mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
chore: update EPSS scores 🤖
This commit is contained in:
@@ -17,8 +17,8 @@ info:
|
||||
cvss-score: 5.1
|
||||
cve-id: CVE-2012-2122
|
||||
cwe-id: CWE-287
|
||||
epss-score: 0.94058
|
||||
epss-percentile: 0.99896
|
||||
epss-score: 0.9407
|
||||
epss-percentile: 0.99895
|
||||
cpe: cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -18,7 +18,7 @@ info:
|
||||
cve-id: CVE-2016-8706
|
||||
cwe-id: CWE-190
|
||||
epss-score: 0.68629
|
||||
epss-percentile: 0.98538
|
||||
epss-percentile: 0.98555
|
||||
cpe: cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
cve-id: CVE-2020-2883
|
||||
cwe-id: CWE-502
|
||||
epss-score: 0.94398
|
||||
epss-percentile: 0.9997
|
||||
epss-percentile: 0.99973
|
||||
cpe: cpe:2.3:a:oracle:weblogic_server:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2020-4429
|
||||
cwe-id: CWE-798
|
||||
epss-score: 0.80629
|
||||
epss-percentile: 0.99088
|
||||
epss-percentile: 0.99093
|
||||
cpe: cpe:2.3:a:ibm:data_risk_manager:2.0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: false
|
||||
|
||||
@@ -20,8 +20,8 @@ info:
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2020-7247
|
||||
cwe-id: CWE-755
|
||||
epss-score: 0.9396
|
||||
epss-percentile: 0.99876
|
||||
epss-score: 0.93848
|
||||
epss-percentile: 0.99857
|
||||
cpe: cpe:2.3:a:openbsd:opensmtpd:6.6:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -11,7 +11,7 @@ info:
|
||||
- https://blogs.juniper.net/en-us/threat-research/realtek-cve-2021-35394-exploited-in-the-wild
|
||||
classification:
|
||||
epss-score: 0.94335
|
||||
epss-percentile: 0.99947
|
||||
epss-percentile: 0.99949
|
||||
tags: cve,cve2021,realtek,rce,kev,vkev,vuln
|
||||
|
||||
javascript:
|
||||
|
||||
@@ -23,7 +23,7 @@ info:
|
||||
cve-id: CVE-2023-34039
|
||||
cwe-id: CWE-327
|
||||
epss-score: 0.93246
|
||||
epss-percentile: 0.99791
|
||||
epss-percentile: 0.99789
|
||||
cpe: cpe:2.3:a:vmware:aria_operations_for_networks:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -20,7 +20,7 @@ info:
|
||||
cve-id: CVE-2023-48795
|
||||
cwe-id: CWE-354
|
||||
epss-score: 0.61406
|
||||
epss-percentile: 0.98218
|
||||
epss-percentile: 0.98235
|
||||
cpe: cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -16,8 +16,8 @@ info:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2024-23897
|
||||
epss-score: 0.94466
|
||||
epss-percentile: 0.99994
|
||||
epss-score: 0.94476
|
||||
epss-percentile: 0.99997
|
||||
cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
Reference in New Issue
Block a user