mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-12 13:43:24 +08:00
chore: update EPSS scores 🤖
This commit is contained in:
@@ -17,8 +17,8 @@ info:
|
||||
cvss-score: 5.1
|
||||
cve-id: CVE-2012-2122
|
||||
cwe-id: CWE-287
|
||||
epss-score: 0.94033
|
||||
epss-percentile: 0.99862
|
||||
epss-score: 0.9407
|
||||
epss-percentile: 0.99895
|
||||
cpe: cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -18,7 +18,7 @@ info:
|
||||
cve-id: CVE-2016-8706
|
||||
cwe-id: CWE-190
|
||||
epss-score: 0.68629
|
||||
epss-percentile: 0.98344
|
||||
epss-percentile: 0.98555
|
||||
cpe: cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -13,6 +13,8 @@ info:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2018-0171
|
||||
epss-score: 0.93524
|
||||
epss-percentile: 0.99823
|
||||
cwe-id: CWE-20
|
||||
cpe: cpe:2.3:o:cisco:ios:15.2\(5\)e:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
|
||||
@@ -13,7 +13,8 @@ info:
|
||||
max-request: 1
|
||||
shodan-query: "product:\"PostgreSQL\""
|
||||
classification:
|
||||
epss-score: 0.93652
|
||||
epss-score: 0.93587
|
||||
epss-percentile: 0.99829
|
||||
tags: cve,cve2018,js,network,postgresql,intrusive
|
||||
|
||||
|
||||
|
||||
@@ -21,7 +21,7 @@ info:
|
||||
cve-id: CVE-2020-7247
|
||||
cwe-id: CWE-755
|
||||
epss-score: 0.94036
|
||||
epss-percentile: 0.99892
|
||||
epss-percentile: 0.9989
|
||||
cpe: cpe:2.3:a:openbsd:opensmtpd:6.6:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
||||
@@ -11,6 +11,7 @@ info:
|
||||
- https://blogs.juniper.net/en-us/threat-research/realtek-cve-2021-35394-exploited-in-the-wild
|
||||
classification:
|
||||
epss-score: 0.94335
|
||||
epss-percentile: 0.99947
|
||||
tags: cve,cve2021,realtek,rce,kev
|
||||
|
||||
javascript:
|
||||
|
||||
@@ -19,8 +19,8 @@ info:
|
||||
cvss-score: 5.9
|
||||
cve-id: CVE-2023-48795
|
||||
cwe-id: CWE-354
|
||||
epss-score: 0.76026
|
||||
epss-percentile: 0.98491
|
||||
epss-score: 0.7623
|
||||
epss-percentile: 0.98884
|
||||
cpe: cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -16,8 +16,8 @@ info:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2024-23897
|
||||
epss-score: 0.94466
|
||||
epss-percentile: 0.99993
|
||||
epss-score: 0.94442
|
||||
epss-percentile: 0.99989
|
||||
cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
||||
@@ -11,6 +11,7 @@ info:
|
||||
- https://blog.projectdiscovery.io/zimbra-remote-code-execution/
|
||||
classification:
|
||||
epss-score: 0.9415
|
||||
epss-percentile: 0.99905
|
||||
cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
vendor: synacor
|
||||
|
||||
@@ -23,7 +23,7 @@ info:
|
||||
cve-id: CVE-2024-47176
|
||||
cwe-id: CWE-1327
|
||||
epss-score: 0.91689
|
||||
epss-percentile: 0.99664
|
||||
epss-percentile: 0.99669
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: "product:cups"
|
||||
|
||||
Reference in New Issue
Block a user