Merge branch 'main' into patch-70

This commit is contained in:
Muhammad Daffa
2026-01-17 13:40:53 +07:00
committed by GitHub
2658 changed files with 6251 additions and 5511 deletions

View File

@@ -10,17 +10,25 @@ http/cves/2023/CVE-2023-52163.yaml
http/cves/2024/CVE-2024-29137.yaml
http/cves/2024/CVE-2024-56159.yaml
http/cves/2025/CVE-2025-25570.yaml
http/cves/2025/CVE-2025-36845.yaml
http/cves/2025/CVE-2025-4210.yaml
http/cves/2025/CVE-2025-46349.yaml
http/cves/2025/CVE-2025-46549.yaml
http/cves/2025/CVE-2025-46550.yaml
http/cves/2025/CVE-2025-66472.yaml
http/cves/2026/CVE-2026-21858.yaml
http/cves/2026/CVE-2026-23550.yaml
http/default-logins/jhipster-default-login.yaml
http/exposed-panels/dagster-webserver-ui-exposure.yaml
http/exposed-panels/orbeon-forms-exposure.yaml
http/exposed-panels/sanity-studio-panel.yaml
http/exposures/apis/frigate-api-exposure.yaml
http/exposures/backups/batflat-sqlite-exposure.yaml
http/exposures/configs/netlify-headers-config-exposure.yaml
http/exposures/configs/selenium-grid-exposure.yaml
http/exposures/configs/zipkin-config-exposure.yaml
http/exposures/files/aspnet-launchsettings-exposure.yaml
http/exposures/files/aws-buildspec-exposure.yaml
http/exposures/files/gcloudignore-file.yaml
http/exposures/files/gitpod-dockerfile-exposure.yaml
http/exposures/files/joe-deadjoe-file-exposure.yaml
@@ -29,23 +37,31 @@ http/exposures/files/vscode-mcp-json.yaml
http/exposures/logs/cacti-log-exposure.yaml
http/exposures/logs/magento-debug-log-exposure.yaml
http/exposures/logs/opencart-error-log.yaml
http/exposures/logs/wp-wpstatistics-log.yaml
http/exposures/tokens/azure/azure-instrumentation-key-exposure.yaml
http/exposures/tokens/firebase-fcm-server-key-disclosure.yaml
http/misconfiguration/administrate-dashboard.yaml
http/misconfiguration/apache-spark-env.yaml
http/misconfiguration/cacti-fpd.yaml
http/misconfiguration/cakephp-debugkit-exposure.yaml
http/misconfiguration/exist-db-dashboard-access.yaml
http/misconfiguration/fortra-filecatalyst-anonymous-access.yaml
http/misconfiguration/google-calendar-exposure.yaml
http/misconfiguration/installer/fork-installer.yaml
http/misconfiguration/intermapper-exposure.yaml
http/misconfiguration/lightstreamer-dashboard-exposure.yaml
http/misconfiguration/mybb-full-path-disclosure.yaml
http/misconfiguration/ollama-improper-authorization.yaml
http/misconfiguration/seafile-public-registration.yaml
http/misconfiguration/stylelint-ignore-disclosure.yaml
http/misconfiguration/wordpress/wp-a3-lazy-load-top-fpd.yaml
http/misconfiguration/wordpress/wp-add-search-to-menu-fpd.yaml
http/misconfiguration/wordpress/wp-advanced-iframe-fpd.yaml
http/misconfiguration/wordpress/wp-advanced-responsive-video-embedder-fpd.yaml
http/misconfiguration/wordpress/wp-ajax-load-more-anything-fpd.yaml
http/misconfiguration/wordpress/wp-ajax-search-lite-fpd.yaml
http/misconfiguration/wordpress/wp-call-now-button-fpd.yaml
http/misconfiguration/wordpress/wp-cf7-data-source-fpd.yaml
http/misconfiguration/wordpress/wp-duplicate-page-fpd.yaml
http/misconfiguration/wordpress/wp-hostinger-fpd.yaml
http/misconfiguration/wordpress/wp-really-simple-captcha-fpd.yaml
@@ -53,6 +69,7 @@ http/misconfiguration/wordpress/wp-updraftplus-fpd.yaml
http/misconfiguration/wordpress/wp-w3-total-cache-fpd.yaml
http/misconfiguration/wordpress/wp-wpforms-lite-fpd.yaml
http/misconfiguration/wordpress/wp-wpfront-scroll-top-fpd.yaml
http/misconfiguration/wp-gravity-forms-log-disclosure.yaml
http/technologies/hotjar-rum-detect.yaml
http/technologies/matomo-rum-detect.yaml
http/technologies/openreplay-rum-detect.yaml

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2019-14287
cwe-id: CWE-755
epss-score: 0.86126
epss-percentile: 0.9937
epss-percentile: 0.99372
cpe: cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
metadata:
verified: true

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2023-49105
cwe-id: CWE-287
epss-score: 0.89605
epss-percentile: 0.99534
epss-percentile: 0.99536
cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
metadata:
max-request: 2

View File

@@ -21,8 +21,8 @@ info:
cvss-score: 7.8
cve-id: CVE-2023-4911
cwe-id: CWE-787,CWE-122
epss-score: 0.69791
epss-percentile: 0.98608
epss-score: 0.73037
epss-percentile: 0.98736
cpe: cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -43,4 +43,4 @@ code:
- type: word
words:
- "139" # Segmentation Fault Exit Code
# digest: 4a0a004730450220692d91239d4d8d90398523ed32a09e20eaadb1a26b3c8b627c23f324ea17238b022100c283b35e540a3c1071d51c5d39983e4d97c63cf6549f73fee8e056fbf64d0faf:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100baf2d3801842e69be56a927b2e4004485330390c1843cc5fc442820322a4657f022100e085081466a761e5dd5f7c85ec14779a3b236c16b19d48802007d3e001515a5a:922c64590222798bb761d5b6d8e72950

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2023-6246
cwe-id: CWE-787,CWE-122
epss-score: 0.24316
epss-percentile: 0.95911
epss-percentile: 0.95913
cpe: cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -18,7 +18,7 @@ info:
cve-id: CVE-2024-10443
cwe-id: CWE-77
epss-score: 0.70846
epss-percentile: 0.98649
epss-percentile: 0.9865
cpe: cpe:2.3:a:synology:photos:*:*:*:*:*:diskstation_manager:*:*
metadata:
verified: true

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2024-3094
cwe-id: CWE-506
epss-score: 0.85995
epss-percentile: 0.99363
epss-percentile: 0.99365
cpe: cpe:2.3:a:tukaani:xz:5.6.0:*:*:*:*:*:*:*
metadata:
verified: true

View File

@@ -15,7 +15,7 @@ info:
cvss-score: 7.5
cve-id: CVE-2024-4340
epss-score: 0.17039
epss-percentile: 0.94765
epss-percentile: 0.94768
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2024-4340
tags: cve,cve2024,py,code,dos,python,sqlparse,vuln

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2024-45409
cwe-id: CWE-347
epss-score: 0.4139
epss-percentile: 0.97279
epss-percentile: 0.97282
metadata:
verified: true
shodan-query: http.title:"GitLab"

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2024-56331
cwe-id: CWE-22
epss-score: 0.41406
epss-percentile: 0.97281
epss-percentile: 0.97283
metadata:
verified: true
shodan-query: http.title:"Uptime Kuma"

View File

@@ -15,7 +15,7 @@ info:
- https://github.com/advisories/GHSA-g83h-4727-5rpv
classification:
epss-score: 0.55491
epss-percentile: 0.97986
epss-percentile: 0.97989
metadata:
verified: true
shodan-query: title:"GitHub Enterprise"
@@ -192,4 +192,4 @@ http:
- type: kval
kval:
- user_session
# digest: 4a0a00473045022100c9a879a1a167eb3a1ea51a072419dceb330da8ff1b29e5e3a27c7e1604beb55002201f6fde90532e3c1af85ecd3bf2aae5bea3e15a9e01d41ff355942faee2992a9a:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402205d400cf5bfb43bc9f34e14e3a8fce693ecd189b2c6e3e9e4b718cbb423972fac02205baca2706db158f33ded9342003c2d8f61e8f84a00d68ffd8b601c28435ec5d2:922c64590222798bb761d5b6d8e72950

View File

@@ -16,7 +16,7 @@ info:
- https://towerofhanoi.it/writeups/cve-2025-1550/
classification:
epss-score: 0.04785
epss-percentile: 0.89146
epss-percentile: 0.89152
metadata:
max-request: 1
tags: cve,cve2025,code,keras,rce,ml

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2025-22457
cwe-id: CWE-121,CWE-787
epss-score: 0.49132
epss-percentile: 0.97677
epss-percentile: 0.97681
cpe: cpe:2.3:a:ivanti:connect_secure:*:-:*:*:*:*:*:*
metadata:
vendor: ivanti

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2025-25291
cwe-id: CWE-347
epss-score: 0.13848
epss-percentile: 0.94082
epss-percentile: 0.94087
metadata:
verified: true
vendor: gitlab
@@ -80,4 +80,4 @@ http:
- type: kval
kval:
- _gitlab_session
# digest: 4a0a00473045022100da7671ed91ea1bc5fb04f262e95116df31243319410921fd226fac65e5965a2002207dae994b259b2e7632380ef6472614f8f2b871f6b87c2a973145ae0b7fa4d82f:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220731b72642f14f7def4d2b37291c7399aa3decc0b0a71f0c40e6599c31b3c3b850220199b904505c1dffc7f88259574b72b88d828fb66d374520ed0161e096c68a7b7:922c64590222798bb761d5b6d8e72950

View File

@@ -23,7 +23,7 @@ info:
cve-id: CVE-2025-32433
cwe-id: CWE-306
epss-score: 0.43921
epss-percentile: 0.97417
epss-percentile: 0.97419
metadata:
verified: true
max-request: 1

View File

@@ -18,7 +18,7 @@ info:
cvss-score: 9.8
cve-id: CVE-2025-54309
epss-score: 0.63875
epss-percentile: 0.98357
epss-percentile: 0.98361
cwe-id: CWE-287,CWE-362
cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*
metadata:
@@ -200,4 +200,4 @@ code:
- type: word
words:
- "VULNERABLE:"
# digest: 4b0a00483046022100eb3f5959125a305830d65c6bf563bec0c2bc81e14ab8a9181f74a3f679fbb5f9022100ec7ca9512961e8e0171d8326e2fe46cf1f33784f2674ecdecd0961b84110bc60:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100c1074d46c2bb8856ffcf46fd38f10ad7b860f624070dd8ec5d1ec16705b8178e022027e276bd32549768c8c42f74669fc9cd71fadc38cf7071720d7a2ccbcc762b8c:922c64590222798bb761d5b6d8e72950

View File

@@ -16,7 +16,7 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2025-6216
classification:
epss-score: 0.33256
epss-percentile: 0.96767
epss-percentile: 0.96769
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2025-6216

View File

@@ -18,7 +18,7 @@ info:
cvss-score: 9.8
cve-id: CVE-2025-68926
epss-score: 0.03135
epss-percentile: 0.8648
epss-percentile: 0.86483
cwe-id: CWE-798
metadata:
verified: true

View File

@@ -19,7 +19,7 @@ info:
cve-id: CVE-2025-9242
cwe-id: CWE-787,CWE-362
epss-score: 0.73453
epss-percentile: 0.98758
epss-percentile: 0.98757
cpe: cpe:2.3:a:watchguard:fireware_os:*:*:*:*:*:*:*
metadata:
verified: true

View File

@@ -3622,6 +3622,7 @@
{"ID":"CVE-2025-64446","Info":{"Name":"FortiWeb - Authentication Bypass","Severity":"critical","Description":"A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2025/CVE-2025-64446.yaml"}
{"ID":"CVE-2025-64525","Info":{"Name":"Astro - Broken Access Control","Severity":"medium","Description":"Astro 2.16.0 to 5.15.5 contains a broken access control caused by insecure use of unsanitized x-forwarded-proto and x-forwarded-port headers in URL building, letting attackers bypass middleware protection, cause DoS, SSRF, and URL pollution, exploit requires crafted headers.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2025/CVE-2025-64525.yaml"}
{"ID":"CVE-2025-64764","Info":{"Name":"Astro - Reflected XSS via server islands feature","Severity":"high","Description":"Astro 5.15.8 contains a reflected XSS caused by improper handling of server islands feature, letting remote attackers execute scripts, exploit requires use of server islands in the application.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2025/CVE-2025-64764.yaml"}
{"ID":"CVE-2025-66472","Info":{"Name":"XWiki DeleteApplication - Cross-Site Scripting","Severity":"medium","Description":"XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Versions 6.2-milestone-1 through 16.10.9 and 17.0.0-rc-1 through 17.4.1 of both XWiki Platform Flamingo Skin Resources and XWiki Platform Web Templates are vulnerable to a reflected XSS attack through a deletion confirmation message. The attacker-supplied script is executed when the victim clicks the \"No\" button. This issue is fixed in versions 16.10.10 and 17.4.2 of both XWiki Platform Flamingo Skin Resources and XWiki Platform Web Templates.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2025/CVE-2025-66472.yaml"}
{"ID":"CVE-2025-6851","Info":{"Name":"WordPress Broken Link Notifier \u003c 1.3.1 - Unauthenticated SSRF","Severity":"high","Description":"The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.0 via the ajax_blinks() function which ultimately calls the check_url_status_code() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2025/CVE-2025-6851.yaml"}
{"ID":"CVE-2025-68613","Info":{"Name":"n8n - Remote Code Execution via Expression Injection","Severity":"critical","Description":"n8n \u003c 1.120.4, 1.121.1, 1.122.0 contains a remote code execution caused by insufficient isolation in workflow expression evaluation, letting authenticated attackers execute arbitrary code with n8n process privileges. Exploit requires authentication.\n","Classification":{"CVSSScore":"9.9"}},"file_path":"http/cves/2025/CVE-2025-68613.yaml"}
{"ID":"CVE-2025-68645","Info":{"Name":"Zimbra Collaboration - Local File Inclusion","Severity":"high","Description":"Zimbra Collaboration (ZCS) 10.0 and 10.1 contain a local file inclusion caused by improper handling of user-supplied parameters in the RestFilter servlet, letting unauthenticated remote attackers include arbitrary files from WebRoot, exploit requires crafted requests to /h/rest endpoint.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2025/CVE-2025-68645.yaml"}

View File

@@ -1 +1 @@
09fab5713c727e1a137ace7ed1682cb6
0a432d30d60b1299fbab000960c32732

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2021-35042
cwe-id: CWE-89
epss-score: 0.35237
epss-percentile: 0.96903
epss-percentile: 0.96907
metadata:
verified: true
fofa-query: body="ProgrammingError" && body="ORDER BY"
@@ -65,4 +65,4 @@ http:
- 'FROM\s+`([a-zA-Z_][a-zA-Z0-9_]*)`'
- 'relation\s+([a-zA-Z_][a-zA-Z0-9_]*)'
- "Table\\s+'[^']*\\.([a-zA-Z_][a-zA-Z0-9_]*)'"
# digest: 490a004630440220781966c6bb2d374e0cfac62875f9c135d90e57506dc8e7c9fbc3a276b04965df02202b2160f1e1c22b03456a8a6845af95bc087859eaa77576dbec8aab5ebcaaaddb:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100e1ff802b08b8a31a2a321eb6b237c4c491f0bdc14873c76b6d16ac56beba011702200c7ac55b3b5ebe1126374038641490a773fdbe83960111781c9c7ba6fb7ba71c:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2022-34265
cwe-id: CWE-89
epss-score: 0.92734
epss-percentile: 0.99739
epss-percentile: 0.99741
tags: sqli,dast,vulhub,cve,cve2022,django,vuln
variables:
@@ -50,4 +50,4 @@ http:
- type: status
status:
- 500
# digest: 4b0a00483046022100aac9d15a26ed5537c5ce00e5d29081ade5bdaefc407c4f13406bff5fce9c610002210092f166b95b14979edb9de2aa8e7c0874d98b8032888f33e8fdc948acf319392f:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402206a08ac3b243f677656d99fcf962e7857a6663ff730ce182b9d5520d664817d8d02201aca3b491a00b1bafb948ce458b7840af40d2af7730008571911e4ee153b48ee:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2022-42889
cwe-id: CWE-94
epss-score: 0.94161
epss-percentile: 0.99911
epss-percentile: 0.9991
metadata:
max-request: 1
confidence: tenative

View File

@@ -19,7 +19,7 @@ info:
cve-id: CVE-2024-2961
cwe-id: CWE-787
epss-score: 0.9286
epss-percentile: 0.99755
epss-percentile: 0.99757
tags: cve,cve2024,php,iconv,glibc,lfr,rce,dast,vkev,vuln
flow: http(1) && http(2)
@@ -57,4 +57,4 @@ http:
- type: regex
regex:
- "root:x:0:0"
# digest: 4a0a0047304502202b290a44cf4a61f704d038aa333eafb504adfdc4a4e55b34d8d9e8b4aeca6ffe02210085ec2d53cbc22b34132c9043e1610e25b64ffa66772292ebdfe73d24a12db186:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022046a24b85835296f4e0345e7a56ea602c2b9cd3279c283d187e284dd468303a83022100de28910d79abe32db5feecf410c523e4e1567df56de364b85f1d411a164b9db0:922c64590222798bb761d5b6d8e72950

View File

@@ -15,13 +15,21 @@ http:
- pre-condition:
- type: dsl
dsl:
- 'method == "POST"'
- 'method == "GET"'
condition: or
payloads:
reflection:
- "'\"><{{first}}>"
fuzzing:
- part: body
type: postfix
mode: single
fuzz:
- "{{url_encode(reflection)}}"
- part: query
type: postfix
mode: single
@@ -47,4 +55,4 @@ http:
part: content_type
words:
- "text/html"
# digest: 490a00463044022030f20275349609941dc22dc277024f1a68a1e0e01a361d80ec923d1ad1f838ea02202ba948e17d033abf38602d49193da8e3f7b801dde81371e9377af43c6002828a:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502201f71f4b45c2da5dee0ab62eb4154bc61e208d3d7c0809dd5a80d040b0f10392c022100b9431765649131e7908db1de1bf6012edf733a1422e0508b822cdc47244e6e76:922c64590222798bb761d5b6d8e72950

View File

@@ -22,4 +22,4 @@ file:
- 'InvalidOperationException'
- 'UnauthorizedAccessException'
- 'NotFound'
# digest: 4a0a0047304502205c69caf3a54cf5dde4b873746259bb936ce8a78abf9b8f97acd075c498022b1a022100f5fb8101bb9106e9b8fa8874faee0f478873b3349d1607d81a83fa6f47716399:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220406f2e2b833fffd9ed4257c6cee1bc103ab98fd3b3f81b49f5944fe2a7a10e60022100ff127bf58e9528a33bbccb956c4a847540da8e3c647484d14e5011241322063f:922c64590222798bb761d5b6d8e72950

View File

@@ -30,4 +30,4 @@ file:
- 'BadRequestError'
- 'MongoError'
- 'SequelizeDatabaseError'
# digest: 490a00463044022052c9b4bf0e4a707ac455ffe442a60c792b5bd48e0896165262e4184708bed8da022002211df5d5221d3ec56a526454a5585a1db704339463964589056885118aca14:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100de0c6f376dabb045c8fa1a19142ec274c1ea4e4f3abac673b2abeb7d7ce883b502205b32aa39e1b49856e605e9aa2b5a4d84958670ce3019ac65eec16060f571ad39:922c64590222798bb761d5b6d8e72950

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2018-25031
cwe-id: CWE-20
epss-score: 0.83676
epss-percentile: 0.9926
epss-percentile: 0.99262
cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:*
metadata:
verified: true

View File

@@ -21,8 +21,8 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-29455
cwe-id: CWE-79
epss-score: 0.48769
epss-percentile: 0.9766
epss-score: 0.52986
epss-percentile: 0.97862
cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
@@ -52,4 +52,4 @@ headless:
words:
- "elementor"
case-insensitive: true
# digest: 4a0a00473045022100acc631b36c0b4f6ea2aa9ddeeffc1ebdf48677fa442443b88e66ef5bf1f8e49702206c5dfd0b03468f189a4187161bfa0c4ef2a795c7e0644fb38fd65cca9dfdae87:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100d020e9c2dbc2ca9684e6689cfba7d4332d326a63c0f64478b21e714987b6068c022058e51ae1ac1c19584c99d8336c2002d0bca093790bd3f64da258185c5d7548da:922c64590222798bb761d5b6d8e72950

View File

@@ -19,7 +19,7 @@ info:
cve-id: CVE-2024-29882
cwe-id: CWE-79
epss-score: 0.07333
epss-percentile: 0.91422
epss-percentile: 0.9143
metadata:
verified: true
max-request: 1
@@ -50,4 +50,4 @@ headless:
- "ConnectSRS</a>"
condition: or
case-insensitive: true
# digest: 4b0a00483046022100b9d00271dbdb45c40709afe3375e37facd87134a648f1f5c5c3269a87649839d022100d458d9d9031bc151e9377fe603d4003a983588698488bea2a23f166def5f62a6:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220608110e5e2ff7cf9fbf7cff17aadc240bb897260e3212b675314740e7c9e6c9d022012c9185262f360f060a4304e5a42ef61db99489fba522813f5a60eb72c366611:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cvss-score: 7.2
cve-id: CVE-2024-38526
epss-score: 0.82064
epss-percentile: 0.99171
epss-percentile: 0.99172
tags: cve,cve2024,supply-chain,polyfill,vkev,vuln
headless:
- steps:

View File

@@ -16,7 +16,7 @@ info:
- https://github.com/Sachinart/essential-addons-for-elementor-xss-poc/blob/main/poc.py
classification:
epss-score: 0.03042
epss-percentile: 0.86271
epss-percentile: 0.86276
metadata:
verified: true
max-request: 1

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2025-25062
cwe-id: CWE-79
epss-score: 0.34064
epss-percentile: 0.96834
epss-percentile: 0.96838
cpe: cpe:2.3:a:backdropcms:backdrop:*:*:*:*:*:*:*:*
metadata:
max-request: 7
@@ -190,4 +190,4 @@ headless:
dsl:
- reflected_text_xss_type
- reflected_text_xss_message
# digest: 4a0a00473045022049368eac638d19d2d1c4f3378269763002ad58cb5a179405270e862d1937fbc1022100edd5425b0200b063a118b9560c4884c23a8070507910d27c2b6e1fae9c50fa68:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100e4841c318ca11e12f9cc9c4001293d50b360ead490ec56c95382836205c40b50022100a1f6c79e841b119c0ba5b0b7b221ac43bd2b4a41a82c88c9293e24378d76d7c3:922c64590222798bb761d5b6d8e72950

View File

@@ -19,7 +19,7 @@ info:
cve-id: CVE-2025-8191
cwe-id: CWE-79
epss-score: 0.01065
epss-percentile: 0.77218
epss-percentile: 0.7723
cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:*
metadata:
verified: true
@@ -69,4 +69,4 @@ headless:
words:
- "swagger"
case-insensitive: true
# digest: 4b0a00483046022100c1efc08c65cf7dd58a535a0c088a660260d248a0e00f844ff434016fc05931f40221008ebe729562cd61dc0f213ad58ef6e612ceac60cc5a4816385bdcee00bd5dbf00:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502205b9b439cd2f665801b812b1f210c8202585916d74342f11dc24df39c1c5084ea022100f878c8f4478cc5175daa178268af02750bd52ff3f994aab1919e26bb3e2be644:922c64590222798bb761d5b6d8e72950

View File

@@ -19,7 +19,7 @@ info:
cvss-score: 5.3
cve-id: CVE-2000-0114
epss-score: 0.05458
epss-percentile: 0.89904
epss-percentile: 0.89911
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -62,4 +62,4 @@ http:
group: 1
regex:
- 'version:([0-9.]+)'
# digest: 4a0a00473045022100c9b6b0b86c2c2395fc95039ef61c619fe3848a8ac438e22a463547f674a0b8de022031e69c37326e623e928483b1e786c1b31c1b71e64070503e6ef5183f66a0c633:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100a078db8e49a4a912e96c7568bba05c195bae1ba071a99476f3be995d551571c5022100c86111c77155e991c03ad9b807a351a76dee28807b0ee28c38f2a95f6e59d3a2:922c64590222798bb761d5b6d8e72950

View File

@@ -18,7 +18,7 @@ info:
cvss-score: 6.4
cve-id: CVE-2000-0760
epss-score: 0.38569
epss-percentile: 0.97113
epss-percentile: 0.97117
cpe: cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
metadata:
verified: true

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2002-1131
cwe-id: CWE-80
epss-score: 0.03877
epss-percentile: 0.87895
epss-percentile: 0.87902
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
metadata:
max-request: 5
@@ -60,4 +60,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100c587232957ba736c22af222707911d24f6b53fc8acd21123de14bfb0dea5f9ce02203d8a42efb1ce30144ad46d0dd6384103bdc7d66a2d141ea91fed8eacf7c30424:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100a703444a05f97dd58268cbd900d5819c11697eb39eae613c66feff4b8f2a48ed022100cb116cbabcfbe70231b10467f183b86dd19a8f386c2d591afd392404ccecb590:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2004-0519
cwe-id: NVD-CWE-Other
epss-score: 0.00124
epss-percentile: 0.32345
epss-percentile: 0.32364
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -48,4 +48,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100a0e3f30eaa7b0379b888c86b4f96da42da8e3dbb65e9cfcc6421e8ea3b48a7d402201f442d977342c5210892a1e45f37ebcbe40f9dcbbf77718eaf7e7dd7169516b9:922c64590222798bb761d5b6d8e72950
# digest: 4b0a004830460221009f9151852769efd9fdeafa594f548ae89097f70475423eb5e7c033e288a66739022100ada6169ae0b5beac00331724823f67dfdf715e898955308ced6f7742f1562e03:922c64590222798bb761d5b6d8e72950

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2004-1965
cwe-id: NVD-CWE-Other
epss-score: 0.00265
epss-percentile: 0.49731
epss-percentile: 0.49755
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -40,4 +40,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
# digest: 4a0a0047304502203c1c76a6abaf4a771d582390dfc5c43867ede5e60b63377f9b6c941fcb6945e50221008986217f5ef2563c6a3fca4e25b4bcc8046b91441f586cad8d6a3455729af089:922c64590222798bb761d5b6d8e72950
# digest: 4b0a004830460221008aac95d85ba9c69ba56bd48fda6963e515a2378796783b8c2368bbb4b225787802210092e10e0ebc980be8ec03b3f063b76d6663bd601306a701656dbc932cb649c831:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2005-2428
cwe-id: CWE-200
epss-score: 0.08605
epss-percentile: 0.92157
epss-percentile: 0.92162
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -44,4 +44,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100f4b5b08ab3d847d6541097b5e22436b548ee6adcdc46ec67992896df0b3276aa022100dab4809a80136dd992cf6d013ae2ea73be737782e2ec67d2b88909de17281066:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402206f52aeaf9058601460db35895d6bc45f6216ae3350fd0ec72135b93ddb339ce502205ca0f2489620783fcc4c5b3fc7a88ebc0bf15f4fbedd7418392979f3527abd68:922c64590222798bb761d5b6d8e72950

View File

@@ -17,7 +17,7 @@ info:
cvss-score: 5.4
cve-id: CVE-2005-3128
epss-score: 0.01733
epss-percentile: 0.82007
epss-percentile: 0.82015
cwe-id: CWE-80
metadata:
max-request: 1
@@ -44,4 +44,4 @@ http:
part: header
words:
- "text/html"
# digest: 490a0046304402207c23342bcb70df1c51ff4a05bb23ea59e1046b25bd9a897161afe1bdb530087002205b61118a90d386ae84b130483e5e4f08fe2aca44775054ee5faae86a6c93578c:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220402c22fe164ab65fab70372fcb4408ae6a230c11da226494260131c12de7259d02204b76125e964e231536a881c679b7e7632031ebb0aacf44f2f88072c97850cede:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2005-3344
cwe-id: NVD-CWE-Other
epss-score: 0.1015
epss-percentile: 0.92881
epss-percentile: 0.92886
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
metadata:
max-request: 2

View File

@@ -23,7 +23,7 @@ info:
cve-id: CVE-2005-3634
cwe-id: NVD-CWE-Other
epss-score: 0.01653
epss-percentile: 0.81588
epss-percentile: 0.81598
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2005-4385
cwe-id: NVD-CWE-Other
epss-score: 0.00373
epss-percentile: 0.58456
epss-percentile: 0.58484
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -43,4 +43,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022072c220ff7c8d1e6603c2e07f3bdc506d5ab4f60eb8a7c12f1ad8884fa9d0a477022100ffe3cf16fcf318b2496d693c148e0fcf9667d724bad875e409830f414f5e096e:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100bb2aaba9d78a3a8aec54109a935de6b1c5962af6e7e03dac3302627199350ba5022100f56e2fb34213e5c965154503485db9702a8aa4a3249cb49cbf3dfdf3905f3eab:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2006-1681
cwe-id: NVD-CWE-Other
epss-score: 0.00299
epss-percentile: 0.52812
epss-percentile: 0.52835
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -62,4 +62,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100e72d79302e1f8fe4e86d254b8cfe644de5eae03acfaac88e268cd91961caa8f5022029fb0d6aebc65ef11ef8eb2475a2372b29d66b2f6530731aa3e27c57ef037798:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450221008fe19c8d330983b2c33595bc6c78533b5fb42fdefed795e4189199c6898560b40220584e805d3b2a50e2fe060c0c09f48fdb066c7e1da210375e4e65c3251500c928:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2006-2842
cwe-id: CWE-22
epss-score: 0.0094
epss-percentile: 0.75736
epss-percentile: 0.75754
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -48,4 +48,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100eea00f78da1901595a2d5e7bfb629f987f584de7c1927ef1e1af12f1f072149b022100ecc787b78ea10d0fe57392e763c1e251b1ea0c72b0d2ac64eaf260f79c37b5ef:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100da99faeddb072593d9ba9c38a5faef8d5e6d1514947654bfdd214537fff98b76022033779721a15a1fb69ce290e9c41ee4b874f341f58d7b0814bd4ba8cc14efb89f:922c64590222798bb761d5b6d8e72950

View File

@@ -18,8 +18,8 @@ info:
cvss-score: 6.8
cve-id: CVE-2007-0885
cwe-id: NVD-CWE-Other
epss-score: 0.02133
epss-percentile: 0.83728
epss-score: 0.03471
epss-percentile: 0.87206
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -46,4 +46,4 @@ http:
- type: status
status:
- 200
# digest: 490a004630440220553d5ca9be0f85cbb89479b707b4321ee21e2a82cd81788c1530e8ded1d8252d022048e469b3d7655cc9a936ccecda6c3c9991fe69c52cddf838b23e363f8aaf508d:922c64590222798bb761d5b6d8e72950
# digest: 4b0a004830460221009bf757aa56e387060b8df54b0875af6dd06619191252c7799b0a23bcaa3a82f50221009a0069809a9de864addc5f7653cf2eac812486fb1f9318f53ef8b72adf580a42:922c64590222798bb761d5b6d8e72950

View File

@@ -17,8 +17,8 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
epss-score: 0.80643
epss-percentile: 0.99095
epss-score: 0.7477
epss-percentile: 0.98816
metadata:
max-request: 1
verified: true

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2007-4504
cwe-id: CWE-22
epss-score: 0.00177
epss-percentile: 0.39567
epss-percentile: 0.39581
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -42,4 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100c32bd9db6c20e381abf2a5cdc552988a16f113960585843149aaccaf8b6611ed022033595a0706122d75b899010a8e4c7738eb184a1fa42a1269e431b83929136e69:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220096b7d4ae7578c7a5432f329cc37d4539082471521a0cf16450ae2eb2c7f578a0220580e18af67e6135e27a45a2614d8d66b32c0ed9254afc40fc29809d68f3edc85:922c64590222798bb761d5b6d8e72950

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2007-4556
cwe-id: NVD-CWE-Other
epss-score: 0.02359
epss-percentile: 0.84502
epss-percentile: 0.84508
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -51,4 +51,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100e980a93cb33e8469be938118930fba62f8d9e23df7e38764e2397351532c4f1702207d9fa10ef4668e8342a36be7592016497f3bde7a58e884d2ae37d49663351ea2:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402200433958fc9d91b2bf2fa74fb9684df32032ea1eebc64dc42812ad7457f6aa9770220010bd088a6b8e8c7d0e27b98422f92f9a385d68411052eebce19c0259967f05f:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2007-5728
cwe-id: CWE-79
epss-score: 0.00523
epss-percentile: 0.66319
epss-percentile: 0.66338
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -57,4 +57,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100b81f80c6672b7bbfa90bda0cdf80c7809761ee600275fe7e708db3e172baf8d202207d1fedabfc203078727ea415f58eeefb6662dfbed91889205cac22bd46442325:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502206eebec630da2b41fd8bfd9c45b73ceeb02e566344fbfd75169ce9f9a5bbb76e7022100c1d3c32e4e9e11604b4b9b3df01e2a08000a19567bbd6ec9b332b98cb1e2af65:922c64590222798bb761d5b6d8e72950

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-1059
cwe-id: CWE-94
epss-score: 0.00265
epss-percentile: 0.4976
epss-percentile: 0.49783
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -47,4 +47,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402207d384b1a1e017321a1621c0a61d77d816c4ac04aa197f94ca684ed9a96fc5b57022033057d1458bc7ce7bd42e9584094a5f1f412df7113de7286dc0840ed61cfb111:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100d94a0e9211d724fb7a82f513fe1e1fcd34879f3a225a336b0bce6a0642e880b202210095652a505722920bb3463527aa0ed77d1682ef71d2e6836dce6a10f3894165be:922c64590222798bb761d5b6d8e72950

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-1061
cwe-id: CWE-79
epss-score: 0.00158
epss-percentile: 0.37152
epss-percentile: 0.37162
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata:
max-request: 2
@@ -62,4 +62,4 @@ http:
- type: status
status:
- 200
# digest: 490a00463044022003d4cf5635a9a027316ae0d2850aa43d1f9e2bdda1d8c9e6f0dd2f337413f181022017e883735467cc0427e59398644dff4b44df7a54fa51dce1e9b3178dcee88ff8:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450221009c3aeedc4a4186a68162f57a9f9831e26ce2cd5d6d998a4e31d91e0c950aef4902204c62fa289e561f728c0c1596c54b4349717dd75534fda9b6be27a27eb2e479b0:922c64590222798bb761d5b6d8e72950

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-1547
cwe-id: CWE-601
epss-score: 0.6311
epss-percentile: 0.98324
epss-percentile: 0.98328
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
metadata:
max-request: 2
@@ -51,4 +51,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 490a00463044022017659545850ff5a8fa99bc39db31c0b7c7f14e903b98d55f6c0fb44abdf72dc802206fce84039928af750d8cd546b2e1b872a0cfb74b95c6fa671dd70c665aa52208:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022079c97fd3887e39db44faf6c5b379f9f7ef2cac3fade7ef62bd62a21c761dd1e9022100c7066d14fd9198db2951e033ce5abeeb5504ace74bfbe4de0187eee1c267376d:922c64590222798bb761d5b6d8e72950

View File

@@ -19,7 +19,7 @@ info:
cve-id: CVE-2008-2398
cwe-id: CWE-79
epss-score: 0.00437
epss-percentile: 0.62521
epss-percentile: 0.62559
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -47,4 +47,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100e6c6d3b1980342829b86e0ad78341beb7c66bd0f2af977a54fdc33333e3cca3002201c15ab13c9fd39838f052b5be785f1a5faa5ae20787ef1568657199737c7506b:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502210091828eea5006919e172ed0ee6682ffb9cae414016f397b2cb8d2cf820cc39bd0022070b84698af0c813529320c80b8907f97fc350d1ded77b64bff866d6ab1f871ec:922c64590222798bb761d5b6d8e72950

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-2650
cwe-id: CWE-22
epss-score: 0.01643
epss-percentile: 0.81524
epss-percentile: 0.81532
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2008-4668
cwe-id: CWE-22
epss-score: 0.00144
epss-percentile: 0.35202
epss-percentile: 0.35209
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -43,4 +43,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100d199b33630ce7aa1d1346972d5c79e3453cb3152602fa428b42d321fbc6ab7c002202ce47a32877cc0129b24dd93fd4efaafe6e961d8493c31be3cf1564b86dfb358:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100b16880d5816f52cbc17ee7ff07f255ce9817067b6e9dc0095b1690effe9140ae022100877eaa566d77eb744a1b0748796d979ea84a902bb8ec37850515b4606942f91c:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-4764
cwe-id: CWE-22
epss-score: 0.01041
epss-percentile: 0.76973
epss-percentile: 0.76988
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
metadata:
max-request: 1
@@ -42,4 +42,4 @@ http:
- type: status
status:
- 200
# digest: 490a004630440220087c916956feb645b6ef37bce82aaac779e49fe6251ae6dc6af18b8ac457c7b502205110487d3b59ddc51cc6fd1b99134f90b25370bc5866252cb5ef2a1f9bfe46b3:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502202ef82d301ff93bd35f30f9f3256901fa7c721f6613cd2020196d3c9d477d88a60221009627d2ba76f8f1809a1d374fa0222bf1e88c20a1c8f4a1ff4b413c5ec242e12d:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2008-5587
cwe-id: CWE-22
epss-score: 0.01986
epss-percentile: 0.83165
epss-percentile: 0.83171
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -49,4 +49,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100cee8f2be5165f3508b2d928e08399f5d7e681b2ccb4fc4d46f3ef0511652f970022100fd373c58ea868bd78a82ab21250c9a898f2713f73993dbe0ff33340cda636a12:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100c99da7f29b3c7a3f4599c0c98b9290a34b811653fe91822890eba193913577c7022075787dc21aa2363f61fcaebeab01c622f07e8aa8a9f977b67888cfa18c3c0155:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-6080
cwe-id: CWE-22
epss-score: 0.06734
epss-percentile: 0.91007
epss-percentile: 0.91012
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-6172
cwe-id: CWE-22
epss-score: 0.05386
epss-percentile: 0.89825
epss-percentile: 0.89833
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -42,4 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450221008bc7319e6f5ace106050e2c83c63d90f65da2359829f29042fefc62f12534a5502204b3548f993646ba37f628dfda8e70d166f00ac36fc532683be7a61f2a899107f:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100d16c4b01c59ac287e3d914a1475cc5d47260ae48eccea851bcc3d51da600a01b022018d9bfcb09e4375c2cf3e493d31d08fbbd148a980fe18aa3c50536fd74f15533:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-6222
cwe-id: CWE-22
epss-score: 0.03072
epss-percentile: 0.86349
epss-percentile: 0.86353
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-6465
cwe-id: CWE-79
epss-score: 0.01157
epss-percentile: 0.78108
epss-percentile: 0.78119
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
metadata:
verified: true
@@ -63,4 +63,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402204f1313c0d0fc02b2b88e65e2205c59a7019f3985506008836db96c2bf101b49302201d1f7bcc769a5c4a320ca4a8302595d43a70bada655ae5d58e7af609bf58a156:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402201080cda9056b737075031259cecfb0961b7a384b5151969864552ea5b1455fdb02201506136632676b1268b5bf56cba84d63a1e7dd3d9faca6dc6055e74147d46424:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2008-6668
cwe-id: CWE-22
epss-score: 0.00573
epss-percentile: 0.68066
epss-percentile: 0.68087
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
metadata:
max-request: 2
@@ -45,4 +45,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022073a82abc162090280a1a6a64f2a459afbf2a0f4a91fcd9393b9fe83275971f610221009953c93df658c540e504fa9865b794592aee58e0e824002771a91ced6f284357:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220521a99b3bc20c51d61d64e00b5dc0cda553fc6c7d47ba8c5a39a371c398ce1a40221009cd2f68b7fed957ed69b9eacdf49d7b5b568d60747c6046ada4b4dc6f86307e4:922c64590222798bb761d5b6d8e72950

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-6982
cwe-id: CWE-79
epss-score: 0.08587
epss-percentile: 0.92146
epss-percentile: 0.92151
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
metadata:
verified: true
@@ -51,4 +51,4 @@ http:
- type: status
status:
- 500
# digest: 4b0a00483046022100f4753441f051d667e946c325ac87b7b2e2f0e524d40153c9975e1062ab6026d9022100b15999b68d102a16a8e3ca878e841266976f68394bcfe998cdd6d0b3d112d3ca:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220241cb1696b2695174024e51b8299ab6725fb54831323ac3ad3d2725dfc44c2fb022100ca8de97cd6a3a448d01fb33c2f46986b0b22296a8e3bbfa409a12e31ec4f8e11:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-7269
cwe-id: CWE-20
epss-score: 0.04298
epss-percentile: 0.88519
epss-percentile: 0.88528
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
metadata:
verified: "true"
@@ -43,4 +43,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 4a0a00473045022054310a22ab60853a707d289be66bef985fdbcaf28a129f12b3f3c635be27ff04022100c660b8eb7c593d9259aa422c2cea13c56c025c31e72978d42d4a8d56607c270e:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022054c93fd88409d402877564ccc718dbc2e32cdf9f8bd69fa5d1fe7063b425bc54022100e90a0b74d72667d39a6ac0e3b16f7530706e6b18a8152532c163366a6784af4d:922c64590222798bb761d5b6d8e72950

View File

@@ -22,7 +22,7 @@ info:
cve-id: CVE-2009-0347
cwe-id: CWE-59
epss-score: 0.03639
epss-percentile: 0.87489
epss-percentile: 0.87496
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -40,4 +40,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 490a00463044022041c003cd7dd0950c4ba45a1d95ebf990967c24019768a647cd86539762fe79b702207af500d081922a844e77c2e26f615bd6008234b5b1ba8294e1720e92ec037640:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100e93ab900f574dd13a5252188627288dbc4a3957ed807e866dac6560483c6338702202f75fa0db8dc4968ac9e0596cc838998a3600c340f09189a9d950abc4b4209e6:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-0932
cwe-id: CWE-22
epss-score: 0.05612
epss-percentile: 0.9005
epss-percentile: 0.90058
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -43,4 +43,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402200bfe958f1555d149c53f037d44e1c0c074a375ebce511ce35e44d96dc16084230220313afab3817449b57308ccdb0040085e5f6e8ccf4c684b1464642290097634de:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220176c1e471300d14c410c4cacaad04b5b252ccabd445696f807b8818a72db01f802203b966d595ff5873820c8a56d5dc284e09281f62d6d6b76962f96e301cf43231e:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2009-1496
cwe-id: CWE-22
epss-score: 0.01909
epss-percentile: 0.82828
epss-percentile: 0.82835
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -42,4 +42,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402200da36523a3a6e833daa84fdf70de711257a4cd3b2bfa8bb43c051567b192ef7e0220013869981588a320d42cc4ec4368b7dbddf5763fd7f5ef321be7fa8fed0194e5:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100ef805d86bbc3b6ea849e5d82584ce89e1b631c76d65f734b15f22577bf22939e02203e656f8b17a40c8838771871d67096af65401ac03ef21b5cd3ddc2b12a97c54e:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-1558
cwe-id: CWE-22
epss-score: 0.09101
epss-percentile: 0.92411
epss-percentile: 0.92413
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-1872
cwe-id: CWE-79
epss-score: 0.08673
epss-percentile: 0.92193
epss-percentile: 0.92197
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata:
verified: true
@@ -59,4 +59,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450221008ee73ac3151f4942996e65ecbea9543e3a89a745a18830db230d89346a098806022072b90b6f4f48cdfc73258d7c30a6526523bdc16ac143ada13c7c4cf7862c5d18:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502203f3bbfe30308f97112f28db30001b1b0252d79eae9d3da71a048f9267868719b022100eec859bff1c18da9372d9dc8d023e2d3d7f60ffa971df2d651b19ae0909d3075:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2009-2015
cwe-id: CWE-22
epss-score: 0.02124
epss-percentile: 0.83699
epss-percentile: 0.83707
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -42,4 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100fd80d15bc547b2d4a1140ddbae15583af0b19cab9ab21b833336282b22688211022100859eacae874f54f1c5798fa27e148bde5bd663db26a52fe5249d8d6ee6c496b4:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502202f21d39514e59a17919ef4794417e9f47cab24f9af053077d4a006eb3b936479022100f7b04be3202781400d02226047aebfad9495f4cae7f6afbb869f4896f78b13b6:922c64590222798bb761d5b6d8e72950

View File

@@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-2100
cwe-id: CWE-22
epss-score: 0.01858
epss-percentile: 0.82586
epss-percentile: 0.82595
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -41,4 +41,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a004830460221009d283735f80dd53d86ef9013292a100ed31346ed5e21c25b4f6f4550381931eb022100c370a92ffd8a85ca89bb31d7518059ee1d4e7911e76e019da6013e7bf2ccef05:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100c3aadb256b762171628a054ad2b342504b255534edf9b6a7407015393c169166022100d232ff87e0597e6601059cdc2bc8f13ed5a6244b3a03a8215460014dd0e385f4:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-3053
cwe-id: CWE-22
epss-score: 0.01573
epss-percentile: 0.81106
epss-percentile: 0.81118
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -43,4 +43,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022048e307a769535e8c7fc683a031edd806f71743b9a950daaec844ea4d8cd2db98022100c73ab2c0f662fd0498495999ef6c9277c47d612ff231789e8930b246a601e084:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100e83ea4173400026c88365946d01cfdfb20ed680ee344781a4d0de275f9c472fd022100eb17c05bbd8b269f9fb5ad40393c6047d8b73b4badc719c9f775c254460a6682:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2009-3318
cwe-id: CWE-22
epss-score: 0.01442
epss-percentile: 0.8031
epss-percentile: 0.80318
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-4202
cwe-id: CWE-22
epss-score: 0.04613
epss-percentile: 0.88923
epss-percentile: 0.8893
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-4223
cwe-id: CWE-94
epss-score: 0.04261
epss-percentile: 0.88472
epss-percentile: 0.88481
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
metadata:
max-request: 1
@@ -44,4 +44,4 @@ http:
- type: status
status:
- 200
# digest: 490a00463044022078105dda6a8aad36aeae2e9ea6436f19e75d00a4d343662070e8138e55742a1b022027da2fc4e37ee4ad9e98a96cbbc155fbd290c315f94f10ce0b937585d586a23c:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100d0287795443b00c86e1844e13a9bb41c3ff09d7ed0539b0c3686da098ed44b3d02203264f1b95a77f5d45ffa092b8d7ea3382c13306b5b093c7ef3996b35ed49fe6f:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-4679
cwe-id: CWE-22
epss-score: 0.23302
epss-percentile: 0.95768
epss-percentile: 0.95769
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -18,7 +18,7 @@ info:
cve-id: CVE-2009-5020
cwe-id: CWE-20
epss-score: 0.01473
epss-percentile: 0.8052
epss-percentile: 0.80532
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
metadata:
max-request: 2

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2009-5114
cwe-id: CWE-22
epss-score: 0.08663
epss-percentile: 0.92187
epss-percentile: 0.92191
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -42,4 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100a4e2d5c985215e6dba01fcd6d0f7e4736e6fc41dc40d3b4cbc41667ed7a43be702201a435474508ecfe73547b8a9b78510e6db465b1aadd72361eac142002092c7d4:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022001de1eb28161a1c3f49a5e955847628ce48f680c2f49fbec28473fb91abdb916022100b1ec8b1fed802b4b05f5b50866aaf57b63fcdcb91b75b6a005e69bd75c5ea932:922c64590222798bb761d5b6d8e72950

View File

@@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-0157
cwe-id: CWE-22
epss-score: 0.06394
epss-percentile: 0.9073
epss-percentile: 0.90734
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0467
cwe-id: CWE-22
epss-score: 0.02939
epss-percentile: 0.86029
epss-percentile: 0.86033
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0696
cwe-id: CWE-22
epss-score: 0.16031
epss-percentile: 0.94563
epss-percentile: 0.94566
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0759
cwe-id: CWE-22
epss-score: 0.06371
epss-percentile: 0.90714
epss-percentile: 0.90718
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0942
cwe-id: CWE-22
epss-score: 0.1146
epss-percentile: 0.93379
epss-percentile: 0.93384
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0943
cwe-id: CWE-22
epss-score: 0.14795
epss-percentile: 0.94291
epss-percentile: 0.94295
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0944
cwe-id: CWE-22
epss-score: 0.01386
epss-percentile: 0.79908
epss-percentile: 0.79919
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -42,4 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a004830460221009ec357ae21b42c6869e77a9482ca3e865f82683fb218e48cf94cacd494ad002e022100f723641ab8abdf2979bd081774640b9c8aa399305e654ce9c6b9b977b87777a1:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022056a8f87479b024017d118602af9219dbdb589970ec99376ff8d982cf22e2b849022100d4552590d202a824d5bedf54cebfeb3385098568dc3942fe3d82d7cff8a9bf4f:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0972
cwe-id: CWE-22
epss-score: 0.04611
epss-percentile: 0.88919
epss-percentile: 0.88925
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -42,4 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100e76854615c72dacee991f8a8ff9bdd151c8e74c1f8d65aebe9c55b0bb08b3fd80221009c5073f9f3c0fea1a34984242b8df45a72c51799e14b865f23ea703c85d48343:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100e75b306e41c534528961c2bd78aa4cb81ff0d9cbbc0ef3353fdf90918bdfe7dc022100b83ddcb881f45d19af601898bb69c9f8be3035aa685feedb2f86a72d9b6a3622:922c64590222798bb761d5b6d8e72950

View File

@@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0982
cwe-id: CWE-22
epss-score: 0.19995
epss-percentile: 0.95278
epss-percentile: 0.95281
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0985
cwe-id: CWE-22
epss-score: 0.21353
epss-percentile: 0.95511
epss-percentile: 0.95513
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1056
cwe-id: CWE-22
epss-score: 0.04792
epss-percentile: 0.89156
epss-percentile: 0.89161
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1081
cwe-id: CWE-22
epss-score: 0.05904
epss-percentile: 0.9032
epss-percentile: 0.90326
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -41,4 +41,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100b4875afbd57b1572f5bf0bbf15065ab92c260799443ed040a35320575563757202205f50760aa86bbd307ea688d3f20d20e3c7f34f95a60428838242060ae15f54ab:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100ccc4ed6707ab03064c60106c3bec575663b910873c66f75bc56cd894a8b2333e02207efb0f8174f1ddd1ca7ba8fc7451390eea0753bd823f96d1f3459c37eac39d98:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1217
cwe-id: CWE-22
epss-score: 0.07857
epss-percentile: 0.91731
epss-percentile: 0.91737
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -42,4 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502210083f2c5bc8002a1b3d0fb00375a9f0b895584a605d08e58b5b28197b542af0c0a02205a9ae939e961f1a3c0f51b409fa9324fb78c2b3b1b6f835746dc969691338c81:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022072aa9d20f061c0549624b1b03890baebd5e6da31701a1447df614b02fbbc6f4c022100c258aab329f28754dca0e47169cb39d9b6ef5607236097f9578fe29bea3ad98e:922c64590222798bb761d5b6d8e72950

View File

@@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1219
cwe-id: CWE-22
epss-score: 0.27216
epss-percentile: 0.96233
epss-percentile: 0.96236
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1302
cwe-id: CWE-22
epss-score: 0.13471
epss-percentile: 0.93984
epss-percentile: 0.9399
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -40,4 +40,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402204fd03977886a556fcc68ebb4f06ca9dc1f0d1e004e6a7bbc620a660a646f908a022056eca5c0f36411aba06c6ccb41b857b7961195e7c28aaa01ceb71233e2ed2106:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100ef14880d617191efae1ef7f5df4746596d7936e271e6b43b051699c3891138c3022032eb0d09a338927f97e9c1fe99533294bbc4262b53295f53e4a21daaf0ce923e:922c64590222798bb761d5b6d8e72950

View File

@@ -21,7 +21,7 @@ info:
cve-id: CVE-2010-1304
cwe-id: CWE-22
epss-score: 0.03144
epss-percentile: 0.86491
epss-percentile: 0.86495
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
metadata:
max-request: 1

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1305
cwe-id: CWE-22
epss-score: 0.06216
epss-percentile: 0.90579
epss-percentile: 0.90584
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -42,4 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450220550358ab565cd26560a538e751d9d2b3052964e1e1e03f1255fe0aa9de0efbd6022100cc2b6d2848d752ea263448646dbe185236973ff680b17b4d1a13b7a2f326b96b:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100b335a784f7a815584e8b73108ee0182b538cfe83b4bf04a47be806345f6197ba022060dec4402c0c4052f644e817e12eb6d1a7e56fe459c97f1a658ab31b71c2dd6a:922c64590222798bb761d5b6d8e72950

View File

@@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1306
cwe-id: CWE-22
epss-score: 0.05015
epss-percentile: 0.89402
epss-percentile: 0.89409
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@@ -41,4 +41,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402207106fefdde74e8253b13475c65cb8f7142ca72a7e4884953b30914bae67e0b910220292fa7ee80ae37df6b2b650b39a3355ab8f42b2098abff445998e412bd232ec8:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502202840c6894c995574885d13b7134e7984145b8f8a2f7bf137d7b6dbc02e85e970022100c979cc9967b57131b60598639b2ad3ee08a63c8ce99e9179df3ba935118807da:922c64590222798bb761d5b6d8e72950

View File

@@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1307
cwe-id: CWE-22
epss-score: 0.15744
epss-percentile: 0.94502
epss-percentile: 0.94506
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1

Some files were not shown because too many files have changed in this diff Show More