5c0addb42a8792d2f3eae8acc493bc98c478c9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022003a285c0912a7f7aac039f3368f64b1f587c66b223dedd37ace5fe7ad6ff927d0220712acc256aa5ac4435304b5b41879b3d225702e53c2f45bbf34871b927f4678a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-5278.yaml b/http/cves/2010/CVE-2010-5278.yaml index c5b9b49ae2c..168ce56134c 100644 --- a/http/cves/2010/CVE-2010-5278.yaml +++ b/http/cves/2010/CVE-2010-5278.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-5278 cwe-id: CWE-22 epss-score: 0.18602 - epss-percentile: 0.95043 + epss-percentile: 0.95045 cpe: cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e02f25f0a7c95095b2718c470d1f58abe490d20e3d89830b84ca862644a195ff0220618e07e761f56586fbd90e3221d6ed8cc65be3534388db4281dc10d4e7af2064:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220757bab32233d39a689994c9865e08c832b11337cd5194d7a82a049502239fe08022100ff44b7db908a6847c17461d30425305a6880a7ed1e95e0ec25a5a91dfe5ca32c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-5286.yaml b/http/cves/2010/CVE-2010-5286.yaml index 6d61658142a..56f95675a78 100644 --- a/http/cves/2010/CVE-2010-5286.yaml +++ b/http/cves/2010/CVE-2010-5286.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-5286 cwe-id: CWE-22 epss-score: 0.32162 - epss-percentile: 0.96659 + epss-percentile: 0.9666 cpe: cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201f2d7bec27fdacfe73923123b58ba4c3271629a85930fc17ff13deb82da0fdaf022100d246a9366c7f6a880abb8f4fa3d556e2205c9f51654aee6c95e1e18e1ead257b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022025d1e96507ef63620bb9ff9a92d26030f0d39836960af01e83a5b60ab138a8270221008375762e49808035adb569b5ac9a3b75bc1a18de2501c02ad84962f1b9e1228b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-0518.yaml b/http/cves/2011/CVE-2011-0518.yaml index b9db4ed454f..1d32c4fc7d5 100644 --- a/http/cves/2011/CVE-2011-0518.yaml +++ b/http/cves/2011/CVE-2011-0518.yaml @@ -18,7 +18,7 @@ info: cvss-score: 10 cve-id: CVE-2011-0518 epss-score: 0.61971 - epss-percentile: 0.98255 + epss-percentile: 0.98253 cwe-id: CWE-77 metadata: max-request: 2 @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ed21dc0ab348fda9f0785e204321df3943ce9277445fc3f49873c057a4fa66bc02210093d50d40380e6305ba4c232508a5a65a90ddc6a17a29bfec084b1c4d51a2d84b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009cf15af37a1666549232224f9105f53d94f237e000209b8d9917b4a8ec3fd1c0022100a54adebc831fd86ae867f2250b24f835656a8b9710201fc1b93b34f94c6dd009:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-1669.yaml b/http/cves/2011/CVE-2011-1669.yaml index 1bbdd1fa1a8..78b66387c38 100644 --- a/http/cves/2011/CVE-2011-1669.yaml +++ b/http/cves/2011/CVE-2011-1669.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2011-1669 cwe-id: CWE-22 epss-score: 0.01195 - epss-percentile: 0.78368 + epss-percentile: 0.78384 cpe: cpe:2.3:a:mikoviny:wp_custom_pages:0.5.0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022040f540a7f0b33cf4a0977c234d44fe10b329d3496aab91fe9e405a3f1261ca61022100c4d8fe59af6690b27fb5df93d82db0fdaaf04ae86e52710b947ca67cca9eaf3a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022063c4aa31ffe38bdba07871395a2b2bad408b0046570bd8d632228eb0dbc1c15e022100a090033554ffa320d7ea9553d49a6dc2c3f967834a9f1a647b6c3d43c1a3c944:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-2744.yaml b/http/cves/2011/CVE-2011-2744.yaml index 9272efb62b1..45152fd3f3c 100644 --- a/http/cves/2011/CVE-2011-2744.yaml +++ b/http/cves/2011/CVE-2011-2744.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2011-2744 cwe-id: CWE-22 epss-score: 0.05641 - epss-percentile: 0.90044 + epss-percentile: 0.90053 cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c0b554a44116e8ed2db72ec8c923be6b8ce42e04023aa9deac8f3512d7a2331702210097282fdb953746fb162de98c72f2c5b2232bc272b0def95ad284862b8450a757:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100deb72db213ba99e9bcc000439846e106727e50c6908f15a25efe94db58aa48b402204321dca8feae0f7114697703f19b64d18647404405a055ef6c03873f745816db:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-2780.yaml b/http/cves/2011/CVE-2011-2780.yaml index 0caeeebe611..b9576ee2342 100644 --- a/http/cves/2011/CVE-2011-2780.yaml +++ b/http/cves/2011/CVE-2011-2780.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2011-2780 cwe-id: CWE-22 epss-score: 0.0269 - epss-percentile: 0.85399 + epss-percentile: 0.85408 cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f78de1792bf4dfd351b235754e014ebd15480eb348233ed86616529995c2089602203e464a4dbdcc4e1ea571e0e9529d3073ec99c93e45ff1ee34308c2ef39cfaa50:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b236dde5eb8660fd2bc70d2a95059f09626c4012323c56353b1e8f969805124e022100b986ce44ce2eced6705ff0c5be121d01a57a29e95df1c10e567acc9542d7b75f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4336.yaml b/http/cves/2011/CVE-2011-4336.yaml index 529b8caba2d..d2afab19e62 100644 --- a/http/cves/2011/CVE-2011-4336.yaml +++ b/http/cves/2011/CVE-2011-4336.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2011-4336 cwe-id: CWE-79 epss-score: 0.00927 - epss-percentile: 0.75477 + epss-percentile: 0.75483 cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022033079c9b317e4893c28c0aa461de056791592f0d6179d7c03d2c3fad464a4390022100e17d41622f07a3788407815ff46aec2dfb6fd69681f5ab17788ca026cf9ee6dc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022044e037dc498cb6e72ca81ebb9b2633b4aac3ea8795a2df54cca08d3c303743470220668bd0640f02adafaf6ebc5ad946c6b28f24d830be1da76eee2993dd9e7e4c17:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4618.yaml b/http/cves/2011/CVE-2011-4618.yaml index 1799651b875..cbbf5def260 100644 --- a/http/cves/2011/CVE-2011-4618.yaml +++ b/http/cves/2011/CVE-2011-4618.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2011-4618 cwe-id: CWE-79 epss-score: 0.04723 - epss-percentile: 0.89027 + epss-percentile: 0.89035 cpe: cpe:2.3:a:simplerealtytheme:advanced_text_widget_plugin:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -46,4 +46,4 @@ http: - 'contains(body_2, "")' - 'contains(body_1, "Advanced Text Widget")' condition: and -# digest: 4b0a00483046022100d44ad811e22170433967c093c27729ada00540f68b25d5004ae09ca511ddfea1022100ddb144df1e80a513e51b19592657d35da2f5c3e9bbfb5320194e2f58ba481a53:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022030438eaab16fca18d58f6d18e10e6c07bc9093acbe0e89b715254928c653a59a022028b91485418ee0393af4d49dc814d50c1facacc0f7936b7f4640076ab9d6bc72:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4624.yaml b/http/cves/2011/CVE-2011-4624.yaml index 240cb8dbf81..f7e54920f8d 100644 --- a/http/cves/2011/CVE-2011-4624.yaml +++ b/http/cves/2011/CVE-2011-4624.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2011-4624 cwe-id: CWE-79 epss-score: 0.05988 - epss-percentile: 0.9035 + epss-percentile: 0.90362 cpe: cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -62,4 +62,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220591518600e67986e045059c1d751407ffc076a11602656bc60c176497e80f98b022100f2149aff14a0f225ef57725f746ff0761f3070f8dc4e9059fc8a7baf69a08cab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206fd02f2acefed464df2c50fc099bc6a23e4360b443e3e412924d4e823990cdfa02200c5ef7a745a0982735bfb8d999ad6797b253809dbe07a5c7e7155fcbfed98ded:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4640.yaml b/http/cves/2011/CVE-2011-4640.yaml index 20ac3a7efe1..f4afae3733f 100644 --- a/http/cves/2011/CVE-2011-4640.yaml +++ b/http/cves/2011/CVE-2011-4640.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2011-4640 cwe-id: CWE-22 epss-score: 0.12255 - epss-percentile: 0.93602 + epss-percentile: 0.93605 cpe: cpe:2.3:a:spamtitan:webtitan:*:*:*:*:*:*:*:* metadata: max-request: 3 @@ -59,4 +59,4 @@ http: - "regex('root:.*:0:0:', body)" - 'status_code_3 == 200' condition: and -# digest: 490a0046304402205933c389c84f8c24ba0744b437bd9f979875808e2696d3d6b7a626af2f08b51b022032d28e5cf826b93881fab63323dea86035300c380bcc1c0bc4246e23b52a81b6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f388ac29f9066d209a15c86a36828a29bf55d4bbaa736851c27e712c6681d0a802206db67b67a224e9859bd296e9bee25b567467ac7102b143510517f7737c397fda:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml index 6f8f6e67609..fe7a81bb47f 100644 --- a/http/cves/2011/CVE-2011-4926.yaml +++ b/http/cves/2011/CVE-2011-4926.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2011-4926 cwe-id: CWE-79 epss-score: 0.07833 - epss-percentile: 0.91676 + epss-percentile: 0.91685 cpe: cpe:2.3:a:bueltge:adminimize:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -62,4 +62,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022065c9fa2a98d0a8abd2b13f8066c2b14ada7511d87e9d667c7d9c9364ca98a716022100c68a26eb93f05961d9a0331eed4f98ccbda6688134a09dc2a5c474990532e991:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205e000310497f1ce520c57201b08bebc252fbd059ac56b11f47e706bd089cd828022100ed46659abb51f41e17be05d89ae51b26ce7aa1ea617eb041bbf817baecdb64e2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5106.yaml b/http/cves/2011/CVE-2011-5106.yaml index 74e58b8e90f..088c1894459 100644 --- a/http/cves/2011/CVE-2011-5106.yaml +++ b/http/cves/2011/CVE-2011-5106.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2011-5106 cwe-id: CWE-79 epss-score: 0.02815 - epss-percentile: 0.85687 + epss-percentile: 0.85695 cpe: cpe:2.3:a:fractalia:flexible_custom_post_type:0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e88d07fd30c0bc005b9bbbd464eac95b9e2d8704906cca53d3546e08a5212e0802204be1605644c5516c877ff9350a21e65f5cff058caceed048d13145b5d3360ba5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022057ed9aa8fb228b26ddc3ff0cf2d481a165b30882fe9cef8b392a119d17938cc40221008d2f37104bf0af0fdbf983e5db43dad8889fdea9a60be890c539ca4c3e8ca998:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5107.yaml b/http/cves/2011/CVE-2011-5107.yaml index 181cbb69034..157af5c3584 100644 --- a/http/cves/2011/CVE-2011-5107.yaml +++ b/http/cves/2011/CVE-2011-5107.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2011-5107 cwe-id: CWE-79 epss-score: 0.02203 - epss-percentile: 0.83978 + epss-percentile: 0.83988 cpe: cpe:2.3:a:wordpress:alert_before_you_post:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -60,4 +60,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210091a11123ef6be8131d7a909e6c689ce2621b357ce7946e9346e59440ff4fc312022007c2448dd3ac30ffebb31f01432acba96ea0229766f7eea5cb0eccaa10b17a38:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022035739c21efa5842f8e719aa612d72cdf2138dd9830c64bbcc5f76ea61d25f616022046d76052b3a6864d46add34b30696df417275e43ce6df9957a892899b6bc7041:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5179.yaml b/http/cves/2011/CVE-2011-5179.yaml index 68ebe87e82e..05321393060 100644 --- a/http/cves/2011/CVE-2011-5179.yaml +++ b/http/cves/2011/CVE-2011-5179.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2011-5179 cwe-id: CWE-79 epss-score: 0.02203 - epss-percentile: 0.83978 + epss-percentile: 0.83988 cpe: cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -60,4 +60,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220786fac6e2b9a1040bd5da35efc4dac3f92c9a79ae6e99c09e1303f36813f7c3902210084b94921d3a25b7f7ea4750a5958c9cd307ff581143b60e5ba7c7ef83c8a1f4f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201d44902b3975844c696005dae589dd86ebb1144968c2b452d43c54753236d8560221009bcd6894a0bda11478427a1d53f5075ee04f828f64ddad2e6d22a38fcef061ca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5181.yaml b/http/cves/2011/CVE-2011-5181.yaml index 574a4d86aec..572b22f7f99 100644 --- a/http/cves/2011/CVE-2011-5181.yaml +++ b/http/cves/2011/CVE-2011-5181.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2011-5181 cwe-id: CWE-79 epss-score: 0.01422 - epss-percentile: 0.8013 + epss-percentile: 0.80147 cpe: cpe:2.3:a:clickdesk:clickdesk_live_support-live_chat_plugin:2.0:*:*:*:*:*:*:* metadata: max-request: 2 @@ -62,4 +62,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d5e08633d95d55f486c233580475c9248c064080bca945edbda3a6d1d47c669402205679a1ec369046383b9a7bd79df472da0a1e84a9b2d1dc6ab27b55b18cd9b22a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205cc6c5ff3902910053cc0bcfdc1cf12bbdbaa1de89e47eeab26069f397272c1802203d8102696da8829065b870ca7ee4353bb7a8c852779fd4f803e475b2f63d8b07:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5252.yaml b/http/cves/2011/CVE-2011-5252.yaml index ac20db1f1d6..a5e22f04906 100644 --- a/http/cves/2011/CVE-2011-5252.yaml +++ b/http/cves/2011/CVE-2011-5252.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2011-5252 cwe-id: CWE-20 epss-score: 0.26961 - epss-percentile: 0.96187 + epss-percentile: 0.96192 cpe: cpe:2.3:a:orchardproject:orchard:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4b0a0048304602210082dafd8e1c2ee55ca32f0e6feeada822af20c662ca187ef07171fd7346a3db1e022100cc9e9e70fa2365f0647251fb2e80f2f793ef1d9a31d68f4be41f667aa510b7e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210090fe1815aee2dadef973d1718a66997f36572d38c693ba5d715af9f07cfe845e02207034e09f572a6ca8d1c17ef9eadf6195ec7bdf6eb8873c75d350f03c3521334b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5265.yaml b/http/cves/2011/CVE-2011-5265.yaml index 7b1fd8dfec9..8cdd1ebe7cd 100644 --- a/http/cves/2011/CVE-2011-5265.yaml +++ b/http/cves/2011/CVE-2011-5265.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2011-5265 cwe-id: CWE-79 epss-score: 0.06376 - epss-percentile: 0.90667 + epss-percentile: 0.90681 cpe: cpe:2.3:a:featurific_for_wordpress_project:featurific-for-wordpress:1.6.2:*:*:*:*:*:*:* metadata: max-request: 2 @@ -61,4 +61,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022021a4879507e4bd10f1c07c426af807d1d2f5f977f01578d7b96a83d327f22e5e022100afceea2dbdea141aed87509bf012d561797343bf1aba1afc74c6fc93a33c16e3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100cd133552eb5aaf23beaebf4f75ef95b21578cf03e1e54c105a52c118acea0e020221008a6ae1e1217113184066759b033d9e6fef04b3b81c570f3f941243eeccf59d73:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0392.yaml b/http/cves/2012/CVE-2012-0392.yaml index 55326732697..344865715f6 100644 --- a/http/cves/2012/CVE-2012-0392.yaml +++ b/http/cves/2012/CVE-2012-0392.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.8 cve-id: CVE-2012-0392 cwe-id: NVD-CWE-noinfo - epss-score: 0.91467 - epss-percentile: 0.99645 + epss-score: 0.91852 + epss-percentile: 0.99671 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -51,4 +51,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022052c672b6ced491028f2400f6d9fee4013f162e7bbacf77e61ecc343ab5db8be202206f182bb6a9ecc249dcc4e74c046ad401057c8713759ba7741c9544d4b82a7700:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100efa217bc5697f3e65ea13a3885dd17ed2564df1893f40a72a27ddd226f55cf0f022018255678a117b26ecb3023681ba39cb64a06e42345ce8e9ff6910a443e63c394:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0394.yaml b/http/cves/2012/CVE-2012-0394.yaml index b8acb80ca21..dcb87314bd8 100644 --- a/http/cves/2012/CVE-2012-0394.yaml +++ b/http/cves/2012/CVE-2012-0394.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.8 cve-id: CVE-2012-0394 cwe-id: CWE-94 - epss-score: 0.92749 - epss-percentile: 0.99743 + epss-score: 0.92974 + epss-percentile: 0.99764 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: verified: true @@ -59,4 +59,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009080b98af5940084cac4fdae1f31ee862d45caecefd69cf6650acdb5f701810b022028f838901c990d47bb096a14a164a3ec3a8c80893c79477bdaf9f9bc33c9c1d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220045c8c9f36e8d1aed18382417a96f15e116068c6e87bce43c7265bc1cc5b799c022100e934928c90b27691c838b23bbacb4add83a28782f5c33b61e40b35d7da342be3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0896.yaml b/http/cves/2012/CVE-2012-0896.yaml index 69c0bd54327..67f36ecacac 100644 --- a/http/cves/2012/CVE-2012-0896.yaml +++ b/http/cves/2012/CVE-2012-0896.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-0896 cwe-id: CWE-22 epss-score: 0.03691 - epss-percentile: 0.87553 + epss-percentile: 0.87563 cpe: cpe:2.3:a:count_per_day_project:count_per_day:2.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210085ead399d2060540d162ca7b014c4f403c823d9d6db7eb9b7917c0a64b718c360220012b0b2aecd289e00ae1edb34068b4292b12d5cebaeeddeb0903a8e383cd67e4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206344785899d0917063c2f34d8628604c77969155975ef6291711e5d53adf0efc022100c442068de8092a04222bddb874e1533613a4f0448137de706993833f94237ded:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0901.yaml b/http/cves/2012/CVE-2012-0901.yaml index 6d238cd3b1e..0f955e350bc 100644 --- a/http/cves/2012/CVE-2012-0901.yaml +++ b/http/cves/2012/CVE-2012-0901.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-0901 cwe-id: CWE-79 epss-score: 0.00693 - epss-percentile: 0.71249 + epss-percentile: 0.71252 cpe: cpe:2.3:a:attenzione:yousaytoo:1.0:*:*:*:*:*:*:* metadata: max-request: 2 @@ -61,4 +61,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022065f7397005aaac2df84a77cb0247073b56f4e0cca0c30738d7f32fb295041b5702201ff0f8d127baacaa81865ff774ccc9b0ad3c70ecd5198f471b058a848ac47a6b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022014a244497ae503ebb714ce379bd09bf11574e2e54b1d4e9e424125bfde0b062e022100e561e56e996e062623daf786551dae690d36a04a68eed507ace3aa4f0e1a7800:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0981.yaml b/http/cves/2012/CVE-2012-0981.yaml index db7ba102ee9..6fbb076d77f 100644 --- a/http/cves/2012/CVE-2012-0981.yaml +++ b/http/cves/2012/CVE-2012-0981.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5 cve-id: CVE-2012-0981 cwe-id: CWE-22 - epss-score: 0.11483 - epss-percentile: 0.93365 + epss-score: 0.08793 + epss-percentile: 0.92233 cpe: cpe:2.3:a:kybernetika:phpshowtime:2.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ee42355ef490b2e27ea92997b3a417e9ed18ad98a6287057c261421425a6c80a0220528300fa86ea027703a10d11a413c77b1d6ea7710584208acfabf74b618c2055:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100fefc2752e7ddbb6469574f1396d763cfe2fc6bd18962ff07a27baec96de76410022100f2842069add862963b45adff8d8d9add097d2cb07ccf85ae22cd1dfb55f886c8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0991.yaml b/http/cves/2012/CVE-2012-0991.yaml index d3be6051ef9..54dd968d92b 100644 --- a/http/cves/2012/CVE-2012-0991.yaml +++ b/http/cves/2012/CVE-2012-0991.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-0991 cwe-id: CWE-22 epss-score: 0.53734 - epss-percentile: 0.97881 + epss-percentile: 0.97882 cpe: cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -53,4 +53,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200331f830063b254fcfd0d532c9e8e43082896573d7f022a64b5da93d96da8512022100e3306efa1a9f4e7a3b2fe35977cd143aaf95c968d31bd2fa2d2e5887182193a2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d9aa7658e7c340142acc42a4f37e679585b590dbbc298ef63719136b5e49658d02207ccd63629e70a7eb1bbf7a3692860d20606381f8444eb99c598017f8f4b145f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0996.yaml b/http/cves/2012/CVE-2012-0996.yaml index cc4e7ca04f8..59be7ca51bf 100644 --- a/http/cves/2012/CVE-2012-0996.yaml +++ b/http/cves/2012/CVE-2012-0996.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-0996 cwe-id: CWE-22 epss-score: 0.04456 - epss-percentile: 0.88686 + epss-percentile: 0.88692 cpe: cpe:2.3:a:11in1:11in1:1.2.1:stable_12-31-2011:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201a0e88484b0f01fe3ddd47c53397a1ad8038198918212e2420c61c08bfc38317022100fd0e3009ade611026e782ea4dd3b8a8be1b002e36498b25387f354a4877edf93:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c9dcbc4a95327a2d1ac99c723345d696a983edb85f2504136fc5dc2adb832941022100d6a537cfc1022711ffc2af0e1a758a6426386bad259e26af181fe3fb5b06d21e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-1226.yaml b/http/cves/2012/CVE-2012-1226.yaml index f337d349014..c4ad7b708da 100644 --- a/http/cves/2012/CVE-2012-1226.yaml +++ b/http/cves/2012/CVE-2012-1226.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-1226 cwe-id: CWE-22 epss-score: 0.04601 - epss-percentile: 0.88875 + epss-percentile: 0.88881 cpe: cpe:2.3:a:dolibarr:dolibarr_erp\/crm:3.2.0:alpha:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204c5e826d207372c2175ed873700024f0331a6f7753cd297adad0328cbc9a5725022100bd1481871fec29ec6bc9515c1920d9c73e9a78f27c621e63d280faed69fa4675:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bbc87fcfd3099b3579332003d025cc533dbceac8f3ed4252d4d1b43207508e8b02206ed3bc8409f503a0353838d5d3b5d9b090b779eead779796e7ea69cbf71a343a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-1835.yaml b/http/cves/2012/CVE-2012-1835.yaml index 5dd58ee2c55..c337998e3db 100644 --- a/http/cves/2012/CVE-2012-1835.yaml +++ b/http/cves/2012/CVE-2012-1835.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-1835 cwe-id: CWE-79 epss-score: 0.00975 - epss-percentile: 0.76136 + epss-percentile: 0.76141 cpe: cpe:2.3:a:timely:all-in-one_event_calendar:1.4:*:*:*:*:*:*:* metadata: max-request: 2 @@ -64,4 +64,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a3070dbf84559dc2da53868e23a04fb10ce2191a09685b6b2f09ccc811f5310502202108fc00b8db8e997de72dc1fab0724746545169839f60fcd7f77e936569b477:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201cfe191febb503941780f9cd2c3ffa84e4bd76d718df042cd834466000f94c90022029d4536f893e0dca42aa0d804cf7eae06fbcd4a6e9c0a8b473d77fa43bee9b99:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-2371.yaml b/http/cves/2012/CVE-2012-2371.yaml index 5d46ee1b3e3..a51000fc31e 100644 --- a/http/cves/2012/CVE-2012-2371.yaml +++ b/http/cves/2012/CVE-2012-2371.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-2371 cwe-id: CWE-79 epss-score: 0.04956 - epss-percentile: 0.89293 + epss-percentile: 0.89302 cpe: cpe:2.3:a:mnt-tech:wp-facethumb:0.1:*:*:*:*:*:*:* metadata: max-request: 2 @@ -61,4 +61,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b3fb602f473a8b05bcff97631758eb5ac8ec847199789b0bf37d46358008fb9b0220452ee23610c66a9b2342d4d031991d7164840ba458969ac36fc99df9c30e639a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022034e2457b6e8ad5f3a7ca0547658d5d9824133d52310ef78a8a5bee7ec3cde86102201dc1612c9a3d1641166500c5d1a53075b73010c46c24f27448f7637d676df44f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-3153.yaml b/http/cves/2012/CVE-2012-3153.yaml index a6d4a1d3cee..fbde54d3856 100644 --- a/http/cves/2012/CVE-2012-3153.yaml +++ b/http/cves/2012/CVE-2012-3153.yaml @@ -71,4 +71,4 @@ http: name: linux_working_path regex: - "/.*/showenv" -# digest: 4a0a00473045022038c0911947db5630b75648a5c5a39428ea309831f63a884f6e05b5c123d7125a022100937346c43046c1244b1d79b94beef9ad6bd504cbd99640f08ae3aed3c22a8f20:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022023e85acb319e5622bef006a806d47125a6524d0299fc61d9ea11fc1f70f664bd022100aedd8a4ea46d3034acfea48d17c9b78c1aed243d0ee0258c37be9a86ff927b3c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4032.yaml b/http/cves/2012/CVE-2012-4032.yaml index e50f7426f09..24d34da3782 100644 --- a/http/cves/2012/CVE-2012-4032.yaml +++ b/http/cves/2012/CVE-2012-4032.yaml @@ -21,8 +21,8 @@ info: cvss-score: 5.8 cve-id: CVE-2012-4032 cwe-id: CWE-20 - epss-score: 0.13567 - epss-percentile: 0.93989 + epss-score: 0.13504 + epss-percentile: 0.93978 cpe: cpe:2.3:a:websitepanel:websitepanel:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -51,4 +51,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4a0a0047304502201199326f91cc769a36a90ad07c9be812d5bf95b6344f3e010b7f2cf09098e44d022100e6e0047b3e96bdf305ac301a584ac8aa11a5215f9d7f2cd91b86cf69a40fe92f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022052bc12235b0b20a6936f30e3220c56cae55bf9afa738d645edac671da73b97af0220719b069a19ad849fd1c4cd8a6ce172dbf8d8f2aa4e4aae888220e6b0f4d22e56:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4242.yaml b/http/cves/2012/CVE-2012-4242.yaml index c11f97f9d1e..8ac4aa348bb 100644 --- a/http/cves/2012/CVE-2012-4242.yaml +++ b/http/cves/2012/CVE-2012-4242.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-4242 cwe-id: CWE-79 epss-score: 0.08022 - epss-percentile: 0.91807 + epss-percentile: 0.91816 cpe: cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:0.9.2:*:*:*:*:*:*:* metadata: max-request: 2 @@ -60,4 +60,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e4b1a14e2d507129a7447bfefc39bf1352203ebd4438c5156b719db915361149022100c4035f67337ded454bc8ca6f9bbe126575739ecb5992bc5e896fb3cf1dc1063a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ec32aa1a511d27f7cc91a7c0455d5f343887343df1b751043a4af95c7d1e478f02200ca169af2b09b976bb03db7de6c8e519dae0a4730315e2754c866dfb57e6f200:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4253.yaml b/http/cves/2012/CVE-2012-4253.yaml index caaecda5c54..76def2f35fe 100644 --- a/http/cves/2012/CVE-2012-4253.yaml +++ b/http/cves/2012/CVE-2012-4253.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-4253 cwe-id: CWE-22 epss-score: 0.62719 - epss-percentile: 0.9829 + epss-percentile: 0.98288 cpe: cpe:2.3:a:mysqldumper:mysqldumper:1.24.4:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203537597f5565c75fe40d0c3e88b63e67dc713fec4849e930621f055eac0a123702210099ddffd5f123a23eabccd635c84ee9eb6fe66b84b7355a6feab55ebfb1b908b4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220016a0c4d1b1147f11184c550f22493cec5e58e22e190d7721228e05fb2c1ca66022100a136e1793b326c97b5124ffcb13970fa0121827f7c15e6e2e55b49822c56b95e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4273.yaml b/http/cves/2012/CVE-2012-4273.yaml index 0daeddc5a96..d336190ce0d 100644 --- a/http/cves/2012/CVE-2012-4273.yaml +++ b/http/cves/2012/CVE-2012-4273.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-4273 cwe-id: CWE-79 epss-score: 0.01303 - epss-percentile: 0.79258 + epss-percentile: 0.79273 cpe: cpe:2.3:a:ppfeufer:2-click-social-media-buttons:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -64,4 +64,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022014e8fa4455c0af5aa22e47a927038cbad258e7f1f2a17f396823adcfc08e3ca5022100d642bdfb077ddefac4d2f3ac6c72e7da7466bcd19da929b588413f300f1754cb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bfa32de8aabfcc57c9e75d117f87cbe6edacb8c0f7d8ea99b1a73276a5d6e44902207ea54631c72032666369bd2796aa5755f564e067ddc951e4199aca78a2132ea5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4547.yaml b/http/cves/2012/CVE-2012-4547.yaml index 3ae7bbf3abd..2be4b82a213 100644 --- a/http/cves/2012/CVE-2012-4547.yaml +++ b/http/cves/2012/CVE-2012-4547.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-4547 cwe-id: CWE-79 epss-score: 0.37906 - epss-percentile: 0.97058 + epss-percentile: 0.97061 cpe: cpe:2.3:a:laurent_destailleur:awstats:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -53,4 +53,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100adfab2cb8a3cd138ba7d0387fe48b3a63fd65bcd1ad494acb8882d4d9538ae85022100d7dbfa1f32af5b5600eaaff2afa190d40ac592126e67204ab8715fbd199d2b24:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210091537e0199f2a19f49d2abfd3d67fd42120aa1b356d6be9921465cf0520cc29b022100faaf238017471adca4b410e2e85adc38f86ca83da2e3b5506cc4380752789012:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4768.yaml b/http/cves/2012/CVE-2012-4768.yaml index 96506c08da8..dffcc0d4566 100644 --- a/http/cves/2012/CVE-2012-4768.yaml +++ b/http/cves/2012/CVE-2012-4768.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-4768 cwe-id: CWE-79 epss-score: 0.01936 - epss-percentile: 0.82932 + epss-percentile: 0.82949 cpe: cpe:2.3:a:mikejolley:download_monitor:3.3.5.7:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -64,4 +64,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f94cb7fe7ed7b10ffe2906ed470edab506f1b775b51d1d819242a554bf9111f7022100d1ff7a356315a07a3c8d5a1d93adbbad0ca98909fe0f215c77480ac83f5253d9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bb285d5b14571b0919be7b17d01f2c15e2712b6edf72e563f73bfdf2565ec630022100c901c7b39082375171932a18016f4738123c77c5ced3471039a5eadd962ec1d6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4878.yaml b/http/cves/2012/CVE-2012-4878.yaml index 8448f5d876f..ae5b71835ba 100644 --- a/http/cves/2012/CVE-2012-4878.yaml +++ b/http/cves/2012/CVE-2012-4878.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-4878 cwe-id: CWE-22 epss-score: 0.14501 - epss-percentile: 0.94213 + epss-percentile: 0.94216 cpe: cpe:2.3:a:flatnux:flatnux:2011-08-09-2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220145ab5b999db54e3364ed1b06ae4906348bda492e575c35e96f80948fa32f2ee022100ac7982fa7f0aa1f4425c10bd10fbf682e81ced27eb688c023ae31054b2ebe0eb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203c0f7e8033eb2643cbbd6f5d75882ab4f6e8392d36455d4360be62ecf8a0c12d022006c78ed1d2beacc3f47a837e6742ee5a876a6af82418bb2dab539f8cccd6c2bd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4889.yaml b/http/cves/2012/CVE-2012-4889.yaml index 4423a66342b..6ee4345f6c0 100644 --- a/http/cves/2012/CVE-2012-4889.yaml +++ b/http/cves/2012/CVE-2012-4889.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-4889 cwe-id: CWE-79 epss-score: 0.03763 - epss-percentile: 0.87669 + epss-percentile: 0.87678 cpe: cpe:2.3:a:manageengine:firewall_analyzer:7.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022004412e6c224a2d04158a74bda5a3113fc4faad3e8e7574c985a72477cb9a171a02203b047a5b7dcb0d33bdcbcab52db9c5aeee0998b005434b8f608f79cbb10ce1bc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022073e54f24d0b52ea453baa6bdeefbae8742d86013851667ecefaa262db111adb3022020821901da3d63955b4a8d31c30f4cadeec14a371ff43c4fa3ea9ae5c12e084c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml index c9da11a2abd..011b57a876a 100644 --- a/http/cves/2012/CVE-2012-4940.yaml +++ b/http/cves/2012/CVE-2012-4940.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-4940 cwe-id: CWE-22 epss-score: 0.8485 - epss-percentile: 0.99299 + epss-percentile: 0.99303 cpe: cpe:2.3:a:gecad:axigen_free_mail_server:-:*:*:*:*:*:*:* metadata: max-request: 2 @@ -43,4 +43,4 @@ http: - "fonts" - "extensions" condition: and -# digest: 4a0a00473045022100e11f97271980ae795d0ae83b43e3677757cf624aa74444f53f9a2ca70070862402205b766ff7710cd1179db2055ab5fc6284a4ec6f1030a11a05d0099895fcca650e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c07322241ddecd86199f0bd593047cd6f483bce9150a758e826be5b4abf2c36d022100e95c9467052264b067f73422bd9763432b560b2d7be449bc7e3f20e9318818ca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4982.yaml b/http/cves/2012/CVE-2012-4982.yaml index e37ab7b0f44..77536cf59f2 100644 --- a/http/cves/2012/CVE-2012-4982.yaml +++ b/http/cves/2012/CVE-2012-4982.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2012-4982 cwe-id: CWE-20 epss-score: 0.1931 - epss-percentile: 0.95162 + epss-percentile: 0.95166 cpe: cpe:2.3:a:forescout:counteract:6.3.4.10:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100db47d5cf3d2251c117d0d3248d216fdd4606b9e5a4e25bf69fc0cfd0c24d8960022007197feb7f6b0f62495042255451a7cf2c666e3e31a7851066fea2d853a4e18e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022021c48c72335f14d161cc362a4c9fbdc6676fa79a263c66341ac36c6963cdab84022100b070a65c247c180ce4109c68e88f6a14482778f7233d6aa24c8abaf3faaa8395:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-5321.yaml b/http/cves/2012/CVE-2012-5321.yaml index 49e7a578658..7bc66d0b75f 100644 --- a/http/cves/2012/CVE-2012-5321.yaml +++ b/http/cves/2012/CVE-2012-5321.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-5321 cwe-id: CWE-20 epss-score: 0.23135 - epss-percentile: 0.95738 + epss-percentile: 0.95745 cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:8.3:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4b0a00483046022100f8a3d9440bc6c1fc5e6159eb9c168c977ea056dd2491228c4691d103bb51c3b8022100c46d78c997f506e779d5f7a14f76fd54c953c72fbe28304cee31d712a819143e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210087ea942a36949528b4cba1919f0756c0a133ca605e214d92af1cf9b878854b290220298283e2c818e23bf40b276ef664f114ddcb55d305892620dd0824c77b1e855a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-5913.yaml b/http/cves/2012/CVE-2012-5913.yaml index 658090803ef..9c0d8c28fba 100644 --- a/http/cves/2012/CVE-2012-5913.yaml +++ b/http/cves/2012/CVE-2012-5913.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-5913 cwe-id: CWE-79 epss-score: 0.01458 - epss-percentile: 0.80363 + epss-percentile: 0.8038 cpe: cpe:2.3:a:wordpress_integrator_project:wordpress_integrator:1.32:*:*:*:*:*:*:* metadata: max-request: 2 @@ -61,4 +61,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100946907738682e88d668905b13b483f08e03c6c160ebe3a42fbc1322d66588c4602207e5851f928c564a12c223745b8717f5df4dda9e2a35606c03c1f147376613d0f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207d1c9ba64ced444b6c7833555765bc827a011ac1427c137e35e150f78db52f6a022049c403950530f351b4d7b1600ba3ef5a1f9a5d8846fdbd4dcc7c64b63198233b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-6499.yaml b/http/cves/2012/CVE-2012-6499.yaml index d9385f5bfb9..522606dc956 100644 --- a/http/cves/2012/CVE-2012-6499.yaml +++ b/http/cves/2012/CVE-2012-6499.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-6499 cwe-id: CWE-20 epss-score: 0.52894 - epss-percentile: 0.97832 + epss-percentile: 0.97833 cpe: cpe:2.3:a:age_verification_project:age_verification:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4a0a004730450221009780e43d626eda7bec8fa2e8edef42370e1ead035ad2130c6cdaeaf2e8bea80002200da31a06de6555b9daa51f6ffae98c3a339ba7fbe39a9036db112c858a92a665:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e839f5dbf46b3f7e1fde0ee7a2399444e445a2293768d0fe033d82118d076f2602201c03dcab86a0685ec715bf8f860a628acaaf703bb50db32c5e6fca51d588b88b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-2287.yaml b/http/cves/2013/CVE-2013-2287.yaml index 5ea439b324c..fa5bcd0531e 100644 --- a/http/cves/2013/CVE-2013-2287.yaml +++ b/http/cves/2013/CVE-2013-2287.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2013-2287 cwe-id: CWE-79 epss-score: 0.09211 - epss-percentile: 0.92429 + epss-percentile: 0.92433 cpe: cpe:2.3:a:roberta_bramski:uploader:1.0.4:*:*:*:*:*:*:* metadata: max-request: 2 @@ -63,4 +63,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220334b7b935ba9eff92dda7c9a93435d93d6a30620160dff2507d223afb01194ac0220766d3c2ea9bf376ad55e055e3adb81dccdcbc288c2aef2db949eb882539d4dcd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ca7558cebf61b1526eb49ec8c41202e81ac4bb130f7e2ae93a0a0f166f4e3942022100ea8ec5c5a09b34ef07ddca3613375b7e70915383b245f137e28e300fd9370c0a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-2621.yaml b/http/cves/2013/CVE-2013-2621.yaml index c8073477dcc..e02d50c268d 100644 --- a/http/cves/2013/CVE-2013-2621.yaml +++ b/http/cves/2013/CVE-2013-2621.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2013-2621 cwe-id: CWE-601 epss-score: 0.1019 - epss-percentile: 0.92877 + epss-percentile: 0.92879 cpe: cpe:2.3:a:telaen_project:telaen:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -42,4 +42,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100bb9474048779061e6ff5dd82b467d0c4cc2b9991e40118811d2f7fa25224070d0220314e32dbf1427b3fa37fe7af50b630c1404f081d5cf7dace7a9e0a6a2b0012b0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220520bef19edf821976b97d53c5c52ba91f502eec07c5e61996bdbfcb0e8fe5b9202207e10970c57273eb45aa8629b6f94fd4edfd8b79b5ee960746546064a82858275:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-3526.yaml b/http/cves/2013/CVE-2013-3526.yaml index 7d905c93a04..284dc503d8a 100644 --- a/http/cves/2013/CVE-2013-3526.yaml +++ b/http/cves/2013/CVE-2013-3526.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2013-3526 cwe-id: CWE-79 epss-score: 0.08185 - epss-percentile: 0.9189 + epss-percentile: 0.91898 cpe: cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.0.0:*:*:*:*:*:*:* metadata: max-request: 2 @@ -64,4 +64,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100964d493e709a6f31e5d277c4b7c925a033d83e0b58272662a61ebedb365b4bc802210093643c6cb151307b56344eeeb412b90d0050fe1ef2aec98eb07a54f91c7368c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100fa17b565d114e733aef4e7113b494dc4668a5c89a8149eadd83d01c2c4ed3a25022100a89990982b4c9d958e30feafe723638413423a1d2ce30f90b0246cb7e47b6b94:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-3827.yaml b/http/cves/2013/CVE-2013-3827.yaml index 139df3705e1..4ef684f8e96 100644 --- a/http/cves/2013/CVE-2013-3827.yaml +++ b/http/cves/2013/CVE-2013-3827.yaml @@ -68,4 +68,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220018d55827dcd678075c1663ebbc477641702c297bb9bb26c29f330324d30960002210094eab67eedeb544a3208b473eec44e241b353b75dc1d5eb4580fe1d8dbd33bf7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100945a5fbd8cf0516ee43af603594b094922958ffd37df198c085efdd9136581f9022009a44c57473fa823ac2d07a807c0064c979024317686e6541d4200be8f463de6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-4117.yaml b/http/cves/2013/CVE-2013-4117.yaml index d0d757b02bd..41ebb257a05 100644 --- a/http/cves/2013/CVE-2013-4117.yaml +++ b/http/cves/2013/CVE-2013-4117.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2013-4117 cwe-id: CWE-79 epss-score: 0.11755 - epss-percentile: 0.93453 + epss-percentile: 0.93457 cpe: cpe:2.3:a:anshul_sharma:category-grid-view-gallery:2.3.1:*:*:*:*:*:*:* metadata: max-request: 2 @@ -62,4 +62,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c15f20c40fc36a0fc122d559c0b25a70a7398d2cead16b67d3844087e5e75cfe0220759d70b7b59b1e9181c7da9f16c01696850c87100c31c44e9b2cede191fec6cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100cf12f73bfc8f1d59b9ff83dbc139ae71db550c6dfa73846a275aef4f18bf411d022100abdfa81db3d4be21ed53140434a93d7ad27a02b495077d7da031217612479604:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-4625.yaml b/http/cves/2013/CVE-2013-4625.yaml index ac76fc0646a..c828e6c6556 100644 --- a/http/cves/2013/CVE-2013-4625.yaml +++ b/http/cves/2013/CVE-2013-4625.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2013-4625 cwe-id: CWE-79 epss-score: 0.08892 - epss-percentile: 0.92279 + epss-percentile: 0.92285 cpe: cpe:2.3:a:cory_lamle:duplicator:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -61,4 +61,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022026eda92207e5bd3586f5280a6d3e5b26e9eff5734b2ee53fc5f2159f585b3fda022006720c7afda77c394ef64e559c6ab0091ab8a2e7d1be5c224e15d4f2352bb40c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009cd8cabe67579516adf37bb209787498f4387b4eaca0d77755be7e0bc3b1f86a02201c7e9b917a86a6265b53f9ae1c1e65232e9134c91cde6cd93b94859184be06b3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-4982.yaml b/http/cves/2013/CVE-2013-4982.yaml index 1a2605a89ba..4541254fc3c 100644 --- a/http/cves/2013/CVE-2013-4982.yaml +++ b/http/cves/2013/CVE-2013-4982.yaml @@ -17,7 +17,7 @@ info: cvss-score: 5.0 cve-id: CVE-2013-4982 epss-score: 0.39617 - epss-percentile: 0.97154 + epss-percentile: 0.97156 cwe-id: CWE-287 metadata: verified: true @@ -49,4 +49,4 @@ http: - status_code == 200 - len(body) == 5 condition: and -# digest: 4b0a00483046022100ccbad86ee643f40e9272aa386020b2f463dde73d5d9507c11265809bdc52a3d8022100e4285069f8e20b0f5610284b78190354e2d296f8e3a4bd39927a206143fd65e9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204403b1210e5ab29dfcdbe9e7e2a3e0a1b9c09053fb9179c52808f7e23283e66e022075dc2aeefeb093318ac30b924fa0b37e5511c581f6a51d3a0c9fec0e0ef97545:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-5528.yaml b/http/cves/2013/CVE-2013-5528.yaml index ae23e2117c2..3bcad3872fb 100644 --- a/http/cves/2013/CVE-2013-5528.yaml +++ b/http/cves/2013/CVE-2013-5528.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2013-5528 cwe-id: CWE-22 epss-score: 0.61502 - epss-percentile: 0.98236 + epss-percentile: 0.98234 cpe: cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022070eca95bb32176011237a2a2f5bef43646131408e8880eff39b25b0fe55541c1022100a69230bfa67401d9c3e8a66da9d2650970f3b37447ea66c7585105e7327e1932:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210099d50d939ebee5ace2aaa837a0bda3fe5e23134e0f2523d642e5d4b947375e5d02206e900bd452792d5716c363845d64ea2c7c59b41186e36a54eb6b18298420fe7d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-5979.yaml b/http/cves/2013/CVE-2013-5979.yaml index 9ca931b93e2..89fe4d90a41 100644 --- a/http/cves/2013/CVE-2013-5979.yaml +++ b/http/cves/2013/CVE-2013-5979.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2013-5979 cwe-id: CWE-22 epss-score: 0.48856 - epss-percentile: 0.97647 + epss-percentile: 0.97648 cpe: cpe:2.3:a:springsignage:xibo:1.2.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100acfee11f15d3b267cbbad1b89de4a861fb99556aad09d5c9f956edbcc436467a022100e2f3391bdbab09caff3b2d45de703b2b23175d25f767151748a1a7393c8109af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200204ebd7abb3c2b88730f9155aefb328ee69371a0d949c02d6f4d41d03bcddb50221009b5b8ad480c16eae115f00bdef15b3544700f475a9ab676096b9f2b7a14e9661:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml index e806c63ac0c..bee76674c62 100644 --- a/http/cves/2013/CVE-2013-6281.yaml +++ b/http/cves/2013/CVE-2013-6281.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2013-6281 cwe-id: CWE-79 epss-score: 0.08709 - epss-percentile: 0.92193 + epss-percentile: 0.92198 cpe: cpe:2.3:a:dhtmlx:dhtmlxspreadsheet:2.0:-:*:*:*:wordpress:*:* metadata: verified: true @@ -56,4 +56,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b2feca560f3c3b6f81a33af77b8d94e4c9242dfeb542cddf49b0cf4711f6c9c502204b2f236d8f486d11c2fee021c313659d2d5516f7f8a8e8d21c189382c2ca94bd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220514317adbb18bea70cbe3aa77ee7ffde469cdb89bb08a3007b60714cc7824d33022100880db37cdb7d7c8aab806952fb12c71659be61ac1ff7bf30fdfd0013580e05b2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-7240.yaml b/http/cves/2013/CVE-2013-7240.yaml index e3f4f5d670e..b1567c5750a 100644 --- a/http/cves/2013/CVE-2013-7240.yaml +++ b/http/cves/2013/CVE-2013-7240.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2013-7240 cwe-id: CWE-22 epss-score: 0.73626 - epss-percentile: 0.98757 + epss-percentile: 0.98758 cpe: cpe:2.3:a:westerndeal:advanced_dewplayer:1.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c5a23bd94b683014bc9fa3b14da682fa1934a0e446bef825014f09562572d18c022020da0371e8622c51ebde631459fc691d0bc21e815011b462d57431ab1c11c4fb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205aa344487e84e5fd1091b157ecab91fd6c007149a6df238ef141c5d2e79e2a7e02207ea88d83be84bb4eb97c7c47c317dcf66ab930e36dcfa438223a323374b796af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-7285.yaml b/http/cves/2013/CVE-2013-7285.yaml index 357a133184b..1a742749403 100644 --- a/http/cves/2013/CVE-2013-7285.yaml +++ b/http/cves/2013/CVE-2013-7285.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2013-7285 cwe-id: CWE-78 epss-score: 0.15054 - epss-percentile: 0.94341 + epss-percentile: 0.94345 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -64,4 +64,4 @@ http: part: interactsh_request words: - "User-Agent: curl" -# digest: 490a00463044022018fda72f9ec9cc773a5020267668e7adb13c6c70ce7856f01d52aa5f00d17fe6022075768bd7dc58c591d873eec31c562db96759e7621aeb13afdcd76aaa2ed68de5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b441f3fc33f1ee7f80d938c5c01bdc87a58f89393760f85f1c7c6a4ab6e97813022100de00cdfdc2dcabc751aed60cd257cc8830f78e5997939677dc5f8ebfc40e5a47:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-100004.yaml b/http/cves/2014/CVE-2014-100004.yaml index 1a56d77ebb5..3c3b2c4cd3f 100644 --- a/http/cves/2014/CVE-2014-100004.yaml +++ b/http/cves/2014/CVE-2014-100004.yaml @@ -19,7 +19,7 @@ info: cvss-score: 6.1 cve-id: CVE-2014-100004 epss-score: 0.00385 - epss-percentile: 0.59113 + epss-percentile: 0.59123 cwe-id: CWE-79 cpe: cpe:2.3:a:sitecore:sitecore.net:*:*:*:*:*:*:*:* metadata: @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 490a00463044021f36782e90def50a202dd4f864660f7142fdd9c6ffb26a9f65f4221be62ed400022100ae330317cdf721be4a6eeb8cecf72d474ab5448f6f8a67f1774a9e3ddf0dc554:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200af877ef1a012ba0cc7393c930494fc47d009cec8eddc6396ff775bf7cd4cf22022002fad459943d3cb1ddb414ffa61f8e6901dacb46ec793172cce033d0fa1ead58:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-10037.yaml b/http/cves/2014/CVE-2014-10037.yaml index e35a16ab6d7..b6516c970ec 100644 --- a/http/cves/2014/CVE-2014-10037.yaml +++ b/http/cves/2014/CVE-2014-10037.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2014-10037 cwe-id: CWE-22 epss-score: 0.72691 - epss-percentile: 0.98715 + epss-percentile: 0.98716 cpe: cpe:2.3:a:domphp:domphp:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100dd489ac31c271e67888869208362913753ef8352d9fbe1c0cea7e5996f0fabc7022100c8837a91ac51fa875797d8e1e61d04a39546a9b9a55383182e66af2eaa174c19:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e0780efb3c12477254628d950cd97876e64725cdef0de947f0495d8dff874c56022100a51389bbc445168a449a0c4b16d4f193cd975dbd22af2c36249ee873d9cf7b2f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2321.yaml b/http/cves/2014/CVE-2014-2321.yaml index a2a45221078..6526e8d32ea 100644 --- a/http/cves/2014/CVE-2014-2321.yaml +++ b/http/cves/2014/CVE-2014-2321.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-2321 cwe-id: CWE-264 epss-score: 0.92497 - epss-percentile: 0.99718 + epss-percentile: 0.99719 cpe: cpe:2.3:h:zte:f460:-:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022024ef7094081e0e7cb50f8206451197e6f589e9d20858163459b3f49eff7e84a702201aa68eaabbbef86d6484a23dca59a69e651e4cdba2140293b752f2a31fd9a432:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a7323c6ef7203dd45ee6ef86d23e3a11b18a10a40b6bdee0ba4f4eb7d4c89b980221008820dbad2d7f56dcd4adb8a61c0928273a09f09e455cbb0dac694adaea97abb7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2323.yaml b/http/cves/2014/CVE-2014-2323.yaml index 06375235143..efe21ab6a84 100644 --- a/http/cves/2014/CVE-2014-2323.yaml +++ b/http/cves/2014/CVE-2014-2323.yaml @@ -41,4 +41,4 @@ http: - type: regex regex: - "root:[x*]:0:0:" -# digest: 4b0a00483046022100b15f15be11a3b78675b25ab153eda79ab5d552621c7ca279d99e5fe01bbc96ea022100f2ce90c02c0eafebcf6b028220a75ad0bb6a1c9b5b04c2c890185be1d8a755fb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220397ea86a59785c206f806fef95a94207b023e858d9d244e11bfb7e0ad8511eb50220766767f8e5d083143b49a496a060de9f68e79b270415da29c96f1a49ba92c857:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2908.yaml b/http/cves/2014/CVE-2014-2908.yaml index df23f03c481..13e06e1c3c8 100644 --- a/http/cves/2014/CVE-2014-2908.yaml +++ b/http/cves/2014/CVE-2014-2908.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-2908 cwe-id: CWE-79 epss-score: 0.38723 - epss-percentile: 0.971 + epss-percentile: 0.97101 cpe: cpe:2.3:o:siemens:simatic_s7_cpu_1200_firmware:2.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100fcfcf3c838c25f7ffdfe10fe3d672c2973e6abb793ad55bd17b5ca029ff619d402210081e561a16f62ac31c17d40a63f65c191f4e180defbd93da68ba25d2cf9d14484:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207cd1f2605c41c6d22668e927b0987cb5f7a630f9cb86a673052224c372323ed702210082c2be5fe57251ea2e9a9b2607f04d7d789895ba693369e6141b5b8f993caa9b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2962.yaml b/http/cves/2014/CVE-2014-2962.yaml index f60266d6dd4..b1884750c6b 100644 --- a/http/cves/2014/CVE-2014-2962.yaml +++ b/http/cves/2014/CVE-2014-2962.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-2962 cwe-id: CWE-22 epss-score: 0.87901 - epss-percentile: 0.99444 + epss-percentile: 0.99446 cpe: cpe:2.3:o:belkin:n150_f9k1009_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c95a5dfe3431f187a086fa38893bfc8d444ce70edcd0507218b1c69cb58f06e102210086385d1bc3a5f81c45bb9f61d4ce6c590f564946fbe7f6a98903c5b3e3c512bb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220118ae691d916a82eaf71e3cc019ca557ab50074c7f42c25d8bdf8bf3e9fe363c022100e07d591d091890907be3d74f65b6fac1467dd819cd68660223e8d32024026e99:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml index 933f06f4c55..9e367e5eb88 100644 --- a/http/cves/2014/CVE-2014-3120.yaml +++ b/http/cves/2014/CVE-2014-3120.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-3120 cwe-id: CWE-284 epss-score: 0.85557 - epss-percentile: 0.99333 + epss-percentile: 0.99335 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -72,4 +72,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ea32f392fadc8b61a74b2ecfd7d3994e7982921e8b61ea6354b0a79f72e8cb2e02202f6dc609f22a108890b42fad7436b1583a3ece13369fe12fbcba917a8070a6c7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203578b5e49a7e34ea9991a392614b26f970003e318713fa30a2f61a50b19ed5c402201f1fb6d4f6ffa0d1884d12c04b583b7a0787bf6d19648fb2cf8fe3911e600048:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml index fe5c103ea61..571fb226673 100644 --- a/http/cves/2014/CVE-2014-3206.yaml +++ b/http/cves/2014/CVE-2014-3206.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-3206 cwe-id: CWE-20 epss-score: 0.92028 - epss-percentile: 0.99684 + epss-percentile: 0.99685 cpe: cpe:2.3:o:seagate:blackarmor_nas_220_firmware:-:*:*:*:*:*:*:* metadata: max-request: 2 @@ -43,4 +43,4 @@ http: part: interactsh_protocol words: - "http" -# digest: 4a0a00473045022100ecde0cf41d8b10a2598b8d034084df3aa4a81e65feca3240a6afb94b21a64478022053bdd20d11849d2707ada788346cca7a2e2f33ade73d34d1c6fe30efb93c91a8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b4f3d205d0f71b66c49d74f73e24c6defc702af61da8643b515bd6f5326c6be7022022634214a209f4328984a766fc7892824359716b4119abc734523e47f665bf31:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3704.yaml b/http/cves/2014/CVE-2014-3704.yaml index d14d15cffcd..b9f7aa82715 100644 --- a/http/cves/2014/CVE-2014-3704.yaml +++ b/http/cves/2014/CVE-2014-3704.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-3704 cwe-id: CWE-89 epss-score: 0.94366 - epss-percentile: 0.99958 + epss-percentile: 0.9996 cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -54,4 +54,4 @@ http: - type: status status: - 500 -# digest: 490a0046304402206e5cc3185468ff7a9000636c70d56949b214bbd84bb0db2913dfb6c25def408002207047d39079d29aaa87788d90f3b6d45985cb0d1b97dc92d9855044495e491485:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202783cb5a83916648ac3a1da25ad39f3662a027516466e99bc1ed9adc503fbe81022100bd6664e9be1bd4e5c52eed902273c79fdea375649123171db166a2b7cf390ee1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3744.yaml b/http/cves/2014/CVE-2014-3744.yaml index f947e014c36..ddc87d37279 100644 --- a/http/cves/2014/CVE-2014-3744.yaml +++ b/http/cves/2014/CVE-2014-3744.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f270e7c1043d54ff3db7586017162dbc7af90107d733f7f2fc467dc86be0b8db022100e0c82a0e6674b0c4dbf2d4168680b7ed1185b46229cd6cafd3a05c51c64b1832:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e0b7c08547c2a62a2ebb6f1b255e59b5bf7f3bcddc11d4cd3020e072e5d8893802203ff398679dc06fdcbb478e30c5fd315cdefd735668231f7e4afe64f22bcf0ae0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4513.yaml b/http/cves/2014/CVE-2014-4513.yaml index 896f295d190..a2312d69038 100644 --- a/http/cves/2014/CVE-2014-4513.yaml +++ b/http/cves/2014/CVE-2014-4513.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2014-4513 cwe-id: CWE-79 epss-score: 0.03718 - epss-percentile: 0.87599 + epss-percentile: 0.87608 cpe: cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -60,4 +60,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022062bdd9f7c040398ff8e795145e2ebc759ee3287218a7bec8da47eef12fc3fd8202207477581cdf25fda94a3628037acc2f79ffac5e19e20fb425fe4c33424a183975:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100da1c18c4f3419e771845b99f1779baf3e5d330a4fd06e7c4712a88aee6f6c449022100c65e8ef0ce42116f2bc0bc8d5944e5cda573cd9fcd71d3490a815df35453f3b6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml index fca7f909c38..2add64457cc 100644 --- a/http/cves/2014/CVE-2014-4535.yaml +++ b/http/cves/2014/CVE-2014-4535.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-4535 cwe-id: CWE-79 epss-score: 0.03802 - epss-percentile: 0.87722 + epss-percentile: 0.87732 cpe: cpe:2.3:a:import_legacy_media_project:import_legacy_media:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -60,4 +60,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022025e8c4b50dcaa9d36650455b94ce5e8b82aed07c6f1c6bbc358eafb17f5637f5022100950fb3b60089e604b73627b757f78e23b3a273ab1e09a889531e3a42c370b030:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220458118f217606424c26749a05402dd4ac97d0dc07760a4956e5540d338a859f7022100be51e12cd10abb45cc641015de7824999374175cd03f81ede431a6e1d479d3d6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4536.yaml b/http/cves/2014/CVE-2014-4536.yaml index 8ca49ec4a3d..fe1064454c7 100644 --- a/http/cves/2014/CVE-2014-4536.yaml +++ b/http/cves/2014/CVE-2014-4536.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2014-4536 cwe-id: CWE-79 epss-score: 0.02649 - epss-percentile: 0.853 + epss-percentile: 0.85311 cpe: cpe:2.3:a:katz:infusionsoft_gravity_forms:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -68,4 +68,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ad4e37adc704a164c368897d8ea46b4a62ae5d41aba0a2d9ea1fdda2be77bd3802207f94cc02ec5f8b9b1f77c24e6060b55e7237351ce8e18bb249988f6d4ecfb525:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a06824964e42d5ef4b2e3c702afd602ef2e08c2420262e5c951fd5ed00f1abd0022027f4310e2ceb804297b67d84c33980d016868a34f5555ed17bb38c9719f29d8b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4539.yaml b/http/cves/2014/CVE-2014-4539.yaml index 3d9980fb45f..699fcfe6346 100644 --- a/http/cves/2014/CVE-2014-4539.yaml +++ b/http/cves/2014/CVE-2014-4539.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-4539 cwe-id: CWE-79 epss-score: 0.0161 - epss-percentile: 0.81302 + epss-percentile: 0.81315 cpe: cpe:2.3:a:movies_project:movies:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -63,4 +63,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402200a3eac71bc5a094b2c23cbb299ff04769805cd6a4da1cfb8bc0d93a9e578e59e02207a93cfa178b6cc64a8c0cf95c0cda833dc2b9a2e495fcba894fabadcba7285e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e118519b73edfb0c50a84cf22376cf5b5d6502e9a232ab6ac9ad0011643a6f0b022100d9714a381a10eb4bcc1be9b39494dbd8ffc910e1303aa8c18946c7ffbad6db85:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4544.yaml b/http/cves/2014/CVE-2014-4544.yaml index 2e3292059c5..065e434d823 100644 --- a/http/cves/2014/CVE-2014-4544.yaml +++ b/http/cves/2014/CVE-2014-4544.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-4544 cwe-id: CWE-79 epss-score: 0.02584 - epss-percentile: 0.8513 + epss-percentile: 0.85142 cpe: cpe:2.3:a:podcast_channels_project:podcast_channels:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200e9ff7690235bee6e6c3cb06706e54095e02b6ab14f1e21a107c6ff519ad7098022100e7df31044a71a1d3cd32e290985ca555a3b60953e8dc39b4b68ac04cf9ab1e79:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022067513cb8e98658a1e5f1b2f8ae834903346716a80a15fdefdf51c99697cf0c4b022020aca92e3c8c2b2f48b833b1f3274907749afbd3f237ff7081146440b42725bb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4550.yaml b/http/cves/2014/CVE-2014-4550.yaml index 44320211621..97549b71714 100644 --- a/http/cves/2014/CVE-2014-4550.yaml +++ b/http/cves/2014/CVE-2014-4550.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-4550 cwe-id: CWE-79 epss-score: 0.02712 - epss-percentile: 0.8546 + epss-percentile: 0.8547 cpe: cpe:2.3:a:visualshortcodes:ninja:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -60,4 +60,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ed9f8cf5eaa664ff93b75572656b73f59681f7e34ffaeb3097e17388313700f6022100f60309b06f88e7ea457c50b3aeb49654e11a2bc0120401f0b651d67546d87921:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c3504eabf285ac9c6237b15a086eba13fee1f3f3f6dc0cc61a7f6752b1df238b022040dca467ac143eec48390ded8be24d81ecfd40a59195c050933a9d5b3ea25d35:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4558.yaml b/http/cves/2014/CVE-2014-4558.yaml index 0225c1d2fe3..dec281f122b 100644 --- a/http/cves/2014/CVE-2014-4558.yaml +++ b/http/cves/2014/CVE-2014-4558.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-4558 cwe-id: CWE-79 epss-score: 0.04411 - epss-percentile: 0.88636 + epss-percentile: 0.88644 cpe: cpe:2.3:a:cybercompany:swipehq-payment-gateway-woocommerce:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -60,4 +60,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100fb8a6a8feeb3872e5976998f9e501a8e62d99f5517133f6fe25a34d14cfb8a03022100f59c3037ddfc11074f783ac41f423d97b2878bc6d5646c92540541a96602db3c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d7437ab0d9ed021de16d5be5246edc18ccdeaefa290f0d4195a5296e3ec01dd502205795465b4ac3724fc490c32cb3361256a7ebef55fb2e2b4d2487f5cb97baf0fd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4561.yaml b/http/cves/2014/CVE-2014-4561.yaml index c96b3b84c1b..3ac6b60d485 100644 --- a/http/cves/2014/CVE-2014-4561.yaml +++ b/http/cves/2014/CVE-2014-4561.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-4561 cwe-id: CWE-79 epss-score: 0.12801 - epss-percentile: 0.93769 + epss-percentile: 0.93771 cpe: cpe:2.3:a:ultimate-weather_project:ultimate-weather:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -63,4 +63,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ca3bda8ed0b2ea9eadb88f4133e1fae19b36c2f68e3d99f7fd5487c28b86bb51022100d2c5efa971ae472988c57851369e1c212eb6b4d11c5d07f50a59be75a897af94:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022044898803c976817bc048b93d5d603f17d9a2dd0100f7b6596a7ef625fb04e50b022100808e82df5d706cac059576ad54fcf8263bd0ff59b5f0047e611c2c35d30b2486:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4577.yaml b/http/cves/2014/CVE-2014-4577.yaml index 31660c8e52f..b3eeafa3eb5 100644 --- a/http/cves/2014/CVE-2014-4577.yaml +++ b/http/cves/2014/CVE-2014-4577.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-4577 cwe-id: CWE-22 epss-score: 0.06185 - epss-percentile: 0.90507 + epss-percentile: 0.90519 cpe: cpe:2.3:a:websupporter:wp_amasin_-_the_amazon_affiliate_shop:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -61,4 +61,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402205be0518de861ed93aff956bebf395fe739f2f1b566ce026ca31731fe94dd4cdd02202d81e15ad9e8d6956cc7ce4bcbf573692471678a98b3144c4d9fc8bb80025896:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220314bfd457ebe2cbd1a16159b20c989bf4c2edc157154cb527021bd314c7f746d02204892dd6add04527772567e69471629880f8d86b1d30e25aae326ffc12e5234db:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4592.yaml b/http/cves/2014/CVE-2014-4592.yaml index beedcfcd2a1..ade03d8589e 100644 --- a/http/cves/2014/CVE-2014-4592.yaml +++ b/http/cves/2014/CVE-2014-4592.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2014-4592 cwe-id: CWE-79 epss-score: 0.03802 - epss-percentile: 0.87722 + epss-percentile: 0.87732 cpe: cpe:2.3:a:czepol:wp-planet:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -60,4 +60,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220087ec9bca5c02c427c35f5866d008b44b09569c559e73f79301b047dcd32e3fe0221008aff960a23a91778037be127002c867e7081ef90a1a855efc98040a00b4161f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b6e02b60965fd01efdc109f196f1786fc2ec6dfb49f6275f78a01d4f046896af02203d3d99c32d3724cfa492c085d3f9c1c2d79841c2956d7a51ffbba78d2a60d9a1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4940.yaml b/http/cves/2014/CVE-2014-4940.yaml index a7a999264cd..fd3ae0b3c7c 100644 --- a/http/cves/2014/CVE-2014-4940.yaml +++ b/http/cves/2014/CVE-2014-4940.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-4940 cwe-id: CWE-22 epss-score: 0.57666 - epss-percentile: 0.98062 + epss-percentile: 0.98063 cpe: cpe:2.3:a:tera_charts_plugin_project:tera-charts:0.1:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402200e91587a1a1a846560db937e23b8501807d6906135b470f4fb04bb1897ab2fcd0220447848f595b2c5afde8d9dedd1b5b2279b5d74358093f20e422a7746308ab364:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100fbcb2e6777b8c48a632722f8431c23d1d1e07d479a1978b47da53dae87edf41e02204c15c640c61ced2c03bed4959c75fc1f1dc1942b9a0e0c582a5f088c2117a4dc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4941.yaml b/http/cves/2014/CVE-2014-4941.yaml index dc34a2f49eb..df4fd59da31 100644 --- a/http/cves/2014/CVE-2014-4941.yaml +++ b/http/cves/2014/CVE-2014-4941.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-4941 cwe-id: CWE-22 epss-score: 0.01851 - epss-percentile: 0.82519 + epss-percentile: 0.82533 cpe: cpe:2.3:a:cross-rss_plugin_project:wp-cross-rss:1.7:*:*:*:*:wordpress:*:* metadata: verified: true @@ -61,4 +61,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bbd63c304ff00ba8927220c4162e45d5a2e2c0cf2d9c867903cc28e2866534fd0220274dfb3097a087533b234f65ec9b229ed36ee66a6d1f73ac7f66846f7cf59d5a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008376f20bbe0449b3ac10590e033461e590405e5bb0f01ac03cdc31ea1781cfdd02210082a26b4747f75165d45f8245d5a91208aed1d57d3e3b25a0ebe75cd40c78e566:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4942.yaml b/http/cves/2014/CVE-2014-4942.yaml index 57328f50039..29f61011eb2 100644 --- a/http/cves/2014/CVE-2014-4942.yaml +++ b/http/cves/2014/CVE-2014-4942.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-4942 cwe-id: CWE-200 epss-score: 0.02447 - epss-percentile: 0.84744 + epss-percentile: 0.84758 cpe: cpe:2.3:a:levelfourdevelopment:wp-easycart:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -55,4 +55,4 @@ http: group: 1 regex: - '>PHP Version <\/td>