TemplateMan Update [Mon Nov 6 15:02:07 UTC 2023] 🤖
parent
cb86e8c37a
commit
191b11bb5a
|
@ -18,7 +18,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2018-0296
|
||||
cwe-id: CWE-22,CWE-20
|
||||
cwe-id: CWE-20,CWE-22
|
||||
epss-score: 0.97359
|
||||
epss-percentile: 0.99865
|
||||
cpe: cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -22,7 +22,7 @@ info:
|
|||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2018-1273
|
||||
cwe-id: CWE-20,CWE-94
|
||||
cwe-id: CWE-94,CWE-20
|
||||
epss-score: 0.97498
|
||||
epss-percentile: 0.99973
|
||||
cpe: cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2018-3760
|
||||
cwe-id: CWE-200,CWE-22
|
||||
cwe-id: CWE-22,CWE-200
|
||||
epss-score: 0.05013
|
||||
epss-percentile: 0.91983
|
||||
cpe: cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2020-15227
|
||||
cwe-id: CWE-74,CWE-94
|
||||
cwe-id: CWE-94,CWE-74
|
||||
epss-score: 0.97307
|
||||
epss-percentile: 0.99833
|
||||
cpe: cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2020-17518
|
||||
cwe-id: CWE-22,CWE-23
|
||||
cwe-id: CWE-23,CWE-22
|
||||
epss-score: 0.97459
|
||||
epss-percentile: 0.99948
|
||||
cpe: cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -14,7 +14,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
|
||||
cvss-score: 6.5
|
||||
cve-id: CVE-2020-5405
|
||||
cwe-id: CWE-23,CWE-22
|
||||
cwe-id: CWE-22,CWE-23
|
||||
epss-score: 0.00258
|
||||
epss-percentile: 0.63404
|
||||
cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -36,4 +36,5 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
|
||||
# digest: 4a0a004730450220371f27b072e07848d8d63e93e6dd32d2ebf784afb289109d676e7bf0f4df7f61022100d6b1d6f8bccca5fa3551a5d1033cea27d9b0166193ce2bb320b89ec225489a7c:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a004730450220371f27b072e07848d8d63e93e6dd32d2ebf784afb289109d676e7bf0f4df7f61022100d6b1d6f8bccca5fa3551a5d1033cea27d9b0166193ce2bb320b89ec225489a7c:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
|
||||
cvss-score: 8.6
|
||||
cve-id: CVE-2021-32820
|
||||
cwe-id: CWE-94,CWE-200
|
||||
cwe-id: CWE-200,CWE-94
|
||||
epss-score: 0.00929
|
||||
epss-percentile: 0.81279
|
||||
cpe: cpe:2.3:a:express_handlebars_project:express_handlebars:*:*:*:*:*:node.js:*:*
|
||||
|
|
|
@ -14,7 +14,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2021-38540
|
||||
cwe-id: CWE-269,CWE-306
|
||||
cwe-id: CWE-306,CWE-269
|
||||
epss-score: 0.00588
|
||||
epss-percentile: 0.759
|
||||
cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
|
||||
cvss-score: 8.5
|
||||
cve-id: CVE-2021-39144
|
||||
cwe-id: CWE-306,CWE-502
|
||||
cwe-id: CWE-502,CWE-306
|
||||
epss-score: 0.96508
|
||||
epss-percentile: 0.99453
|
||||
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
||||
cvss-score: 9.1
|
||||
cve-id: CVE-2022-0482
|
||||
cwe-id: CWE-359,CWE-863
|
||||
cwe-id: CWE-863,CWE-359
|
||||
epss-score: 0.06254
|
||||
epss-percentile: 0.92812
|
||||
cpe: cpe:2.3:a:easyappointments:easyappointments:*:*:*:*:*:wordpress:*:*
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 8.8
|
||||
cve-id: CVE-2022-1329
|
||||
cwe-id: CWE-862,CWE-434
|
||||
cwe-id: CWE-434,CWE-862
|
||||
epss-score: 0.96468
|
||||
epss-percentile: 0.99438
|
||||
cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2022-1815
|
||||
cwe-id: CWE-918,CWE-200
|
||||
cwe-id: CWE-200,CWE-918
|
||||
epss-score: 0.00928
|
||||
epss-percentile: 0.81273
|
||||
cpe: cpe:2.3:a:diagrams:drawio:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
||||
cvss-score: 10
|
||||
cve-id: CVE-2022-22947
|
||||
cwe-id: CWE-917,CWE-94
|
||||
cwe-id: CWE-94,CWE-917
|
||||
epss-score: 0.97481
|
||||
epss-percentile: 0.99964
|
||||
cpe: cpe:2.3:a:vmware:spring_cloud_gateway:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
|
||||
cvss-score: 8.6
|
||||
cve-id: CVE-2022-24900
|
||||
cwe-id: CWE-22,CWE-668
|
||||
cwe-id: CWE-668,CWE-22
|
||||
epss-score: 0.01655
|
||||
epss-percentile: 0.8621
|
||||
cpe: cpe:2.3:a:piano_led_visualizer_project:piano_led_visualizer:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 6.1
|
||||
cve-id: CVE-2022-3242
|
||||
cwe-id: CWE-79,CWE-94
|
||||
cwe-id: CWE-94,CWE-79
|
||||
epss-score: 0.02392
|
||||
epss-percentile: 0.88709
|
||||
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
|
||||
|
|
|
@ -45,4 +45,5 @@ http:
|
|||
- '!contains(body_1, "/index.html")'
|
||||
- 'contains_any(tolower(body_1), "<TITLE>DELL DPI Remote Power Management", "title=\"DELL DPI Remote Power Management")'
|
||||
condition: and
|
||||
# digest: 4a0a0047304502207ec3715d4ce799a65597cc52dda3045bd8212193918fb00d7639d9c737068a33022100e94aa17ac15af55326a8ed2f244192b2d5d309fc753539a92bf72d15b74bf963:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a0047304502207ec3715d4ce799a65597cc52dda3045bd8212193918fb00d7639d9c737068a33022100e94aa17ac15af55326a8ed2f244192b2d5d309fc753539a92bf72d15b74bf963:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -28,4 +28,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a0047304502206d051dd5350c45cabe20dcc3a29e0c3b3bfcbe3018bd85d7e3ca3d2e22b83f53022100888c309964c9101cf88e77b4b6119572e08e0337fc0278f051f6f81b1f19bb82:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a0047304502206d051dd5350c45cabe20dcc3a29e0c3b3bfcbe3018bd85d7e3ca3d2e22b83f53022100888c309964c9101cf88e77b4b6119572e08e0337fc0278f051f6f81b1f19bb82:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -28,4 +28,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a004730450221008e1cd471794706318028b22b8379122afa34e0cc93c85d75cc553dcb2aa1c809022055f96b17665cee77dee5aad079c39721771337017e54091518b6a68aa95d38e8:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a004730450221008e1cd471794706318028b22b8379122afa34e0cc93c85d75cc553dcb2aa1c809022055f96b17665cee77dee5aad079c39721771337017e54091518b6a68aa95d38e8:922c64590222798bb761d5b6d8e72950
|
||||
|
|
Loading…
Reference in New Issue