mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 07:43:27 +08:00
Merge branch 'main' into patch-70
This commit is contained in:
@@ -10,17 +10,25 @@ http/cves/2023/CVE-2023-52163.yaml
|
||||
http/cves/2024/CVE-2024-29137.yaml
|
||||
http/cves/2024/CVE-2024-56159.yaml
|
||||
http/cves/2025/CVE-2025-25570.yaml
|
||||
http/cves/2025/CVE-2025-36845.yaml
|
||||
http/cves/2025/CVE-2025-4210.yaml
|
||||
http/cves/2025/CVE-2025-46349.yaml
|
||||
http/cves/2025/CVE-2025-46549.yaml
|
||||
http/cves/2025/CVE-2025-46550.yaml
|
||||
http/cves/2025/CVE-2025-66472.yaml
|
||||
http/cves/2026/CVE-2026-21858.yaml
|
||||
http/cves/2026/CVE-2026-23550.yaml
|
||||
http/default-logins/jhipster-default-login.yaml
|
||||
http/exposed-panels/dagster-webserver-ui-exposure.yaml
|
||||
http/exposed-panels/orbeon-forms-exposure.yaml
|
||||
http/exposed-panels/sanity-studio-panel.yaml
|
||||
http/exposures/apis/frigate-api-exposure.yaml
|
||||
http/exposures/backups/batflat-sqlite-exposure.yaml
|
||||
http/exposures/configs/netlify-headers-config-exposure.yaml
|
||||
http/exposures/configs/selenium-grid-exposure.yaml
|
||||
http/exposures/configs/zipkin-config-exposure.yaml
|
||||
http/exposures/files/aspnet-launchsettings-exposure.yaml
|
||||
http/exposures/files/aws-buildspec-exposure.yaml
|
||||
http/exposures/files/gcloudignore-file.yaml
|
||||
http/exposures/files/gitpod-dockerfile-exposure.yaml
|
||||
http/exposures/files/joe-deadjoe-file-exposure.yaml
|
||||
@@ -29,23 +37,31 @@ http/exposures/files/vscode-mcp-json.yaml
|
||||
http/exposures/logs/cacti-log-exposure.yaml
|
||||
http/exposures/logs/magento-debug-log-exposure.yaml
|
||||
http/exposures/logs/opencart-error-log.yaml
|
||||
http/exposures/logs/wp-wpstatistics-log.yaml
|
||||
http/exposures/tokens/azure/azure-instrumentation-key-exposure.yaml
|
||||
http/exposures/tokens/firebase-fcm-server-key-disclosure.yaml
|
||||
http/misconfiguration/administrate-dashboard.yaml
|
||||
http/misconfiguration/apache-spark-env.yaml
|
||||
http/misconfiguration/cacti-fpd.yaml
|
||||
http/misconfiguration/cakephp-debugkit-exposure.yaml
|
||||
http/misconfiguration/exist-db-dashboard-access.yaml
|
||||
http/misconfiguration/fortra-filecatalyst-anonymous-access.yaml
|
||||
http/misconfiguration/google-calendar-exposure.yaml
|
||||
http/misconfiguration/installer/fork-installer.yaml
|
||||
http/misconfiguration/intermapper-exposure.yaml
|
||||
http/misconfiguration/lightstreamer-dashboard-exposure.yaml
|
||||
http/misconfiguration/mybb-full-path-disclosure.yaml
|
||||
http/misconfiguration/ollama-improper-authorization.yaml
|
||||
http/misconfiguration/seafile-public-registration.yaml
|
||||
http/misconfiguration/stylelint-ignore-disclosure.yaml
|
||||
http/misconfiguration/wordpress/wp-a3-lazy-load-top-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-add-search-to-menu-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-advanced-iframe-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-advanced-responsive-video-embedder-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-ajax-load-more-anything-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-ajax-search-lite-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-call-now-button-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-cf7-data-source-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-duplicate-page-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-hostinger-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-really-simple-captcha-fpd.yaml
|
||||
@@ -53,6 +69,7 @@ http/misconfiguration/wordpress/wp-updraftplus-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-w3-total-cache-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-wpforms-lite-fpd.yaml
|
||||
http/misconfiguration/wordpress/wp-wpfront-scroll-top-fpd.yaml
|
||||
http/misconfiguration/wp-gravity-forms-log-disclosure.yaml
|
||||
http/technologies/hotjar-rum-detect.yaml
|
||||
http/technologies/matomo-rum-detect.yaml
|
||||
http/technologies/openreplay-rum-detect.yaml
|
||||
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2019-14287
|
||||
cwe-id: CWE-755
|
||||
epss-score: 0.86126
|
||||
epss-percentile: 0.9937
|
||||
epss-percentile: 0.99372
|
||||
cpe: cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2023-49105
|
||||
cwe-id: CWE-287
|
||||
epss-score: 0.89605
|
||||
epss-percentile: 0.99534
|
||||
epss-percentile: 0.99536
|
||||
cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
||||
@@ -21,8 +21,8 @@ info:
|
||||
cvss-score: 7.8
|
||||
cve-id: CVE-2023-4911
|
||||
cwe-id: CWE-787,CWE-122
|
||||
epss-score: 0.69791
|
||||
epss-percentile: 0.98608
|
||||
epss-score: 0.73037
|
||||
epss-percentile: 0.98736
|
||||
cpe: cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -43,4 +43,4 @@ code:
|
||||
- type: word
|
||||
words:
|
||||
- "139" # Segmentation Fault Exit Code
|
||||
# digest: 4a0a004730450220692d91239d4d8d90398523ed32a09e20eaadb1a26b3c8b627c23f324ea17238b022100c283b35e540a3c1071d51c5d39983e4d97c63cf6549f73fee8e056fbf64d0faf:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100baf2d3801842e69be56a927b2e4004485330390c1843cc5fc442820322a4657f022100e085081466a761e5dd5f7c85ec14779a3b236c16b19d48802007d3e001515a5a:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2023-6246
|
||||
cwe-id: CWE-787,CWE-122
|
||||
epss-score: 0.24316
|
||||
epss-percentile: 0.95911
|
||||
epss-percentile: 0.95913
|
||||
cpe: cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -18,7 +18,7 @@ info:
|
||||
cve-id: CVE-2024-10443
|
||||
cwe-id: CWE-77
|
||||
epss-score: 0.70846
|
||||
epss-percentile: 0.98649
|
||||
epss-percentile: 0.9865
|
||||
cpe: cpe:2.3:a:synology:photos:*:*:*:*:*:diskstation_manager:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2024-3094
|
||||
cwe-id: CWE-506
|
||||
epss-score: 0.85995
|
||||
epss-percentile: 0.99363
|
||||
epss-percentile: 0.99365
|
||||
cpe: cpe:2.3:a:tukaani:xz:5.6.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -15,7 +15,7 @@ info:
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2024-4340
|
||||
epss-score: 0.17039
|
||||
epss-percentile: 0.94765
|
||||
epss-percentile: 0.94768
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2024-4340
|
||||
tags: cve,cve2024,py,code,dos,python,sqlparse,vuln
|
||||
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2024-45409
|
||||
cwe-id: CWE-347
|
||||
epss-score: 0.4139
|
||||
epss-percentile: 0.97279
|
||||
epss-percentile: 0.97282
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.title:"GitLab"
|
||||
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2024-56331
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.41406
|
||||
epss-percentile: 0.97281
|
||||
epss-percentile: 0.97283
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.title:"Uptime Kuma"
|
||||
|
||||
@@ -15,7 +15,7 @@ info:
|
||||
- https://github.com/advisories/GHSA-g83h-4727-5rpv
|
||||
classification:
|
||||
epss-score: 0.55491
|
||||
epss-percentile: 0.97986
|
||||
epss-percentile: 0.97989
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: title:"GitHub Enterprise"
|
||||
@@ -192,4 +192,4 @@ http:
|
||||
- type: kval
|
||||
kval:
|
||||
- user_session
|
||||
# digest: 4a0a00473045022100c9a879a1a167eb3a1ea51a072419dceb330da8ff1b29e5e3a27c7e1604beb55002201f6fde90532e3c1af85ecd3bf2aae5bea3e15a9e01d41ff355942faee2992a9a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402205d400cf5bfb43bc9f34e14e3a8fce693ecd189b2c6e3e9e4b718cbb423972fac02205baca2706db158f33ded9342003c2d8f61e8f84a00d68ffd8b601c28435ec5d2:922c64590222798bb761d5b6d8e72950
|
||||
@@ -16,7 +16,7 @@ info:
|
||||
- https://towerofhanoi.it/writeups/cve-2025-1550/
|
||||
classification:
|
||||
epss-score: 0.04785
|
||||
epss-percentile: 0.89146
|
||||
epss-percentile: 0.89152
|
||||
metadata:
|
||||
max-request: 1
|
||||
tags: cve,cve2025,code,keras,rce,ml
|
||||
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2025-22457
|
||||
cwe-id: CWE-121,CWE-787
|
||||
epss-score: 0.49132
|
||||
epss-percentile: 0.97677
|
||||
epss-percentile: 0.97681
|
||||
cpe: cpe:2.3:a:ivanti:connect_secure:*:-:*:*:*:*:*:*
|
||||
metadata:
|
||||
vendor: ivanti
|
||||
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2025-25291
|
||||
cwe-id: CWE-347
|
||||
epss-score: 0.13848
|
||||
epss-percentile: 0.94082
|
||||
epss-percentile: 0.94087
|
||||
metadata:
|
||||
verified: true
|
||||
vendor: gitlab
|
||||
@@ -80,4 +80,4 @@ http:
|
||||
- type: kval
|
||||
kval:
|
||||
- _gitlab_session
|
||||
# digest: 4a0a00473045022100da7671ed91ea1bc5fb04f262e95116df31243319410921fd226fac65e5965a2002207dae994b259b2e7632380ef6472614f8f2b871f6b87c2a973145ae0b7fa4d82f:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220731b72642f14f7def4d2b37291c7399aa3decc0b0a71f0c40e6599c31b3c3b850220199b904505c1dffc7f88259574b72b88d828fb66d374520ed0161e096c68a7b7:922c64590222798bb761d5b6d8e72950
|
||||
@@ -23,7 +23,7 @@ info:
|
||||
cve-id: CVE-2025-32433
|
||||
cwe-id: CWE-306
|
||||
epss-score: 0.43921
|
||||
epss-percentile: 0.97417
|
||||
epss-percentile: 0.97419
|
||||
metadata:
|
||||
verified: true
|
||||
max-request: 1
|
||||
|
||||
@@ -18,7 +18,7 @@ info:
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2025-54309
|
||||
epss-score: 0.63875
|
||||
epss-percentile: 0.98357
|
||||
epss-percentile: 0.98361
|
||||
cwe-id: CWE-287,CWE-362
|
||||
cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
@@ -200,4 +200,4 @@ code:
|
||||
- type: word
|
||||
words:
|
||||
- "VULNERABLE:"
|
||||
# digest: 4b0a00483046022100eb3f5959125a305830d65c6bf563bec0c2bc81e14ab8a9181f74a3f679fbb5f9022100ec7ca9512961e8e0171d8326e2fe46cf1f33784f2674ecdecd0961b84110bc60:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100c1074d46c2bb8856ffcf46fd38f10ad7b860f624070dd8ec5d1ec16705b8178e022027e276bd32549768c8c42f74669fc9cd71fadc38cf7071720d7a2ccbcc762b8c:922c64590222798bb761d5b6d8e72950
|
||||
@@ -16,7 +16,7 @@ info:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2025-6216
|
||||
classification:
|
||||
epss-score: 0.33256
|
||||
epss-percentile: 0.96767
|
||||
epss-percentile: 0.96769
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2025-6216
|
||||
|
||||
@@ -18,7 +18,7 @@ info:
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2025-68926
|
||||
epss-score: 0.03135
|
||||
epss-percentile: 0.8648
|
||||
epss-percentile: 0.86483
|
||||
cwe-id: CWE-798
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2025-9242
|
||||
cwe-id: CWE-787,CWE-362
|
||||
epss-score: 0.73453
|
||||
epss-percentile: 0.98758
|
||||
epss-percentile: 0.98757
|
||||
cpe: cpe:2.3:a:watchguard:fireware_os:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -3622,6 +3622,7 @@
|
||||
{"ID":"CVE-2025-64446","Info":{"Name":"FortiWeb - Authentication Bypass","Severity":"critical","Description":"A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2025/CVE-2025-64446.yaml"}
|
||||
{"ID":"CVE-2025-64525","Info":{"Name":"Astro - Broken Access Control","Severity":"medium","Description":"Astro 2.16.0 to 5.15.5 contains a broken access control caused by insecure use of unsanitized x-forwarded-proto and x-forwarded-port headers in URL building, letting attackers bypass middleware protection, cause DoS, SSRF, and URL pollution, exploit requires crafted headers.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2025/CVE-2025-64525.yaml"}
|
||||
{"ID":"CVE-2025-64764","Info":{"Name":"Astro - Reflected XSS via server islands feature","Severity":"high","Description":"Astro 5.15.8 contains a reflected XSS caused by improper handling of server islands feature, letting remote attackers execute scripts, exploit requires use of server islands in the application.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2025/CVE-2025-64764.yaml"}
|
||||
{"ID":"CVE-2025-66472","Info":{"Name":"XWiki DeleteApplication - Cross-Site Scripting","Severity":"medium","Description":"XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Versions 6.2-milestone-1 through 16.10.9 and 17.0.0-rc-1 through 17.4.1 of both XWiki Platform Flamingo Skin Resources and XWiki Platform Web Templates are vulnerable to a reflected XSS attack through a deletion confirmation message. The attacker-supplied script is executed when the victim clicks the \"No\" button. This issue is fixed in versions 16.10.10 and 17.4.2 of both XWiki Platform Flamingo Skin Resources and XWiki Platform Web Templates.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2025/CVE-2025-66472.yaml"}
|
||||
{"ID":"CVE-2025-6851","Info":{"Name":"WordPress Broken Link Notifier \u003c 1.3.1 - Unauthenticated SSRF","Severity":"high","Description":"The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.0 via the ajax_blinks() function which ultimately calls the check_url_status_code() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2025/CVE-2025-6851.yaml"}
|
||||
{"ID":"CVE-2025-68613","Info":{"Name":"n8n - Remote Code Execution via Expression Injection","Severity":"critical","Description":"n8n \u003c 1.120.4, 1.121.1, 1.122.0 contains a remote code execution caused by insufficient isolation in workflow expression evaluation, letting authenticated attackers execute arbitrary code with n8n process privileges. Exploit requires authentication.\n","Classification":{"CVSSScore":"9.9"}},"file_path":"http/cves/2025/CVE-2025-68613.yaml"}
|
||||
{"ID":"CVE-2025-68645","Info":{"Name":"Zimbra Collaboration - Local File Inclusion","Severity":"high","Description":"Zimbra Collaboration (ZCS) 10.0 and 10.1 contain a local file inclusion caused by improper handling of user-supplied parameters in the RestFilter servlet, letting unauthenticated remote attackers include arbitrary files from WebRoot, exploit requires crafted requests to /h/rest endpoint.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2025/CVE-2025-68645.yaml"}
|
||||
|
||||
@@ -1 +1 @@
|
||||
09fab5713c727e1a137ace7ed1682cb6
|
||||
0a432d30d60b1299fbab000960c32732
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2021-35042
|
||||
cwe-id: CWE-89
|
||||
epss-score: 0.35237
|
||||
epss-percentile: 0.96903
|
||||
epss-percentile: 0.96907
|
||||
metadata:
|
||||
verified: true
|
||||
fofa-query: body="ProgrammingError" && body="ORDER BY"
|
||||
@@ -65,4 +65,4 @@ http:
|
||||
- 'FROM\s+`([a-zA-Z_][a-zA-Z0-9_]*)`'
|
||||
- 'relation\s+([a-zA-Z_][a-zA-Z0-9_]*)'
|
||||
- "Table\\s+'[^']*\\.([a-zA-Z_][a-zA-Z0-9_]*)'"
|
||||
# digest: 490a004630440220781966c6bb2d374e0cfac62875f9c135d90e57506dc8e7c9fbc3a276b04965df02202b2160f1e1c22b03456a8a6845af95bc087859eaa77576dbec8aab5ebcaaaddb:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100e1ff802b08b8a31a2a321eb6b237c4c491f0bdc14873c76b6d16ac56beba011702200c7ac55b3b5ebe1126374038641490a773fdbe83960111781c9c7ba6fb7ba71c:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2022-34265
|
||||
cwe-id: CWE-89
|
||||
epss-score: 0.92734
|
||||
epss-percentile: 0.99739
|
||||
epss-percentile: 0.99741
|
||||
tags: sqli,dast,vulhub,cve,cve2022,django,vuln
|
||||
|
||||
variables:
|
||||
@@ -50,4 +50,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 500
|
||||
# digest: 4b0a00483046022100aac9d15a26ed5537c5ce00e5d29081ade5bdaefc407c4f13406bff5fce9c610002210092f166b95b14979edb9de2aa8e7c0874d98b8032888f33e8fdc948acf319392f:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402206a08ac3b243f677656d99fcf962e7857a6663ff730ce182b9d5520d664817d8d02201aca3b491a00b1bafb948ce458b7840af40d2af7730008571911e4ee153b48ee:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2022-42889
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.94161
|
||||
epss-percentile: 0.99911
|
||||
epss-percentile: 0.9991
|
||||
metadata:
|
||||
max-request: 1
|
||||
confidence: tenative
|
||||
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2024-2961
|
||||
cwe-id: CWE-787
|
||||
epss-score: 0.9286
|
||||
epss-percentile: 0.99755
|
||||
epss-percentile: 0.99757
|
||||
tags: cve,cve2024,php,iconv,glibc,lfr,rce,dast,vkev,vuln
|
||||
|
||||
flow: http(1) && http(2)
|
||||
@@ -57,4 +57,4 @@ http:
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:x:0:0"
|
||||
# digest: 4a0a0047304502202b290a44cf4a61f704d038aa333eafb504adfdc4a4e55b34d8d9e8b4aeca6ffe02210085ec2d53cbc22b34132c9043e1610e25b64ffa66772292ebdfe73d24a12db186:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022046a24b85835296f4e0345e7a56ea602c2b9cd3279c283d187e284dd468303a83022100de28910d79abe32db5feecf410c523e4e1567df56de364b85f1d411a164b9db0:922c64590222798bb761d5b6d8e72950
|
||||
@@ -15,13 +15,21 @@ http:
|
||||
- pre-condition:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- 'method == "POST"'
|
||||
- 'method == "GET"'
|
||||
condition: or
|
||||
|
||||
payloads:
|
||||
reflection:
|
||||
- "'\"><{{first}}>"
|
||||
|
||||
fuzzing:
|
||||
- part: body
|
||||
type: postfix
|
||||
mode: single
|
||||
fuzz:
|
||||
- "{{url_encode(reflection)}}"
|
||||
|
||||
- part: query
|
||||
type: postfix
|
||||
mode: single
|
||||
@@ -47,4 +55,4 @@ http:
|
||||
part: content_type
|
||||
words:
|
||||
- "text/html"
|
||||
# digest: 490a00463044022030f20275349609941dc22dc277024f1a68a1e0e01a361d80ec923d1ad1f838ea02202ba948e17d033abf38602d49193da8e3f7b801dde81371e9377af43c6002828a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502201f71f4b45c2da5dee0ab62eb4154bc61e208d3d7c0809dd5a80d040b0f10392c022100b9431765649131e7908db1de1bf6012edf733a1422e0508b822cdc47244e6e76:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,4 +22,4 @@ file:
|
||||
- 'InvalidOperationException'
|
||||
- 'UnauthorizedAccessException'
|
||||
- 'NotFound'
|
||||
# digest: 4a0a0047304502205c69caf3a54cf5dde4b873746259bb936ce8a78abf9b8f97acd075c498022b1a022100f5fb8101bb9106e9b8fa8874faee0f478873b3349d1607d81a83fa6f47716399:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220406f2e2b833fffd9ed4257c6cee1bc103ab98fd3b3f81b49f5944fe2a7a10e60022100ff127bf58e9528a33bbccb956c4a847540da8e3c647484d14e5011241322063f:922c64590222798bb761d5b6d8e72950
|
||||
@@ -30,4 +30,4 @@ file:
|
||||
- 'BadRequestError'
|
||||
- 'MongoError'
|
||||
- 'SequelizeDatabaseError'
|
||||
# digest: 490a00463044022052c9b4bf0e4a707ac455ffe442a60c792b5bd48e0896165262e4184708bed8da022002211df5d5221d3ec56a526454a5585a1db704339463964589056885118aca14:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100de0c6f376dabb045c8fa1a19142ec274c1ea4e4f3abac673b2abeb7d7ce883b502205b32aa39e1b49856e605e9aa2b5a4d84958670ce3019ac65eec16060f571ad39:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2018-25031
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.83676
|
||||
epss-percentile: 0.9926
|
||||
epss-percentile: 0.99262
|
||||
cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -21,8 +21,8 @@ info:
|
||||
cvss-score: 6.1
|
||||
cve-id: CVE-2022-29455
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.48769
|
||||
epss-percentile: 0.9766
|
||||
epss-score: 0.52986
|
||||
epss-percentile: 0.97862
|
||||
cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
@@ -52,4 +52,4 @@ headless:
|
||||
words:
|
||||
- "elementor"
|
||||
case-insensitive: true
|
||||
# digest: 4a0a00473045022100acc631b36c0b4f6ea2aa9ddeeffc1ebdf48677fa442443b88e66ef5bf1f8e49702206c5dfd0b03468f189a4187161bfa0c4ef2a795c7e0644fb38fd65cca9dfdae87:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100d020e9c2dbc2ca9684e6689cfba7d4332d326a63c0f64478b21e714987b6068c022058e51ae1ac1c19584c99d8336c2002d0bca093790bd3f64da258185c5d7548da:922c64590222798bb761d5b6d8e72950
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2024-29882
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.07333
|
||||
epss-percentile: 0.91422
|
||||
epss-percentile: 0.9143
|
||||
metadata:
|
||||
verified: true
|
||||
max-request: 1
|
||||
@@ -50,4 +50,4 @@ headless:
|
||||
- "ConnectSRS</a>"
|
||||
condition: or
|
||||
case-insensitive: true
|
||||
# digest: 4b0a00483046022100b9d00271dbdb45c40709afe3375e37facd87134a648f1f5c5c3269a87649839d022100d458d9d9031bc151e9377fe603d4003a983588698488bea2a23f166def5f62a6:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220608110e5e2ff7cf9fbf7cff17aadc240bb897260e3212b675314740e7c9e6c9d022012c9185262f360f060a4304e5a42ef61db99489fba522813f5a60eb72c366611:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cvss-score: 7.2
|
||||
cve-id: CVE-2024-38526
|
||||
epss-score: 0.82064
|
||||
epss-percentile: 0.99171
|
||||
epss-percentile: 0.99172
|
||||
tags: cve,cve2024,supply-chain,polyfill,vkev,vuln
|
||||
headless:
|
||||
- steps:
|
||||
|
||||
@@ -16,7 +16,7 @@ info:
|
||||
- https://github.com/Sachinart/essential-addons-for-elementor-xss-poc/blob/main/poc.py
|
||||
classification:
|
||||
epss-score: 0.03042
|
||||
epss-percentile: 0.86271
|
||||
epss-percentile: 0.86276
|
||||
metadata:
|
||||
verified: true
|
||||
max-request: 1
|
||||
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2025-25062
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.34064
|
||||
epss-percentile: 0.96834
|
||||
epss-percentile: 0.96838
|
||||
cpe: cpe:2.3:a:backdropcms:backdrop:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 7
|
||||
@@ -190,4 +190,4 @@ headless:
|
||||
dsl:
|
||||
- reflected_text_xss_type
|
||||
- reflected_text_xss_message
|
||||
# digest: 4a0a00473045022049368eac638d19d2d1c4f3378269763002ad58cb5a179405270e862d1937fbc1022100edd5425b0200b063a118b9560c4884c23a8070507910d27c2b6e1fae9c50fa68:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100e4841c318ca11e12f9cc9c4001293d50b360ead490ec56c95382836205c40b50022100a1f6c79e841b119c0ba5b0b7b221ac43bd2b4a41a82c88c9293e24378d76d7c3:922c64590222798bb761d5b6d8e72950
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2025-8191
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.01065
|
||||
epss-percentile: 0.77218
|
||||
epss-percentile: 0.7723
|
||||
cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
@@ -69,4 +69,4 @@ headless:
|
||||
words:
|
||||
- "swagger"
|
||||
case-insensitive: true
|
||||
# digest: 4b0a00483046022100c1efc08c65cf7dd58a535a0c088a660260d248a0e00f844ff434016fc05931f40221008ebe729562cd61dc0f213ad58ef6e612ceac60cc5a4816385bdcee00bd5dbf00:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502205b9b439cd2f665801b812b1f210c8202585916d74342f11dc24df39c1c5084ea022100f878c8f4478cc5175daa178268af02750bd52ff3f994aab1919e26bb3e2be644:922c64590222798bb761d5b6d8e72950
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cvss-score: 5.3
|
||||
cve-id: CVE-2000-0114
|
||||
epss-score: 0.05458
|
||||
epss-percentile: 0.89904
|
||||
epss-percentile: 0.89911
|
||||
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -62,4 +62,4 @@ http:
|
||||
group: 1
|
||||
regex:
|
||||
- 'version:([0-9.]+)'
|
||||
# digest: 4a0a00473045022100c9b6b0b86c2c2395fc95039ef61c619fe3848a8ac438e22a463547f674a0b8de022031e69c37326e623e928483b1e786c1b31c1b71e64070503e6ef5183f66a0c633:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100a078db8e49a4a912e96c7568bba05c195bae1ba071a99476f3be995d551571c5022100c86111c77155e991c03ad9b807a351a76dee28807b0ee28c38f2a95f6e59d3a2:922c64590222798bb761d5b6d8e72950
|
||||
@@ -18,7 +18,7 @@ info:
|
||||
cvss-score: 6.4
|
||||
cve-id: CVE-2000-0760
|
||||
epss-score: 0.38569
|
||||
epss-percentile: 0.97113
|
||||
epss-percentile: 0.97117
|
||||
cpe: cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2002-1131
|
||||
cwe-id: CWE-80
|
||||
epss-score: 0.03877
|
||||
epss-percentile: 0.87895
|
||||
epss-percentile: 0.87902
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 5
|
||||
@@ -60,4 +60,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100c587232957ba736c22af222707911d24f6b53fc8acd21123de14bfb0dea5f9ce02203d8a42efb1ce30144ad46d0dd6384103bdc7d66a2d141ea91fed8eacf7c30424:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100a703444a05f97dd58268cbd900d5819c11697eb39eae613c66feff4b8f2a48ed022100cb116cbabcfbe70231b10467f183b86dd19a8f386c2d591afd392404ccecb590:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2004-0519
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00124
|
||||
epss-percentile: 0.32345
|
||||
epss-percentile: 0.32364
|
||||
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -48,4 +48,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100a0e3f30eaa7b0379b888c86b4f96da42da8e3dbb65e9cfcc6421e8ea3b48a7d402201f442d977342c5210892a1e45f37ebcbe40f9dcbbf77718eaf7e7dd7169516b9:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221009f9151852769efd9fdeafa594f548ae89097f70475423eb5e7c033e288a66739022100ada6169ae0b5beac00331724823f67dfdf715e898955308ced6f7742f1562e03:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2004-1965
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00265
|
||||
epss-percentile: 0.49731
|
||||
epss-percentile: 0.49755
|
||||
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -40,4 +40,4 @@ http:
|
||||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
|
||||
# digest: 4a0a0047304502203c1c76a6abaf4a771d582390dfc5c43867ede5e60b63377f9b6c941fcb6945e50221008986217f5ef2563c6a3fca4e25b4bcc8046b91441f586cad8d6a3455729af089:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221008aac95d85ba9c69ba56bd48fda6963e515a2378796783b8c2368bbb4b225787802210092e10e0ebc980be8ec03b3f063b76d6663bd601306a701656dbc932cb649c831:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2005-2428
|
||||
cwe-id: CWE-200
|
||||
epss-score: 0.08605
|
||||
epss-percentile: 0.92157
|
||||
epss-percentile: 0.92162
|
||||
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -44,4 +44,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100f4b5b08ab3d847d6541097b5e22436b548ee6adcdc46ec67992896df0b3276aa022100dab4809a80136dd992cf6d013ae2ea73be737782e2ec67d2b88909de17281066:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402206f52aeaf9058601460db35895d6bc45f6216ae3350fd0ec72135b93ddb339ce502205ca0f2489620783fcc4c5b3fc7a88ebc0bf15f4fbedd7418392979f3527abd68:922c64590222798bb761d5b6d8e72950
|
||||
@@ -17,7 +17,7 @@ info:
|
||||
cvss-score: 5.4
|
||||
cve-id: CVE-2005-3128
|
||||
epss-score: 0.01733
|
||||
epss-percentile: 0.82007
|
||||
epss-percentile: 0.82015
|
||||
cwe-id: CWE-80
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -44,4 +44,4 @@ http:
|
||||
part: header
|
||||
words:
|
||||
- "text/html"
|
||||
# digest: 490a0046304402207c23342bcb70df1c51ff4a05bb23ea59e1046b25bd9a897161afe1bdb530087002205b61118a90d386ae84b130483e5e4f08fe2aca44775054ee5faae86a6c93578c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220402c22fe164ab65fab70372fcb4408ae6a230c11da226494260131c12de7259d02204b76125e964e231536a881c679b7e7632031ebb0aacf44f2f88072c97850cede:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2005-3344
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.1015
|
||||
epss-percentile: 0.92881
|
||||
epss-percentile: 0.92886
|
||||
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
||||
@@ -23,7 +23,7 @@ info:
|
||||
cve-id: CVE-2005-3634
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.01653
|
||||
epss-percentile: 0.81588
|
||||
epss-percentile: 0.81598
|
||||
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2005-4385
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00373
|
||||
epss-percentile: 0.58456
|
||||
epss-percentile: 0.58484
|
||||
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -43,4 +43,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022072c220ff7c8d1e6603c2e07f3bdc506d5ab4f60eb8a7c12f1ad8884fa9d0a477022100ffe3cf16fcf318b2496d693c148e0fcf9667d724bad875e409830f414f5e096e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100bb2aaba9d78a3a8aec54109a935de6b1c5962af6e7e03dac3302627199350ba5022100f56e2fb34213e5c965154503485db9702a8aa4a3249cb49cbf3dfdf3905f3eab:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2006-1681
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00299
|
||||
epss-percentile: 0.52812
|
||||
epss-percentile: 0.52835
|
||||
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -62,4 +62,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100e72d79302e1f8fe4e86d254b8cfe644de5eae03acfaac88e268cd91961caa8f5022029fb0d6aebc65ef11ef8eb2475a2372b29d66b2f6530731aa3e27c57ef037798:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221008fe19c8d330983b2c33595bc6c78533b5fb42fdefed795e4189199c6898560b40220584e805d3b2a50e2fe060c0c09f48fdb066c7e1da210375e4e65c3251500c928:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2006-2842
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0094
|
||||
epss-percentile: 0.75736
|
||||
epss-percentile: 0.75754
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -48,4 +48,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100eea00f78da1901595a2d5e7bfb629f987f584de7c1927ef1e1af12f1f072149b022100ecc787b78ea10d0fe57392e763c1e251b1ea0c72b0d2ac64eaf260f79c37b5ef:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100da99faeddb072593d9ba9c38a5faef8d5e6d1514947654bfdd214537fff98b76022033779721a15a1fb69ce290e9c41ee4b874f341f58d7b0814bd4ba8cc14efb89f:922c64590222798bb761d5b6d8e72950
|
||||
@@ -18,8 +18,8 @@ info:
|
||||
cvss-score: 6.8
|
||||
cve-id: CVE-2007-0885
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02133
|
||||
epss-percentile: 0.83728
|
||||
epss-score: 0.03471
|
||||
epss-percentile: 0.87206
|
||||
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -46,4 +46,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a004630440220553d5ca9be0f85cbb89479b707b4321ee21e2a82cd81788c1530e8ded1d8252d022048e469b3d7655cc9a936ccecda6c3c9991fe69c52cddf838b23e363f8aaf508d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221009bf757aa56e387060b8df54b0875af6dd06619191252c7799b0a23bcaa3a82f50221009a0069809a9de864addc5f7653cf2eac812486fb1f9318f53ef8b72adf580a42:922c64590222798bb761d5b6d8e72950
|
||||
@@ -17,8 +17,8 @@ info:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.80643
|
||||
epss-percentile: 0.99095
|
||||
epss-score: 0.7477
|
||||
epss-percentile: 0.98816
|
||||
metadata:
|
||||
max-request: 1
|
||||
verified: true
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2007-4504
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00177
|
||||
epss-percentile: 0.39567
|
||||
epss-percentile: 0.39581
|
||||
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -42,4 +42,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100c32bd9db6c20e381abf2a5cdc552988a16f113960585843149aaccaf8b6611ed022033595a0706122d75b899010a8e4c7738eb184a1fa42a1269e431b83929136e69:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220096b7d4ae7578c7a5432f329cc37d4539082471521a0cf16450ae2eb2c7f578a0220580e18af67e6135e27a45a2614d8d66b32c0ed9254afc40fc29809d68f3edc85:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2007-4556
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02359
|
||||
epss-percentile: 0.84502
|
||||
epss-percentile: 0.84508
|
||||
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -51,4 +51,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100e980a93cb33e8469be938118930fba62f8d9e23df7e38764e2397351532c4f1702207d9fa10ef4668e8342a36be7592016497f3bde7a58e884d2ae37d49663351ea2:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402200433958fc9d91b2bf2fa74fb9684df32032ea1eebc64dc42812ad7457f6aa9770220010bd088a6b8e8c7d0e27b98422f92f9a385d68411052eebce19c0259967f05f:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2007-5728
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00523
|
||||
epss-percentile: 0.66319
|
||||
epss-percentile: 0.66338
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -57,4 +57,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100b81f80c6672b7bbfa90bda0cdf80c7809761ee600275fe7e708db3e172baf8d202207d1fedabfc203078727ea415f58eeefb6662dfbed91889205cac22bd46442325:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502206eebec630da2b41fd8bfd9c45b73ceeb02e566344fbfd75169ce9f9a5bbb76e7022100c1d3c32e4e9e11604b4b9b3df01e2a08000a19567bbd6ec9b332b98cb1e2af65:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2008-1059
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.00265
|
||||
epss-percentile: 0.4976
|
||||
epss-percentile: 0.49783
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -47,4 +47,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a0046304402207d384b1a1e017321a1621c0a61d77d816c4ac04aa197f94ca684ed9a96fc5b57022033057d1458bc7ce7bd42e9584094a5f1f412df7113de7286dc0840ed61cfb111:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100d94a0e9211d724fb7a82f513fe1e1fcd34879f3a225a336b0bce6a0642e880b202210095652a505722920bb3463527aa0ed77d1682ef71d2e6836dce6a10f3894165be:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2008-1061
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00158
|
||||
epss-percentile: 0.37152
|
||||
epss-percentile: 0.37162
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
@@ -62,4 +62,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a00463044022003d4cf5635a9a027316ae0d2850aa43d1f9e2bdda1d8c9e6f0dd2f337413f181022017e883735467cc0427e59398644dff4b44df7a54fa51dce1e9b3178dcee88ff8:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221009c3aeedc4a4186a68162f57a9f9831e26ce2cd5d6d998a4e31d91e0c950aef4902204c62fa289e561f728c0c1596c54b4349717dd75534fda9b6be27a27eb2e479b0:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2008-1547
|
||||
cwe-id: CWE-601
|
||||
epss-score: 0.6311
|
||||
epss-percentile: 0.98324
|
||||
epss-percentile: 0.98328
|
||||
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
@@ -51,4 +51,4 @@ http:
|
||||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
# digest: 490a00463044022017659545850ff5a8fa99bc39db31c0b7c7f14e903b98d55f6c0fb44abdf72dc802206fce84039928af750d8cd546b2e1b872a0cfb74b95c6fa671dd70c665aa52208:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022079c97fd3887e39db44faf6c5b379f9f7ef2cac3fade7ef62bd62a21c761dd1e9022100c7066d14fd9198db2951e033ce5abeeb5504ace74bfbe4de0187eee1c267376d:922c64590222798bb761d5b6d8e72950
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2008-2398
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00437
|
||||
epss-percentile: 0.62521
|
||||
epss-percentile: 0.62559
|
||||
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -47,4 +47,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100e6c6d3b1980342829b86e0ad78341beb7c66bd0f2af977a54fdc33333e3cca3002201c15ab13c9fd39838f052b5be785f1a5faa5ae20787ef1568657199737c7506b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502210091828eea5006919e172ed0ee6682ffb9cae414016f397b2cb8d2cf820cc39bd0022070b84698af0c813529320c80b8907f97fc350d1ded77b64bff866d6ab1f871ec:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2008-2650
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01643
|
||||
epss-percentile: 0.81524
|
||||
epss-percentile: 0.81532
|
||||
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2008-4668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00144
|
||||
epss-percentile: 0.35202
|
||||
epss-percentile: 0.35209
|
||||
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -43,4 +43,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100d199b33630ce7aa1d1346972d5c79e3453cb3152602fa428b42d321fbc6ab7c002202ce47a32877cc0129b24dd93fd4efaafe6e961d8493c31be3cf1564b86dfb358:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100b16880d5816f52cbc17ee7ff07f255ce9817067b6e9dc0095b1690effe9140ae022100877eaa566d77eb744a1b0748796d979ea84a902bb8ec37850515b4606942f91c:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2008-4764
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01041
|
||||
epss-percentile: 0.76973
|
||||
epss-percentile: 0.76988
|
||||
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -42,4 +42,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a004630440220087c916956feb645b6ef37bce82aaac779e49fe6251ae6dc6af18b8ac457c7b502205110487d3b59ddc51cc6fd1b99134f90b25370bc5866252cb5ef2a1f9bfe46b3:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502202ef82d301ff93bd35f30f9f3256901fa7c721f6613cd2020196d3c9d477d88a60221009627d2ba76f8f1809a1d374fa0222bf1e88c20a1c8f4a1ff4b413c5ec242e12d:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2008-5587
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01986
|
||||
epss-percentile: 0.83165
|
||||
epss-percentile: 0.83171
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -49,4 +49,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100cee8f2be5165f3508b2d928e08399f5d7e681b2ccb4fc4d46f3ef0511652f970022100fd373c58ea868bd78a82ab21250c9a898f2713f73993dbe0ff33340cda636a12:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100c99da7f29b3c7a3f4599c0c98b9290a34b811653fe91822890eba193913577c7022075787dc21aa2363f61fcaebeab01c622f07e8aa8a9f977b67888cfa18c3c0155:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2008-6080
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06734
|
||||
epss-percentile: 0.91007
|
||||
epss-percentile: 0.91012
|
||||
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2008-6172
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05386
|
||||
epss-percentile: 0.89825
|
||||
epss-percentile: 0.89833
|
||||
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -42,4 +42,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a004730450221008bc7319e6f5ace106050e2c83c63d90f65da2359829f29042fefc62f12534a5502204b3548f993646ba37f628dfda8e70d166f00ac36fc532683be7a61f2a899107f:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100d16c4b01c59ac287e3d914a1475cc5d47260ae48eccea851bcc3d51da600a01b022018d9bfcb09e4375c2cf3e493d31d08fbbd148a980fe18aa3c50536fd74f15533:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2008-6222
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03072
|
||||
epss-percentile: 0.86349
|
||||
epss-percentile: 0.86353
|
||||
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2008-6465
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.01157
|
||||
epss-percentile: 0.78108
|
||||
epss-percentile: 0.78119
|
||||
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
@@ -63,4 +63,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a0046304402204f1313c0d0fc02b2b88e65e2205c59a7019f3985506008836db96c2bf101b49302201d1f7bcc769a5c4a320ca4a8302595d43a70bada655ae5d58e7af609bf58a156:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402201080cda9056b737075031259cecfb0961b7a384b5151969864552ea5b1455fdb02201506136632676b1268b5bf56cba84d63a1e7dd3d9faca6dc6055e74147d46424:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2008-6668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00573
|
||||
epss-percentile: 0.68066
|
||||
epss-percentile: 0.68087
|
||||
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
@@ -45,4 +45,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022073a82abc162090280a1a6a64f2a459afbf2a0f4a91fcd9393b9fe83275971f610221009953c93df658c540e504fa9865b794592aee58e0e824002771a91ced6f284357:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220521a99b3bc20c51d61d64e00b5dc0cda553fc6c7d47ba8c5a39a371c398ce1a40221009cd2f68b7fed957ed69b9eacdf49d7b5b568d60747c6046ada4b4dc6f86307e4:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2008-6982
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.08587
|
||||
epss-percentile: 0.92146
|
||||
epss-percentile: 0.92151
|
||||
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
@@ -51,4 +51,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 500
|
||||
# digest: 4b0a00483046022100f4753441f051d667e946c325ac87b7b2e2f0e524d40153c9975e1062ab6026d9022100b15999b68d102a16a8e3ca878e841266976f68394bcfe998cdd6d0b3d112d3ca:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220241cb1696b2695174024e51b8299ab6725fb54831323ac3ad3d2725dfc44c2fb022100ca8de97cd6a3a448d01fb33c2f46986b0b22296a8e3bbfa409a12e31ec4f8e11:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2008-7269
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.04298
|
||||
epss-percentile: 0.88519
|
||||
epss-percentile: 0.88528
|
||||
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: "true"
|
||||
@@ -43,4 +43,4 @@ http:
|
||||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
# digest: 4a0a00473045022054310a22ab60853a707d289be66bef985fdbcaf28a129f12b3f3c635be27ff04022100c660b8eb7c593d9259aa422c2cea13c56c025c31e72978d42d4a8d56607c270e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022054c93fd88409d402877564ccc718dbc2e32cdf9f8bd69fa5d1fe7063b425bc54022100e90a0b74d72667d39a6ac0e3b16f7530706e6b18a8152532c163366a6784af4d:922c64590222798bb761d5b6d8e72950
|
||||
@@ -22,7 +22,7 @@ info:
|
||||
cve-id: CVE-2009-0347
|
||||
cwe-id: CWE-59
|
||||
epss-score: 0.03639
|
||||
epss-percentile: 0.87489
|
||||
epss-percentile: 0.87496
|
||||
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -40,4 +40,4 @@ http:
|
||||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
# digest: 490a00463044022041c003cd7dd0950c4ba45a1d95ebf990967c24019768a647cd86539762fe79b702207af500d081922a844e77c2e26f615bd6008234b5b1ba8294e1720e92ec037640:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100e93ab900f574dd13a5252188627288dbc4a3957ed807e866dac6560483c6338702202f75fa0db8dc4968ac9e0596cc838998a3600c340f09189a9d950abc4b4209e6:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2009-0932
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05612
|
||||
epss-percentile: 0.9005
|
||||
epss-percentile: 0.90058
|
||||
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -43,4 +43,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a0046304402200bfe958f1555d149c53f037d44e1c0c074a375ebce511ce35e44d96dc16084230220313afab3817449b57308ccdb0040085e5f6e8ccf4c684b1464642290097634de:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220176c1e471300d14c410c4cacaad04b5b252ccabd445696f807b8818a72db01f802203b966d595ff5873820c8a56d5dc284e09281f62d6d6b76962f96e301cf43231e:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2009-1496
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01909
|
||||
epss-percentile: 0.82828
|
||||
epss-percentile: 0.82835
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -42,4 +42,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a0046304402200da36523a3a6e833daa84fdf70de711257a4cd3b2bfa8bb43c051567b192ef7e0220013869981588a320d42cc4ec4368b7dbddf5763fd7f5ef321be7fa8fed0194e5:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100ef805d86bbc3b6ea849e5d82584ce89e1b631c76d65f734b15f22577bf22939e02203e656f8b17a40c8838771871d67096af65401ac03ef21b5cd3ddc2b12a97c54e:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2009-1558
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.09101
|
||||
epss-percentile: 0.92411
|
||||
epss-percentile: 0.92413
|
||||
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2009-1872
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.08673
|
||||
epss-percentile: 0.92193
|
||||
epss-percentile: 0.92197
|
||||
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
@@ -59,4 +59,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a004730450221008ee73ac3151f4942996e65ecbea9543e3a89a745a18830db230d89346a098806022072b90b6f4f48cdfc73258d7c30a6526523bdc16ac143ada13c7c4cf7862c5d18:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502203f3bbfe30308f97112f28db30001b1b0252d79eae9d3da71a048f9267868719b022100eec859bff1c18da9372d9dc8d023e2d3d7f60ffa971df2d651b19ae0909d3075:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2009-2015
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02124
|
||||
epss-percentile: 0.83699
|
||||
epss-percentile: 0.83707
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -42,4 +42,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100fd80d15bc547b2d4a1140ddbae15583af0b19cab9ab21b833336282b22688211022100859eacae874f54f1c5798fa27e148bde5bd663db26a52fe5249d8d6ee6c496b4:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502202f21d39514e59a17919ef4794417e9f47cab24f9af053077d4a006eb3b936479022100f7b04be3202781400d02226047aebfad9495f4cae7f6afbb869f4896f78b13b6:922c64590222798bb761d5b6d8e72950
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2009-2100
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01858
|
||||
epss-percentile: 0.82586
|
||||
epss-percentile: 0.82595
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -41,4 +41,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a004830460221009d283735f80dd53d86ef9013292a100ed31346ed5e21c25b4f6f4550381931eb022100c370a92ffd8a85ca89bb31d7518059ee1d4e7911e76e019da6013e7bf2ccef05:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100c3aadb256b762171628a054ad2b342504b255534edf9b6a7407015393c169166022100d232ff87e0597e6601059cdc2bc8f13ed5a6244b3a03a8215460014dd0e385f4:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2009-3053
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01573
|
||||
epss-percentile: 0.81106
|
||||
epss-percentile: 0.81118
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -43,4 +43,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022048e307a769535e8c7fc683a031edd806f71743b9a950daaec844ea4d8cd2db98022100c73ab2c0f662fd0498495999ef6c9277c47d612ff231789e8930b246a601e084:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100e83ea4173400026c88365946d01cfdfb20ed680ee344781a4d0de275f9c472fd022100eb17c05bbd8b269f9fb5ad40393c6047d8b73b4badc719c9f775c254460a6682:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2009-3318
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01442
|
||||
epss-percentile: 0.8031
|
||||
epss-percentile: 0.80318
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2009-4202
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04613
|
||||
epss-percentile: 0.88923
|
||||
epss-percentile: 0.8893
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2009-4223
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.04261
|
||||
epss-percentile: 0.88472
|
||||
epss-percentile: 0.88481
|
||||
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -44,4 +44,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a00463044022078105dda6a8aad36aeae2e9ea6436f19e75d00a4d343662070e8138e55742a1b022027da2fc4e37ee4ad9e98a96cbbc155fbd290c315f94f10ce0b937585d586a23c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100d0287795443b00c86e1844e13a9bb41c3ff09d7ed0539b0c3686da098ed44b3d02203264f1b95a77f5d45ffa092b8d7ea3382c13306b5b093c7ef3996b35ed49fe6f:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2009-4679
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.23302
|
||||
epss-percentile: 0.95768
|
||||
epss-percentile: 0.95769
|
||||
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -18,7 +18,7 @@ info:
|
||||
cve-id: CVE-2009-5020
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.01473
|
||||
epss-percentile: 0.8052
|
||||
epss-percentile: 0.80532
|
||||
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2009-5114
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.08663
|
||||
epss-percentile: 0.92187
|
||||
epss-percentile: 0.92191
|
||||
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -42,4 +42,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100a4e2d5c985215e6dba01fcd6d0f7e4736e6fc41dc40d3b4cbc41667ed7a43be702201a435474508ecfe73547b8a9b78510e6db465b1aadd72361eac142002092c7d4:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022001de1eb28161a1c3f49a5e955847628ce48f680c2f49fbec28473fb91abdb916022100b1ec8b1fed802b4b05f5b50866aaf57b63fcdcb91b75b6a005e69bd75c5ea932:922c64590222798bb761d5b6d8e72950
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2010-0157
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06394
|
||||
epss-percentile: 0.9073
|
||||
epss-percentile: 0.90734
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-0467
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02939
|
||||
epss-percentile: 0.86029
|
||||
epss-percentile: 0.86033
|
||||
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-0696
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.16031
|
||||
epss-percentile: 0.94563
|
||||
epss-percentile: 0.94566
|
||||
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-0759
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06371
|
||||
epss-percentile: 0.90714
|
||||
epss-percentile: 0.90718
|
||||
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-0942
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.1146
|
||||
epss-percentile: 0.93379
|
||||
epss-percentile: 0.93384
|
||||
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-0943
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.14795
|
||||
epss-percentile: 0.94291
|
||||
epss-percentile: 0.94295
|
||||
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-0944
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01386
|
||||
epss-percentile: 0.79908
|
||||
epss-percentile: 0.79919
|
||||
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -42,4 +42,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a004830460221009ec357ae21b42c6869e77a9482ca3e865f82683fb218e48cf94cacd494ad002e022100f723641ab8abdf2979bd081774640b9c8aa399305e654ce9c6b9b977b87777a1:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022056a8f87479b024017d118602af9219dbdb589970ec99376ff8d982cf22e2b849022100d4552590d202a824d5bedf54cebfeb3385098568dc3942fe3d82d7cff8a9bf4f:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-0972
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04611
|
||||
epss-percentile: 0.88919
|
||||
epss-percentile: 0.88925
|
||||
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -42,4 +42,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100e76854615c72dacee991f8a8ff9bdd151c8e74c1f8d65aebe9c55b0bb08b3fd80221009c5073f9f3c0fea1a34984242b8df45a72c51799e14b865f23ea703c85d48343:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100e75b306e41c534528961c2bd78aa4cb81ff0d9cbbc0ef3353fdf90918bdfe7dc022100b83ddcb881f45d19af601898bb69c9f8be3035aa685feedb2f86a72d9b6a3622:922c64590222798bb761d5b6d8e72950
|
||||
@@ -17,7 +17,7 @@ info:
|
||||
cve-id: CVE-2010-0982
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.19995
|
||||
epss-percentile: 0.95278
|
||||
epss-percentile: 0.95281
|
||||
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-0985
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.21353
|
||||
epss-percentile: 0.95511
|
||||
epss-percentile: 0.95513
|
||||
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-1056
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04792
|
||||
epss-percentile: 0.89156
|
||||
epss-percentile: 0.89161
|
||||
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2010-1081
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05904
|
||||
epss-percentile: 0.9032
|
||||
epss-percentile: 0.90326
|
||||
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -41,4 +41,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100b4875afbd57b1572f5bf0bbf15065ab92c260799443ed040a35320575563757202205f50760aa86bbd307ea688d3f20d20e3c7f34f95a60428838242060ae15f54ab:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100ccc4ed6707ab03064c60106c3bec575663b910873c66f75bc56cd894a8b2333e02207efb0f8174f1ddd1ca7ba8fc7451390eea0753bd823f96d1f3459c37eac39d98:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-1217
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.07857
|
||||
epss-percentile: 0.91731
|
||||
epss-percentile: 0.91737
|
||||
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -42,4 +42,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a0047304502210083f2c5bc8002a1b3d0fb00375a9f0b895584a605d08e58b5b28197b542af0c0a02205a9ae939e961f1a3c0f51b409fa9324fb78c2b3b1b6f835746dc969691338c81:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022072aa9d20f061c0549624b1b03890baebd5e6da31701a1447df614b02fbbc6f4c022100c258aab329f28754dca0e47169cb39d9b6ef5607236097f9578fe29bea3ad98e:922c64590222798bb761d5b6d8e72950
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2010-1219
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.27216
|
||||
epss-percentile: 0.96233
|
||||
epss-percentile: 0.96236
|
||||
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -18,7 +18,7 @@ info:
|
||||
cve-id: CVE-2010-1302
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.13471
|
||||
epss-percentile: 0.93984
|
||||
epss-percentile: 0.9399
|
||||
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -40,4 +40,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a0046304402204fd03977886a556fcc68ebb4f06ca9dc1f0d1e004e6a7bbc620a660a646f908a022056eca5c0f36411aba06c6ccb41b857b7961195e7c28aaa01ceb71233e2ed2106:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100ef14880d617191efae1ef7f5df4746596d7936e271e6b43b051699c3891138c3022032eb0d09a338927f97e9c1fe99533294bbc4262b53295f53e4a21daaf0ce923e:922c64590222798bb761d5b6d8e72950
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2010-1304
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03144
|
||||
epss-percentile: 0.86491
|
||||
epss-percentile: 0.86495
|
||||
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-1305
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06216
|
||||
epss-percentile: 0.90579
|
||||
epss-percentile: 0.90584
|
||||
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -42,4 +42,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a004730450220550358ab565cd26560a538e751d9d2b3052964e1e1e03f1255fe0aa9de0efbd6022100cc2b6d2848d752ea263448646dbe185236973ff680b17b4d1a13b7a2f326b96b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100b335a784f7a815584e8b73108ee0182b538cfe83b4bf04a47be806345f6197ba022060dec4402c0c4052f644e817e12eb6d1a7e56fe459c97f1a658ab31b71c2dd6a:922c64590222798bb761d5b6d8e72950
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2010-1306
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05015
|
||||
epss-percentile: 0.89402
|
||||
epss-percentile: 0.89409
|
||||
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
@@ -41,4 +41,4 @@ http:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a0046304402207106fefdde74e8253b13475c65cb8f7142ca72a7e4884953b30914bae67e0b910220292fa7ee80ae37df6b2b650b39a3355ab8f42b2098abff445998e412bd232ec8:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502202840c6894c995574885d13b7134e7984145b8f8a2f7bf137d7b6dbc02e85e970022100c979cc9967b57131b60598639b2ad3ee08a63c8ce99e9179df3ba935118807da:922c64590222798bb761d5b6d8e72950
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2010-1307
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.15744
|
||||
epss-percentile: 0.94502
|
||||
epss-percentile: 0.94506
|
||||
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user