TemplateMan Update [Mon Apr 8 11:30:07 UTC 2024] 🤖

patch-1
GitHub Action 2024-04-08 11:30:07 +00:00
parent 465915c16e
commit 433dda4ae5
2075 changed files with 3395 additions and 3315 deletions

View File

@ -9,7 +9,7 @@ info:
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
tags: cloud,enum,cloud-enum,azure tags: cloud,enum,cloud-enum,azure,dns
self-contained: true self-contained: true

View File

@ -9,7 +9,7 @@ info:
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
tags: cloud,cloud-enum,azure,fuzz,enum tags: cloud,cloud-enum,azure,fuzz,enum,dns
self-contained: true self-contained: true

View File

@ -25,7 +25,7 @@ info:
max-request: 2 max-request: 2
vendor: sudo_project vendor: sudo_project
product: sudo product: sudo
tags: packetstorm,cve,cve2019,sudo,code,linux,privesc,local,canonical tags: packetstorm,cve,cve2019,sudo,code,linux,privesc,local,canonical,sudo_project
self-contained: true self-contained: true
code: code:

View File

@ -24,7 +24,7 @@ info:
verified: true verified: true
vendor: sudo_project vendor: sudo_project
product: sudo product: sudo
tags: packetstorm,cve,cve2021,sudo,code,linux,privesc,local,kev tags: packetstorm,cve,cve2021,sudo,code,linux,privesc,local,kev,sudo_project
self-contained: true self-contained: true
code: code:

View File

@ -24,7 +24,7 @@ info:
max-request: 1 max-request: 1
vendor: gnu vendor: gnu
product: glibc product: glibc
tags: cve,cve2023,code,glibc,looneytunables,linux,privesc,local,kev tags: cve,cve2023,code,glibc,looneytunables,linux,privesc,local,kev,gnu
self-contained: true self-contained: true
code: code:

View File

@ -18,13 +18,13 @@ info:
cve-id: CVE-2023-6246 cve-id: CVE-2023-6246
cwe-id: CWE-787,CWE-122 cwe-id: CWE-787,CWE-122
epss-score: 0.0077 epss-score: 0.0077
epss-percentile: 0.80859 epss-percentile: 0.80911
cpe: cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1
vendor: gnu vendor: gnu
product: glibc product: glibc
tags: cve,cve2023,code,glibc,linux,privesc,local tags: cve,cve2023,code,glibc,linux,privesc,local,gnu
self-contained: true self-contained: true
code: code:

View File

@ -11,7 +11,7 @@ info:
metadata: metadata:
verified: true verified: true
max-request: 3 max-request: 3
tags: code,linux,sqlite3,privesc,local tags: code,linux,sqlite3,privesc,local,sqli
self-contained: true self-contained: true
code: code:

View File

@ -17,6 +17,7 @@ info:
cve-id: CVE-2018-19518 cve-id: CVE-2018-19518
cwe-id: CWE-88 cwe-id: CWE-88
metadata: metadata:
max-request: 1
confidence: tenative confidence: tenative
tags: imap,dast,vulhub,cve,cve2018,rce,oast,php tags: imap,dast,vulhub,cve,cve2018,rce,oast,php

View File

@ -17,6 +17,7 @@ info:
cve-id: CVE-2021-45046 cve-id: CVE-2021-45046
cwe-id: CWE-502 cwe-id: CWE-502
metadata: metadata:
max-request: 1
confidence: tenative confidence: tenative
tags: cve,cve2021,rce,oast,log4j,injection,dast tags: cve,cve2021,rce,oast,log4j,injection,dast

View File

@ -6,19 +6,20 @@ info:
severity: critical severity: critical
description: | description: |
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default. Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
remediation: Upgrade to Apache Commons Text component between 1.5.0 to 1.10.0.
reference: reference:
- https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om - https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om
- http://www.openwall.com/lists/oss-security/2022/10/13/4 - http://www.openwall.com/lists/oss-security/2022/10/13/4
- http://www.openwall.com/lists/oss-security/2022/10/18/1 - http://www.openwall.com/lists/oss-security/2022/10/18/1
- https://securitylab.github.com/advisories/GHSL-2022-018_Apache_Commons_Text/ - https://securitylab.github.com/advisories/GHSL-2022-018_Apache_Commons_Text/
- https://github.com/silentsignal/burp-text4shell - https://github.com/silentsignal/burp-text4shell
remediation: Upgrade to Apache Commons Text component between 1.5.0 to 1.10.0.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2022-42889 cve-id: CVE-2022-42889
cwe-id: CWE-94 cwe-id: CWE-94
metadata: metadata:
max-request: 1
confidence: tenative confidence: tenative
tags: cve,cve2022,rce,oast,text4shell,dast tags: cve,cve2022,rce,oast,text4shell,dast

View File

@ -5,11 +5,13 @@ info:
author: pdteam,geeknik author: pdteam,geeknik
severity: high severity: high
description: | description: |
Potential blind OS command injection vulnerabilities, where the application constructs OS commands using unsanitized user input. Potential blind OS command injection vulnerabilities, where the application constructs OS commands using unsanitized user input.
Successful exploitation could lead to arbitrary command execution on the system. Successful exploitation could lead to arbitrary command execution on the system.
reference: reference:
- https://portswigger.net/research/hunting-asynchronous-vulnerabilities - https://portswigger.net/research/hunting-asynchronous-vulnerabilities
- https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Command%20Injection/README.md - https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Command%20Injection/README.md
metadata:
max-request: 4
tags: cmdi,oast,dast,blind,polyglot tags: cmdi,oast,dast,blind,polyglot
variables: variables:

View File

@ -5,10 +5,12 @@ info:
author: pdteam author: pdteam
severity: high severity: high
description: | description: |
Ruby's Kernel#open and URI.open enables not only file access but also process invocation by prefixing a pipe symbol (e.g., open(“| ls”)). So, it may lead to Remote Code Execution by using variable input to the argument of Kernel#open and URI.open. Ruby's Kernel#open and URI.open enables not only file access but also process invocation by prefixing a pipe symbol (e.g., open(“| ls”)). So, it may lead to Remote Code Execution by using variable input to the argument of Kernel#open and URI.open.
reference: reference:
- https://bishopfox.com/blog/ruby-vulnerabilities-exploits - https://bishopfox.com/blog/ruby-vulnerabilities-exploits
- https://codeql.github.com/codeql-query-help/ruby/rb-kernel-open/ - https://codeql.github.com/codeql-query-help/ruby/rb-kernel-open/
metadata:
max-request: 1
tags: cmdi,oast,dast,blind,ruby,rce tags: cmdi,oast,dast,blind,ruby,rce
variables: variables:

View File

@ -7,6 +7,8 @@ info:
reference: reference:
- https://www.invicti.com/blog/web-security/understanding-cookie-poisoning-attacks/ - https://www.invicti.com/blog/web-security/understanding-cookie-poisoning-attacks/
- https://docs.imperva.com/bundle/on-premises-knowledgebase-reference-guide/page/cookie_injection.htm - https://docs.imperva.com/bundle/on-premises-knowledgebase-reference-guide/page/cookie_injection.htm
metadata:
max-request: 1
tags: reflected,dast,cookie,injection tags: reflected,dast,cookie,injection
variables: variables:

View File

@ -4,6 +4,8 @@ info:
name: CRLF Injection name: CRLF Injection
author: pdteam author: pdteam
severity: low severity: low
metadata:
max-request: 41
tags: crlf,dast tags: crlf,dast
http: http:

View File

@ -6,6 +6,8 @@ info:
severity: unknown severity: unknown
reference: reference:
- https://owasp.org/www-community/attacks/Unicode_Encoding - https://owasp.org/www-community/attacks/Unicode_Encoding
metadata:
max-request: 25
tags: dast,pathtraversal,lfi tags: dast,pathtraversal,lfi
variables: variables:

View File

@ -7,6 +7,8 @@ info:
reference: reference:
- https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Directory%20Traversal/Intruder/directory_traversal.txt - https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Directory%20Traversal/Intruder/directory_traversal.txt
- https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion - https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion
metadata:
max-request: 46
tags: lfi,dast,linux tags: lfi,dast,linux
http: http:

View File

@ -4,6 +4,8 @@ info:
name: Local File Inclusion - Windows name: Local File Inclusion - Windows
author: pussycat0x author: pussycat0x
severity: high severity: high
metadata:
max-request: 39
tags: lfi,windows,dast tags: lfi,windows,dast
http: http:

View File

@ -4,6 +4,8 @@ info:
name: Open Redirect Detection name: Open Redirect Detection
author: princechaddha author: princechaddha
severity: medium severity: medium
metadata:
max-request: 1
tags: redirect,dast tags: redirect,dast
http: http:

View File

@ -6,6 +6,8 @@ info:
severity: high severity: high
reference: reference:
- https://www.invicti.com/learn/remote-file-inclusion-rfi/ - https://www.invicti.com/learn/remote-file-inclusion-rfi/
metadata:
max-request: 1
tags: rfi,dast,oast tags: rfi,dast,oast
http: http:

View File

@ -8,6 +8,8 @@ info:
Direct SQL Command Injection is a technique where an attacker creates or alters existing SQL commands to expose hidden data, Direct SQL Command Injection is a technique where an attacker creates or alters existing SQL commands to expose hidden data,
or to override valuable ones, or even to execute dangerous system level commands on the database host. or to override valuable ones, or even to execute dangerous system level commands on the database host.
This is accomplished by the application taking user input and combining it with static parameters to build an SQL query . This is accomplished by the application taking user input and combining it with static parameters to build an SQL query .
metadata:
max-request: 3
tags: sqli,error,dast tags: sqli,error,dast
http: http:

View File

@ -4,6 +4,8 @@ info:
name: Blind SSRF OAST Detection name: Blind SSRF OAST Detection
author: pdteam author: pdteam
severity: medium severity: medium
metadata:
max-request: 3
tags: ssrf,dast,oast tags: ssrf,dast,oast
http: http:

View File

@ -6,6 +6,8 @@ info:
severity: high severity: high
reference: reference:
- https://github.com/bugcrowd/HUNT/blob/master/ZAP/scripts/passive/SSRF.py - https://github.com/bugcrowd/HUNT/blob/master/ZAP/scripts/passive/SSRF.py
metadata:
max-request: 12
tags: ssrf,dast tags: ssrf,dast
http: http:

View File

@ -7,6 +7,8 @@ info:
reference: reference:
- https://github.com/zaproxy/zap-extensions/blob/2d9898900abe85a47b9fe0ceb85ec39070816b98/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/SstiScanRule.java - https://github.com/zaproxy/zap-extensions/blob/2d9898900abe85a47b9fe0ceb85ec39070816b98/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/SstiScanRule.java
- https://github.com/DiogoMRSilva/websitesVulnerableToSSTI#list-of-seversneeds-update - https://github.com/DiogoMRSilva/websitesVulnerableToSSTI#list-of-seversneeds-update
metadata:
max-request: 14
tags: ssti,dast tags: ssti,dast
variables: variables:

View File

@ -4,6 +4,8 @@ info:
name: Reflected Cross Site Scripting name: Reflected Cross Site Scripting
author: pdteam author: pdteam
severity: medium severity: medium
metadata:
max-request: 1
tags: xss,rxss,dast tags: xss,rxss,dast
variables: variables:

View File

@ -6,6 +6,8 @@ info:
severity: medium severity: medium
reference: reference:
- https://github.com/andresriancho/w3af/blob/master/w3af/plugins/audit/xxe.py - https://github.com/andresriancho/w3af/blob/master/w3af/plugins/audit/xxe.py
metadata:
max-request: 2
tags: dast,xxe tags: dast,xxe
variables: variables:

View File

@ -5,7 +5,7 @@ info:
author: Sy3Omda,geeknik,forgedhallpass,ayadi author: Sy3Omda,geeknik,forgedhallpass,ayadi
severity: unknown severity: unknown
description: Check for multiple keys/tokens/passwords hidden inside of files. description: Check for multiple keys/tokens/passwords hidden inside of files.
tags: exposure,token,file,disclosure tags: exposure,token,file,disclosure,keys
# Extract secrets regex like api keys, password, token, etc ... for different services. # Extract secrets regex like api keys, password, token, etc ... for different services.
# Always validate the leaked key/tokens/passwords to make sure it's valid, a token/keys without any impact is not an valid issue. # Always validate the leaked key/tokens/passwords to make sure it's valid, a token/keys without any impact is not an valid issue.
# Severity is not fixed in this case, it varies from none to critical depending upon impact of disclosed key/tokes. # Severity is not fixed in this case, it varies from none to critical depending upon impact of disclosed key/tokes.

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2000-0114 cve-id: CVE-2000-0114
cwe-id: NVD-CWE-Other cwe-id: NVD-CWE-Other
epss-score: 0.15958 epss-score: 0.15958
epss-percentile: 0.95829 epss-percentile: 0.95841
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -23,7 +23,7 @@ info:
cve-id: CVE-2005-3634 cve-id: CVE-2005-3634
cwe-id: NVD-CWE-Other cwe-id: NVD-CWE-Other
epss-score: 0.02843 epss-score: 0.02843
epss-percentile: 0.897 epss-percentile: 0.90511
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:* cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -22,7 +22,7 @@ info:
cve-id: CVE-2007-3010 cve-id: CVE-2007-3010
cwe-id: CWE-20 cwe-id: CWE-20
epss-score: 0.97317 epss-score: 0.97317
epss-percentile: 0.99868 epss-percentile: 0.99867
cpe: cpe:2.3:a:alcatel-lucent:omnipcx:7.1:*:enterprise:*:*:*:*:* cpe: cpe:2.3:a:alcatel-lucent:omnipcx:7.1:*:enterprise:*:*:*:*:*
metadata: metadata:
verified: true verified: true
@ -31,7 +31,7 @@ info:
product: omnipcx product: omnipcx
shodan-query: title:"OmniPCX for Enterprise" shodan-query: title:"OmniPCX for Enterprise"
fofa-query: app="Alcatel_Lucent-OmniPCX-Enterprise" fofa-query: app="Alcatel_Lucent-OmniPCX-Enterprise"
tags: cve,cve2007,kev,rce,alcatel tags: cve,cve2007,kev,rce,alcatel,alcatel-lucent
http: http:
- method: GET - method: GET

View File

@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-1059 cve-id: CVE-2008-1059
cwe-id: CWE-94 cwe-id: CWE-94
epss-score: 0.01493 epss-score: 0.01493
epss-percentile: 0.86573 epss-percentile: 0.86593
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -25,11 +25,10 @@ info:
epss-percentile: 0.77516 epss-percentile: 0.77516
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: wordpress vendor: wordpress
product: sniplets_plugin product: "sniplets_plugin"
tags: cve2008,cve,xss,wp-plugin,wp,edb,wpscan,wordpress,sniplets tags: cve2008,cve,xss,wp-plugin,wp,edb,wpscan,wordpress,sniplets
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-1547 cve-id: CVE-2008-1547
cwe-id: CWE-601 cwe-id: CWE-601
epss-score: 0.03875 epss-score: 0.03875
epss-percentile: 0.9108 epss-percentile: 0.91757
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:* cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
metadata: metadata:
max-request: 2 max-request: 2

View File

@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-2650 cve-id: CVE-2008-2650
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.06344 epss-score: 0.06344
epss-percentile: 0.93486 epss-percentile: 0.93508
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2008-5587 cve-id: CVE-2008-5587
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.02331 epss-score: 0.02331
epss-percentile: 0.88625 epss-percentile: 0.89531
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-6080 cve-id: CVE-2008-6080
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03314 epss-score: 0.03314
epss-percentile: 0.90395 epss-percentile: 0.91148
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://www.exploit-db.com/exploits/6980 - https://www.exploit-db.com/exploits/6980
- https://nvd.nist.gov/vuln/detail/CVE-2008-6222 - https://nvd.nist.gov/vuln/detail/CVE-2008-6222
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46356 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46356
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2008-6222 cve-id: CVE-2008-6222
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01029 epss-score: 0.01302
epss-percentile: 0.82175 epss-percentile: 0.85607
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -15,13 +15,14 @@ info:
- http://sourceforge.net/projects/devalcms/files/devalcms/devalcms-1.4b/devalcms-1.4b.zip/download - http://sourceforge.net/projects/devalcms/files/devalcms/devalcms-1.4b/devalcms-1.4b.zip/download
- https://nvd.nist.gov/vuln/detail/CVE-2008-6982 - https://nvd.nist.gov/vuln/detail/CVE-2008-6982
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44940 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44940
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3 cvss-score: 4.3
cve-id: CVE-2008-6982 cve-id: CVE-2008-6982
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.0038 epss-score: 0.0038
epss-percentile: 0.70097 epss-percentile: 0.72554
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:* cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2008-7269 cve-id: CVE-2008-7269
cwe-id: CWE-20 cwe-id: CWE-20
epss-score: 0.01425 epss-score: 0.01425
epss-percentile: 0.86241 epss-percentile: 0.86272
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
metadata: metadata:
verified: "true" verified: "true"

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-0932 cve-id: CVE-2009-0932
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.04048 epss-score: 0.04048
epss-percentile: 0.919 epss-percentile: 0.91931
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,8 +20,8 @@ info:
cvss-score: 4.3 cvss-score: 4.3
cve-id: CVE-2009-1872 cve-id: CVE-2009-1872
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.37553 epss-score: 0.32712
epss-percentile: 0.97102 epss-percentile: 0.96936
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-2100 cve-id: CVE-2009-2100
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00779 epss-score: 0.00779
epss-percentile: 0.80973 epss-percentile: 0.8102
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -14,13 +14,14 @@ info:
- http://www.vupen.com/english/advisories/2009/1494 - http://www.vupen.com/english/advisories/2009/1494
- https://nvd.nist.gov/vuln/detail/CVE-2009-4202 - https://nvd.nist.gov/vuln/detail/CVE-2009-4202
- http://www.exploit-db.com/exploits/8870 - http://www.exploit-db.com/exploits/8870
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2009-4202 cve-id: CVE-2009-4202
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01956 epss-score: 0.01956
epss-percentile: 0.87449 epss-percentile: 0.88476
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2010-0219 cve-id: CVE-2010-0219
cwe-id: CWE-255 cwe-id: CWE-255
epss-score: 0.97509 epss-score: 0.97509
epss-percentile: 0.99981 epss-percentile: 0.99982
cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:* cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*
metadata: metadata:
max-request: 2 max-request: 2

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0696 cve-id: CVE-2010-0696
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.57303 epss-score: 0.57303
epss-percentile: 0.97418 epss-percentile: 0.97645
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0759 cve-id: CVE-2010-0759
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01569 epss-score: 0.01569
epss-percentile: 0.86974 epss-percentile: 0.86988
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0943 cve-id: CVE-2010-0943
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01155 epss-score: 0.01155
epss-percentile: 0.83338 epss-percentile: 0.84586
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0972 cve-id: CVE-2010-0972
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00813 epss-score: 0.00813
epss-percentile: 0.81406 epss-percentile: 0.8146
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:* cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -11,13 +11,14 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/10942 - https://www.exploit-db.com/exploits/10942
- https://nvd.nist.gov/vuln/detail/CVE-2010-0982 - https://nvd.nist.gov/vuln/detail/CVE-2010-0982
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
cvss-score: 4.3 cvss-score: 4.3
cve-id: CVE-2010-0982 cve-id: CVE-2010-0982
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.0087 epss-score: 0.19302
epss-percentile: 0.80553 epss-percentile: 0.96179
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -12,13 +12,14 @@ info:
- https://www.exploit-db.com/exploits/11511 - https://www.exploit-db.com/exploits/11511
- https://nvd.nist.gov/vuln/detail/CVE-2010-1081 - https://nvd.nist.gov/vuln/detail/CVE-2010-1081
- http://www.corejoomla.com/component/content/article/1-corejoomla-updates/40-community-polls-v153-security-release.html - http://www.corejoomla.com/component/content/article/1-corejoomla-updates/40-community-polls-v153-security-release.html
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1081 cve-id: CVE-2010-1081
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.0168 epss-score: 0.36214
epss-percentile: 0.8632 epss-percentile: 0.97067
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1219 cve-id: CVE-2010-1219
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00813 epss-score: 0.00813
epss-percentile: 0.81406 epss-percentile: 0.8146
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1305 cve-id: CVE-2010-1305
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03203 epss-score: 0.03203
epss-percentile: 0.90236 epss-percentile: 0.91022
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1307 - https://nvd.nist.gov/vuln/detail/CVE-2010-1307
- http://www.vupen.com/english/advisories/2010/0806 - http://www.vupen.com/english/advisories/2010/0806
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57531 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57531
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1307 cve-id: CVE-2010-1307
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01751 epss-score: 0.01751
epss-percentile: 0.86604 epss-percentile: 0.87711
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1308 cve-id: CVE-2010-1308
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01334 epss-score: 0.01334
epss-percentile: 0.85765 epss-percentile: 0.85783
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1315 cve-id: CVE-2010-1315
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.0087 epss-score: 0.0087
epss-percentile: 0.82023 epss-percentile: 0.82084
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1345 cve-id: CVE-2010-1345
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00477 epss-score: 0.00477
epss-percentile: 0.75244 epss-percentile: 0.75338
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:* cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1352 cve-id: CVE-2010-1352
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00477 epss-score: 0.00477
epss-percentile: 0.75244 epss-percentile: 0.75338
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1470 cve-id: CVE-2010-1470
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.04616 epss-score: 0.04616
epss-percentile: 0.92373 epss-percentile: 0.92396
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1471 cve-id: CVE-2010-1471
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.05684 epss-score: 0.05684
epss-percentile: 0.93171 epss-percentile: 0.9319
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1472 cve-id: CVE-2010-1472
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.05684 epss-score: 0.05684
epss-percentile: 0.93171 epss-percentile: 0.9319
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1531 cve-id: CVE-2010-1531
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01815 epss-score: 0.01815
epss-percentile: 0.86892 epss-percentile: 0.87938
cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1534 cve-id: CVE-2010-1534
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01385 epss-score: 0.01385
epss-percentile: 0.86058 epss-percentile: 0.86077
cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -12,13 +12,14 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/11625 - https://www.exploit-db.com/exploits/11625
- https://nvd.nist.gov/vuln/detail/CVE-2010-1540 - https://nvd.nist.gov/vuln/detail/CVE-2010-1540
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1540 cve-id: CVE-2010-1540
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.0045 epss-score: 0.0045
epss-percentile: 0.72402 epss-percentile: 0.74677
cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:* cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2010-1602 cve-id: CVE-2010-1602
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03451 epss-score: 0.03451
epss-percentile: 0.91267 epss-percentile: 0.91313
cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1603 cve-id: CVE-2010-1603
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03451 epss-score: 0.03451
epss-percentile: 0.91267 epss-percentile: 0.91313
cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1607 cve-id: CVE-2010-1607
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01726 epss-score: 0.01726
epss-percentile: 0.87577 epss-percentile: 0.87631
cpe: cpe:2.3:a:paysyspro:com_wmi:1.5.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:paysyspro:com_wmi:1.5.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2010-1653 cve-id: CVE-2010-1653
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03527 epss-score: 0.03527
epss-percentile: 0.91355 epss-percentile: 0.91392
cpe: cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:* cpe: cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -12,13 +12,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1715 - https://nvd.nist.gov/vuln/detail/CVE-2010-1715
- http://packetstormsecurity.org/1004-exploits/joomlaonlineexam-lfi.txt - http://packetstormsecurity.org/1004-exploits/joomlaonlineexam-lfi.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57677 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57677
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8 cvss-score: 6.8
cve-id: CVE-2010-1715 cve-id: CVE-2010-1715
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01242 epss-score: 0.01242
epss-percentile: 0.83996 epss-percentile: 0.85229
cpe: cpe:2.3:a:pucit.edu:com_onlineexam:1.5.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:pucit.edu:com_onlineexam:1.5.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -14,13 +14,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1722 - https://nvd.nist.gov/vuln/detail/CVE-2010-1722
- http://www.exploit-db.com/exploits/12177 - http://www.exploit-db.com/exploits/12177
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57674 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57674
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8 cvss-score: 6.8
cve-id: CVE-2010-1722 cve-id: CVE-2010-1722
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01242 epss-score: 0.01242
epss-percentile: 0.83996 epss-percentile: 0.85229
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_market:2.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:dev.pucit.edu.pk:com_market:2.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2010-1870 cve-id: CVE-2010-1870
cwe-id: CWE-917 cwe-id: CWE-917
epss-score: 0.06174 epss-score: 0.06174
epss-percentile: 0.92842 epss-percentile: 0.93421
cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 2 max-request: 2

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2010-1878 cve-id: CVE-2010-1878
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.81565 epss-percentile: 0.81631
cpe: cpe:2.3:a:blueflyingfish.no-ip:com_orgchart:1.0.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:blueflyingfish.no-ip:com_orgchart:1.0.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1956 cve-id: CVE-2010-1956
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.06055 epss-score: 0.06055
epss-percentile: 0.92761 epss-percentile: 0.93366
cpe: cpe:2.3:a:thefactory:com_gadgetfactory:1.0.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:thefactory:com_gadgetfactory:1.0.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1957 cve-id: CVE-2010-1957
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01671 epss-score: 0.01671
epss-percentile: 0.87378 epss-percentile: 0.87414
cpe: cpe:2.3:a:thefactory:com_lovefactory:1.3.4:*:*:*:*:*:*:* cpe: cpe:2.3:a:thefactory:com_lovefactory:1.3.4:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1979 cve-id: CVE-2010-1979
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.81565 epss-percentile: 0.81631
cpe: cpe:2.3:a:affiliatefeeds:com_datafeeds:build_880:*:*:*:*:*:*:* cpe: cpe:2.3:a:affiliatefeeds:com_datafeeds:build_880:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1981 cve-id: CVE-2010-1981
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00656 epss-score: 0.00656
epss-percentile: 0.77311 epss-percentile: 0.79117
cpe: cpe:2.3:a:fabrikar:fabrik:2.0:*:*:*:*:joomla\!:*:* cpe: cpe:2.3:a:fabrikar:fabrik:2.0:*:*:*:*:joomla\!:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1983 cve-id: CVE-2010-1983
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01815 epss-score: 0.01815
epss-percentile: 0.87898 epss-percentile: 0.87938
cpe: cpe:2.3:a:redcomponent:com_redtwitter:1.0b8:*:*:*:*:*:*:* cpe: cpe:2.3:a:redcomponent:com_redtwitter:1.0b8:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -18,8 +18,8 @@ info:
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-2034 cve-id: CVE-2010-2034
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00718 epss-score: 0.07071
epss-percentile: 0.7851 epss-percentile: 0.93866
cpe: cpe:2.3:a:percha:com_perchaimageattach:1.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:percha:com_perchaimageattach:1.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-2122 cve-id: CVE-2010-2122
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01806 epss-score: 0.01806
epss-percentile: 0.87868 epss-percentile: 0.87908
cpe: cpe:2.3:a:joelrowley:com_simpledownload:0.9.5:*:*:*:*:*:*:* cpe: cpe:2.3:a:joelrowley:com_simpledownload:0.9.5:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-2507 cve-id: CVE-2010-2507
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01671 epss-score: 0.01671
epss-percentile: 0.87378 epss-percentile: 0.87414
cpe: cpe:2.3:a:masselink:com_picasa2gallery:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:masselink:com_picasa2gallery:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -11,13 +11,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-2680 - https://nvd.nist.gov/vuln/detail/CVE-2010-2680
- http://packetstormsecurity.org/1006-exploits/joomlajesectionfinder-lfi.txt - http://packetstormsecurity.org/1006-exploits/joomlajesectionfinder-lfi.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/59796 - https://exchange.xforce.ibmcloud.com/vulnerabilities/59796
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8 cvss-score: 6.8
cve-id: CVE-2010-2680 cve-id: CVE-2010-2680
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.80059 epss-percentile: 0.81631
cpe: cpe:2.3:a:harmistechnology:com_jesectionfinder:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:harmistechnology:com_jesectionfinder:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -11,13 +11,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-2920 - https://nvd.nist.gov/vuln/detail/CVE-2010-2920
- http://www.vupen.com/english/advisories/2010/1844 - http://www.vupen.com/english/advisories/2010/1844
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57660 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57660
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8 cvss-score: 6.8
cve-id: CVE-2010-2920 cve-id: CVE-2010-2920
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03527 epss-score: 0.03527
epss-percentile: 0.90637 epss-percentile: 0.91392
cpe: cpe:2.3:a:foobla:com_foobla_suggestions:1.5.1.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:foobla:com_foobla_suggestions:1.5.1.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-3426 cve-id: CVE-2010-3426
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.81565 epss-percentile: 0.81631
cpe: cpe:2.3:a:4you-studio:com_jphone:1.0:alpha3:*:*:*:*:*:* cpe: cpe:2.3:a:4you-studio:com_jphone:1.0:alpha3:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -11,13 +11,14 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/15585 - https://www.exploit-db.com/exploits/15585
- https://nvd.nist.gov/vuln/detail/CVE-2010-4769 - https://nvd.nist.gov/vuln/detail/CVE-2010-4769
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-4769 cve-id: CVE-2010-4769
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.22222
epss-percentile: 0.80059 epss-percentile: 0.96389
cpe: cpe:2.3:a:janguo:com_jimtawl:1.0.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:janguo:com_jimtawl:1.0.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,8 +19,8 @@ info:
cvss-score: 5 cvss-score: 5
cve-id: CVE-2011-0049 cve-id: CVE-2011-0049
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.96615 epss-score: 0.8814
epss-percentile: 0.99548 epss-percentile: 0.98619
cpe: cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2011-2780 cve-id: CVE-2011-2780
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03327 epss-score: 0.03327
epss-percentile: 0.91127 epss-percentile: 0.91171
cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2011-4336 cve-id: CVE-2011-4336
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.00255 epss-score: 0.00255
epss-percentile: 0.64746 epss-percentile: 0.6488
cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,16 +20,15 @@ info:
cve-id: CVE-2011-4624 cve-id: CVE-2011-4624
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.00431 epss-score: 0.00431
epss-percentile: 0.74018 epss-percentile: 0.7409
cpe: cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:* cpe: cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: codeasily vendor: codeasily
product: grand_flagallery product: "grand_flagallery"
framework: wordpress framework: wordpress
google-query: inurl:"/wp-content/plugins/flash-album-gallery" google-query: "inurl:\"/wp-content/plugins/flash-album-gallery\""
tags: cve,cve2011,wordpress,xss,wp-plugin,codeasily tags: cve,cve2011,wordpress,xss,wp-plugin,codeasily
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -14,11 +14,13 @@ info:
cvss-score: 4 cvss-score: 4
cve-id: CVE-2011-4640 cve-id: CVE-2011-4640
cwe-id: CWE-22 cwe-id: CWE-22
cpe: cpe:2.3:a:spamtitan:spamtitan:*:*:*:*:*:*:*:* epss-score: 0.02569
epss-percentile: 0.90017
cpe: cpe:2.3:a:spamtitan:webtitan:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 3 max-request: 3
product: spamtitan
vendor: spamtitan vendor: spamtitan
product: webtitan
shodan-query: title:"WebTitan" shodan-query: title:"WebTitan"
tags: cve,cve2011,lfi,spamtitan,webtitan,authenticated tags: cve,cve2011,lfi,spamtitan,webtitan,authenticated

View File

@ -21,15 +21,14 @@ info:
cve-id: CVE-2011-4926 cve-id: CVE-2011-4926
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.01792 epss-score: 0.01792
epss-percentile: 0.86796 epss-percentile: 0.87857
cpe: cpe:2.3:a:bueltge:adminimize:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:bueltge:adminimize:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: bueltge vendor: bueltge
product: adminimize product: adminimize
google-query: inurl:"/wp-content/plugins/adminimize/" google-query: "inurl:\"/wp-content/plugins/adminimize/\""
tags: cve2011,cve,wordpress,xss,wp-plugin,bueltge tags: cve2011,cve,wordpress,xss,wp-plugin,bueltge
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -19,16 +19,15 @@ info:
cvss-score: 4.3 cvss-score: 4.3
cve-id: CVE-2011-5107 cve-id: CVE-2011-5107
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.00232 epss-score: 0.00231
epss-percentile: 0.6058 epss-percentile: 0.6067
cpe: cpe:2.3:a:wordpress:alert_before_you_post:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:wordpress:alert_before_you_post:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: wordpress vendor: wordpress
product: alert_before_you_post product: "alert_before_you_post"
google-query: inurl:"/wp-content/plugins/alert-before-your-post" google-query: "inurl:\"/wp-content/plugins/alert-before-your-post\""
tags: cve,cve2011,wordpress,xss,wp-plugin tags: cve,cve2011,wordpress,xss,wp-plugin
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -22,12 +22,11 @@ info:
epss-percentile: 0.61346 epss-percentile: 0.61346
cpe: cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: skysa vendor: skysa
product: skysa_app_bar_integration_plugin product: "skysa_app_bar_integration_plugin"
google-query: inurl:"/wp-content/plugins/skysa-official/" google-query: "inurl:\"/wp-content/plugins/skysa-official/\""
tags: cve,cve2011,wordpress,xss,wp-plugin,skysa tags: cve,cve2011,wordpress,xss,wp-plugin,skysa
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -22,12 +22,11 @@ info:
epss-percentile: 0.71803 epss-percentile: 0.71803
cpe: cpe:2.3:a:clickdesk:clickdesk_live_support-live_chat_plugin:2.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:clickdesk:clickdesk_live_support-live_chat_plugin:2.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: clickdesk vendor: clickdesk
product: clickdesk_live_support-live_chat_plugin product: "clickdesk_live_support-live_chat_plugin"
google-query: inurl:"/wp-content/plugins/clickdesk-live-support-chat/" google-query: "inurl:\"/wp-content/plugins/clickdesk-live-support-chat/\""
tags: cve2011,cve,wordpress,xss,wp-plugin,clickdesk tags: cve2011,cve,wordpress,xss,wp-plugin,clickdesk
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -23,12 +23,11 @@ info:
epss-percentile: 0.75288 epss-percentile: 0.75288
cpe: cpe:2.3:a:featurific_for_wordpress_project:featurific-for-wordpress:1.6.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:featurific_for_wordpress_project:featurific-for-wordpress:1.6.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: featurific_for_wordpress_project vendor: "featurific_for_wordpress_project"
product: featurific-for-wordpress product: "featurific-for-wordpress"
google-query: inurl:"/wp-content/plugins/featurific-for-wordpress" google-query: "inurl:\"/wp-content/plugins/featurific-for-wordpress\""
tags: cve2011,cve,wordpress,xss,wp-plugin,featurific_for_wordpress_project tags: cve2011,cve,wordpress,xss,wp-plugin,featurific_for_wordpress_project
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2012-0392 cve-id: CVE-2012-0392
cwe-id: NVD-CWE-noinfo cwe-id: NVD-CWE-noinfo
epss-score: 0.9496 epss-score: 0.9496
epss-percentile: 0.99239 epss-percentile: 0.99258
cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -14,21 +14,21 @@ info:
- http://packetstormsecurity.org/files/view/108470/wpystap-xss.txt - http://packetstormsecurity.org/files/view/108470/wpystap-xss.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72271 - https://exchange.xforce.ibmcloud.com/vulnerabilities/72271
- https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/d4n-sec/d4n-sec.github.io
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3 cvss-score: 4.3
cve-id: CVE-2012-0901 cve-id: CVE-2012-0901
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.00216 epss-score: 0.00223
epss-percentile: 0.59612 epss-percentile: 0.60018
cpe: cpe:2.3:a:attenzione:yousaytoo:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:attenzione:yousaytoo:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: attenzione vendor: attenzione
product: yousaytoo product: yousaytoo
google-query: inurl:"/wp-content/plugins/yousaytoo-auto-publishing-plugin" google-query: "inurl:\"/wp-content/plugins/yousaytoo-auto-publishing-plugin\""
tags: cve,cve2012,wp-plugin,packetstorm,wordpress,xss,attenzione tags: cve,cve2012,wp-plugin,packetstorm,wordpress,xss,attenzione
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -20,8 +20,8 @@ info:
cvss-score: 3.5 cvss-score: 3.5
cve-id: CVE-2012-0991 cve-id: CVE-2012-0991
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.81788 epss-score: 0.72743
epss-percentile: 0.98116 epss-percentile: 0.98029
cpe: cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,15 +19,14 @@ info:
cve-id: CVE-2012-1835 cve-id: CVE-2012-1835
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.01124 epss-score: 0.01124
epss-percentile: 0.84313 epss-percentile: 0.84355
cpe: cpe:2.3:a:timely:all-in-one_event_calendar:1.4:*:*:*:*:*:*:* cpe: cpe:2.3:a:timely:all-in-one_event_calendar:1.4:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: timely vendor: timely
product: all-in-one_event_calendar product: "all-in-one_event_calendar"
google-query: inurl:"/wp-content/plugins/all-in-one-event-calendar" google-query: "inurl:\"/wp-content/plugins/all-in-one-event-calendar\""
tags: cve,cve2012,wordpress,xss,wp-plugin,timely tags: cve,cve2012,wordpress,xss,wp-plugin,timely
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -24,11 +24,10 @@ info:
epss-percentile: 0.85828 epss-percentile: 0.85828
cpe: cpe:2.3:a:mnt-tech:wp-facethumb:0.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:mnt-tech:wp-facethumb:0.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: mnt-tech vendor: "mnt-tech"
product: wp-facethumb product: "wp-facethumb"
tags: cve,cve2012,packetstorm,wordpress,xss,wp-plugin,mnt-tech tags: cve,cve2012,packetstorm,wordpress,xss,wp-plugin,mnt-tech
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -21,8 +21,8 @@ info:
cvss-score: 5.8 cvss-score: 5.8
cve-id: CVE-2012-4032 cve-id: CVE-2012-4032
cwe-id: CWE-20 cwe-id: CWE-20
epss-score: 0.00951 epss-score: 0.00842
epss-percentile: 0.81499 epss-percentile: 0.818
cpe: cpe:2.3:a:websitepanel:websitepanel:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:websitepanel:websitepanel:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,11 +21,10 @@ info:
epss-percentile: 0.59546 epss-percentile: 0.59546
cpe: cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:0.9.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:0.9.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 2
vendor: mf_gig_calendar_project vendor: "mf_gig_calendar_project"
product: mf_gig_calendar product: "mf_gig_calendar"
tags: cve,cve2012,wordpress,xss,wp-plugin,mf_gig_calendar_project tags: cve,cve2012,wordpress,xss,wp-plugin,mf_gig_calendar_project
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@ -21,13 +21,13 @@ info:
cve-id: CVE-2012-4253 cve-id: CVE-2012-4253
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.0179 epss-score: 0.0179
epss-percentile: 0.87805 epss-percentile: 0.87848
cpe: cpe:2.3:a:mysqldumper:mysqldumper:1.24.4:*:*:*:*:*:*:* cpe: cpe:2.3:a:mysqldumper:mysqldumper:1.24.4:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1
vendor: mysqldumper vendor: mysqldumper
product: mysqldumper product: mysqldumper
tags: cve2012,cve,packetstorm,lfi,edb,mysqldumper tags: cve2012,cve,packetstorm,lfi,edb,mysqldumper,xss
http: http:
- method: GET - method: GET

Some files were not shown because too many files have changed in this diff Show More