TemplateMan Update [Mon Nov 6 15:02:07 UTC 2023] 🤖

patch-1
GitHub Action 2023-11-06 15:02:07 +00:00
parent cb86e8c37a
commit 191b11bb5a
19 changed files with 23 additions and 19 deletions

View File

@ -18,7 +18,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 7.5
cve-id: CVE-2018-0296
cwe-id: CWE-22,CWE-20
cwe-id: CWE-20,CWE-22
epss-score: 0.97359
epss-percentile: 0.99865
cpe: cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*

View File

@ -22,7 +22,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-1273
cwe-id: CWE-20,CWE-94
cwe-id: CWE-94,CWE-20
epss-score: 0.97498
epss-percentile: 0.99973
cpe: cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:*

View File

@ -18,7 +18,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2018-3760
cwe-id: CWE-200,CWE-22
cwe-id: CWE-22,CWE-200
epss-score: 0.05013
epss-percentile: 0.91983
cpe: cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*

View File

@ -17,7 +17,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-15227
cwe-id: CWE-74,CWE-94
cwe-id: CWE-94,CWE-74
epss-score: 0.97307
epss-percentile: 0.99833
cpe: cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*

View File

@ -18,7 +18,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
cvss-score: 7.5
cve-id: CVE-2020-17518
cwe-id: CWE-22,CWE-23
cwe-id: CWE-23,CWE-22
epss-score: 0.97459
epss-percentile: 0.99948
cpe: cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*

View File

@ -14,7 +14,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
cvss-score: 6.5
cve-id: CVE-2020-5405
cwe-id: CWE-23,CWE-22
cwe-id: CWE-22,CWE-23
epss-score: 0.00258
epss-percentile: 0.63404
cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:*

View File

@ -36,4 +36,5 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
# digest: 4a0a004730450220371f27b072e07848d8d63e93e6dd32d2ebf784afb289109d676e7bf0f4df7f61022100d6b1d6f8bccca5fa3551a5d1033cea27d9b0166193ce2bb320b89ec225489a7c:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cve-id: CVE-2021-32820
cwe-id: CWE-94,CWE-200
cwe-id: CWE-200,CWE-94
epss-score: 0.00929
epss-percentile: 0.81279
cpe: cpe:2.3:a:express_handlebars_project:express_handlebars:*:*:*:*:*:node.js:*:*

View File

@ -14,7 +14,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-38540
cwe-id: CWE-269,CWE-306
cwe-id: CWE-306,CWE-269
epss-score: 0.00588
epss-percentile: 0.759
cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

View File

@ -18,7 +18,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
cvss-score: 8.5
cve-id: CVE-2021-39144
cwe-id: CWE-306,CWE-502
cwe-id: CWE-502,CWE-306
epss-score: 0.96508
epss-percentile: 0.99453
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*

View File

@ -18,7 +18,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2022-0482
cwe-id: CWE-359,CWE-863
cwe-id: CWE-863,CWE-359
epss-score: 0.06254
epss-percentile: 0.92812
cpe: cpe:2.3:a:easyappointments:easyappointments:*:*:*:*:*:wordpress:*:*

View File

@ -16,7 +16,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2022-1329
cwe-id: CWE-862,CWE-434
cwe-id: CWE-434,CWE-862
epss-score: 0.96468
epss-percentile: 0.99438
cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*

View File

@ -17,7 +17,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-1815
cwe-id: CWE-918,CWE-200
cwe-id: CWE-200,CWE-918
epss-score: 0.00928
epss-percentile: 0.81273
cpe: cpe:2.3:a:diagrams:drawio:*:*:*:*:*:*:*:*

View File

@ -17,7 +17,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2022-22947
cwe-id: CWE-917,CWE-94
cwe-id: CWE-94,CWE-917
epss-score: 0.97481
epss-percentile: 0.99964
cpe: cpe:2.3:a:vmware:spring_cloud_gateway:*:*:*:*:*:*:*:*

View File

@ -17,7 +17,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cve-id: CVE-2022-24900
cwe-id: CWE-22,CWE-668
cwe-id: CWE-668,CWE-22
epss-score: 0.01655
epss-percentile: 0.8621
cpe: cpe:2.3:a:piano_led_visualizer_project:piano_led_visualizer:*:*:*:*:*:*:*:*

View File

@ -15,7 +15,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-3242
cwe-id: CWE-79,CWE-94
cwe-id: CWE-94,CWE-79
epss-score: 0.02392
epss-percentile: 0.88709
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*

View File

@ -45,4 +45,5 @@ http:
- '!contains(body_1, "/index.html")'
- 'contains_any(tolower(body_1), "<TITLE>DELL DPI Remote Power Management", "title=\"DELL DPI Remote Power Management")'
condition: and
# digest: 4a0a0047304502207ec3715d4ce799a65597cc52dda3045bd8212193918fb00d7639d9c737068a33022100e94aa17ac15af55326a8ed2f244192b2d5d309fc753539a92bf72d15b74bf963:922c64590222798bb761d5b6d8e72950

View File

@ -28,4 +28,5 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502206d051dd5350c45cabe20dcc3a29e0c3b3bfcbe3018bd85d7e3ca3d2e22b83f53022100888c309964c9101cf88e77b4b6119572e08e0337fc0278f051f6f81b1f19bb82:922c64590222798bb761d5b6d8e72950

View File

@ -28,4 +28,5 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450221008e1cd471794706318028b22b8379122afa34e0cc93c85d75cc553dcb2aa1c809022055f96b17665cee77dee5aad079c39721771337017e54091518b6a68aa95d38e8:922c64590222798bb761d5b6d8e72950