TemplateMan Update [Mon Nov 27 09:19:41 UTC 2023] 🤖
parent
90e6799473
commit
523d229c92
|
@ -50,4 +50,5 @@ http:
|
|||
- 'contains(body_1, "htmoffice operate")'
|
||||
- 'contains(body_2, "Windows IP")'
|
||||
condition: and
|
||||
# digest: 490a004630440220129cac2608f955cc940bb015a47de2d660b6f0f7e98e07d7d602ccae98dcd95702203984da9465625bc1d69ae92c873892ee5e1349e60257a4e18c7e3577456d1c37:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a004630440220129cac2608f955cc940bb015a47de2d660b6f0f7e98e07d7d602ccae98dcd95702203984da9465625bc1d69ae92c873892ee5e1349e60257a4e18c7e3577456d1c37:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -45,4 +45,5 @@ http:
|
|||
- "contains(body_1, 'verify_string')"
|
||||
- "contains(body_2, 'Windows IP')"
|
||||
condition: and
|
||||
# digest: 4b0a00483046022100e0b8a978d4631823ced989441ed9dc7f4787e0865117f3774c90e5f27393ad3b022100a2f5705860233f76a0fd9a7a6cb44ff3db36963f9c04f4d8f57b519133f77112:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a00483046022100e0b8a978d4631823ced989441ed9dc7f4787e0865117f3774c90e5f27393ad3b022100a2f5705860233f76a0fd9a7a6cb44ff3db36963f9c04f4d8f57b519133f77112:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -28,7 +28,6 @@ http:
|
|||
|
||||
utf8=%E2%9C%93&authenticity_token={{url_encode(authenticity_token)}}&username={{username}}&password={{password}}&commit=Login
|
||||
|
||||
|
||||
extractors:
|
||||
- type: xpath
|
||||
name: authenticity_token
|
||||
|
@ -53,4 +52,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 302
|
||||
# digest: 490a0046304402203d169c3f0cdacac46938760110666c36529dce6006c19736ebe89b88918131cf0220318ad363911110f9a85c1125f7e8ce879e3fa1f252a1cf577120cfacb4aa71a0:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a0046304402203d169c3f0cdacac46938760110666c36529dce6006c19736ebe89b88918131cf0220318ad363911110f9a85c1125f7e8ce879e3fa1f252a1cf577120cfacb4aa71a0:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -25,7 +25,6 @@ http:
|
|||
|
||||
_authentication_token={{auth_token}}&username={{username}}&password={{password}}
|
||||
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
name: auth_token
|
||||
|
@ -51,4 +50,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 302
|
||||
# digest: 4a0a00473045022100c23834bce6d4034f85481f09d589ee3f219be4de465190fba26334d49be7a618022041fcf0b7111a3f1a3ef086896a0b5d4d2d60f2601d2e67178b2ec9aff14672cf:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022100c23834bce6d4034f85481f09d589ee3f219be4de465190fba26334d49be7a618022041fcf0b7111a3f1a3ef086896a0b5d4d2d60f2601d2e67178b2ec9aff14672cf:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -27,7 +27,6 @@ http:
|
|||
|
||||
commit=Sign+in&authenticity_token={{authenticity_token}}&login={{username}}&password={{password}}&trusted_device=&webauthn-support=supported&webauthn-iuvpaa-support=unsupported&return_to=https%3A%2F%2Fgithub.com%2Flogin&allow_signup=&client_id=&integration=&required_field_34b7=×tamp={{timestamp}}×tamp_secret={{timestamp_secret}}
|
||||
|
||||
|
||||
extractors:
|
||||
- type: xpath
|
||||
name: authenticity_token
|
||||
|
@ -73,4 +72,5 @@ http:
|
|||
- "contains(to_lower(header), 'set-cookie: user_session=')"
|
||||
- "status_code==302"
|
||||
condition: and
|
||||
# digest: 4a0a00473045022044dacf041522f5bdf2380edede0b1316819db87a4d55ccdf4439f8a5d9e4e2ca022100ccbcb59aca67fd1cb463e82c2754b9101cb895e2221a47e48b989d65ad45400b:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022044dacf041522f5bdf2380edede0b1316819db87a4d55ccdf4439f8a5d9e4e2ca022100ccbcb59aca67fd1cb463e82c2754b9101cb895e2221a47e48b989d65ad45400b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -51,4 +51,5 @@ http:
|
|||
- "contains(to_lower(body), 'identity.postman.co/continue')"
|
||||
- "status_code==200"
|
||||
condition: and
|
||||
# digest: 4a0a00473045022100a5cc97815eecb4cac96601b204c3eabb0ad1e9c0d8dd7480f813f38e9014617202200422cee6d3374b8b07c6ea34ca09d7e6731d1d087a29386e8d921021835af829:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022100a5cc97815eecb4cac96601b204c3eabb0ad1e9c0d8dd7480f813f38e9014617202200422cee6d3374b8b07c6ea34ca09d7e6731d1d087a29386e8d921021835af829:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -54,4 +54,5 @@ http:
|
|||
- status_code_2 == 302
|
||||
- '!contains(to_lower(body_2), "invalid login")'
|
||||
condition: and
|
||||
# digest: 4a0a00473045022100cd7dd9cc87262947bbd5b212adb57e7675f7b01102eab8aa7a098637688db6f302206039736f280ed2b9cd276dc59104b53ad7e6be58ccad1a538aa1570ce8e65e5a:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022100cd7dd9cc87262947bbd5b212adb57e7675f7b01102eab8aa7a098637688db6f302206039736f280ed2b9cd276dc59104b53ad7e6be58ccad1a538aa1570ce8e65e5a:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2001-0537
|
||||
cwe-id: CWE-287
|
||||
epss-score: 0.88063
|
||||
epss-percentile: 0.9837
|
||||
epss-percentile: 0.98371
|
||||
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2002-1131
|
||||
cwe-id: CWE-80
|
||||
epss-score: 0.06018
|
||||
epss-percentile: 0.92707
|
||||
epss-percentile: 0.92699
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 5
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2004-0519
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02285
|
||||
epss-percentile: 0.88467
|
||||
epss-percentile: 0.88466
|
||||
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -46,4 +46,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100b6d0a451b73863153217179a44315593bd95b681bc715ca3cf3fa4c33079278b022100dfce551413fab6fff405e1a421456861de3df1661785af4e222ec2d523ada366:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a00483046022100b6d0a451b73863153217179a44315593bd95b681bc715ca3cf3fa4c33079278b022100dfce551413fab6fff405e1a421456861de3df1661785af4e222ec2d523ada366:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2004-1965
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.0113
|
||||
epss-percentile: 0.83041
|
||||
epss-percentile: 0.83031
|
||||
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2005-2428
|
||||
cwe-id: CWE-200
|
||||
epss-score: 0.01188
|
||||
epss-percentile: 0.83516
|
||||
epss-percentile: 0.83501
|
||||
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2005-3344
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02158
|
||||
epss-percentile: 0.88108
|
||||
epss-percentile: 0.88112
|
||||
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
|
|
@ -21,7 +21,7 @@ info:
|
|||
cve-id: CVE-2005-3634
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02843
|
||||
epss-percentile: 0.89618
|
||||
epss-percentile: 0.89615
|
||||
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2005-4385
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00294
|
||||
epss-percentile: 0.65862
|
||||
epss-percentile: 0.65861
|
||||
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a004630440220673e62e802706569de01235511b09cf60ef4431d2b36cc61a6d45fc6973cd1f502207a6c3a37459c49db2959676a60c221b3e7f77999b8b3108c8fa8eada73624b9e:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a004630440220673e62e802706569de01235511b09cf60ef4431d2b36cc61a6d45fc6973cd1f502207a6c3a37459c49db2959676a60c221b3e7f77999b8b3108c8fa8eada73624b9e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2006-1681
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.01015
|
||||
epss-percentile: 0.82058
|
||||
epss-percentile: 0.82038
|
||||
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2006-2842
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.17301
|
||||
epss-percentile: 0.95572
|
||||
epss-percentile: 0.9557
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2007-0885
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00827
|
||||
epss-percentile: 0.80015
|
||||
epss-percentile: 0.8
|
||||
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -43,4 +43,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a0047304502202c97811c940054824ad9d88193d234bea9144542df9f085961fad41a2f9213380221008510f7a7413eeab2204c139ebfd73a19196f156b7a9a9290cafb537c9c65af5a:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a0047304502202c97811c940054824ad9d88193d234bea9144542df9f085961fad41a2f9213380221008510f7a7413eeab2204c139ebfd73a19196f156b7a9a9290cafb537c9c65af5a:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2007-4504
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01677
|
||||
epss-percentile: 0.86265
|
||||
epss-percentile: 0.86275
|
||||
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2007-4556
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.19583
|
||||
epss-percentile: 0.95794
|
||||
epss-percentile: 0.95789
|
||||
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2007-5728
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.02361
|
||||
epss-percentile: 0.88644
|
||||
epss-percentile: 0.88645
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-1059
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.01493
|
||||
epss-percentile: 0.85397
|
||||
epss-percentile: 0.85392
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-1061
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00938
|
||||
epss-percentile: 0.81303
|
||||
epss-percentile: 0.81287
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-1547
|
||||
cwe-id: CWE-601
|
||||
epss-score: 0.02834
|
||||
epss-percentile: 0.89604
|
||||
epss-percentile: 0.896
|
||||
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -40,4 +40,5 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
# digest: 4a0a00473045022100fda42720acd0219bd8ded7001cf7117170fe124ca5301f38e5a263fdb932570302206c5528bcc30b78a42e5e430dcf5c97b5d4b743a2afb56c3fbd3d9f8375e65f27:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022100fda42720acd0219bd8ded7001cf7117170fe124ca5301f38e5a263fdb932570302206c5528bcc30b78a42e5e430dcf5c97b5d4b743a2afb56c3fbd3d9f8375e65f27:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-2398
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00329
|
||||
epss-percentile: 0.67785
|
||||
epss-percentile: 0.67779
|
||||
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -45,4 +45,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100cd9b89d5dcd1a766ed4fd1b07468d3d1d7708c5a75bf2bdd3384179927ce7811022100e18fa3326e1f27806a7289079fd00ce63d2371a55d9f967d6c646a8a7e31a1c8:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a00483046022100cd9b89d5dcd1a766ed4fd1b07468d3d1d7708c5a75bf2bdd3384179927ce7811022100e18fa3326e1f27806a7289079fd00ce63d2371a55d9f967d6c646a8a7e31a1c8:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-2650
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06344
|
||||
epss-percentile: 0.92897
|
||||
epss-percentile: 0.92889
|
||||
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2008-4668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01018
|
||||
epss-percentile: 0.8208
|
||||
epss-percentile: 0.8206
|
||||
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100a6a7cb3538fd9b5e197416851ff4b0befbc9d95aa9143933f0dc683e9f1579be02210085d0f2bb938cb2db2c46ba97d41460e463dd2d78cb83e8e31138252083d5f39c:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a00483046022100a6a7cb3538fd9b5e197416851ff4b0befbc9d95aa9143933f0dc683e9f1579be02210085d0f2bb938cb2db2c46ba97d41460e463dd2d78cb83e8e31138252083d5f39c:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -39,4 +39,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a0047304502206c07845b098bfaf4d31a1acba62a4a6001a3fb396285c29ac960e07d6d7dc552022100903532a7960d07f403df9703729dffcfd5d339b2bb05a3dd7f92b50a939652de:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a0047304502206c07845b098bfaf4d31a1acba62a4a6001a3fb396285c29ac960e07d6d7dc552022100903532a7960d07f403df9703729dffcfd5d339b2bb05a3dd7f92b50a939652de:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-5587
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02331
|
||||
epss-percentile: 0.88567
|
||||
epss-percentile: 0.88568
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6080
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00824
|
||||
epss-percentile: 0.79978
|
||||
epss-percentile: 0.79963
|
||||
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6172
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00509
|
||||
epss-percentile: 0.73894
|
||||
epss-percentile: 0.73887
|
||||
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022029f62e06dca30f4568de2c0de4407c641911c26884b4bc97917a6d2143c3e7e7022100f2dbbfea9140890786775f29ee2a7a95ec59b47c564b137eec57919d27ed8dc0:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022029f62e06dca30f4568de2c0de4407c641911c26884b4bc97917a6d2143c3e7e7022100f2dbbfea9140890786775f29ee2a7a95ec59b47c564b137eec57919d27ed8dc0:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6222
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01029
|
||||
epss-percentile: 0.82168
|
||||
epss-percentile: 0.82151
|
||||
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-6465
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00421
|
||||
epss-percentile: 0.71409
|
||||
epss-percentile: 0.71402
|
||||
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -51,4 +51,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a00463044022038c0f95ef8c5174738edc57326a2eb363f5fec6b4e9e2a5544a43f5d97de705e02205c6ba78678b9fc761aa630e9b70ad75742919c54da3169d6135508c715c515d4:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a00463044022038c0f95ef8c5174738edc57326a2eb363f5fec6b4e9e2a5544a43f5d97de705e02205c6ba78678b9fc761aa630e9b70ad75742919c54da3169d6135508c715c515d4:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2008-6668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00359
|
||||
epss-percentile: 0.6909
|
||||
epss-percentile: 0.6908
|
||||
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -42,4 +42,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100dad85c46fd405a22b1035e8fb72301f9a3a278695f0706bbd703df61fdc801e0022100d41a94405efd345e493ac3e872709792f383b5e83973906e5635e761929b723d:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a00483046022100dad85c46fd405a22b1035e8fb72301f9a3a278695f0706bbd703df61fdc801e0022100d41a94405efd345e493ac3e872709792f383b5e83973906e5635e761929b723d:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-6982
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.0038
|
||||
epss-percentile: 0.69971
|
||||
epss-percentile: 0.69965
|
||||
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -48,4 +48,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 500
|
||||
# digest: 490a00463044022012ee0e401b3c927c63ad614c2176753273176718d04287d964b63e9ba5b94ed0022048571270ed8b065e31bc56acd9a46376688658b8fec65170aeb31bb58477ef13:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a00463044022012ee0e401b3c927c63ad614c2176753273176718d04287d964b63e9ba5b94ed0022048571270ed8b065e31bc56acd9a46376688658b8fec65170aeb31bb58477ef13:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-7269
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.01358
|
||||
epss-percentile: 0.84722
|
||||
epss-percentile: 0.84691
|
||||
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: "true"
|
||||
|
@ -37,4 +37,5 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
# digest: 4a0a004730450221008773efd5379c28078d619e8aed577c03cc4e1effe84548d6a9889350a7f88055022071991934bcc80c468b72a491d9493499bdafabe332278acfe813bb4932844d83:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a004730450221008773efd5379c28078d619e8aed577c03cc4e1effe84548d6a9889350a7f88055022071991934bcc80c468b72a491d9493499bdafabe332278acfe813bb4932844d83:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2009-0347
|
||||
cwe-id: CWE-59
|
||||
epss-score: 0.10982
|
||||
epss-percentile: 0.94557
|
||||
epss-percentile: 0.94555
|
||||
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-0545
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.97081
|
||||
epss-percentile: 0.99714
|
||||
epss-percentile: 0.99716
|
||||
cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-0932
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04048
|
||||
epss-percentile: 0.91149
|
||||
epss-percentile: 0.91145
|
||||
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-1151
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.79256
|
||||
epss-percentile: 0.97963
|
||||
epss-percentile: 0.97966
|
||||
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -47,4 +47,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a0047304502205e47bb09ce2ba9c2cfd3607bee60f02a9ef1e8abcd360f9ae5720359e27c7793022100fe4939bbc91cabb0e62e081486f4c60acfb294f6b2daeb11e93653a272b10850:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a0047304502205e47bb09ce2ba9c2cfd3607bee60f02a9ef1e8abcd360f9ae5720359e27c7793022100fe4939bbc91cabb0e62e081486f4c60acfb294f6b2daeb11e93653a272b10850:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-1496
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00648
|
||||
epss-percentile: 0.77032
|
||||
epss-percentile: 0.77015
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100b4e7469e841e32b9d5ecdc1720f29c5cc0c8c02cef3dfbfa4d9ca7a1d4e54dc202204f1f24043a8c5939657b3eaecb94acdc1a1284e6e7cec9dcec7905e4e9089eb0:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022100b4e7469e841e32b9d5ecdc1720f29c5cc0c8c02cef3dfbfa4d9ca7a1d4e54dc202204f1f24043a8c5939657b3eaecb94acdc1a1284e6e7cec9dcec7905e4e9089eb0:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-1558
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00891
|
||||
epss-percentile: 0.80792
|
||||
epss-percentile: 0.80782
|
||||
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-1872
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.37553
|
||||
epss-percentile: 0.9683
|
||||
epss-percentile: 0.96829
|
||||
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -48,4 +48,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a0047304502210093c2833853733c7dc56f6fee26f49fb70b1b9e8707b4c927489d925dd62a683602201d137ac57e2a13be346854aeb2e2956151a2d2bf7c7d7089260451da95a9f9d1:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a0047304502210093c2833853733c7dc56f6fee26f49fb70b1b9e8707b4c927489d925dd62a683602201d137ac57e2a13be346854aeb2e2956151a2d2bf7c7d7089260451da95a9f9d1:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-2015
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00797
|
||||
epss-percentile: 0.79641
|
||||
epss-percentile: 0.79631
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2009-2100
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00517
|
||||
epss-percentile: 0.74101
|
||||
epss-percentile: 0.74095
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a0047304502205ee6838326f115cb349a0d22fa9f805b71465582d2bf31f13b55c01ca5055512022100aee9ba0a2adaa67d33ce1483bec4f3c140cbbea776f9a2097f4f70919c24721f:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a0047304502205ee6838326f115cb349a0d22fa9f805b71465582d2bf31f13b55c01ca5055512022100aee9ba0a2adaa67d33ce1483bec4f3c140cbbea776f9a2097f4f70919c24721f:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-3053
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00367
|
||||
epss-percentile: 0.69485
|
||||
epss-percentile: 0.69476
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100eb0c0e9e0a7b80152613d1ce995387886a0094369416b38ffcfce8853e57adfd02207ea0a563845e50812458c254a9fd3994801b129c710e43362c46a72d251f935b:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022100eb0c0e9e0a7b80152613d1ce995387886a0094369416b38ffcfce8853e57adfd02207ea0a563845e50812458c254a9fd3994801b129c710e43362c46a72d251f935b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-3318
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00706
|
||||
epss-percentile: 0.78165
|
||||
epss-percentile: 0.78153
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-4202
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01956
|
||||
epss-percentile: 0.87399
|
||||
epss-percentile: 0.87394
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100deb39ee8d31f7875a738a7a40f9f00465adfad9b9ff6d621362f7df4c623f9bd022100f012a8ec69fedf1cab698f64f791a699f26ca50de2fc001f3f3d5194ac3f8a6f:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a00483046022100deb39ee8d31f7875a738a7a40f9f00465adfad9b9ff6d621362f7df4c623f9bd022100f012a8ec69fedf1cab698f64f791a699f26ca50de2fc001f3f3d5194ac3f8a6f:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-4223
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.00697
|
||||
epss-percentile: 0.77997
|
||||
epss-percentile: 0.77987
|
||||
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -42,4 +42,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a004730450220764ceb646b9fc9b2da9e4aea4fcdd1e30796ca6755ff8877ecd4e7537ae0007502210093902c463a018835b55a0fe5d134e63eb34c00dcb8c8e24b8e7395478fc573a5:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a004730450220764ceb646b9fc9b2da9e4aea4fcdd1e30796ca6755ff8877ecd4e7537ae0007502210093902c463a018835b55a0fe5d134e63eb34c00dcb8c8e24b8e7395478fc573a5:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-4679
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.8001
|
||||
epss-percentile: 0.79995
|
||||
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a00463044022071bc2de3d904d3f1b365147b9020a016a8c1889526b4a30fbad0e24b9dc9752102204000d0a40e6f8a4f65e422b336a1dc36d6c55924e7647b80b4629853a0880b5d:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a00463044022071bc2de3d904d3f1b365147b9020a016a8c1889526b4a30fbad0e24b9dc9752102204000d0a40e6f8a4f65e422b336a1dc36d6c55924e7647b80b4629853a0880b5d:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2009-5020
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.00215
|
||||
epss-percentile: 0.59418
|
||||
epss-percentile: 0.59397
|
||||
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -35,4 +35,5 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
|
||||
# digest: 4b0a00483046022100afa29105e1450795c6c4658dd320f27acb3f35ce1983b7978153cf84f4b84706022100d7987de41bf54f39f03c6cfd9449660940e9aee56c1dd514c4343364720b97c1:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a00483046022100afa29105e1450795c6c4658dd320f27acb3f35ce1983b7978153cf84f4b84706022100d7987de41bf54f39f03c6cfd9449660940e9aee56c1dd514c4343364720b97c1:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-0157
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.8001
|
||||
epss-percentile: 0.79995
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a004630440220214508fcd3bf9daff9b007372be27bbc14706dc02a8f0e2bf4f8023c39a8ac060220363f760694568cd1e35f5c9d12fa4d082bc26b0bf32542a640e1c31f648dbae2:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a004630440220214508fcd3bf9daff9b007372be27bbc14706dc02a8f0e2bf4f8023c39a8ac060220363f760694568cd1e35f5c9d12fa4d082bc26b0bf32542a640e1c31f648dbae2:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-0467
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0586
|
||||
epss-percentile: 0.92622
|
||||
epss-percentile: 0.92614
|
||||
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0759
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01326
|
||||
epss-percentile: 0.84525
|
||||
epss-percentile: 0.84496
|
||||
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a004630440220467b5098499d90f5ce38b9b03e4502b026e5369bbc03e7c81148debbcedd400e02204fa5416effe711f3aaa6f12d8d1923ebf1571af67c38f536ae4398e55cdcd11f:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a004630440220467b5098499d90f5ce38b9b03e4502b026e5369bbc03e7c81148debbcedd400e02204fa5416effe711f3aaa6f12d8d1923ebf1571af67c38f536ae4398e55cdcd11f:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0942
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73063
|
||||
epss-percentile: 0.73053
|
||||
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a0046304402204fc1d7b56d8efaa092939b0dde91c829143a9d58e5b4b79a723d832c9784bd940220744b39dc37e016fe498889362f97d44a2a801e2b8f1f974a1a14f5d08db6d3f2:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a0046304402204fc1d7b56d8efaa092939b0dde91c829143a9d58e5b4b79a723d832c9784bd940220744b39dc37e016fe498889362f97d44a2a801e2b8f1f974a1a14f5d08db6d3f2:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0943
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83238
|
||||
epss-percentile: 0.8323
|
||||
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-0944
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73063
|
||||
epss-percentile: 0.73053
|
||||
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a00463044022079c0965d112fbed0d097a86a3c78a7090a987bbcd39ecfa4f57abd47bf48f6ae02202dee158150bfe69a0539ccef5e880b3b5bd7e820f76ff2cce4c3d6e4867e293c:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a00463044022079c0965d112fbed0d097a86a3c78a7090a987bbcd39ecfa4f57abd47bf48f6ae02202dee158150bfe69a0539ccef5e880b3b5bd7e820f76ff2cce4c3d6e4867e293c:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0972
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79832
|
||||
epss-percentile: 0.79821
|
||||
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-0982
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0087
|
||||
epss-percentile: 0.80512
|
||||
epss-percentile: 0.805
|
||||
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -37,4 +37,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a0046304402200212685e0860df84441146636126680de927567d723be4a285f5c398961c6d7602204e79eea2787307d7bdfafca015c1942647f64be81a189e12eb9b5f0d31746ee1:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a0046304402200212685e0860df84441146636126680de927567d723be4a285f5c398961c6d7602204e79eea2787307d7bdfafca015c1942647f64be81a189e12eb9b5f0d31746ee1:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0985
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01222
|
||||
epss-percentile: 0.8377
|
||||
epss-percentile: 0.83755
|
||||
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1056
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06484
|
||||
epss-percentile: 0.92984
|
||||
epss-percentile: 0.92977
|
||||
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1081
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0168
|
||||
epss-percentile: 0.8627
|
||||
epss-percentile: 0.86279
|
||||
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1217
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83238
|
||||
epss-percentile: 0.8323
|
||||
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1219
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79832
|
||||
epss-percentile: 0.79821
|
||||
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-1302
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01204
|
||||
epss-percentile: 0.83639
|
||||
epss-percentile: 0.83623
|
||||
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -37,4 +37,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022046e18658e1e724518142631406c1c4592268e6b7529c55e4cc4a3b10c198d299022100a8a4df7ecbf32272e79dbd739c47ea49f554e79c6e206dbd59c759c30e9ad35e:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022046e18658e1e724518142631406c1c4592268e6b7529c55e4cc4a3b10c198d299022100a8a4df7ecbf32272e79dbd739c47ea49f554e79c6e206dbd59c759c30e9ad35e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1304
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0045
|
||||
epss-percentile: 0.72295
|
||||
epss-percentile: 0.72287
|
||||
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1306
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
epss-percentile: 0.83937
|
||||
epss-percentile: 0.83919
|
||||
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1307
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01751
|
||||
epss-percentile: 0.86548
|
||||
epss-percentile: 0.86555
|
||||
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1308
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01334
|
||||
epss-percentile: 0.84559
|
||||
epss-percentile: 0.8453
|
||||
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1312
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83238
|
||||
epss-percentile: 0.8323
|
||||
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1313
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0045
|
||||
epss-percentile: 0.72295
|
||||
epss-percentile: 0.72287
|
||||
cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1314
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73063
|
||||
epss-percentile: 0.73053
|
||||
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100bb1835db1a55bdc20a7ef45f8fc283426a181ae324ee11783a9df1f7ae9ab5e1022100edaa5bfa9b8b37440348e9b37b2b76116b402124d4c36300243f8aa928e826ba:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a00483046022100bb1835db1a55bdc20a7ef45f8fc283426a181ae324ee11783a9df1f7ae9ab5e1022100edaa5bfa9b8b37440348e9b37b2b76116b402124d4c36300243f8aa928e826ba:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1315
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0087
|
||||
epss-percentile: 0.80512
|
||||
epss-percentile: 0.805
|
||||
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a004630440220732366ebc615c9ed7a430022aa521d4dab08d8b09e481dfc8ae4252903262627022042855e2f67d5c45a43f1a93f6101056a4230216b9230008e72dd588df3349bec:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a004630440220732366ebc615c9ed7a430022aa521d4dab08d8b09e481dfc8ae4252903262627022042855e2f67d5c45a43f1a93f6101056a4230216b9230008e72dd588df3349bec:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1340
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83238
|
||||
epss-percentile: 0.8323
|
||||
cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1345
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73063
|
||||
epss-percentile: 0.73053
|
||||
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100eae33a4d8880bc5d6c37120a554446c0587b8d642981d751a01a4f653949b83b0220693b70f77e38288c6aa8826c10d6d2276646091a2433205b51bc62b19363af66:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022100eae33a4d8880bc5d6c37120a554446c0587b8d642981d751a01a4f653949b83b0220693b70f77e38288c6aa8826c10d6d2276646091a2433205b51bc62b19363af66:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1352
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73063
|
||||
epss-percentile: 0.73053
|
||||
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100b8611401bf4f6733ef37d7f299d7bf6ccf95dc270b3ac73818e818133c9a3f76022100d4194dbb6cafc6aec360e3ec8bba6fc50dee9a0799c75a9d7f7878f6e9baf2ce:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a00483046022100b8611401bf4f6733ef37d7f299d7bf6ccf95dc270b3ac73818e818133c9a3f76022100d4194dbb6cafc6aec360e3ec8bba6fc50dee9a0799c75a9d7f7878f6e9baf2ce:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1353
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01751
|
||||
epss-percentile: 0.86548
|
||||
epss-percentile: 0.86555
|
||||
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1354
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73063
|
||||
epss-percentile: 0.73053
|
||||
cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a00463044022001c2ec67a93c735e4fb4159075d3cce865dbfcc86fcb3c673331667fae29a53b02205c9ed61809c82ab6431b60513691686a366d0086a402945f98bede6c74ff7819:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a00463044022001c2ec67a93c735e4fb4159075d3cce865dbfcc86fcb3c673331667fae29a53b02205c9ed61809c82ab6431b60513691686a366d0086a402945f98bede6c74ff7819:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2010-1429
|
||||
cwe-id: CWE-264
|
||||
epss-score: 0.00573
|
||||
epss-percentile: 0.75434
|
||||
epss-percentile: 0.75423
|
||||
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1461
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73063
|
||||
epss-percentile: 0.73053
|
||||
cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022100b3961c18db4a21aedd30e97d78a165a11eab451315e7106d5d6262959287365402206b7652da28402ee411c07ceecb72c174bdaf2ac2732065e061d452bede92db6e:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022100b3961c18db4a21aedd30e97d78a165a11eab451315e7106d5d6262959287365402206b7652da28402ee411c07ceecb72c174bdaf2ac2732065e061d452bede92db6e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1469
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79832
|
||||
epss-percentile: 0.79821
|
||||
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1470
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04616
|
||||
epss-percentile: 0.91671
|
||||
epss-percentile: 0.91659
|
||||
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1471
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05684
|
||||
epss-percentile: 0.92527
|
||||
epss-percentile: 0.92521
|
||||
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1472
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05684
|
||||
epss-percentile: 0.92527
|
||||
epss-percentile: 0.92521
|
||||
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1473
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.8001
|
||||
epss-percentile: 0.79995
|
||||
cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a00483046022100c572d101442c9c0488f828b3d006f54a4c94b26e992edff9e9d3779df5a8f494022100da4920c7453e34d83058896925689e69c4e383ec148c0ce350ec1617100523c3:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a00483046022100c572d101442c9c0488f828b3d006f54a4c94b26e992edff9e9d3779df5a8f494022100da4920c7453e34d83058896925689e69c4e383ec148c0ce350ec1617100523c3:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1474
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
epss-percentile: 0.83937
|
||||
epss-percentile: 0.83919
|
||||
cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1475
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
epss-percentile: 0.83937
|
||||
epss-percentile: 0.83919
|
||||
cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1476
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03527
|
||||
epss-percentile: 0.90553
|
||||
epss-percentile: 0.9055
|
||||
cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-1478
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.8001
|
||||
epss-percentile: 0.79995
|
||||
cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -37,4 +37,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a00473045022004cbbc1b624f1e47558859755db005beaae9208e98e13803362c6da268a8dae3022100f8b767ddf7abae6592782632005bd36d6a2091673daf7b068e370bc2f3bdd7b5:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022004cbbc1b624f1e47558859755db005beaae9208e98e13803362c6da268a8dae3022100f8b767ddf7abae6592782632005bd36d6a2091673daf7b068e370bc2f3bdd7b5:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1491
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73063
|
||||
epss-percentile: 0.73053
|
||||
cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a004730450220671eb13517acade060ad865ad74beba19783c0af58953f5e04bdfd238e4ba5bb0221008fd6d7208d43fc975caf4e5031116e21fda952a4bb851118f3e0f34537e4a948:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a004730450220671eb13517acade060ad865ad74beba19783c0af58953f5e04bdfd238e4ba5bb0221008fd6d7208d43fc975caf4e5031116e21fda952a4bb851118f3e0f34537e4a948:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1494
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01827
|
||||
epss-percentile: 0.86861
|
||||
epss-percentile: 0.86862
|
||||
cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 490a00463044022013837cb275c88e106f694577c33e60a2bce62e9128c82b63b95f3fed65991f5f02200ddbba66477bc4a3220e8cf809a0f83b70af85e329a62784b4562b0ed6642c70:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 490a00463044022013837cb275c88e106f694577c33e60a2bce62e9128c82b63b95f3fed65991f5f02200ddbba66477bc4a3220e8cf809a0f83b70af85e329a62784b4562b0ed6642c70:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1495
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04503
|
||||
epss-percentile: 0.91573
|
||||
epss-percentile: 0.91559
|
||||
cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1531
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01815
|
||||
epss-percentile: 0.86804
|
||||
epss-percentile: 0.86806
|
||||
cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a0048304602210080868d8263dc6eebde53256178cbac54e311c6fb958d3104a3db6801e7bb6f78022100e016f6517a0dbd26f6f877592ffe43d7972174b68f3bd36c7c481f1a59f3c28c:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a0048304602210080868d8263dc6eebde53256178cbac54e311c6fb958d3104a3db6801e7bb6f78022100e016f6517a0dbd26f6f877592ffe43d7972174b68f3bd36c7c481f1a59f3c28c:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1532
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73063
|
||||
epss-percentile: 0.73053
|
||||
cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4b0a0048304602210097aa7457af25d571d9b771392df388aa9a27bec818a7ea09b486adf4b770bce3022100b57e98f511a2491ca9f70b5a28b7df5806f186030fef0470d92762f017ec6adf:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4b0a0048304602210097aa7457af25d571d9b771392df388aa9a27bec818a7ea09b486adf4b770bce3022100b57e98f511a2491ca9f70b5a28b7df5806f186030fef0470d92762f017ec6adf:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1533
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00706
|
||||
epss-percentile: 0.78165
|
||||
epss-percentile: 0.78153
|
||||
cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1534
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01228
|
||||
epss-percentile: 0.83805
|
||||
epss-percentile: 0.8379
|
||||
cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a0047304502201e44c4bd8d0166740e24c2bceec4359b29f5def81db857a407a646841428ef18022100af66f0bf73f2d9283fbba732be5eb91b42f856eaf2a7b44741a9d3473fc26f98:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a0047304502201e44c4bd8d0166740e24c2bceec4359b29f5def81db857a407a646841428ef18022100af66f0bf73f2d9283fbba732be5eb91b42f856eaf2a7b44741a9d3473fc26f98:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1535
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00706
|
||||
epss-percentile: 0.78165
|
||||
epss-percentile: 0.78153
|
||||
cpe: cpe:2.3:a:peter_hocherl:com_travelbook:1.0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1540
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0045
|
||||
epss-percentile: 0.72295
|
||||
epss-percentile: 0.72287
|
||||
cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1586
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.00917
|
||||
epss-percentile: 0.81083
|
||||
epss-percentile: 0.81069
|
||||
cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -36,4 +36,5 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
# digest: 4a0a00473045022100acd36cb83e01543211adfb20ae41f0f21115d85a4adc5e6d209ef4e7d186c370022052383247ac7075d8a0f84651c4762dd50cb37a413524f9b14357f7f177ae246b:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a00473045022100acd36cb83e01543211adfb20ae41f0f21115d85a4adc5e6d209ef4e7d186c370022052383247ac7075d8a0f84651c4762dd50cb37a413524f9b14357f7f177ae246b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1601
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01299
|
||||
epss-percentile: 0.84357
|
||||
epss-percentile: 0.84331
|
||||
cpe: cpe:2.3:a:joomlamart:com_jacomment:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,5 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# digest: 4a0a004730450221009df6f94c02c4a3169e513574ab38705b1d1446c84d7482aed96e79e253b772cb022067bdd2303d87f52ea7e9967b3363beb9236c94cff79e9e89d6aa0abc7d3f6b90:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
# digest: 4a0a004730450221009df6f94c02c4a3169e513574ab38705b1d1446c84d7482aed96e79e253b772cb022067bdd2303d87f52ea7e9967b3363beb9236c94cff79e9e89d6aa0abc7d3f6b90:922c64590222798bb761d5b6d8e72950
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue