Merge branch 'main' into feat-javascript-templates
commit
b4c51b6ded
|
@ -1,5 +1,6 @@
|
|||
http/cves/2023/CVE-2023-20198.yaml
|
||||
http/cves/2023/CVE-2023-22518.yaml
|
||||
http/cves/2023/CVE-2023-33629.yaml
|
||||
http/cves/2023/CVE-2023-4169.yaml
|
||||
http/cves/2023/CVE-2023-43795.yaml
|
||||
http/cves/2023/CVE-2023-4415.yaml
|
||||
|
@ -14,8 +15,10 @@ http/misconfiguration/installer/cube-105-install.yaml
|
|||
http/misconfiguration/installer/orangescrum-install.yaml
|
||||
http/misconfiguration/installer/ruckus-smartzone-install.yaml
|
||||
http/misconfiguration/installer/ruckus-unleashed-install.yaml
|
||||
http/misconfiguration/installer/sugarcrm-install.yaml
|
||||
http/misconfiguration/installer/tautulli-install.yaml
|
||||
http/misconfiguration/installer/webcalendar-install.yaml
|
||||
http/misconfiguration/installer/webtrees-install.yaml
|
||||
http/misconfiguration/searchreplacedb2-exposure.yaml
|
||||
http/technologies/wordpress/plugins/metform.yaml
|
||||
http/vulnerabilities/other/podcast-generator-ssrf.yaml
|
||||
|
|
|
@ -1986,6 +1986,7 @@
|
|||
{"ID":"CVE-2023-22478","Info":{"Name":"KubePi \u003c= v1.6.4 LoginLogsSearch - Unauthorized Access","Severity":"high","Description":"KubePi is a modern Kubernetes panel. The API interfaces with unauthorized entities and may leak sensitive information. This issue has been patched in version 1.6.4. There are currently no known workarounds.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-22478.yaml"}
|
||||
{"ID":"CVE-2023-22480","Info":{"Name":"KubeOperator Foreground `kubeconfig` - File Download","Severity":"critical","Description":"KubeOperator is an open source Kubernetes distribution focused on helping enterprises plan, deploy and operate production-level K8s clusters. In KubeOperator versions 3.16.3 and below, API interfaces with unauthorized entities and can leak sensitive information. This vulnerability could be used to take over the cluster under certain conditions. This issue has been patched in version 3.16.4.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-22480.yaml"}
|
||||
{"ID":"CVE-2023-22515","Info":{"Name":"Atlassian Confluence - Privilege Escalation","Severity":"critical","Description":"Atlassian Confluence Data Center and Server contains a privilege escalation vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-22515.yaml"}
|
||||
{"ID":"CVE-2023-22518","Info":{"Name":"Atlassian Confluence Server - Improper Authorization","Severity":"critical","Description":"All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data.\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.\n","Classification":{"CVSSScore":"9.1"}},"file_path":"http/cves/2023/CVE-2023-22518.yaml"}
|
||||
{"ID":"CVE-2023-2252","Info":{"Name":"Directorist \u003c 7.5.4 - Local File Inclusion","Severity":"medium","Description":"Directorist before 7.5.4 is susceptible to Local File Inclusion as it does not validate the file parameter when importing CSV files.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-2252.yaml"}
|
||||
{"ID":"CVE-2023-22620","Info":{"Name":"SecurePoint UTM 12.x Session ID Leak","Severity":"high","Description":"An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows sessionid information disclosure via an invalid authentication attempt. This can afterwards be used to bypass the device's authentication and get access to the administrative interface.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-22620.yaml"}
|
||||
{"ID":"CVE-2023-2272","Info":{"Name":"Tiempo.com \u003c= 0.1.2 - Cross-Site Scripting","Severity":"medium","Description":"Tiempo.com before 0.1.2 is susceptible to cross-site scripting via the page parameter due to insufficient input sanitization and output escaping. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-2272.yaml"}
|
||||
|
@ -2086,6 +2087,7 @@
|
|||
{"ID":"CVE-2023-33510","Info":{"Name":"Jeecg P3 Biz Chat - Local File Inclusion","Severity":"high","Description":"Jeecg P3 Biz Chat 1.0.5 allows remote attackers to read arbitrary files through specific parameters.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-33510.yaml"}
|
||||
{"ID":"CVE-2023-33568","Info":{"Name":"Dolibarr Unauthenticated Contacts Database Theft","Severity":"high","Description":"An issue in Dolibarr 16 before 16.0.5 allows unauthenticated attackers to perform a database dump and access a company's entire customer file, prospects, suppliers, and employee information if a contact file exists.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-33568.yaml"}
|
||||
{"ID":"CVE-2023-33584","Info":{"Name":"Enrollment System Project v1.0 - SQL Injection Authentication Bypass","Severity":"critical","Description":"Enrollment System Project V1.0, developed by Sourcecodester, has been found to be vulnerable to SQL Injection (SQLI) attacks. This vulnerability allows an attacker to manipulate the SQL queries executed by the application. The system fails to properly validate user-supplied input in the username and password fields during the login process, enabling an attacker to inject malicious SQL code. By exploiting this vulnerability, an attacker can bypass authentication and gain unauthorized access to the system.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-33584.yaml"}
|
||||
{"ID":"CVE-2023-33629","Info":{"Name":"H3C Magic R300-2100M - Remote Code Execution","Severity":"critical","Description":"H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-33629.yaml"}
|
||||
{"ID":"CVE-2023-33831","Info":{"Name":"FUXA - Unauthenticated Remote Code Execution","Severity":"critical","Description":"A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-33831.yaml"}
|
||||
{"ID":"CVE-2023-34124","Info":{"Name":"SonicWall GMS and Analytics Web Services - Shell Injection","Severity":"critical","Description":"The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-34124.yaml"}
|
||||
{"ID":"CVE-2023-34192","Info":{"Name":"Zimbra Collaboration Suite (ZCS) v.8.8.15 - Cross-Site Scripting","Severity":"critical","Description":"Cross Site Scripting vulnerability in Zimbra ZCS v.8.8.15 allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.\n","Classification":{"CVSSScore":"9"}},"file_path":"http/cves/2023/CVE-2023-34192.yaml"}
|
||||
|
@ -2169,13 +2171,14 @@
|
|||
{"ID":"CVE-2023-41538","Info":{"Name":"PHPJabbers PHP Forum Script 3.0 - Cross-Site Scripting","Severity":"medium","Description":"PhpJabbers PHP Forum Script 3.0 is vulnerable to Cross Site Scripting (XSS) via the keyword parameter.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-41538.yaml"}
|
||||
{"ID":"CVE-2023-41642","Info":{"Name":"RealGimm by GruppoSCAI v1.1.37p38 - Cross-Site Scripting","Severity":"medium","Description":"Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-41642.yaml"}
|
||||
{"ID":"CVE-2023-4168","Info":{"Name":"Adlisting Classified Ads 2.14.0 - Information Disclosure","Severity":"high","Description":"Information disclosure issue in the redirect responses, When accessing any page on the website, Sensitive data, such as API keys, server keys, and app IDs, is being exposed in the body of these redirects.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-4168.yaml"}
|
||||
{"ID":"CVE-2023-4169","Info":{"Name":"Ruijie RG-EW1200G Router - Password Reset","Severity":"high","Description":"A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-4169.yaml"}
|
||||
{"ID":"CVE-2023-4169","Info":{"Name":"Ruijie RG-EW1200G Router - Password Reset","Severity":"high","Description":"A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-4169.yaml"}
|
||||
{"ID":"CVE-2023-4173","Info":{"Name":"mooSocial 3.1.8 - Reflected XSS","Severity":"medium","Description":"A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4173.yaml"}
|
||||
{"ID":"CVE-2023-4174","Info":{"Name":"mooSocial 3.1.6 - Reflected Cross Site Scripting","Severity":"medium","Description":"A vulnerability has been found in mooSocial mooStore 3.1.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4174.yaml"}
|
||||
{"ID":"CVE-2023-41892","Info":{"Name":"CraftCMS \u003c 4.4.15 - Unauthenticated Remote Code Execution","Severity":"critical","Description":"Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector leading to Remote Code Execution (RCE). Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-41892.yaml"}
|
||||
{"ID":"CVE-2023-42442","Info":{"Name":"JumpServer \u003e 3.6.4 - Information Disclosure","Severity":"medium","Description":"JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affected. The api `/api/v1/terminal/sessions/` permission control is broken and can be accessed anonymously. SessionViewSet permission classes set to `[RBACPermission | IsSessionAssignee]`, relation is or, so any permission matched will be allowed. Versions 3.5.5 and 3.6.4 have a fix. After upgrading, visit the api `$HOST/api/v1/terminal/sessions/?limit=1`. The expected http response code is 401 (`not_authenticated`).\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2023/CVE-2023-42442.yaml"}
|
||||
{"ID":"CVE-2023-42793","Info":{"Name":"JetBrains TeamCity \u003c 2023.05.4 - Remote Code Execution","Severity":"critical","Description":"In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-42793.yaml"}
|
||||
{"ID":"CVE-2023-43261","Info":{"Name":"Milesight Routers - Information Disclosure","Severity":"high","Description":"A critical security vulnerability has been identified in Milesight Industrial Cellular Routers, compromising the security of sensitive credentials and permitting unauthorized access. This vulnerability stems from a misconfiguration that results in directory listing being enabled on the router systems, rendering log files publicly accessible. These log files, while containing sensitive information such as admin and other user passwords (encrypted as a security measure), can be exploited by attackers via the router's web interface. The presence of a hardcoded AES secret key and initialization vector (IV) in the JavaScript code further exacerbates the situation, facilitating the decryption of these passwords. This chain of vulnerabilities allows malicious actors to gain unauthorized access to the router.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-43261.yaml"}
|
||||
{"ID":"CVE-2023-43795","Info":{"Name":"GeoServer WPS - Server Side Request Forgery","Severity":"critical","Description":"GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43795.yaml"}
|
||||
{"ID":"CVE-2023-4415","Info":{"Name":"Ruijie RG-EW1200G Router Background - Login Bypass","Severity":"high","Description":"A vulnerability was found in Ruijie RG-EW1200G 07161417 r483. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/sys/login. The manipulation leads to improper authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237518 is the identifier assigned to this vulnerability.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-4415.yaml"}
|
||||
{"ID":"CVE-2023-4451","Info":{"Name":"Cockpit - Cross-Site Scripting","Severity":"medium","Description":"Cross-site Scripting (XSS) - Reflected in GitHub repository cockpit-hq/cockpit prior to 2.6.4.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4451.yaml"}
|
||||
{"ID":"CVE-2023-4547","Info":{"Name":"SPA-Cart eCommerce CMS 1.9.0.3 - Cross-Site Scripting","Severity":"medium","Description":"A vulnerability was found in SPA-Cart eCommerce CMS 1.9.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /search. The manipulation of the argument filter[brandid]/filter[price] leads to cross site scripting. The attack may be launched remotely. VDB-238058 is the identifier assigned to this vulnerability.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4547.yaml"}
|
||||
|
|
|
@ -1 +1 @@
|
|||
16fc811297044b5d3f7904cafbfd9424
|
||||
2a9dac7ed37848256e768a0872ce4e60
|
||||
|
|
|
@ -1 +1 @@
|
|||
3.4.4
|
||||
3.4.5
|
|
@ -1 +1 @@
|
|||
9.0.2
|
||||
9.0.3
|
|
@ -1 +1 @@
|
|||
5.7.4
|
||||
5.7.5
|
|
@ -1 +1 @@
|
|||
2.25.25
|
||||
2.25.26
|
|
@ -1 +1 @@
|
|||
2.26.2
|
||||
2.27.0
|
|
@ -1 +1 @@
|
|||
2.1.8
|
||||
2.2.1
|
|
@ -1 +1 @@
|
|||
1.2.0
|
||||
1.2.1
|
|
@ -1 +1 @@
|
|||
7.1.1
|
||||
7.1.2
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2000-0114
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.09258
|
||||
epss-percentile: 0.94019
|
||||
epss-percentile: 0.94032
|
||||
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022076a0b67db39d6edf3954ad1ee2b91b0a9f366839b9014307530cd9cc301348ce022100b2f0ea19edc1f3d1f6aec75c82c48a7d962bbdc075b1e007246d367a67cd9d6e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100c1af67bfa98e66512709d669308e72a8b8e181d9f5189736a3c02480164fc771022100b179367c633acc0549a9d8cf368dedc353f63706bae414f2bec68d5cba58c36b:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2001-0537
|
||||
cwe-id: CWE-287
|
||||
epss-score: 0.88063
|
||||
epss-percentile: 0.98328
|
||||
epss-percentile: 0.98333
|
||||
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -47,5 +47,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a0048304602210087cafd283b0d2c32b5e6d535d02ddec38630ac34fde9f938ce1c9cb46b48853702210090848784fe6f52b0c99bf31404f11287813e30263bc34318aa234ababa7ce9dc:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402200d464f701b2fbc864167f7007182385a7f6b82527c2e307d8c30dbf642100bc00220219b9dc1b4a588c4bbdd87d68a9b022c9c71147f8673915d04c2f48f54caff0c:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2002-1131
|
||||
cwe-id: CWE-80
|
||||
epss-score: 0.06018
|
||||
epss-percentile: 0.92666
|
||||
epss-percentile: 0.92677
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 5
|
||||
|
@ -53,5 +53,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100ac64503df2415371f194e66f195785387bb01de16a12faa0e35d0c1396f9529202202a5d73ff06b2a2223965df6ace420ec1003c472bcea7a894c09090a26fd73295:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220381533f6a0fe1a564d03d953cd4d9bca7490759d2b9a0854b00908fceeae95aa02207e1c04b30268ce76af15f595078b86754919e90013203f2a72b1a1e723426d31:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2004-0519
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02285
|
||||
epss-percentile: 0.88457
|
||||
epss-percentile: 0.88471
|
||||
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -46,5 +46,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022026db67e61d737b0bc17e66cbc5a43657a4139b3f810bcabcacf6b6e0bb1b4ffc0221008f1fdadac48f0fafcc12bea26c5093d4043d133b94ff0ba7709e6418d2502f08:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100c4b6b89d3edc11f393f2a4056502636caea8e03fb6deab8c52330f290ffea85e0220334661fe3051fca2480611dd1bbc3546b747dacc54619592392166131da9b32f:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2004-1965
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.0113
|
||||
epss-percentile: 0.83076
|
||||
epss-percentile: 0.83104
|
||||
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -37,5 +37,4 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
|
||||
|
||||
# digest: 490a0046304402204f36a1601b30669cf8af8bea8fb1a6f41dfcedeb02acd83cfea95776e17ceed402206f2e2cc64fb805ea2c51ec91723b1b5dfdcacbd110ec24b6ed1157f6c45c7e24:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402206c124d71a3b5f48ac30f2bf1259d76673088a5aec591fa8bc1bcab0da303990802203d1ab92ef93e5f99cbb0e39ca32658c5501674986480590024c2398cb92d9842:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2005-2428
|
||||
cwe-id: CWE-200
|
||||
epss-score: 0.01188
|
||||
epss-percentile: 0.83571
|
||||
epss-percentile: 0.83589
|
||||
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -42,5 +42,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100d1dee1d9d8c1a63a329c49aafee32c6d3884e4ac1f5a7baf342625087e720a51022100bb009165de1ef2f00c382e03ccbbaf3ea121cb2f7c7fecbf4bfaf8aff7826197:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100e821043833fe53ff49fdf030f58f6a5ab7aeb3e6227007c81b08ed0dbe559bbd022100e088480b15270f1f4f2ba2a5869df0a095bcc6fcbaa8849ab3e50091e7ffb5e9:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2005-3344
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02158
|
||||
epss-percentile: 0.88101
|
||||
epss-percentile: 0.88115
|
||||
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -45,5 +45,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502200ea2fc21fb5781e21b2b21b33bceed90ea6758ea92acf5e56601ab63bfbde4b9022100abafc518e3316e8c514c886bf19dd0b230a139b83beccab21722538c8c8e9a18:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100d3402643b70f436a0e2093d5a37aff3b9eceaf04ef7c30c292359d66ba7758c30221008ecfa3a058d8b6b0777c0c57fbf3c707b459111d320c3fa0c3e40b86dc42fd6d:922c64590222798bb761d5b6d8e72950
|
|
@ -21,7 +21,7 @@ info:
|
|||
cve-id: CVE-2005-3634
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02843
|
||||
epss-percentile: 0.89574
|
||||
epss-percentile: 0.89589
|
||||
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
|
||||
|
||||
# digest: 490a00463044022055e73075a78d30caeac1b6a9afb7ab17b8c7e75f4d660b53e03961c5345515cb02204b4690e0148f678b0afccd87b2cb11222f509fd941330dae5c7c03cadde56dd7:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100d7713b4325fae549b334172098ffc1b0ed278bc774297f29ff1bdb75a29cf6580220750a8cc019a92148dff0987fafdf5bb00ca37b3c45d9e5df103ac0d689897008:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2005-4385
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00294
|
||||
epss-percentile: 0.65814
|
||||
epss-percentile: 0.65867
|
||||
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100bce32e7d11f9924510e6f4c147b6eea44e966df4c012dd96d3cc6ad09b46f05c0220251fa43d5cef67ac0546f2d7d456faedb106dc55faf90adb4c4ccced53c57bb7:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022023a51223cd793cbc4f7c98ec10bb6b81912a38cca4e8b61ac8575894cf04eaa1022100bb4046135196f9c6e436e3fe4282bd888225f00e1a55ce8456a070090c09509c:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2006-1681
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.01015
|
||||
epss-percentile: 0.821
|
||||
epss-percentile: 0.82128
|
||||
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -45,5 +45,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100feed1caed197fa85a4250142d43f8757b89480c02cf52fb58f079af050465069022100a5328a54040801a8263ab4b1ec2b54ec9b3d8e63416dc7889b685349306d0c18:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220493c5e1d4552bf41512d28592d276ffbf30aa4aea92f1b6f86b9d4d038b0e11a022100f46aa3fbfc4bac5479cadf4fa6df835d3625af347ca4a959345e54108512c7a9:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2006-2842
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.22361
|
||||
epss-percentile: 0.95949
|
||||
epss-percentile: 0.95956
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,5 +41,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402204228585cf3216a21661376687483c7146156dd0ad793c18761ca793f2281992e022025166e51845704a0d17dfddbf8893db355b72d5b964a4b4df4d82910ba5e0c2e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402200f92f112f97f10640f68383f18e0d635e1f842122fef492c435a6877d6c9ea1b02204ba13f88d2d13a2b44ba30c9e40a21c2f5264c6de914825ca13ff5a89758442f:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2007-0885
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.0059
|
||||
epss-percentile: 0.75886
|
||||
epss-percentile: 0.75921
|
||||
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -43,5 +43,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502210097f11299aa634722d7ec16f77bd049dd81a568727313a933a0eab8ed844d08300220684180e2d52ca9f594aa4d1249866033e0f32df5bc8e60b6fdbb0c94811f9fe8:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022064ffc47da72b10202aa637a27b7fb4a55d64df785e2f112d151e1e8e0cb5bd00022100b8ff1e83597027c3a20fecc7416355ec607358892f8092ab3ffa4ffd6d32d011:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2007-4504
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01677
|
||||
epss-percentile: 0.86281
|
||||
epss-percentile: 0.86294
|
||||
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a004630440220394739936f7c51c7b2558cdc3eeef7ca372dc443e542152ae6612fc9a4830a6402202769f1ea652a2dc5723685baa0b44b2163bebbb621a6c71b8e1ba6965f1de3f9:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022032d62163c3a002e98dcbfd822a7bbfe73948b083d3a915a8e70bdf9682cbaa1a022100cc8073c12ab17603aede2f9309f8f0e1f9fdf228f873b5490fa2e84e2bd27f68:922c64590222798bb761d5b6d8e72950
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2007-4556
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.19583
|
||||
epss-percentile: 0.95732
|
||||
epss-percentile: 0.95737
|
||||
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -49,5 +49,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022075521baf86f07edd5e2a2504c3d335182070703ffb9b0a89fd3ad0ddd8374596022029dd03a113c7fa870a14eeef53dce4b88683dfc1f6b677f5c637df8f1c41ce4d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220195dff1585af1ad1f5cb0261b474e04916b92601a931fe519f3065b15373f1ea02210087bf14a4d6249567ea8b4a3b25c613f80b9f1f1c06a15ca6e5b6e6891c88783c:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2007-5728
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.02361
|
||||
epss-percentile: 0.88625
|
||||
epss-percentile: 0.88639
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -50,5 +50,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450221008e9ff996e34052a3953e8b1aecf9c9ba921b8af66bfe95fd31275c22c358024f02207b50bcb5c379b648e2668660421cfb8f29242d6dbc9f406df9ed1bb82d292fa6:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100bd6dcb9147fb40e9e7beba1175be378ffa726b7f46bf24198c2e99a8acc26a89022100bb773f64b053cc9ec58c75b12b9a5155a80917851a898a7676846287edc6f942:922c64590222798bb761d5b6d8e72950
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-1059
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.01493
|
||||
epss-percentile: 0.85416
|
||||
epss-percentile: 0.85435
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -45,5 +45,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100fbfdf880b057950665b98ddd29790b1df56f2c131de9a6cf365b6968df35c0ea022100f50d6697fd45f5e85a62479a5f417e5dfd8926f9d492e8ab0c3ca68afe0ff99c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502201ca2b768849b8c3ca5e390b1a0e501fbb839c6181fea4a11e26d6f5d7ba3b350022100f85d991bc46efbc225803a2d9a768257cee172a139abf4689bdabfcf8ece001d:922c64590222798bb761d5b6d8e72950
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-1061
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00938
|
||||
epss-percentile: 0.81344
|
||||
epss-percentile: 0.81368
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -48,5 +48,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022006dfd2f336acaa81f4aff48e3e8617709ab99c28ee3b4537292d277550806d9d022100cceb88226badef697912dc073f310b8e6cc79feb9345886f7a93267b333b3254:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402207eeae9b94cf1d36ca0404fa0c5edd430c9d05a802675373a1b6946c614b55ae802207261a472fe3818978942ad843da675e072ddc3178dba2a4c7a013a349d12ce28:922c64590222798bb761d5b6d8e72950
|
|
@ -18,8 +18,8 @@ info:
|
|||
cvss-score: 4.3
|
||||
cve-id: CVE-2008-1547
|
||||
cwe-id: CWE-601
|
||||
epss-score: 0.03523
|
||||
epss-percentile: 0.90498
|
||||
epss-score: 0.02834
|
||||
epss-percentile: 0.89575
|
||||
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
|
||||
# digest: 490a004630440220508dd6b30ef8f1374954890e820c8ee382a307f563b410fa615922171239733d022061fb7341a271f65fedf1ac004f8b7915e4c519cc9233f5e5f301afb368448cd6:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502201950eba3841dede656d99d00d79fb18f0a54085abc37e200f409e3bacdd11186022100c5ac92bcccead79bc02785fc5269ec59523dbd7237e8ac8b944d2355c2cbe43b:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-2398
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00329
|
||||
epss-percentile: 0.67767
|
||||
epss-percentile: 0.67809
|
||||
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -45,5 +45,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100c8a67c822699374f093826464671f06f62c6f56a38b6bfb72ad9d681a9696c02022100cdc87193973e90fd6af33d01349c9f3ae5766e7dd2d86e8b8db681c4cffe73c0:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221009f9770ab555b8b30d0f1402fbe557932ca1623540617f1837455611af34408e7022016e8cf51eb8e61d68d50ec4b1f165f91bbeacb7b46ed574a95eeed0eba692955:922c64590222798bb761d5b6d8e72950
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-2650
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06344
|
||||
epss-percentile: 0.92856
|
||||
epss-percentile: 0.92864
|
||||
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -45,5 +45,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100e9035c810e298e72d777d662cff7ebc4248e230712bbb564a9c453b1233ab8fc022100f0f2b7d832f1194c4bf525dba7e085bd2193d544eebbc8fb9e1d147d92ee44d9:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402207f4ef68a3d2b74aa9e5bf2aa9497f520385ed67dba66371f898c9d15af43bb300220386722e6a1ad09affd3ccadc19703ab89d93623f5d2d67de50986514ef9f5b83:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2008-4668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01018
|
||||
epss-percentile: 0.8212
|
||||
epss-percentile: 0.82149
|
||||
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022007213a1944da431df62ec0aa704ea00af82ce4c61f2f423bc4a192508fc3c0b90221009c13e842507d8b49cdb7d2e3ac1e903b944a2c7de37d51caff1049f65486329b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100ddea23a4fde7203aab5223bffff461f8e79c0e72fc0289a610b8d181a20f1983022100b28703a063306b220faf7a43b4bf0651c027c9a01f1622136327230d4b85bf29:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-4764
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02365
|
||||
epss-percentile: 0.88632
|
||||
epss-percentile: 0.88647
|
||||
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450221009a0e290ee0cdb7b44749685b5d8468a315ebcff6ec3c7271b405372f44c92fd002205a385617f0d7b01d21d7a0ed4607fa46cbb2862fcd0d8221817d4ae184d5a8cb:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100f9cc04ebce6dee194b15923db242fa0bfe762c95061ebeb7152e57e9a18a560a022009730c8250c86a39b39cc7aeedc3374057cf8d7e2bc7948e62b01715d42ebb35:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-5587
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02331
|
||||
epss-percentile: 0.88553
|
||||
epss-percentile: 0.88565
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -42,5 +42,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502207b83fd8a77d08350b0dcb8a8775e7cf005466ec0e6f73d9517a12d0ec985f595022100aa556e5eb269e11dde3575ec7c8c5d0fe6a15840cb6aa9ce2ec0ec06a8831365:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022049d1a1b54cac6ea9a4849043aa3ab5b8a7089fbed5ea58643011f64bf0400260022022aa2c7000a5d0075f1f10117d579b166eb36c458f0f779751a61172bd50c184:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6080
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00824
|
||||
epss-percentile: 0.8003
|
||||
epss-percentile: 0.80049
|
||||
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402205aed9fe5ee723c9631501c87f21a1a4f52673d35d5317391f07c39ca73767745022031d0091b40920e364611bf23a7b15a37c33339da2820c5b2f0610d3a845d1831:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100b97e826eb0c51a86a2c4d141d09ae115325443f40ba8ac119d93649c88bdd70902201e75f402188ca06108818403b7932b4c5b427aaba7cae9c0ea72b69f081e0b74:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6172
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00509
|
||||
epss-percentile: 0.73923
|
||||
epss-percentile: 0.73965
|
||||
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a0048304602210080836d4683e158c670b5d3a459fc7af0ed30bb115904a812156d94cf66239faf022100d64b338c0b0b6c3ac0ad59685e2b0f07fbd39996c325da41c2642083f9ffcdcc:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022025c7c512a0e4600821d2b4bba6d7933052d304826823e251daaf5019bc941813022100c3f58668769d97154a5cd3f280bf04fd1cf65004defbcbec45ed3dd446520035:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6222
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01029
|
||||
epss-percentile: 0.82197
|
||||
epss-percentile: 0.82225
|
||||
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402203b534552b52d40e24e8c3a1e4fb8c4333ee2f081b3f9ea812a28bad07d2b1722022060f311cdcf6ed15ff0710756ea57aa752885a461d7f0fc60b5f29e917ccb10d8:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402203ee35436938d53dbf86e421601a7ed5ebba317fd373205caeace75d158170d4b02200d451111d8a5c8d81c610eda47a7f03430a78899b8d8a12025d0ae3de76455b8:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-6465
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00421
|
||||
epss-percentile: 0.71388
|
||||
epss-percentile: 0.71429
|
||||
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -51,5 +51,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502202e71e72ad3fdac21334fe3446a010663732faf568f4cd57a92e4431876405baf0221008c31cba704c52d8afc84886b6090d5740ea6d8f65d2ec9a8e592dd5f3e857ad4:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100dd05acdfd381b9a0242309bfa4752f6d296d9d13a62eb7da84fe214e2d14398102210089e1037b799a3ab34ba4d10339c386e47e0839e71ffa11b7d28ac71c6d586f9c:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2008-6668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00359
|
||||
epss-percentile: 0.6908
|
||||
epss-percentile: 0.69124
|
||||
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -42,5 +42,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100ae68958325c13a5a1a18aaf4b9cedbba5168d0e5c98e3e0195edba55dedea18f022100af95d530c98d093fc628bbd3e8fe36d87d2b479c1e1b53debb846a3c25772665:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220047ee1d0d88ac990b887bdbdf98d41903b061249da354c821dc04d42e8356b08022100a27a9a0de9995172c7f85317a70839fd8174d0f27200d1ddcafc9d21fed8f4bf:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-6982
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.0038
|
||||
epss-percentile: 0.69953
|
||||
epss-percentile: 0.69999
|
||||
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -48,5 +48,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 500
|
||||
|
||||
# digest: 490a0046304402201a6c1a0662176a06cb31ef97a6e9fea2e12b9f3a0e8d12f6c1f910ebfa94452a022064df13ea2f89ce8064d0d525bf48a749821563906e6e3f25e5043402e4ca48c6:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100ddf03befe6b354c155750c83a68f45d3436729e566c17291f6af087a3bfab492022100b26e8dcaf1e2618efada11fd878c5973654fcd5b5dcf2d50873ac812cc4bd23b:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-7269
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.01358
|
||||
epss-percentile: 0.84747
|
||||
epss-percentile: 0.84762
|
||||
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: "true"
|
||||
|
@ -37,5 +37,4 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
|
||||
# digest: 490a0046304402203a40ff8c9ef91b0d67d19e5db5f1d401e809e75ff9c1c856bb34738f3a80011a022027c0b511bfb3b7fa435d4fa9a2dd58539ebe2a1f85fa25cf03aae378842476f1:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022044e87aa9d3c46fa7fc86a7e390916463dee64ee82664a98569644689ec640a3d022100f49006032f08b4a330ccad70f85945b65ca41c0b2688fbe01ae94207d9e96317:922c64590222798bb761d5b6d8e72950
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2009-0347
|
||||
cwe-id: CWE-59
|
||||
epss-score: 0.10982
|
||||
epss-percentile: 0.94502
|
||||
epss-percentile: 0.94511
|
||||
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
|
||||
# digest: 4b0a00483046022100a4fb3f1f26e87549a0346537c99aac620c444f3b5891bab7a6d3afe485bc1275022100bf9e4887170099ded1d09e00598d4198eeeac39adfd93f6b4062a183ddedbdff:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a0048304602210096ae858563d7f921cab4aa2763ab211c2155597fc931a31875c18052ce4e0b2b022100da7ab5b8a0ca41ba1310fbd36939bcd8bd91fb727d75e07e8300c2d6901e5ace:922c64590222798bb761d5b6d8e72950
|
|
@ -18,8 +18,8 @@ info:
|
|||
cvss-score: 10
|
||||
cve-id: CVE-2009-0545
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.97252
|
||||
epss-percentile: 0.99786
|
||||
epss-score: 0.9717
|
||||
epss-percentile: 0.9974
|
||||
cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -37,5 +37,4 @@ http:
|
|||
part: body
|
||||
regex:
|
||||
- "root:.*:0:0:"
|
||||
|
||||
# digest: 4a0a00473045022100ab78ce4e76d5bb8589a1c90a878873cef61e8bd9c131d05a3cf221441662e0cf02202e7be3650f19fbc75a5af390af076489f73d67cce9450b0058a718dabd1d6b9e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402201c8cf9399d3f49a32a3ce7a72b44bd43323d9b082202b90b02b16ad7446a2d7002204e4809c13f057bf758820cd178f5813d8bdbb3b75ed8e41543dea272f58591bd:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-0932
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04048
|
||||
epss-percentile: 0.91094
|
||||
epss-percentile: 0.91106
|
||||
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,5 +41,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450220225a9977f6b3e43a446ba93183260d3404da98d0a3878ea6c984139db365f7a4022100ce71f2c95520ba95aea00c91c30c3eac42d6c35246ea86046addf7c92633e27f:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100904465e6da1d8e87a9366f8172e2bfeddf0b3bd80746706e0dad353bcb3a068902203e3180bc397d4614a72f611b45451899e202af38465ab546e5a02714decb2494:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-1151
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.79256
|
||||
epss-percentile: 0.97929
|
||||
epss-percentile: 0.97936
|
||||
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -47,5 +47,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022061e0d5d5d476e3caddd1ff1433f46857a3e6f6534d6ec8183d05bf973bcda1420220431b4b1e4c02a02bdbdce462d95243196d8f8d9b014121cc01cdf31aa8ff527d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022046c88e614e4a0f71cb55b880435e65c277074bc021b1621ce8aa50c5cba5349f022100a4a3b700aff2f011c5a7a23cc2a985ab5f8bd49283e98c1228c473e562e689f7:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-1496
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00648
|
||||
epss-percentile: 0.77046
|
||||
epss-percentile: 0.7708
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450220116ddc6dc44d74cacfd1a85fca5c629659ac61d56e9092a5c0c95cbd780944cf022100d422d6f87a3a9ac8b3012ccfd46d0cf59d3f1d13d74d63e4a69b0394ad07e8a3:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022065067f7b9e3d1cad8dd0c4d92ad248bc2a745536d0b4a80905c9d0e2b812e7a7022100a807fb80acf28af3df9e934cabd65819e02d111d45abb766aa2176b8cffd158c:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-1558
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00883
|
||||
epss-percentile: 0.80734
|
||||
epss-percentile: 0.80759
|
||||
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,5 +41,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100a9144e6064c3c0954996f644ca3d79a62be6d1558dc8074fc813307aba7590ec02202b3e1a95822a1bc10eec518594142d99021fe987b4d1a8d40d6ec277a6f18f06:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502205ccc56309fdae10172eb46f1956a11c35e85c527c293751b189f8bf19f261085022100e5731fab3a815f2c1137038b95ccc16fbc806f69b35f81e7eded595d3ca12ff7:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-1872
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.40155
|
||||
epss-percentile: 0.96856
|
||||
epss-percentile: 0.96861
|
||||
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -48,5 +48,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100e0f9e4d3979cf7fb4b85cf75f1c808ecb6db2645bc01ba179b9822216a5f82b30220661d94ff3c1e3baf962c4811c2ecb0295af00ec92c24a3ff5f36bc6792ba504b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221009533742c0ec378a6edff61334a88b272e6ed3005f0a5347aaa9176a41d65dba902205b7cbe4b8c72e7c0fa25db77a5fe3a93fda80316987ff698763de242cc08c733:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-2015
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00797
|
||||
epss-percentile: 0.797
|
||||
epss-percentile: 0.79721
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100b86c09c2fc23a9a8a723d957775f912cb1c1f00d3ac2d6990ca66ac3d636f2250221008b1edbd72157e245660129250d11e4706d2cc56cf7e067c1756a966c1168a712:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100c1e4996bdca53d4534bff113fc03e9ee1d5e56e5a71ca6e19cecdbfb1bda99fd022100a4cd7fe91f4e521e36a6d6ad708313fbacf5e8d9ddf99bb7956d3ebf76e5b88d:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2009-2100
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00528
|
||||
epss-percentile: 0.74412
|
||||
epss-percentile: 0.74456
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100a8530668ba1327d37fac6302e61fa31f8bed06f77b1e187c4c7d7291946bd1dc022100925490352b66a55d09fb5823343504d05ffccd4f39cf129ea66c9b52d49c8788:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100968e95dd878c3177afa117d6174278e9c418a5191f54eff2db35bc35db7e080002200abf9d8168bb13262d841c5448b80336f24cac570c202d03de4cea617158b658:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-3053
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00367
|
||||
epss-percentile: 0.6946
|
||||
epss-percentile: 0.69501
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a004830460221008253458574a558f0048881e209c8724637f135a2e08f06ecb4adcf13c6af7715022100db109ce80163c82ecc9cfcb8cd495117b50b58ef1637505efe2dfec6d47a33ca:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221008548a2fe66fa3977d5acd72a4e50c76320651ecc37f1852d007f270f17b6e29002204d014958d6c6785079dc59743fa157aa3b1562d8dc694da4da04f8a68dcf5677:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-3318
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00706
|
||||
epss-percentile: 0.78213
|
||||
epss-percentile: 0.78239
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402201ca85ce6475c6107d30edcb8e32c59683579966f42caf7a8feb419f2922c4a83022057b9daf1adda48f534a763b50a76690e503373e00074ab39fa3cca42c5f493f4:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402200bb3133ae4e0a6533ea3822c8174c7f50cad871cff35c154e861818761439b5302203204b0233aeec635b37807ccf2810b54af7d19e4bcd3633e0f4389fe4d414e91:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-4202
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01956
|
||||
epss-percentile: 0.87408
|
||||
epss-percentile: 0.87431
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022004806a9823f876b60c36ac9cc3f38e6c90c6177ad315247e727d8ea3ea4f435902200c01475406412e5f29d50a5914ad51987135074c1244220115dba20757368e86:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100f547ecf8478846e017f78f6826ee6d9eb4d0f959f649ffb89712262b958dcd43022100fce833b4932d46b6686e18cc108bc2a57c0a221df8c0bf8d39474f0e46c5942c:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-4223
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.01041
|
||||
epss-percentile: 0.82323
|
||||
epss-percentile: 0.82352
|
||||
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -42,5 +42,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100c6d560ec94c429eec67cf5686febc2a284a1f5bbf0ba5acf4ba43c9ad4ea05d9022100f549d00f532208f52cec5b07f4277e446cfbb479095420ef3bb1e84e39e6c818:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100fec92d4cc493bd485c6507e68c3a8915b219d1ce50be82476c5c48b226f4f10c02210099f79302362b04751fcdd84e2986ca69e2fd0ff5b5c1597104582b38b4747d78:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-4679
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.80056
|
||||
epss-percentile: 0.80076
|
||||
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502210096ef00365de861dbef0c297ffd309b5b5e26b1869ab8492c57e4c0a93e4d992002205a8aa3b92229d58aeaa63dad525393a423519785f65ec704491afa63af378f9d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100e321a85104d3d5212d5f2e3bd346f05b0aeca99e1b7689e572daac27b0fd12b402204702a90f8a8fe9b535db96b4f462e8ed0922d7150907bae83c0a58f66a621369:922c64590222798bb761d5b6d8e72950
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2009-5020
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.00215
|
||||
epss-percentile: 0.59359
|
||||
epss-percentile: 0.59413
|
||||
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -35,5 +35,4 @@ http:
|
|||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
|
||||
|
||||
# digest: 4a0a0047304502203c00dba8096aaf3da35c70c90b6bd1af8c32bb94f34730c62a77a196900452e6022100f60897b4f53189a05212312d0a50a373cf4eb8cae8dec0f6c58476ba0c657d29:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100c66debbf21ef93e8b06af7aaab11b8550c8fe9e0d56bf453d786da42f1798ca602200fc5465062214bd748168502197bb320030800e90d3f327086e62e6e5cee304a:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-5114
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02357
|
||||
epss-percentile: 0.88611
|
||||
epss-percentile: 0.88624
|
||||
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100f6f21c323951728453163016377f95e63215d9a69e7e83beaad91d3180c84602022002842dcd05e308b023484e5f9dfef94bcae8157991aab81687999212c763c56c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502204daf91f462e5e6887f0e6204a147a9ef2463af9120d1af4ac7c92be382042282022100cf0efe9a9fe9074d48b715cdbd07a163bf9e5d20cab1bcc442bbb057915a3252:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-0157
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.80056
|
||||
epss-percentile: 0.80076
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022023a37ad7022fb3ea4680961c03fbd4698e0c1a31c55a3b96cf3d666e05be805d022029378a8235dad0cba7857df5bc6c4329d99a1c4ab6c3262bbd206a7e70bc0590:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221009473b7372aad54d8e6a83e5fca5bb9f16550a7098862b98df570293edb8ec660022064392ee158b3586c404d5d396dcbe7b1ffbcdceed6c19e03b462eec1a3deec7d:922c64590222798bb761d5b6d8e72950
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2010-0219
|
||||
cwe-id: CWE-255
|
||||
epss-score: 0.975
|
||||
epss-percentile: 0.99974
|
||||
epss-percentile: 0.99973
|
||||
cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -60,4 +60,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100ee66a81cf0b38e51042293f4a1dddc8aa8dba47774371e9d19eb48829eea21f80220368383c23f0e6b0c8f3c52120ae93ac76e1e4c2e52c9bdeb83814ca2c54f6ead:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221008f4bad01c33bd0abc7a040d1f2873216d00a465439ba1eacafc0f9afc1e14379022035ff2091b7ca247d5df65db41584f094ab86acb4172116371ab0a3aae5c26947:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-0467
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0586
|
||||
epss-percentile: 0.92582
|
||||
epss-percentile: 0.92591
|
||||
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502203f4b902ebc2ae4854cafeb88509c7e1ef5cfec9ecd2e63ebe5919272bbba62e9022100cbd8ec589f383690d4813601af98da2fac45af5428344a064d422f86af5bbd14:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402203ca81fbcb123889134c95781cc2d9458d0afa0135d2097f10ca8d4835d62d3a9022057eb95f29958e50241c873b31c65c973026b4ef88bfc048bd9622f54586911fa:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0696
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.62698
|
||||
epss-percentile: 0.97465
|
||||
epss-percentile: 0.97469
|
||||
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502200c1daefd45441a6775d47dec8176af125290fe9a2f506ab0621f0c35706039400221009d91b31c866a277402a6ad484789eaf3a7022d4952f74eec830b2f69172bd52c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a0048304602210080a4439965d45d4421cf2bc80f91474235cc9f582353c2c782b4e14f50fbdf78022100864a8fa344e9f6d3f8718004578bfa32627668adf36768a9cce6bdb72f50ddf0:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0759
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01326
|
||||
epss-percentile: 0.84549
|
||||
epss-percentile: 0.84565
|
||||
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100c94f1338a2dff721cd063eed5485dbd9a3c66e36446450c1541be48488735e67022100cfe98b345c2bc3ee84c7d92554e2a58b36b684dbb2cac8969dc88cc27aae419c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221009f179781a230e0850b5e37d07fde5ae02dbe482cb2850c4b8bb2bd797cecb729022100aae6b363d9a6ac1b75a8b31e18504552ceecae8ed539b8cb036aa6f96ec22fff:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0942
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73076
|
||||
epss-percentile: 0.7312
|
||||
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100fd91e7dfebaf8b0d04852883f5e7a633abe8aa06faf8657fc073c775bf374793022100eec148400ff02e7f6ee994882a3dd373828cfb8829619e4b0d6bbe6cf7da9700:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100c3d612f298915367a74d6420a50524ca25431edff91220198f1404cc378418b5022100914ec9cf3acc35164f595c25cbc0a2d051b36b6c073815c068df44d8fb0ea864:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0943
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83288
|
||||
epss-percentile: 0.83314
|
||||
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100b2fbff89c230538358bba6fc5afce9ccaadbdcedecb8c45a8db76bf6608e4233022100ddd21f7c769f48c04d307662bf41b6807f181234eb54b3b00793a2ce62d42ed2:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220639392e392af04ee83704f4472d75dc8e85d635afd785917c357b9e3261184c20221008dfa91ec0927d296601796c48f89e74291ea1b07dc3fb8e839f8ce910979d2d9:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-0944
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73076
|
||||
epss-percentile: 0.7312
|
||||
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100d29a9ce567c0aa89e4daf7800b6316e60a0ff2c4e507227be2af830d8112afc2022100d6c9853f4dbb770b4070acb020a365994e45cc635a87d504097726d997a247bd:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022040ddf3b66ab429ce7bf5029149bb783e18c32a1e4a2123f8783990cb807f6eb80221009eac4a07ce73f0e92bed73ef8e07bbec0690741071f290e6b95f5c7e6ffb2fa9:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0972
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79894
|
||||
epss-percentile: 0.79912
|
||||
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100dff33c9033e1b94bddb8a8e6127e74c5bbcc96102afffa1908892bc7f2bcd6f4022100ae3cbc19e4b253fd7672c7a3c01b9fe9cdaa37134e7dde2fec130662b7e2bd2e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022038ad0331a6adfba1545c515ba4023474c955214584f39804212fe65771e04e0d0221009561f9ca9f07d721e18f1ace7c091eff76b347fc2037efbc1e4f66e591466d04:922c64590222798bb761d5b6d8e72950
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-0982
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0087
|
||||
epss-percentile: 0.80556
|
||||
epss-percentile: 0.80583
|
||||
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -37,5 +37,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450221009988b72c18a8473e7676505c8dbcf940f19b037a7cda5e342166cc62998f53e1022051670d3d925f03da83afeaaed9aabe505861204af60117def2f35c5439289582:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502200d0fa8a48b3f25e59a9cfd9ba10486f86493dde14febd15ed34199d83ddc0381022100a061aa17219bb464fb02d11643e989718554a2c9e2add0f82d4c3503b4c0891f:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0985
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01222
|
||||
epss-percentile: 0.83814
|
||||
epss-percentile: 0.83832
|
||||
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100d74dd5d68f3e54422255ecc05d88f31d61bc710bb6170eadbf7b16334afd6fb10221008e91799ca473f0698e062ca2ead6939ccf62f9ce998034ba4a6ea3348a99bd48:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502202be8a75ae3a0d5b5cca6ec12ed7c3202a6efb6ee153dc721a1c6747ec9c5d1ae022100aa4ff760f83e3d77261444432c7331caf8c1ef020560bced223524a3b539d7aa:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1056
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06484
|
||||
epss-percentile: 0.92944
|
||||
epss-percentile: 0.92952
|
||||
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100d25c1566a9de53c8293cece2cf57afbe02e1459d3447a96f68be6fd7eb0a9c6b02207f7597f4df7414385e5c59f1ef313f956da70de3e83a29613fc4e73511bd7038:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220777877b17f13e54fdcb96dcb778c13550b13326fed684b587330cfcba9d72157022100d55804dc2f0d17059485794d3fb5bcb8013a712a6eb462965c0dcbcf394f4038:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1081
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0168
|
||||
epss-percentile: 0.86286
|
||||
epss-percentile: 0.86299
|
||||
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502210087b176606c85de1ae890e412cdbc5271199eed07cd7535a2178cf217b31ec8ba02203199b9303e8ee29fa4dc1b2ad01faee7f17fe727c22cd16745a8591bde952e1d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220476efb2ec0e15e50d67c48fdf764c82afcacb80a840f0d6a6d988ea1128c43ec02205573e9a47db060974c0b7668669c2e8ea9d3127dafc524f9ccec8b1435a9760a:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1217
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83288
|
||||
epss-percentile: 0.83314
|
||||
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100f95d7c437b7a17ad3f3b4a0323b1a636be740478fde30d38e8a63f6bc185305a022059e61ec7c8c98c505beee18607d635debdc62d82b6c05ff1a1c16eb85fe1cf89:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100dd4cdce994c45c357f9cc8e02c2fa6be27d70bba298be7d923a70e71f3f90334022100d3284c3aa6987489f377aa5c8383e5f2f43c49795d51236266f620461d4e5a21:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1219
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79894
|
||||
epss-percentile: 0.79912
|
||||
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100f02f199bb61e17ea003fbcfca82494b36e0b63c97ca85a31050cc24a6d6e39c3022100b9ac5ad8287cfcc76ddc15f97dc1eb2eb87c889c541567a8d19afcae5c063012:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100d2dcfcb47d0e2c19982ae635b43fa75119795ce741a14c05e61ada61749f08c40221009b50b77621c80e2663f5d806089a95b66f8ea4b7444a3de06ae1c78c88db01c7:922c64590222798bb761d5b6d8e72950
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-1302
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01204
|
||||
epss-percentile: 0.83685
|
||||
epss-percentile: 0.83704
|
||||
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -37,5 +37,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100e0b33fff97fb0ae5caf281801eeb3f083e35fa9f7a0c7514e10ed3ccaf4156dd022055264150d8f052b1c17820f2a6a196b0ca422bd271ca74a4b82c30089fb2eb87:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100b11513da13e8aa1c61a7ee28388e5261c9e692225a43fa46a5b284e58a3cb577022100e60aec85a658237d9b8a6ab12f2288f4ff3e0eff83aea5022151266781da1e93:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1304
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0045
|
||||
epss-percentile: 0.72298
|
||||
epss-percentile: 0.72337
|
||||
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100cd263b378665fe459c9ac4c3593b1ffea45c13747bde6bdc9fbe540e479275c002206b952cfef1e1f5c9a197e9975372db932018585bb6d53a4dd6e83a0b9b88552e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402206b2fbfb4e8665f80380bda1b877024a95ccf84fe838be4b9644b235adf21d52102200f2152dae80c832755c5fcdb1858976d08e1150db56368a6b66f11eb794fb263:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1305
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03203
|
||||
epss-percentile: 0.90103
|
||||
epss-percentile: 0.90114
|
||||
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022034dee82663578c2e1ab9a960772cf617aca31c767509694d09dde8e09549e300022100bf2f07e28729557a5cd345206844273182673d9efd30968fa1e122af6115b3f2:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402207205e19cb5f2983328ad807fce96f2bde33578ac0fd9f9b1727a0196d1688a8b022035cf47c0dd1046d34bc751085a06b69509a3ff526460866502c4dec0dfb08721:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1306
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
epss-percentile: 0.83977
|
||||
epss-percentile: 0.83996
|
||||
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402202df6bbc50d7cc8368259ac5c6184d04e75048880177d47c07f728aefb1668442022026f12aeb3c65ada4eab3bc49dbc9949d4657858b787fc536c26c3160c8106b4e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402207a03718b731e0e70f8760e0a592026417e59fb92e06a7d83bd5761cb31448757022075180db49dccbae8f807c16ab516e615af257ae1d79e8f7a3ec13933be251c19:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1307
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01751
|
||||
epss-percentile: 0.8657
|
||||
epss-percentile: 0.8658
|
||||
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502205e86c6b24b4ecb46d4afcf38d506bcf7f4cfff13f36cd2eee63089da70b0b868022100856040c0237849b063be5541a915d7316bfd4b92d07e69fa1b5ffdccb4823826:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100cc6fafa3bcc40c8363cb96e3079976f46d54b90a3d67f8399284097a701edd9602201aa71058190d9bea8845f952d14838d66ac83f3d2919f6b4c89deb5dc7a4f616:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1308
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01334
|
||||
epss-percentile: 0.84582
|
||||
epss-percentile: 0.84598
|
||||
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100ab845e16687ce7394f1946b78ec0391abc76843c858d48749c49726df35b2825022100e0686a546d0be89423fdb2ac2236db2c58678e0cf8d0c4000cf95332a695001b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502202253ada6630cef825f35e2fd697d200f8c121f9fd28dac2147addb8fca7150c8022100bf20325083decde3b0703c1c0ddc546d91849c2c791e1df40fc8b2f685757bdd:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1312
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83288
|
||||
epss-percentile: 0.83314
|
||||
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100b66da8f11f27a19ee5eb13ac43eaf15f982cf603dbfac58c05c64ba33856016c02201f31008b5c95173798587761cbacde6ed0dbe642cef56b80bd5665f066b3170a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100d031c9594d55b94c1ce517622588bede3078a56fa0ed813c39cc438a181f01ad022100e93a1b31d473bab48be5756576d604331213ba75ee814a5051b0654a7cd802d6:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1313
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0045
|
||||
epss-percentile: 0.72298
|
||||
epss-percentile: 0.72337
|
||||
cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100b3023459497fd023667bd23f69c5d79e989e120a4f4d4b902de91f25b0303c1102207bfa0050b332ae808843e6d6dd97f61130c9d6e6c4aa8d55644d1d59dd2e1171:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022020146c64b159ac705de2e4dd28015932653744c20b56e76f74faf54c29e52ebe022013c89d894dccc1a81f0d46e37912c58ff1482746be56da8725312560b9dbf2aa:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1314
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73076
|
||||
epss-percentile: 0.7312
|
||||
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100a3a8e923bd287eb99e43d17cfcb86977d3117ab38c87cd12cb582aab308ef4b40220212cf2131eb3c0a4ce8622b00360c9803c7e0c505b742223fec1e4e11d19a1f0:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502200c00246f8aa8ef8f8f58dd5a0074a43a3514f0346be0921d5162d185f95d4d2002210095ccd71b05f422c6eecf62e02f90d8faa7cd17626ad9fe55888ba503a1dc5e29:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1315
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0087
|
||||
epss-percentile: 0.80556
|
||||
epss-percentile: 0.80583
|
||||
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100cb30289178cac99e34cb8ca62f6462b7452d8c03c88c272c51392463ba7c000f022100e8d73b86a88d672d1cd610ec7645ce88a04685ffd9810a631afc73d3dad7bf3a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502201d611032c4dcf3d0088f3f5a20a7f83c3ada1e2758091a501780c8658d7bdd570221008cb74ccc071b4409eece930deb86cd415cca8195740fc254700b4348caafd4d0:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1340
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83288
|
||||
epss-percentile: 0.83314
|
||||
cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100f4d995506543d30fe5c868a1d7cb9f0e3bba77ec70c2df920053c15e44ced48c02206486f126b4e4a609a1cc858bc0de00938f33c55ba9c14c80aded301ade3ef340:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502202c9457055390b7eca97fe4779cc54f4e6313b488ea8804a74a6e0b4306575cd40221008610d09c75d50f19541cf59d6da39d71eba9dde35045b9b8e070137dd6961df7:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1345
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73076
|
||||
epss-percentile: 0.7312
|
||||
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022033ebd8edc048ce4653495f563460b4f7fe05cc413a086392f526fc3f9938822d0221009ac9dd56d2999373c20eee533aaff2ddf0519372940f32146c7419044589224d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221009a880f84f0e9022fd3ebe342a3c792ae657394839e72a44839fcaff06eba8c01022100a778b955a05e82ff094fc1276ce40dc25cdacc865426bc046ed08651102bbc05:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1352
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73076
|
||||
epss-percentile: 0.7312
|
||||
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402200b73843e2463f5a6fe29cf1427f706e0ca3047fa9e624f3ba45905f7c2f771d0022055fbe68ee1440edf07fc88689456e3c565572cc6b5d3503e7988a16caf01a6c0:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022040eb21742e7976b62f15cc315a62652df7d7338363763bd91bcbfd2459b45ed002207780512a5252538b6235f6cf5a081e79497d94d81c0e77fc54693e49fd7f01a7:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1353
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01751
|
||||
epss-percentile: 0.8657
|
||||
epss-percentile: 0.8658
|
||||
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100d665c7f0fb0f414afd94f1dba980b4f650853cfe790377b484be1d53c9fb2cfd022100eda66e141ee99de501cc8e41d437e0aa290f26bfe08078cda96316193d8b1c50:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100afc5261fae4c1e5727c4cd6d7aced6feb8833bc0f0eb4e959ed09a9c506e9b31022011e4e7d5e8614c531065b2ef2752b2b3c260354f055afb617b7f4ed0ed27a558:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1354
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73076
|
||||
epss-percentile: 0.7312
|
||||
cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100cd8547386fbfc1ba0e30a326035ac207235a54679367415f6a3c680b21a8083202202e3cbcad6032aeb420ac28a2587b2cb3c1b7dede66774fbb7d0e00b775f10077:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502203aa9d584f9cea24aca71e92b600df1f293849c18d24a4777a52e2d3778df7865022100bbc1e711dd1c50b6644e79db38488db171c74dc16486d294e5f9e03f59c8cb78:922c64590222798bb761d5b6d8e72950
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2010-1429
|
||||
cwe-id: CWE-264
|
||||
epss-score: 0.00573
|
||||
epss-percentile: 0.75475
|
||||
epss-percentile: 0.75511
|
||||
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -47,5 +47,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402206853d100fb1b0a8e5031a836cbd955afd6535263364e018002af89b86a6e38fb02200c3130cf954d066b48b7dceffc7ca9204d13160742b673f268825e5f63eeb1bf:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022034022d209790cc1fb4de224da266adc91eafbdfd2cdbd7c4659856630d16c5c2022100f2c9301e616146d24b534fad1348c33ea8bd1799731182e55089cc3a80cebf62:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1461
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73076
|
||||
epss-percentile: 0.7312
|
||||
cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502210097b8cfc292bf3f3facb7d4225137141e5c503177794328a1525882312e5d33ac02200779d032fb4b04d02b4ad0a4b4d5300ed4b8a66cc72c7762d04571663a23e75c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100a4317de6976b0f8f958c95ae8cbae85852c649a0a0ecb9058d4bf8f0e4efa9a80221009e2778609b3cdbfbd5964163bad11d2784fc96376d2b93ef2c98ae3c97cc8b02:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1469
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79894
|
||||
epss-percentile: 0.79912
|
||||
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402205c978b1c47f85c1b51061d169c5eb7631cdd9c6c2d612200dec29fda57fabe1b0220507d86d5d8c9164a8f26a6549ad5e3d0af4285f8711a7ec5b58da6cb7bcba3fb:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100c1fd85ee1ee30afd25513e4111fdcb5dc5dc463101f8ade408c98247485ccff8022100f95bd0bef569834716285d0c9c9183468b26d0d027d5ec3f8ab169b9869e77d1:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1470
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04616
|
||||
epss-percentile: 0.91626
|
||||
epss-percentile: 0.91642
|
||||
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100aa3197d11bc16fc8ee1ccb9a4101baac0d27470d024cfc16bdb234ddf2d98f57022100e3900d14b5143d172f65959a05ea5412c68c884a467e9c8127d817270fbe73b6:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221008f76fc5ceeb0ecba7e3136289cceaac3826c6e8629c1e05c315d48a882d8252902201b232ef47b785a14ddddeb0e2fa822406fd07e90a65a5e9ee6e1295288fa03e9:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1471
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05684
|
||||
epss-percentile: 0.92484
|
||||
epss-percentile: 0.92493
|
||||
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450220091f45f1bb929a6acc4d68e0f76dbedad7ac8ed558c517aa3d80e8f3980dbafb022100fa4b496a564614c6924066415c88b37a8cf0c22ec0a551ee0243ba1eba803fb8:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100b603f3c13db9a7c36583e5360a496d863bb41a5ec7895cc23d4f6241efceca48022100d67025a66105cdcd3ea0d19550825b9627ada743cc41d8605139f0e8cd2f53dd:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1472
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05684
|
||||
epss-percentile: 0.92484
|
||||
epss-percentile: 0.92493
|
||||
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100bccbd1e9ee053ac9e46e9fe02ce4ba8b8ab7a45f61e18f88bae127c18959eea2022100a0ae9fc4caa042eddbf836e530bdb9070c729ecd61432b3afee7e1143643faec:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100ffe9886cc1c362b3089618e2a5e94c20c51c94f46ac392134f3c7b840f142f7502206d322caafb2950a2c6645d2340fe308403d37948c9238499e6e40c385de371f7:922c64590222798bb761d5b6d8e72950
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1473
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.80056
|
||||
epss-percentile: 0.80076
|
||||
cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,5 +38,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450221009d8087eb5640e8a879f0b3c653086ccb9f3a4ace2026cc1dc7bdca2c38a619b70220736327ca1b9f8fefa9a6476fa5c6a0405be0ba84982a6de34d11f6b288aac115:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a0048304602210088c94c8d965f48544be9d0029474f1253cc5ed5e291d12a792b53a8976d2d68a022100bdc302972e96ae50a2c25f23dd67230aece6b43e7c05cd7c52e60ca23e37e6fc:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1474
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
epss-percentile: 0.83977
|
||||
epss-percentile: 0.83996
|
||||
cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450220604489eae224516bde408e712c6c6267dbaa1bb8fe8ed67bee521102fbbe83ea02210098b330a0542095b8f56f2ee974bddd8cc1b314b907fa700648cd17b432b788bd:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100e8134229e092da03de01096bde4d63feafba069079bb7236252a653b89ca0318022100cbf67850799f1bc5ccb6bae0f4229f20ef018aaa7c2c7d0eb85977766680dc64:922c64590222798bb761d5b6d8e72950
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1475
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
epss-percentile: 0.83977
|
||||
epss-percentile: 0.83996
|
||||
cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022003a8f0a17966c6aac8c4c7d69fec398251be1920d377473475d434b72e785b9f022100f45e0538786f63179fb8e33277b8e8fe6451243f4e0f7542ee80ca3f6cee1db5:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502210084dc1ed7c8817002175d8478c006a3913718b4a4d1a8004e9f6874def223673202200cc5cc64a3e51866813fb0ec6f98039b3bafa0de96fdc36b9191a6ec063b0ac5:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1476
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03527
|
||||
epss-percentile: 0.90505
|
||||
epss-percentile: 0.90518
|
||||
cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022051d183b9eaecce287a500f763945967601bf00003688a9da6b05fb4029d91f05022053d4c28c3aaf7094ccb73c81940417e58a38c6371e23d6276410642a728eaa1a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402200ffc4344d566784bbe3f85ad5c7d713b256650215444947918ee43538e219643022057edd39fd7f31d569ec066dcb7793c56c69811cddbc4338a41a9a94635972527:922c64590222798bb761d5b6d8e72950
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-1478
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.80056
|
||||
epss-percentile: 0.80076
|
||||
cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -37,5 +37,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100c00767d832ccc0e7a9edb0ae3ba58075325f96d52f710f0d15128366195bccec022100815dcff9ef6c43991808b0227417d24ff4e1850d54a7b6c5d66facecfb37e13d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220552109f47977b2ca8c157de482cbf4693ec05893d897b17641ec3d0ef4df9a31022100918319965e673ba2be67f24e51fd2474d611f4523fff58b6c96d0397b59529b6:922c64590222798bb761d5b6d8e72950
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1491
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73076
|
||||
epss-percentile: 0.7312
|
||||
cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,5 +39,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402200d14fe03a30656f4024e43d9c1b33112c896cb14b5cc1275125c442a286eaebd02206bad6bb225f2bd6731eb2bbc9b8d3a42230f5e681b4403858def43f7505e23b6:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220620d90f32ee47a24bfe89f3d203c24fc2af07649253c263db5c7dbc2b06de73d022100c60af0b38da3252b8ca891f7b3008a9b2de81c6d6b5eb05a13ef3e1a112548d4:922c64590222798bb761d5b6d8e72950
|
|
@ -17,8 +17,8 @@ info:
|
|||
cvss-score: 5
|
||||
cve-id: CVE-2010-1494
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02305
|
||||
epss-percentile: 0.88502
|
||||
epss-score: 0.01827
|
||||
epss-percentile: 0.86904
|
||||
cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,5 +40,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a004630440220678cb1f8e8ba9f8af67849992c9ff45fd32d95989f3798f257282ee79a24662e02201985cdb2da03b969a742957679cc291f966d7173d2b7d93450478bc6041229f7:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100f5364d8cc2e38483ba10b21995be01c99d5b5f9f3f20b0c1a7d57311cd7c5be802206dc35b7e622a7b3d73f76109eeaf145bb3ad02ca2f1906ab431a8a48377091ad:922c64590222798bb761d5b6d8e72950
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue