Merge branch 'main' into feat-javascript-templates

patch-1
Sandeep Singh 2023-11-04 02:09:42 +05:30 committed by GitHub
commit b4c51b6ded
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2329 changed files with 7007 additions and 8864 deletions

View File

@ -1,5 +1,6 @@
http/cves/2023/CVE-2023-20198.yaml
http/cves/2023/CVE-2023-22518.yaml
http/cves/2023/CVE-2023-33629.yaml
http/cves/2023/CVE-2023-4169.yaml
http/cves/2023/CVE-2023-43795.yaml
http/cves/2023/CVE-2023-4415.yaml
@ -14,8 +15,10 @@ http/misconfiguration/installer/cube-105-install.yaml
http/misconfiguration/installer/orangescrum-install.yaml
http/misconfiguration/installer/ruckus-smartzone-install.yaml
http/misconfiguration/installer/ruckus-unleashed-install.yaml
http/misconfiguration/installer/sugarcrm-install.yaml
http/misconfiguration/installer/tautulli-install.yaml
http/misconfiguration/installer/webcalendar-install.yaml
http/misconfiguration/installer/webtrees-install.yaml
http/misconfiguration/searchreplacedb2-exposure.yaml
http/technologies/wordpress/plugins/metform.yaml
http/vulnerabilities/other/podcast-generator-ssrf.yaml

View File

@ -1986,6 +1986,7 @@
{"ID":"CVE-2023-22478","Info":{"Name":"KubePi \u003c= v1.6.4 LoginLogsSearch - Unauthorized Access","Severity":"high","Description":"KubePi is a modern Kubernetes panel. The API interfaces with unauthorized entities and may leak sensitive information. This issue has been patched in version 1.6.4. There are currently no known workarounds.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-22478.yaml"}
{"ID":"CVE-2023-22480","Info":{"Name":"KubeOperator Foreground `kubeconfig` - File Download","Severity":"critical","Description":"KubeOperator is an open source Kubernetes distribution focused on helping enterprises plan, deploy and operate production-level K8s clusters. In KubeOperator versions 3.16.3 and below, API interfaces with unauthorized entities and can leak sensitive information. This vulnerability could be used to take over the cluster under certain conditions. This issue has been patched in version 3.16.4.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-22480.yaml"}
{"ID":"CVE-2023-22515","Info":{"Name":"Atlassian Confluence - Privilege Escalation","Severity":"critical","Description":"Atlassian Confluence Data Center and Server contains a privilege escalation vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-22515.yaml"}
{"ID":"CVE-2023-22518","Info":{"Name":"Atlassian Confluence Server - Improper Authorization","Severity":"critical","Description":"All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data.\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.\n","Classification":{"CVSSScore":"9.1"}},"file_path":"http/cves/2023/CVE-2023-22518.yaml"}
{"ID":"CVE-2023-2252","Info":{"Name":"Directorist \u003c 7.5.4 - Local File Inclusion","Severity":"medium","Description":"Directorist before 7.5.4 is susceptible to Local File Inclusion as it does not validate the file parameter when importing CSV files.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-2252.yaml"}
{"ID":"CVE-2023-22620","Info":{"Name":"SecurePoint UTM 12.x Session ID Leak","Severity":"high","Description":"An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows sessionid information disclosure via an invalid authentication attempt. This can afterwards be used to bypass the device's authentication and get access to the administrative interface.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-22620.yaml"}
{"ID":"CVE-2023-2272","Info":{"Name":"Tiempo.com \u003c= 0.1.2 - Cross-Site Scripting","Severity":"medium","Description":"Tiempo.com before 0.1.2 is susceptible to cross-site scripting via the page parameter due to insufficient input sanitization and output escaping. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-2272.yaml"}
@ -2086,6 +2087,7 @@
{"ID":"CVE-2023-33510","Info":{"Name":"Jeecg P3 Biz Chat - Local File Inclusion","Severity":"high","Description":"Jeecg P3 Biz Chat 1.0.5 allows remote attackers to read arbitrary files through specific parameters.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-33510.yaml"}
{"ID":"CVE-2023-33568","Info":{"Name":"Dolibarr Unauthenticated Contacts Database Theft","Severity":"high","Description":"An issue in Dolibarr 16 before 16.0.5 allows unauthenticated attackers to perform a database dump and access a company's entire customer file, prospects, suppliers, and employee information if a contact file exists.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-33568.yaml"}
{"ID":"CVE-2023-33584","Info":{"Name":"Enrollment System Project v1.0 - SQL Injection Authentication Bypass","Severity":"critical","Description":"Enrollment System Project V1.0, developed by Sourcecodester, has been found to be vulnerable to SQL Injection (SQLI) attacks. This vulnerability allows an attacker to manipulate the SQL queries executed by the application. The system fails to properly validate user-supplied input in the username and password fields during the login process, enabling an attacker to inject malicious SQL code. By exploiting this vulnerability, an attacker can bypass authentication and gain unauthorized access to the system.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-33584.yaml"}
{"ID":"CVE-2023-33629","Info":{"Name":"H3C Magic R300-2100M - Remote Code Execution","Severity":"critical","Description":"H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-33629.yaml"}
{"ID":"CVE-2023-33831","Info":{"Name":"FUXA - Unauthenticated Remote Code Execution","Severity":"critical","Description":"A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-33831.yaml"}
{"ID":"CVE-2023-34124","Info":{"Name":"SonicWall GMS and Analytics Web Services - Shell Injection","Severity":"critical","Description":"The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-34124.yaml"}
{"ID":"CVE-2023-34192","Info":{"Name":"Zimbra Collaboration Suite (ZCS) v.8.8.15 - Cross-Site Scripting","Severity":"critical","Description":"Cross Site Scripting vulnerability in Zimbra ZCS v.8.8.15 allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.\n","Classification":{"CVSSScore":"9"}},"file_path":"http/cves/2023/CVE-2023-34192.yaml"}
@ -2169,13 +2171,14 @@
{"ID":"CVE-2023-41538","Info":{"Name":"PHPJabbers PHP Forum Script 3.0 - Cross-Site Scripting","Severity":"medium","Description":"PhpJabbers PHP Forum Script 3.0 is vulnerable to Cross Site Scripting (XSS) via the keyword parameter.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-41538.yaml"}
{"ID":"CVE-2023-41642","Info":{"Name":"RealGimm by GruppoSCAI v1.1.37p38 - Cross-Site Scripting","Severity":"medium","Description":"Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-41642.yaml"}
{"ID":"CVE-2023-4168","Info":{"Name":"Adlisting Classified Ads 2.14.0 - Information Disclosure","Severity":"high","Description":"Information disclosure issue in the redirect responses, When accessing any page on the website, Sensitive data, such as API keys, server keys, and app IDs, is being exposed in the body of these redirects.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-4168.yaml"}
{"ID":"CVE-2023-4169","Info":{"Name":"Ruijie RG-EW1200G Router - Password Reset","Severity":"high","Description":"A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-4169.yaml"}
{"ID":"CVE-2023-4169","Info":{"Name":"Ruijie RG-EW1200G Router - Password Reset","Severity":"high","Description":"A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-4169.yaml"}
{"ID":"CVE-2023-4173","Info":{"Name":"mooSocial 3.1.8 - Reflected XSS","Severity":"medium","Description":"A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4173.yaml"}
{"ID":"CVE-2023-4174","Info":{"Name":"mooSocial 3.1.6 - Reflected Cross Site Scripting","Severity":"medium","Description":"A vulnerability has been found in mooSocial mooStore 3.1.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4174.yaml"}
{"ID":"CVE-2023-41892","Info":{"Name":"CraftCMS \u003c 4.4.15 - Unauthenticated Remote Code Execution","Severity":"critical","Description":"Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector leading to Remote Code Execution (RCE). Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-41892.yaml"}
{"ID":"CVE-2023-42442","Info":{"Name":"JumpServer \u003e 3.6.4 - Information Disclosure","Severity":"medium","Description":"JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affected. The api `/api/v1/terminal/sessions/` permission control is broken and can be accessed anonymously. SessionViewSet permission classes set to `[RBACPermission | IsSessionAssignee]`, relation is or, so any permission matched will be allowed. Versions 3.5.5 and 3.6.4 have a fix. After upgrading, visit the api `$HOST/api/v1/terminal/sessions/?limit=1`. The expected http response code is 401 (`not_authenticated`).\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2023/CVE-2023-42442.yaml"}
{"ID":"CVE-2023-42793","Info":{"Name":"JetBrains TeamCity \u003c 2023.05.4 - Remote Code Execution","Severity":"critical","Description":"In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-42793.yaml"}
{"ID":"CVE-2023-43261","Info":{"Name":"Milesight Routers - Information Disclosure","Severity":"high","Description":"A critical security vulnerability has been identified in Milesight Industrial Cellular Routers, compromising the security of sensitive credentials and permitting unauthorized access. This vulnerability stems from a misconfiguration that results in directory listing being enabled on the router systems, rendering log files publicly accessible. These log files, while containing sensitive information such as admin and other user passwords (encrypted as a security measure), can be exploited by attackers via the router's web interface. The presence of a hardcoded AES secret key and initialization vector (IV) in the JavaScript code further exacerbates the situation, facilitating the decryption of these passwords. This chain of vulnerabilities allows malicious actors to gain unauthorized access to the router.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-43261.yaml"}
{"ID":"CVE-2023-43795","Info":{"Name":"GeoServer WPS - Server Side Request Forgery","Severity":"critical","Description":"GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43795.yaml"}
{"ID":"CVE-2023-4415","Info":{"Name":"Ruijie RG-EW1200G Router Background - Login Bypass","Severity":"high","Description":"A vulnerability was found in Ruijie RG-EW1200G 07161417 r483. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/sys/login. The manipulation leads to improper authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237518 is the identifier assigned to this vulnerability.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-4415.yaml"}
{"ID":"CVE-2023-4451","Info":{"Name":"Cockpit - Cross-Site Scripting","Severity":"medium","Description":"Cross-site Scripting (XSS) - Reflected in GitHub repository cockpit-hq/cockpit prior to 2.6.4.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4451.yaml"}
{"ID":"CVE-2023-4547","Info":{"Name":"SPA-Cart eCommerce CMS 1.9.0.3 - Cross-Site Scripting","Severity":"medium","Description":"A vulnerability was found in SPA-Cart eCommerce CMS 1.9.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /search. The manipulation of the argument filter[brandid]/filter[price] leads to cross site scripting. The attack may be launched remotely. VDB-238058 is the identifier assigned to this vulnerability.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4547.yaml"}

View File

@ -1 +1 @@
16fc811297044b5d3f7904cafbfd9424
2a9dac7ed37848256e768a0872ce4e60

View File

@ -1 +1 @@
3.4.4
3.4.5

View File

@ -1 +1 @@
9.0.2
9.0.3

View File

@ -1 +1 @@
5.7.4
5.7.5

View File

@ -1 +1 @@
2.25.25
2.25.26

View File

@ -1 +1 @@
2.26.2
2.27.0

View File

@ -1 +1 @@
2.1.8
2.2.1

View File

@ -1 +1 @@
1.2.0
1.2.1

View File

@ -1 +1 @@
7.1.1
7.1.2

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2000-0114
cwe-id: NVD-CWE-Other
epss-score: 0.09258
epss-percentile: 0.94019
epss-percentile: 0.94032
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022076a0b67db39d6edf3954ad1ee2b91b0a9f366839b9014307530cd9cc301348ce022100b2f0ea19edc1f3d1f6aec75c82c48a7d962bbdc075b1e007246d367a67cd9d6e:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100c1af67bfa98e66512709d669308e72a8b8e181d9f5189736a3c02480164fc771022100b179367c633acc0549a9d8cf368dedc353f63706bae414f2bec68d5cba58c36b:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2001-0537
cwe-id: CWE-287
epss-score: 0.88063
epss-percentile: 0.98328
epss-percentile: 0.98333
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
metadata:
verified: true
@ -47,5 +47,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a0048304602210087cafd283b0d2c32b5e6d535d02ddec38630ac34fde9f938ce1c9cb46b48853702210090848784fe6f52b0c99bf31404f11287813e30263bc34318aa234ababa7ce9dc:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402200d464f701b2fbc864167f7007182385a7f6b82527c2e307d8c30dbf642100bc00220219b9dc1b4a588c4bbdd87d68a9b022c9c71147f8673915d04c2f48f54caff0c:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2002-1131
cwe-id: CWE-80
epss-score: 0.06018
epss-percentile: 0.92666
epss-percentile: 0.92677
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
metadata:
max-request: 5
@ -53,5 +53,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100ac64503df2415371f194e66f195785387bb01de16a12faa0e35d0c1396f9529202202a5d73ff06b2a2223965df6ace420ec1003c472bcea7a894c09090a26fd73295:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220381533f6a0fe1a564d03d953cd4d9bca7490759d2b9a0854b00908fceeae95aa02207e1c04b30268ce76af15f595078b86754919e90013203f2a72b1a1e723426d31:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2004-0519
cwe-id: NVD-CWE-Other
epss-score: 0.02285
epss-percentile: 0.88457
epss-percentile: 0.88471
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -46,5 +46,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022026db67e61d737b0bc17e66cbc5a43657a4139b3f810bcabcacf6b6e0bb1b4ffc0221008f1fdadac48f0fafcc12bea26c5093d4043d133b94ff0ba7709e6418d2502f08:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100c4b6b89d3edc11f393f2a4056502636caea8e03fb6deab8c52330f290ffea85e0220334661fe3051fca2480611dd1bbc3546b747dacc54619592392166131da9b32f:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2004-1965
cwe-id: NVD-CWE-Other
epss-score: 0.0113
epss-percentile: 0.83076
epss-percentile: 0.83104
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -37,5 +37,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
# digest: 490a0046304402204f36a1601b30669cf8af8bea8fb1a6f41dfcedeb02acd83cfea95776e17ceed402206f2e2cc64fb805ea2c51ec91723b1b5dfdcacbd110ec24b6ed1157f6c45c7e24:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402206c124d71a3b5f48ac30f2bf1259d76673088a5aec591fa8bc1bcab0da303990802203d1ab92ef93e5f99cbb0e39ca32658c5501674986480590024c2398cb92d9842:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2005-2428
cwe-id: CWE-200
epss-score: 0.01188
epss-percentile: 0.83571
epss-percentile: 0.83589
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -42,5 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100d1dee1d9d8c1a63a329c49aafee32c6d3884e4ac1f5a7baf342625087e720a51022100bb009165de1ef2f00c382e03ccbbaf3ea121cb2f7c7fecbf4bfaf8aff7826197:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100e821043833fe53ff49fdf030f58f6a5ab7aeb3e6227007c81b08ed0dbe559bbd022100e088480b15270f1f4f2ba2a5869df0a095bcc6fcbaa8849ab3e50091e7ffb5e9:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2005-3344
cwe-id: NVD-CWE-Other
epss-score: 0.02158
epss-percentile: 0.88101
epss-percentile: 0.88115
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
metadata:
max-request: 2
@ -45,5 +45,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502200ea2fc21fb5781e21b2b21b33bceed90ea6758ea92acf5e56601ab63bfbde4b9022100abafc518e3316e8c514c886bf19dd0b230a139b83beccab21722538c8c8e9a18:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100d3402643b70f436a0e2093d5a37aff3b9eceaf04ef7c30c292359d66ba7758c30221008ecfa3a058d8b6b0777c0c57fbf3c707b459111d320c3fa0c3e40b86dc42fd6d:922c64590222798bb761d5b6d8e72950

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2005-3634
cwe-id: NVD-CWE-Other
epss-score: 0.02843
epss-percentile: 0.89574
epss-percentile: 0.89589
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
# digest: 490a00463044022055e73075a78d30caeac1b6a9afb7ab17b8c7e75f4d660b53e03961c5345515cb02204b4690e0148f678b0afccd87b2cb11222f509fd941330dae5c7c03cadde56dd7:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100d7713b4325fae549b334172098ffc1b0ed278bc774297f29ff1bdb75a29cf6580220750a8cc019a92148dff0987fafdf5bb00ca37b3c45d9e5df103ac0d689897008:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2005-4385
cwe-id: NVD-CWE-Other
epss-score: 0.00294
epss-percentile: 0.65814
epss-percentile: 0.65867
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100bce32e7d11f9924510e6f4c147b6eea44e966df4c012dd96d3cc6ad09b46f05c0220251fa43d5cef67ac0546f2d7d456faedb106dc55faf90adb4c4ccced53c57bb7:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022023a51223cd793cbc4f7c98ec10bb6b81912a38cca4e8b61ac8575894cf04eaa1022100bb4046135196f9c6e436e3fe4282bd888225f00e1a55ce8456a070090c09509c:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2006-1681
cwe-id: NVD-CWE-Other
epss-score: 0.01015
epss-percentile: 0.821
epss-percentile: 0.82128
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -45,5 +45,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100feed1caed197fa85a4250142d43f8757b89480c02cf52fb58f079af050465069022100a5328a54040801a8263ab4b1ec2b54ec9b3d8e63416dc7889b685349306d0c18:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220493c5e1d4552bf41512d28592d276ffbf30aa4aea92f1b6f86b9d4d038b0e11a022100f46aa3fbfc4bac5479cadf4fa6df835d3625af347ca4a959345e54108512c7a9:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2006-2842
cwe-id: CWE-22
epss-score: 0.22361
epss-percentile: 0.95949
epss-percentile: 0.95956
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,5 +41,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402204228585cf3216a21661376687483c7146156dd0ad793c18761ca793f2281992e022025166e51845704a0d17dfddbf8893db355b72d5b964a4b4df4d82910ba5e0c2e:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402200f92f112f97f10640f68383f18e0d635e1f842122fef492c435a6877d6c9ea1b02204ba13f88d2d13a2b44ba30c9e40a21c2f5264c6de914825ca13ff5a89758442f:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2007-0885
cwe-id: NVD-CWE-Other
epss-score: 0.0059
epss-percentile: 0.75886
epss-percentile: 0.75921
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -43,5 +43,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502210097f11299aa634722d7ec16f77bd049dd81a568727313a933a0eab8ed844d08300220684180e2d52ca9f594aa4d1249866033e0f32df5bc8e60b6fdbb0c94811f9fe8:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022064ffc47da72b10202aa637a27b7fb4a55d64df785e2f112d151e1e8e0cb5bd00022100b8ff1e83597027c3a20fecc7416355ec607358892f8092ab3ffa4ffd6d32d011:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2007-4504
cwe-id: CWE-22
epss-score: 0.01677
epss-percentile: 0.86281
epss-percentile: 0.86294
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 490a004630440220394739936f7c51c7b2558cdc3eeef7ca372dc443e542152ae6612fc9a4830a6402202769f1ea652a2dc5723685baa0b44b2163bebbb621a6c71b8e1ba6965f1de3f9:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022032d62163c3a002e98dcbfd822a7bbfe73948b083d3a915a8e70bdf9682cbaa1a022100cc8073c12ab17603aede2f9309f8f0e1f9fdf228f873b5490fa2e84e2bd27f68:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2007-4556
cwe-id: NVD-CWE-Other
epss-score: 0.19583
epss-percentile: 0.95732
epss-percentile: 0.95737
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -49,5 +49,4 @@ http:
- type: status
status:
- 200
# digest: 490a00463044022075521baf86f07edd5e2a2504c3d335182070703ffb9b0a89fd3ad0ddd8374596022029dd03a113c7fa870a14eeef53dce4b88683dfc1f6b677f5c637df8f1c41ce4d:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220195dff1585af1ad1f5cb0261b474e04916b92601a931fe519f3065b15373f1ea02210087bf14a4d6249567ea8b4a3b25c613f80b9f1f1c06a15ca6e5b6e6891c88783c:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2007-5728
cwe-id: CWE-79
epss-score: 0.02361
epss-percentile: 0.88625
epss-percentile: 0.88639
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -50,5 +50,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450221008e9ff996e34052a3953e8b1aecf9c9ba921b8af66bfe95fd31275c22c358024f02207b50bcb5c379b648e2668660421cfb8f29242d6dbc9f406df9ed1bb82d292fa6:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100bd6dcb9147fb40e9e7beba1175be378ffa726b7f46bf24198c2e99a8acc26a89022100bb773f64b053cc9ec58c75b12b9a5155a80917851a898a7676846287edc6f942:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-1059
cwe-id: CWE-94
epss-score: 0.01493
epss-percentile: 0.85416
epss-percentile: 0.85435
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -45,5 +45,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100fbfdf880b057950665b98ddd29790b1df56f2c131de9a6cf365b6968df35c0ea022100f50d6697fd45f5e85a62479a5f417e5dfd8926f9d492e8ab0c3ca68afe0ff99c:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502201ca2b768849b8c3ca5e390b1a0e501fbb839c6181fea4a11e26d6f5d7ba3b350022100f85d991bc46efbc225803a2d9a768257cee172a139abf4689bdabfcf8ece001d:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-1061
cwe-id: CWE-79
epss-score: 0.00938
epss-percentile: 0.81344
epss-percentile: 0.81368
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -48,5 +48,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022006dfd2f336acaa81f4aff48e3e8617709ab99c28ee3b4537292d277550806d9d022100cceb88226badef697912dc073f310b8e6cc79feb9345886f7a93267b333b3254:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402207eeae9b94cf1d36ca0404fa0c5edd430c9d05a802675373a1b6946c614b55ae802207261a472fe3818978942ad843da675e072ddc3178dba2a4c7a013a349d12ce28:922c64590222798bb761d5b6d8e72950

View File

@ -18,8 +18,8 @@ info:
cvss-score: 4.3
cve-id: CVE-2008-1547
cwe-id: CWE-601
epss-score: 0.03523
epss-percentile: 0.90498
epss-score: 0.02834
epss-percentile: 0.89575
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
metadata:
max-request: 2
@ -40,5 +40,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 490a004630440220508dd6b30ef8f1374954890e820c8ee382a307f563b410fa615922171239733d022061fb7341a271f65fedf1ac004f8b7915e4c519cc9233f5e5f301afb368448cd6:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502201950eba3841dede656d99d00d79fb18f0a54085abc37e200f409e3bacdd11186022100c5ac92bcccead79bc02785fc5269ec59523dbd7237e8ac8b944d2355c2cbe43b:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-2398
cwe-id: CWE-79
epss-score: 0.00329
epss-percentile: 0.67767
epss-percentile: 0.67809
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -45,5 +45,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100c8a67c822699374f093826464671f06f62c6f56a38b6bfb72ad9d681a9696c02022100cdc87193973e90fd6af33d01349c9f3ae5766e7dd2d86e8b8db681c4cffe73c0:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450221009f9770ab555b8b30d0f1402fbe557932ca1623540617f1837455611af34408e7022016e8cf51eb8e61d68d50ec4b1f165f91bbeacb7b46ed574a95eeed0eba692955:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-2650
cwe-id: CWE-22
epss-score: 0.06344
epss-percentile: 0.92856
epss-percentile: 0.92864
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -45,5 +45,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100e9035c810e298e72d777d662cff7ebc4248e230712bbb564a9c453b1233ab8fc022100f0f2b7d832f1194c4bf525dba7e085bd2193d544eebbc8fb9e1d147d92ee44d9:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402207f4ef68a3d2b74aa9e5bf2aa9497f520385ed67dba66371f898c9d15af43bb300220386722e6a1ad09affd3ccadc19703ab89d93623f5d2d67de50986514ef9f5b83:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2008-4668
cwe-id: CWE-22
epss-score: 0.01018
epss-percentile: 0.8212
epss-percentile: 0.82149
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022007213a1944da431df62ec0aa704ea00af82ce4c61f2f423bc4a192508fc3c0b90221009c13e842507d8b49cdb7d2e3ac1e903b944a2c7de37d51caff1049f65486329b:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100ddea23a4fde7203aab5223bffff461f8e79c0e72fc0289a610b8d181a20f1983022100b28703a063306b220faf7a43b4bf0651c027c9a01f1622136327230d4b85bf29:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-4764
cwe-id: CWE-22
epss-score: 0.02365
epss-percentile: 0.88632
epss-percentile: 0.88647
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450221009a0e290ee0cdb7b44749685b5d8468a315ebcff6ec3c7271b405372f44c92fd002205a385617f0d7b01d21d7a0ed4607fa46cbb2862fcd0d8221817d4ae184d5a8cb:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100f9cc04ebce6dee194b15923db242fa0bfe762c95061ebeb7152e57e9a18a560a022009730c8250c86a39b39cc7aeedc3374057cf8d7e2bc7948e62b01715d42ebb35:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2008-5587
cwe-id: CWE-22
epss-score: 0.02331
epss-percentile: 0.88553
epss-percentile: 0.88565
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -42,5 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502207b83fd8a77d08350b0dcb8a8775e7cf005466ec0e6f73d9517a12d0ec985f595022100aa556e5eb269e11dde3575ec7c8c5d0fe6a15840cb6aa9ce2ec0ec06a8831365:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022049d1a1b54cac6ea9a4849043aa3ab5b8a7089fbed5ea58643011f64bf0400260022022aa2c7000a5d0075f1f10117d579b166eb36c458f0f779751a61172bd50c184:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-6080
cwe-id: CWE-22
epss-score: 0.00824
epss-percentile: 0.8003
epss-percentile: 0.80049
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402205aed9fe5ee723c9631501c87f21a1a4f52673d35d5317391f07c39ca73767745022031d0091b40920e364611bf23a7b15a37c33339da2820c5b2f0610d3a845d1831:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100b97e826eb0c51a86a2c4d141d09ae115325443f40ba8ac119d93649c88bdd70902201e75f402188ca06108818403b7932b4c5b427aaba7cae9c0ea72b69f081e0b74:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-6172
cwe-id: CWE-22
epss-score: 0.00509
epss-percentile: 0.73923
epss-percentile: 0.73965
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a0048304602210080836d4683e158c670b5d3a459fc7af0ed30bb115904a812156d94cf66239faf022100d64b338c0b0b6c3ac0ad59685e2b0f07fbd39996c325da41c2642083f9ffcdcc:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022025c7c512a0e4600821d2b4bba6d7933052d304826823e251daaf5019bc941813022100c3f58668769d97154a5cd3f280bf04fd1cf65004defbcbec45ed3dd446520035:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-6222
cwe-id: CWE-22
epss-score: 0.01029
epss-percentile: 0.82197
epss-percentile: 0.82225
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402203b534552b52d40e24e8c3a1e4fb8c4333ee2f081b3f9ea812a28bad07d2b1722022060f311cdcf6ed15ff0710756ea57aa752885a461d7f0fc60b5f29e917ccb10d8:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402203ee35436938d53dbf86e421601a7ed5ebba317fd373205caeace75d158170d4b02200d451111d8a5c8d81c610eda47a7f03430a78899b8d8a12025d0ae3de76455b8:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2008-6465
cwe-id: CWE-79
epss-score: 0.00421
epss-percentile: 0.71388
epss-percentile: 0.71429
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
metadata:
verified: true
@ -51,5 +51,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502202e71e72ad3fdac21334fe3446a010663732faf568f4cd57a92e4431876405baf0221008c31cba704c52d8afc84886b6090d5740ea6d8f65d2ec9a8e592dd5f3e857ad4:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100dd05acdfd381b9a0242309bfa4752f6d296d9d13a62eb7da84fe214e2d14398102210089e1037b799a3ab34ba4d10339c386e47e0839e71ffa11b7d28ac71c6d586f9c:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2008-6668
cwe-id: CWE-22
epss-score: 0.00359
epss-percentile: 0.6908
epss-percentile: 0.69124
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
metadata:
max-request: 2
@ -42,5 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100ae68958325c13a5a1a18aaf4b9cedbba5168d0e5c98e3e0195edba55dedea18f022100af95d530c98d093fc628bbd3e8fe36d87d2b479c1e1b53debb846a3c25772665:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220047ee1d0d88ac990b887bdbdf98d41903b061249da354c821dc04d42e8356b08022100a27a9a0de9995172c7f85317a70839fd8174d0f27200d1ddcafc9d21fed8f4bf:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2008-6982
cwe-id: CWE-79
epss-score: 0.0038
epss-percentile: 0.69953
epss-percentile: 0.69999
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
metadata:
verified: true
@ -48,5 +48,4 @@ http:
- type: status
status:
- 500
# digest: 490a0046304402201a6c1a0662176a06cb31ef97a6e9fea2e12b9f3a0e8d12f6c1f910ebfa94452a022064df13ea2f89ce8064d0d525bf48a749821563906e6e3f25e5043402e4ca48c6:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100ddf03befe6b354c155750c83a68f45d3436729e566c17291f6af087a3bfab492022100b26e8dcaf1e2618efada11fd878c5973654fcd5b5dcf2d50873ac812cc4bd23b:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-7269
cwe-id: CWE-20
epss-score: 0.01358
epss-percentile: 0.84747
epss-percentile: 0.84762
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
metadata:
verified: "true"
@ -37,5 +37,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 490a0046304402203a40ff8c9ef91b0d67d19e5db5f1d401e809e75ff9c1c856bb34738f3a80011a022027c0b511bfb3b7fa435d4fa9a2dd58539ebe2a1f85fa25cf03aae378842476f1:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022044e87aa9d3c46fa7fc86a7e390916463dee64ee82664a98569644689ec640a3d022100f49006032f08b4a330ccad70f85945b65ca41c0b2688fbe01ae94207d9e96317:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2009-0347
cwe-id: CWE-59
epss-score: 0.10982
epss-percentile: 0.94502
epss-percentile: 0.94511
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 4b0a00483046022100a4fb3f1f26e87549a0346537c99aac620c444f3b5891bab7a6d3afe485bc1275022100bf9e4887170099ded1d09e00598d4198eeeac39adfd93f6b4062a183ddedbdff:922c64590222798bb761d5b6d8e72950
# digest: 4b0a0048304602210096ae858563d7f921cab4aa2763ab211c2155597fc931a31875c18052ce4e0b2b022100da7ab5b8a0ca41ba1310fbd36939bcd8bd91fb727d75e07e8300c2d6901e5ace:922c64590222798bb761d5b6d8e72950

View File

@ -18,8 +18,8 @@ info:
cvss-score: 10
cve-id: CVE-2009-0545
cwe-id: CWE-20
epss-score: 0.97252
epss-percentile: 0.99786
epss-score: 0.9717
epss-percentile: 0.9974
cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
metadata:
max-request: 1
@ -37,5 +37,4 @@ http:
part: body
regex:
- "root:.*:0:0:"
# digest: 4a0a00473045022100ab78ce4e76d5bb8589a1c90a878873cef61e8bd9c131d05a3cf221441662e0cf02202e7be3650f19fbc75a5af390af076489f73d67cce9450b0058a718dabd1d6b9e:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402201c8cf9399d3f49a32a3ce7a72b44bd43323d9b082202b90b02b16ad7446a2d7002204e4809c13f057bf758820cd178f5813d8bdbb3b75ed8e41543dea272f58591bd:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-0932
cwe-id: CWE-22
epss-score: 0.04048
epss-percentile: 0.91094
epss-percentile: 0.91106
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,5 +41,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450220225a9977f6b3e43a446ba93183260d3404da98d0a3878ea6c984139db365f7a4022100ce71f2c95520ba95aea00c91c30c3eac42d6c35246ea86046addf7c92633e27f:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100904465e6da1d8e87a9366f8172e2bfeddf0b3bd80746706e0dad353bcb3a068902203e3180bc397d4614a72f611b45451899e202af38465ab546e5a02714decb2494:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-1151
cwe-id: CWE-94
epss-score: 0.79256
epss-percentile: 0.97929
epss-percentile: 0.97936
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -47,5 +47,4 @@ http:
- type: status
status:
- 200
# digest: 490a00463044022061e0d5d5d476e3caddd1ff1433f46857a3e6f6534d6ec8183d05bf973bcda1420220431b4b1e4c02a02bdbdce462d95243196d8f8d9b014121cc01cdf31aa8ff527d:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022046c88e614e4a0f71cb55b880435e65c277074bc021b1621ce8aa50c5cba5349f022100a4a3b700aff2f011c5a7a23cc2a985ab5f8bd49283e98c1228c473e562e689f7:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2009-1496
cwe-id: CWE-22
epss-score: 0.00648
epss-percentile: 0.77046
epss-percentile: 0.7708
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450220116ddc6dc44d74cacfd1a85fca5c629659ac61d56e9092a5c0c95cbd780944cf022100d422d6f87a3a9ac8b3012ccfd46d0cf59d3f1d13d74d63e4a69b0394ad07e8a3:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022065067f7b9e3d1cad8dd0c4d92ad248bc2a745536d0b4a80905c9d0e2b812e7a7022100a807fb80acf28af3df9e934cabd65819e02d111d45abb766aa2176b8cffd158c:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-1558
cwe-id: CWE-22
epss-score: 0.00883
epss-percentile: 0.80734
epss-percentile: 0.80759
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,5 +41,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100a9144e6064c3c0954996f644ca3d79a62be6d1558dc8074fc813307aba7590ec02202b3e1a95822a1bc10eec518594142d99021fe987b4d1a8d40d6ec277a6f18f06:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502205ccc56309fdae10172eb46f1956a11c35e85c527c293751b189f8bf19f261085022100e5731fab3a815f2c1137038b95ccc16fbc806f69b35f81e7eded595d3ca12ff7:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2009-1872
cwe-id: CWE-79
epss-score: 0.40155
epss-percentile: 0.96856
epss-percentile: 0.96861
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata:
verified: true
@ -48,5 +48,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100e0f9e4d3979cf7fb4b85cf75f1c808ecb6db2645bc01ba179b9822216a5f82b30220661d94ff3c1e3baf962c4811c2ecb0295af00ec92c24a3ff5f36bc6792ba504b:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450221009533742c0ec378a6edff61334a88b272e6ed3005f0a5347aaa9176a41d65dba902205b7cbe4b8c72e7c0fa25db77a5fe3a93fda80316987ff698763de242cc08c733:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2009-2015
cwe-id: CWE-22
epss-score: 0.00797
epss-percentile: 0.797
epss-percentile: 0.79721
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100b86c09c2fc23a9a8a723d957775f912cb1c1f00d3ac2d6990ca66ac3d636f2250221008b1edbd72157e245660129250d11e4706d2cc56cf7e067c1756a966c1168a712:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100c1e4996bdca53d4534bff113fc03e9ee1d5e56e5a71ca6e19cecdbfb1bda99fd022100a4cd7fe91f4e521e36a6d6ad708313fbacf5e8d9ddf99bb7956d3ebf76e5b88d:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2009-2100
cwe-id: CWE-22
epss-score: 0.00528
epss-percentile: 0.74412
epss-percentile: 0.74456
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100a8530668ba1327d37fac6302e61fa31f8bed06f77b1e187c4c7d7291946bd1dc022100925490352b66a55d09fb5823343504d05ffccd4f39cf129ea66c9b52d49c8788:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100968e95dd878c3177afa117d6174278e9c418a5191f54eff2db35bc35db7e080002200abf9d8168bb13262d841c5448b80336f24cac570c202d03de4cea617158b658:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2009-3053
cwe-id: CWE-22
epss-score: 0.00367
epss-percentile: 0.6946
epss-percentile: 0.69501
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a004830460221008253458574a558f0048881e209c8724637f135a2e08f06ecb4adcf13c6af7715022100db109ce80163c82ecc9cfcb8cd495117b50b58ef1637505efe2dfec6d47a33ca:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450221008548a2fe66fa3977d5acd72a4e50c76320651ecc37f1852d007f270f17b6e29002204d014958d6c6785079dc59743fa157aa3b1562d8dc694da4da04f8a68dcf5677:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2009-3318
cwe-id: CWE-22
epss-score: 0.00706
epss-percentile: 0.78213
epss-percentile: 0.78239
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402201ca85ce6475c6107d30edcb8e32c59683579966f42caf7a8feb419f2922c4a83022057b9daf1adda48f534a763b50a76690e503373e00074ab39fa3cca42c5f493f4:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402200bb3133ae4e0a6533ea3822c8174c7f50cad871cff35c154e861818761439b5302203204b0233aeec635b37807ccf2810b54af7d19e4bcd3633e0f4389fe4d414e91:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2009-4202
cwe-id: CWE-22
epss-score: 0.01956
epss-percentile: 0.87408
epss-percentile: 0.87431
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 490a00463044022004806a9823f876b60c36ac9cc3f38e6c90c6177ad315247e727d8ea3ea4f435902200c01475406412e5f29d50a5914ad51987135074c1244220115dba20757368e86:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100f547ecf8478846e017f78f6826ee6d9eb4d0f959f649ffb89712262b958dcd43022100fce833b4932d46b6686e18cc108bc2a57c0a221df8c0bf8d39474f0e46c5942c:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-4223
cwe-id: CWE-94
epss-score: 0.01041
epss-percentile: 0.82323
epss-percentile: 0.82352
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
metadata:
max-request: 1
@ -42,5 +42,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100c6d560ec94c429eec67cf5686febc2a284a1f5bbf0ba5acf4ba43c9ad4ea05d9022100f549d00f532208f52cec5b07f4277e446cfbb479095420ef3bb1e84e39e6c818:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100fec92d4cc493bd485c6507e68c3a8915b219d1ce50be82476c5c48b226f4f10c02210099f79302362b04751fcdd84e2986ca69e2fd0ff5b5c1597104582b38b4747d78:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2009-4679
cwe-id: CWE-22
epss-score: 0.00826
epss-percentile: 0.80056
epss-percentile: 0.80076
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502210096ef00365de861dbef0c297ffd309b5b5e26b1869ab8492c57e4c0a93e4d992002205a8aa3b92229d58aeaa63dad525393a423519785f65ec704491afa63af378f9d:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100e321a85104d3d5212d5f2e3bd346f05b0aeca99e1b7689e572daac27b0fd12b402204702a90f8a8fe9b535db96b4f462e8ed0922d7150907bae83c0a58f66a621369:922c64590222798bb761d5b6d8e72950

View File

@ -15,7 +15,7 @@ info:
cve-id: CVE-2009-5020
cwe-id: CWE-20
epss-score: 0.00215
epss-percentile: 0.59359
epss-percentile: 0.59413
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
metadata:
max-request: 2
@ -35,5 +35,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
# digest: 4a0a0047304502203c00dba8096aaf3da35c70c90b6bd1af8c32bb94f34730c62a77a196900452e6022100f60897b4f53189a05212312d0a50a373cf4eb8cae8dec0f6c58476ba0c657d29:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100c66debbf21ef93e8b06af7aaab11b8550c8fe9e0d56bf453d786da42f1798ca602200fc5465062214bd748168502197bb320030800e90d3f327086e62e6e5cee304a:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2009-5114
cwe-id: CWE-22
epss-score: 0.02357
epss-percentile: 0.88611
epss-percentile: 0.88624
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100f6f21c323951728453163016377f95e63215d9a69e7e83beaad91d3180c84602022002842dcd05e308b023484e5f9dfef94bcae8157991aab81687999212c763c56c:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502204daf91f462e5e6887f0e6204a147a9ef2463af9120d1af4ac7c92be382042282022100cf0efe9a9fe9074d48b715cdbd07a163bf9e5d20cab1bcc442bbb057915a3252:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-0157
cwe-id: CWE-22
epss-score: 0.00826
epss-percentile: 0.80056
epss-percentile: 0.80076
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 490a00463044022023a37ad7022fb3ea4680961c03fbd4698e0c1a31c55a3b96cf3d666e05be805d022029378a8235dad0cba7857df5bc6c4329d99a1c4ab6c3262bbd206a7e70bc0590:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450221009473b7372aad54d8e6a83e5fca5bb9f16550a7098862b98df570293edb8ec660022064392ee158b3586c404d5d396dcbe7b1ffbcdceed6c19e03b462eec1a3deec7d:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-0219
cwe-id: CWE-255
epss-score: 0.975
epss-percentile: 0.99974
epss-percentile: 0.99973
cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*
metadata:
max-request: 2
@ -60,4 +60,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100ee66a81cf0b38e51042293f4a1dddc8aa8dba47774371e9d19eb48829eea21f80220368383c23f0e6b0c8f3c52120ae93ac76e1e4c2e52c9bdeb83814ca2c54f6ead:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450221008f4bad01c33bd0abc7a040d1f2873216d00a465439ba1eacafc0f9afc1e14379022035ff2091b7ca247d5df65db41584f094ab86acb4172116371ab0a3aae5c26947:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-0467
cwe-id: CWE-22
epss-score: 0.0586
epss-percentile: 0.92582
epss-percentile: 0.92591
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502203f4b902ebc2ae4854cafeb88509c7e1ef5cfec9ecd2e63ebe5919272bbba62e9022100cbd8ec589f383690d4813601af98da2fac45af5428344a064d422f86af5bbd14:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402203ca81fbcb123889134c95781cc2d9458d0afa0135d2097f10ca8d4835d62d3a9022057eb95f29958e50241c873b31c65c973026b4ef88bfc048bd9622f54586911fa:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0696
cwe-id: CWE-22
epss-score: 0.62698
epss-percentile: 0.97465
epss-percentile: 0.97469
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502200c1daefd45441a6775d47dec8176af125290fe9a2f506ab0621f0c35706039400221009d91b31c866a277402a6ad484789eaf3a7022d4952f74eec830b2f69172bd52c:922c64590222798bb761d5b6d8e72950
# digest: 4b0a0048304602210080a4439965d45d4421cf2bc80f91474235cc9f582353c2c782b4e14f50fbdf78022100864a8fa344e9f6d3f8718004578bfa32627668adf36768a9cce6bdb72f50ddf0:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0759
cwe-id: CWE-22
epss-score: 0.01326
epss-percentile: 0.84549
epss-percentile: 0.84565
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100c94f1338a2dff721cd063eed5485dbd9a3c66e36446450c1541be48488735e67022100cfe98b345c2bc3ee84c7d92554e2a58b36b684dbb2cac8969dc88cc27aae419c:922c64590222798bb761d5b6d8e72950
# digest: 4b0a004830460221009f179781a230e0850b5e37d07fde5ae02dbe482cb2850c4b8bb2bd797cecb729022100aae6b363d9a6ac1b75a8b31e18504552ceecae8ed539b8cb036aa6f96ec22fff:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0942
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73076
epss-percentile: 0.7312
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100fd91e7dfebaf8b0d04852883f5e7a633abe8aa06faf8657fc073c775bf374793022100eec148400ff02e7f6ee994882a3dd373828cfb8829619e4b0d6bbe6cf7da9700:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100c3d612f298915367a74d6420a50524ca25431edff91220198f1404cc378418b5022100914ec9cf3acc35164f595c25cbc0a2d051b36b6c073815c068df44d8fb0ea864:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0943
cwe-id: CWE-22
epss-score: 0.01155
epss-percentile: 0.83288
epss-percentile: 0.83314
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100b2fbff89c230538358bba6fc5afce9ccaadbdcedecb8c45a8db76bf6608e4233022100ddd21f7c769f48c04d307662bf41b6807f181234eb54b3b00793a2ce62d42ed2:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220639392e392af04ee83704f4472d75dc8e85d635afd785917c357b9e3261184c20221008dfa91ec0927d296601796c48f89e74291ea1b07dc3fb8e839f8ce910979d2d9:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-0944
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73076
epss-percentile: 0.7312
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100d29a9ce567c0aa89e4daf7800b6316e60a0ff2c4e507227be2af830d8112afc2022100d6c9853f4dbb770b4070acb020a365994e45cc635a87d504097726d997a247bd:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022040ddf3b66ab429ce7bf5029149bb783e18c32a1e4a2123f8783990cb807f6eb80221009eac4a07ce73f0e92bed73ef8e07bbec0690741071f290e6b95f5c7e6ffb2fa9:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0972
cwe-id: CWE-22
epss-score: 0.00813
epss-percentile: 0.79894
epss-percentile: 0.79912
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100dff33c9033e1b94bddb8a8e6127e74c5bbcc96102afffa1908892bc7f2bcd6f4022100ae3cbc19e4b253fd7672c7a3c01b9fe9cdaa37134e7dde2fec130662b7e2bd2e:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022038ad0331a6adfba1545c515ba4023474c955214584f39804212fe65771e04e0d0221009561f9ca9f07d721e18f1ace7c091eff76b347fc2037efbc1e4f66e591466d04:922c64590222798bb761d5b6d8e72950

View File

@ -15,7 +15,7 @@ info:
cve-id: CVE-2010-0982
cwe-id: CWE-22
epss-score: 0.0087
epss-percentile: 0.80556
epss-percentile: 0.80583
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -37,5 +37,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450221009988b72c18a8473e7676505c8dbcf940f19b037a7cda5e342166cc62998f53e1022051670d3d925f03da83afeaaed9aabe505861204af60117def2f35c5439289582:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502200d0fa8a48b3f25e59a9cfd9ba10486f86493dde14febd15ed34199d83ddc0381022100a061aa17219bb464fb02d11643e989718554a2c9e2add0f82d4c3503b4c0891f:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0985
cwe-id: CWE-22
epss-score: 0.01222
epss-percentile: 0.83814
epss-percentile: 0.83832
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100d74dd5d68f3e54422255ecc05d88f31d61bc710bb6170eadbf7b16334afd6fb10221008e91799ca473f0698e062ca2ead6939ccf62f9ce998034ba4a6ea3348a99bd48:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502202be8a75ae3a0d5b5cca6ec12ed7c3202a6efb6ee153dc721a1c6747ec9c5d1ae022100aa4ff760f83e3d77261444432c7331caf8c1ef020560bced223524a3b539d7aa:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1056
cwe-id: CWE-22
epss-score: 0.06484
epss-percentile: 0.92944
epss-percentile: 0.92952
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100d25c1566a9de53c8293cece2cf57afbe02e1459d3447a96f68be6fd7eb0a9c6b02207f7597f4df7414385e5c59f1ef313f956da70de3e83a29613fc4e73511bd7038:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220777877b17f13e54fdcb96dcb778c13550b13326fed684b587330cfcba9d72157022100d55804dc2f0d17059485794d3fb5bcb8013a712a6eb462965c0dcbcf394f4038:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1081
cwe-id: CWE-22
epss-score: 0.0168
epss-percentile: 0.86286
epss-percentile: 0.86299
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502210087b176606c85de1ae890e412cdbc5271199eed07cd7535a2178cf217b31ec8ba02203199b9303e8ee29fa4dc1b2ad01faee7f17fe727c22cd16745a8591bde952e1d:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220476efb2ec0e15e50d67c48fdf764c82afcacb80a840f0d6a6d988ea1128c43ec02205573e9a47db060974c0b7668669c2e8ea9d3127dafc524f9ccec8b1435a9760a:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1217
cwe-id: CWE-22
epss-score: 0.01155
epss-percentile: 0.83288
epss-percentile: 0.83314
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100f95d7c437b7a17ad3f3b4a0323b1a636be740478fde30d38e8a63f6bc185305a022059e61ec7c8c98c505beee18607d635debdc62d82b6c05ff1a1c16eb85fe1cf89:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100dd4cdce994c45c357f9cc8e02c2fa6be27d70bba298be7d923a70e71f3f90334022100d3284c3aa6987489f377aa5c8383e5f2f43c49795d51236266f620461d4e5a21:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1219
cwe-id: CWE-22
epss-score: 0.00813
epss-percentile: 0.79894
epss-percentile: 0.79912
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100f02f199bb61e17ea003fbcfca82494b36e0b63c97ca85a31050cc24a6d6e39c3022100b9ac5ad8287cfcc76ddc15f97dc1eb2eb87c889c541567a8d19afcae5c063012:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100d2dcfcb47d0e2c19982ae635b43fa75119795ce741a14c05e61ada61749f08c40221009b50b77621c80e2663f5d806089a95b66f8ea4b7444a3de06ae1c78c88db01c7:922c64590222798bb761d5b6d8e72950

View File

@ -15,7 +15,7 @@ info:
cve-id: CVE-2010-1302
cwe-id: CWE-22
epss-score: 0.01204
epss-percentile: 0.83685
epss-percentile: 0.83704
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -37,5 +37,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100e0b33fff97fb0ae5caf281801eeb3f083e35fa9f7a0c7514e10ed3ccaf4156dd022055264150d8f052b1c17820f2a6a196b0ca422bd271ca74a4b82c30089fb2eb87:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100b11513da13e8aa1c61a7ee28388e5261c9e692225a43fa46a5b284e58a3cb577022100e60aec85a658237d9b8a6ab12f2288f4ff3e0eff83aea5022151266781da1e93:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1304
cwe-id: CWE-22
epss-score: 0.0045
epss-percentile: 0.72298
epss-percentile: 0.72337
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100cd263b378665fe459c9ac4c3593b1ffea45c13747bde6bdc9fbe540e479275c002206b952cfef1e1f5c9a197e9975372db932018585bb6d53a4dd6e83a0b9b88552e:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402206b2fbfb4e8665f80380bda1b877024a95ccf84fe838be4b9644b235adf21d52102200f2152dae80c832755c5fcdb1858976d08e1150db56368a6b66f11eb794fb263:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1305
cwe-id: CWE-22
epss-score: 0.03203
epss-percentile: 0.90103
epss-percentile: 0.90114
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022034dee82663578c2e1ab9a960772cf617aca31c767509694d09dde8e09549e300022100bf2f07e28729557a5cd345206844273182673d9efd30968fa1e122af6115b3f2:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402207205e19cb5f2983328ad807fce96f2bde33578ac0fd9f9b1727a0196d1688a8b022035cf47c0dd1046d34bc751085a06b69509a3ff526460866502c4dec0dfb08721:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1306
cwe-id: CWE-22
epss-score: 0.01242
epss-percentile: 0.83977
epss-percentile: 0.83996
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402202df6bbc50d7cc8368259ac5c6184d04e75048880177d47c07f728aefb1668442022026f12aeb3c65ada4eab3bc49dbc9949d4657858b787fc536c26c3160c8106b4e:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402207a03718b731e0e70f8760e0a592026417e59fb92e06a7d83bd5761cb31448757022075180db49dccbae8f807c16ab516e615af257ae1d79e8f7a3ec13933be251c19:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1307
cwe-id: CWE-22
epss-score: 0.01751
epss-percentile: 0.8657
epss-percentile: 0.8658
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502205e86c6b24b4ecb46d4afcf38d506bcf7f4cfff13f36cd2eee63089da70b0b868022100856040c0237849b063be5541a915d7316bfd4b92d07e69fa1b5ffdccb4823826:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100cc6fafa3bcc40c8363cb96e3079976f46d54b90a3d67f8399284097a701edd9602201aa71058190d9bea8845f952d14838d66ac83f3d2919f6b4c89deb5dc7a4f616:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1308
cwe-id: CWE-22
epss-score: 0.01334
epss-percentile: 0.84582
epss-percentile: 0.84598
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100ab845e16687ce7394f1946b78ec0391abc76843c858d48749c49726df35b2825022100e0686a546d0be89423fdb2ac2236db2c58678e0cf8d0c4000cf95332a695001b:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502202253ada6630cef825f35e2fd697d200f8c121f9fd28dac2147addb8fca7150c8022100bf20325083decde3b0703c1c0ddc546d91849c2c791e1df40fc8b2f685757bdd:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1312
cwe-id: CWE-22
epss-score: 0.01155
epss-percentile: 0.83288
epss-percentile: 0.83314
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100b66da8f11f27a19ee5eb13ac43eaf15f982cf603dbfac58c05c64ba33856016c02201f31008b5c95173798587761cbacde6ed0dbe642cef56b80bd5665f066b3170a:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100d031c9594d55b94c1ce517622588bede3078a56fa0ed813c39cc438a181f01ad022100e93a1b31d473bab48be5756576d604331213ba75ee814a5051b0654a7cd802d6:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1313
cwe-id: CWE-22
epss-score: 0.0045
epss-percentile: 0.72298
epss-percentile: 0.72337
cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100b3023459497fd023667bd23f69c5d79e989e120a4f4d4b902de91f25b0303c1102207bfa0050b332ae808843e6d6dd97f61130c9d6e6c4aa8d55644d1d59dd2e1171:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022020146c64b159ac705de2e4dd28015932653744c20b56e76f74faf54c29e52ebe022013c89d894dccc1a81f0d46e37912c58ff1482746be56da8725312560b9dbf2aa:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1314
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73076
epss-percentile: 0.7312
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100a3a8e923bd287eb99e43d17cfcb86977d3117ab38c87cd12cb582aab308ef4b40220212cf2131eb3c0a4ce8622b00360c9803c7e0c505b742223fec1e4e11d19a1f0:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502200c00246f8aa8ef8f8f58dd5a0074a43a3514f0346be0921d5162d185f95d4d2002210095ccd71b05f422c6eecf62e02f90d8faa7cd17626ad9fe55888ba503a1dc5e29:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1315
cwe-id: CWE-22
epss-score: 0.0087
epss-percentile: 0.80556
epss-percentile: 0.80583
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100cb30289178cac99e34cb8ca62f6462b7452d8c03c88c272c51392463ba7c000f022100e8d73b86a88d672d1cd610ec7645ce88a04685ffd9810a631afc73d3dad7bf3a:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502201d611032c4dcf3d0088f3f5a20a7f83c3ada1e2758091a501780c8658d7bdd570221008cb74ccc071b4409eece930deb86cd415cca8195740fc254700b4348caafd4d0:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1340
cwe-id: CWE-22
epss-score: 0.01155
epss-percentile: 0.83288
epss-percentile: 0.83314
cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100f4d995506543d30fe5c868a1d7cb9f0e3bba77ec70c2df920053c15e44ced48c02206486f126b4e4a609a1cc858bc0de00938f33c55ba9c14c80aded301ade3ef340:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502202c9457055390b7eca97fe4779cc54f4e6313b488ea8804a74a6e0b4306575cd40221008610d09c75d50f19541cf59d6da39d71eba9dde35045b9b8e070137dd6961df7:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1345
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73076
epss-percentile: 0.7312
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022033ebd8edc048ce4653495f563460b4f7fe05cc413a086392f526fc3f9938822d0221009ac9dd56d2999373c20eee533aaff2ddf0519372940f32146c7419044589224d:922c64590222798bb761d5b6d8e72950
# digest: 4b0a004830460221009a880f84f0e9022fd3ebe342a3c792ae657394839e72a44839fcaff06eba8c01022100a778b955a05e82ff094fc1276ce40dc25cdacc865426bc046ed08651102bbc05:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1352
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73076
epss-percentile: 0.7312
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402200b73843e2463f5a6fe29cf1427f706e0ca3047fa9e624f3ba45905f7c2f771d0022055fbe68ee1440edf07fc88689456e3c565572cc6b5d3503e7988a16caf01a6c0:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022040eb21742e7976b62f15cc315a62652df7d7338363763bd91bcbfd2459b45ed002207780512a5252538b6235f6cf5a081e79497d94d81c0e77fc54693e49fd7f01a7:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1353
cwe-id: CWE-22
epss-score: 0.01751
epss-percentile: 0.8657
epss-percentile: 0.8658
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100d665c7f0fb0f414afd94f1dba980b4f650853cfe790377b484be1d53c9fb2cfd022100eda66e141ee99de501cc8e41d437e0aa290f26bfe08078cda96316193d8b1c50:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100afc5261fae4c1e5727c4cd6d7aced6feb8833bc0f0eb4e959ed09a9c506e9b31022011e4e7d5e8614c531065b2ef2752b2b3c260354f055afb617b7f4ed0ed27a558:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1354
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73076
epss-percentile: 0.7312
cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100cd8547386fbfc1ba0e30a326035ac207235a54679367415f6a3c680b21a8083202202e3cbcad6032aeb420ac28a2587b2cb3c1b7dede66774fbb7d0e00b775f10077:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502203aa9d584f9cea24aca71e92b600df1f293849c18d24a4777a52e2d3778df7865022100bbc1e711dd1c50b6644e79db38488db171c74dc16486d294e5f9e03f59c8cb78:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1429
cwe-id: CWE-264
epss-score: 0.00573
epss-percentile: 0.75475
epss-percentile: 0.75511
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
metadata:
verified: true
@ -47,5 +47,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402206853d100fb1b0a8e5031a836cbd955afd6535263364e018002af89b86a6e38fb02200c3130cf954d066b48b7dceffc7ca9204d13160742b673f268825e5f63eeb1bf:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022034022d209790cc1fb4de224da266adc91eafbdfd2cdbd7c4659856630d16c5c2022100f2c9301e616146d24b534fad1348c33ea8bd1799731182e55089cc3a80cebf62:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1461
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73076
epss-percentile: 0.7312
cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502210097b8cfc292bf3f3facb7d4225137141e5c503177794328a1525882312e5d33ac02200779d032fb4b04d02b4ad0a4b4d5300ed4b8a66cc72c7762d04571663a23e75c:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100a4317de6976b0f8f958c95ae8cbae85852c649a0a0ecb9058d4bf8f0e4efa9a80221009e2778609b3cdbfbd5964163bad11d2784fc96376d2b93ef2c98ae3c97cc8b02:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1469
cwe-id: CWE-22
epss-score: 0.00813
epss-percentile: 0.79894
epss-percentile: 0.79912
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402205c978b1c47f85c1b51061d169c5eb7631cdd9c6c2d612200dec29fda57fabe1b0220507d86d5d8c9164a8f26a6549ad5e3d0af4285f8711a7ec5b58da6cb7bcba3fb:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100c1fd85ee1ee30afd25513e4111fdcb5dc5dc463101f8ade408c98247485ccff8022100f95bd0bef569834716285d0c9c9183468b26d0d027d5ec3f8ab169b9869e77d1:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1470
cwe-id: CWE-22
epss-score: 0.04616
epss-percentile: 0.91626
epss-percentile: 0.91642
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100aa3197d11bc16fc8ee1ccb9a4101baac0d27470d024cfc16bdb234ddf2d98f57022100e3900d14b5143d172f65959a05ea5412c68c884a467e9c8127d817270fbe73b6:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450221008f76fc5ceeb0ecba7e3136289cceaac3826c6e8629c1e05c315d48a882d8252902201b232ef47b785a14ddddeb0e2fa822406fd07e90a65a5e9ee6e1295288fa03e9:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1471
cwe-id: CWE-22
epss-score: 0.05684
epss-percentile: 0.92484
epss-percentile: 0.92493
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450220091f45f1bb929a6acc4d68e0f76dbedad7ac8ed558c517aa3d80e8f3980dbafb022100fa4b496a564614c6924066415c88b37a8cf0c22ec0a551ee0243ba1eba803fb8:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100b603f3c13db9a7c36583e5360a496d863bb41a5ec7895cc23d4f6241efceca48022100d67025a66105cdcd3ea0d19550825b9627ada743cc41d8605139f0e8cd2f53dd:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1472
cwe-id: CWE-22
epss-score: 0.05684
epss-percentile: 0.92484
epss-percentile: 0.92493
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100bccbd1e9ee053ac9e46e9fe02ce4ba8b8ab7a45f61e18f88bae127c18959eea2022100a0ae9fc4caa042eddbf836e530bdb9070c729ecd61432b3afee7e1143643faec:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100ffe9886cc1c362b3089618e2a5e94c20c51c94f46ac392134f3c7b840f142f7502206d322caafb2950a2c6645d2340fe308403d37948c9238499e6e40c385de371f7:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1473
cwe-id: CWE-22
epss-score: 0.00826
epss-percentile: 0.80056
epss-percentile: 0.80076
cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,5 +38,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450221009d8087eb5640e8a879f0b3c653086ccb9f3a4ace2026cc1dc7bdca2c38a619b70220736327ca1b9f8fefa9a6476fa5c6a0405be0ba84982a6de34d11f6b288aac115:922c64590222798bb761d5b6d8e72950
# digest: 4b0a0048304602210088c94c8d965f48544be9d0029474f1253cc5ed5e291d12a792b53a8976d2d68a022100bdc302972e96ae50a2c25f23dd67230aece6b43e7c05cd7c52e60ca23e37e6fc:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1474
cwe-id: CWE-22
epss-score: 0.01242
epss-percentile: 0.83977
epss-percentile: 0.83996
cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a004730450220604489eae224516bde408e712c6c6267dbaa1bb8fe8ed67bee521102fbbe83ea02210098b330a0542095b8f56f2ee974bddd8cc1b314b907fa700648cd17b432b788bd:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100e8134229e092da03de01096bde4d63feafba069079bb7236252a653b89ca0318022100cbf67850799f1bc5ccb6bae0f4229f20ef018aaa7c2c7d0eb85977766680dc64:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1475
cwe-id: CWE-22
epss-score: 0.01242
epss-percentile: 0.83977
epss-percentile: 0.83996
cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022003a8f0a17966c6aac8c4c7d69fec398251be1920d377473475d434b72e785b9f022100f45e0538786f63179fb8e33277b8e8fe6451243f4e0f7542ee80ca3f6cee1db5:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502210084dc1ed7c8817002175d8478c006a3913718b4a4d1a8004e9f6874def223673202200cc5cc64a3e51866813fb0ec6f98039b3bafa0de96fdc36b9191a6ec063b0ac5:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1476
cwe-id: CWE-22
epss-score: 0.03527
epss-percentile: 0.90505
epss-percentile: 0.90518
cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 490a00463044022051d183b9eaecce287a500f763945967601bf00003688a9da6b05fb4029d91f05022053d4c28c3aaf7094ccb73c81940417e58a38c6371e23d6276410642a728eaa1a:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402200ffc4344d566784bbe3f85ad5c7d713b256650215444947918ee43538e219643022057edd39fd7f31d569ec066dcb7793c56c69811cddbc4338a41a9a94635972527:922c64590222798bb761d5b6d8e72950

View File

@ -15,7 +15,7 @@ info:
cve-id: CVE-2010-1478
cwe-id: CWE-22
epss-score: 0.00826
epss-percentile: 0.80056
epss-percentile: 0.80076
cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -37,5 +37,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100c00767d832ccc0e7a9edb0ae3ba58075325f96d52f710f0d15128366195bccec022100815dcff9ef6c43991808b0227417d24ff4e1850d54a7b6c5d66facecfb37e13d:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220552109f47977b2ca8c157de482cbf4693ec05893d897b17641ec3d0ef4df9a31022100918319965e673ba2be67f24e51fd2474d611f4523fff58b6c96d0397b59529b6:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1491
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73076
epss-percentile: 0.7312
cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,5 +39,4 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402200d14fe03a30656f4024e43d9c1b33112c896cb14b5cc1275125c442a286eaebd02206bad6bb225f2bd6731eb2bbc9b8d3a42230f5e681b4403858def43f7505e23b6:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220620d90f32ee47a24bfe89f3d203c24fc2af07649253c263db5c7dbc2b06de73d022100c60af0b38da3252b8ca891f7b3008a9b2de81c6d6b5eb05a13ef3e1a112548d4:922c64590222798bb761d5b6d8e72950

View File

@ -17,8 +17,8 @@ info:
cvss-score: 5
cve-id: CVE-2010-1494
cwe-id: CWE-22
epss-score: 0.02305
epss-percentile: 0.88502
epss-score: 0.01827
epss-percentile: 0.86904
cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,5 +40,4 @@ http:
- type: status
status:
- 200
# digest: 490a004630440220678cb1f8e8ba9f8af67849992c9ff45fd32d95989f3798f257282ee79a24662e02201985cdb2da03b969a742957679cc291f966d7173d2b7d93450478bc6041229f7:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100f5364d8cc2e38483ba10b21995be01c99d5b5f9f3f20b0c1a7d57311cd7c5be802206dc35b7e622a7b3d73f76109eeaf145bb3ad02ca2f1906ab431a8a48377091ad:922c64590222798bb761d5b6d8e72950

Some files were not shown because too many files have changed in this diff Show More