TemplateMan Update [Sat Mar 23 09:28:19 UTC 2024] 🤖

patch-1
GitHub Action 2024-03-23 09:28:19 +00:00
parent 42e27ad7f9
commit c491aa6724
2095 changed files with 5404 additions and 4465 deletions

View File

@ -17,15 +17,15 @@ info:
cvss-score: 8.8 cvss-score: 8.8
cve-id: CVE-2019-14287 cve-id: CVE-2019-14287
cwe-id: CWE-755 cwe-id: CWE-755
epss-score: 0.34299 epss-score: 0.30814
epss-percentile: 0.96958 epss-percentile: 0.96854
cpe: cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
vendor: sudo_project vendor: sudo_project
product: sudo product: sudo
tags: cve,cve2019,sudo,code,linux,privesc,local,canonical tags: packetstorm,cve,cve2019,sudo,code,linux,privesc,local,canonical
self-contained: true self-contained: true
code: code:

View File

@ -18,13 +18,13 @@ info:
cve-id: CVE-2021-3156 cve-id: CVE-2021-3156
cwe-id: CWE-193 cwe-id: CWE-193
epss-score: 0.97085 epss-score: 0.97085
epss-percentile: 0.99752 epss-percentile: 0.99757
cpe: cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
vendor: sudo_project vendor: sudo_project
product: sudo product: sudo
tags: cve,cve2021,sudo,code,linux,privesc,local,kev tags: packetstorm,cve,cve2021,sudo,code,linux,privesc,local,kev
self-contained: true self-contained: true
code: code:

View File

@ -21,8 +21,8 @@ info:
cvss-score: 7.8 cvss-score: 7.8
cve-id: CVE-2023-2640 cve-id: CVE-2023-2640
cwe-id: CWE-863 cwe-id: CWE-863
epss-score: 0.00174 epss-score: 0.00232
epss-percentile: 0.53697 epss-percentile: 0.60636
cpe: cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:* cpe: cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true

View File

@ -10,20 +10,22 @@ info:
- https://owncloud.com/security-advisories/webdav-api-authentication-bypass-using-pre-signed-urls/ - https://owncloud.com/security-advisories/webdav-api-authentication-bypass-using-pre-signed-urls/
- https://github.com/0xfed/ownedcloud - https://github.com/0xfed/ownedcloud
- https://owncloud.org/security - https://owncloud.org/security
- https://github.com/ambionics/owncloud-exploits
- https://github.com/nomi-sec/PoC-in-GitHub
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2023-49105 cve-id: CVE-2023-49105
cwe-id: CWE-287 cwe-id: CWE-287
epss-score: 0.21237
epss-percentile: 0.96302
cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
epss-score: 0.00091
epss-percentile: 0.38353
metadata: metadata:
max-request: 2 max-request: 2
vendor: owncloud
product: owncloud product: owncloud
shodan-query: title:"owncloud" shodan-query: title:"owncloud"
tags: cve,cve2023,code,owncloud,auth-bypass tags: cve,cve2023,code,owncloud,auth-bypass
variables: variables:
username: admin username: admin

View File

@ -17,8 +17,8 @@ info:
cvss-score: 7.8 cvss-score: 7.8
cve-id: CVE-2023-6246 cve-id: CVE-2023-6246
cwe-id: CWE-787,CWE-122 cwe-id: CWE-787,CWE-122
epss-score: 0.00383 epss-score: 0.0077
epss-percentile: 0.72435 epss-percentile: 0.80859
cpe: cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -1,18 +1,18 @@
id: soa-detect id: soa-detect
info: info:
name: SOA Record Service - Detection name: SOA Record Service - Detection
author: rxerium author: rxerium
severity: info severity: info
description: | description: |
Detects which domain provider a domain is using, detected through SOA records Detects which domain provider a domain is using, detected through SOA records
reference: reference:
- https://www.cloudflare.com/learning/dns/dns-records/dns-soa-record/ - https://www.cloudflare.com/learning/dns/dns-records/dns-soa-record/
metadata: metadata:
max-request: 1 verified: true
verified: true max-request: 1
tags: dns,soa tags: dns,soa
dns: dns:
- name: "{{FQDN}}" - name: "{{FQDN}}"

View File

@ -1,15 +1,16 @@
id: spf-record-detect id: spf-record-detect
info: info:
name: SPF Record - Detection name: SPF Record - Detection
author: rxerium author: rxerium
severity: info severity: info
description: | description: |
An SPF TXT record was detected An SPF TXT record was detected
reference: reference:
- https://www.mimecast.com/content/how-to-create-an-spf-txt-record - https://www.mimecast.com/content/how-to-create-an-spf-txt-record
tags: dns,spf metadata:
max-request: 1
tags: dns,spf
dns: dns:
- name: "{{FQDN}}" - name: "{{FQDN}}"
type: TXT type: TXT

View File

@ -1,18 +1,18 @@
id: txt-service-detect id: txt-service-detect
info: info:
name: DNS TXT Service - Detect name: DNS TXT Service - Detect
author: rxerium author: rxerium
severity: info severity: info
description: | description: |
Finding the services companies use via their TXT records. Finding the services companies use via their TXT records.
reference: reference:
- https://www.abenezer.ca/blog/services-companies-use-txt-records - https://www.abenezer.ca/blog/services-companies-use-txt-records
metadata: metadata:
max-request: 1 verified: true
verified: true max-request: 1
tags: dns,txt tags: dns,txt
dns: dns:
- name: "{{FQDN}}" - name: "{{FQDN}}"
type: TXT type: TXT

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2018-25031 cve-id: CVE-2018-25031
cwe-id: CWE-20 cwe-id: CWE-20
epss-score: 0.00265 epss-score: 0.00265
epss-percentile: 0.65414 epss-percentile: 0.65516
cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true

View File

@ -12,13 +12,15 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2000-0114 - https://nvd.nist.gov/vuln/detail/CVE-2000-0114
- https://www.exploit-db.com/exploits/19897 - https://www.exploit-db.com/exploits/19897
- https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0114 - https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0114
- https://github.com/0xPugazh/One-Liners
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2000-0114 cve-id: CVE-2000-0114
cwe-id: NVD-CWE-Other cwe-id: NVD-CWE-Other
epss-score: 0.09258 epss-score: 0.15958
epss-percentile: 0.94099 epss-percentile: 0.95829
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -15,13 +15,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2001-0537 - https://nvd.nist.gov/vuln/detail/CVE-2001-0537
- http://www.ciac.org/ciac/bulletins/l-106.shtml - http://www.ciac.org/ciac/bulletins/l-106.shtml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6749 - https://exchange.xforce.ibmcloud.com/vulnerabilities/6749
- https://github.com/ARPSyndicate/cvemon
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:C/I:C/A:C cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:C/I:C/A:C
cvss-score: 9.3 cvss-score: 9.3
cve-id: CVE-2001-0537 cve-id: CVE-2001-0537
cwe-id: CWE-287 cwe-id: CWE-287
epss-score: 0.88063 epss-score: 0.87683
epss-percentile: 0.98412 epss-percentile: 0.98569
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:* cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2004-0519 cve-id: CVE-2004-0519
cwe-id: NVD-CWE-Other cwe-id: NVD-CWE-Other
epss-score: 0.02285 epss-score: 0.02285
epss-percentile: 0.88555 epss-percentile: 0.89406
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2004-1965 cve-id: CVE-2004-1965
cwe-id: NVD-CWE-Other cwe-id: NVD-CWE-Other
epss-score: 0.0113 epss-score: 0.0113
epss-percentile: 0.83145 epss-percentile: 0.84351
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:* cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- http://pridels0.blogspot.com/2005/12/cofax-xss-vuln.html - http://pridels0.blogspot.com/2005/12/cofax-xss-vuln.html
- https://nvd.nist.gov/vuln/detail/CVE-2005-4385 - https://nvd.nist.gov/vuln/detail/CVE-2005-4385
- http://www.vupen.com/english/advisories/2005/2977 - http://www.vupen.com/english/advisories/2005/2977
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3 cvss-score: 4.3
cve-id: CVE-2005-4385 cve-id: CVE-2005-4385
cwe-id: NVD-CWE-Other cwe-id: NVD-CWE-Other
epss-score: 0.00294 epss-score: 0.00294
epss-percentile: 0.65964 epss-percentile: 0.68633
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:* cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -10,13 +10,14 @@ info:
reference: reference:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32418 - https://exchange.xforce.ibmcloud.com/vulnerabilities/32418
- https://nvd.nist.gov/vuln/detail/CVE-2007-0885 - https://nvd.nist.gov/vuln/detail/CVE-2007-0885
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8 cvss-score: 6.8
cve-id: CVE-2007-0885 cve-id: CVE-2007-0885
cwe-id: NVD-CWE-Other cwe-id: NVD-CWE-Other
epss-score: 0.0093 epss-score: 0.0093
epss-percentile: 0.81235 epss-percentile: 0.82626
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,16 +21,16 @@ info:
cvss-score: 10 cvss-score: 10
cve-id: CVE-2007-3010 cve-id: CVE-2007-3010
cwe-id: CWE-20 cwe-id: CWE-20
epss-score: 0.97264 epss-score: 0.97317
epss-percentile: 0.99824 epss-percentile: 0.99868
cpe: cpe:2.3:a:alcatel-lucent:omnipcx:7.1:*:enterprise:*:*:*:*:* cpe: cpe:2.3:a:alcatel-lucent:omnipcx:7.1:*:enterprise:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: alcatel-lucent vendor: alcatel-lucent
product: omnipcx product: omnipcx
fofa-query: app="Alcatel_Lucent-OmniPCX-Enterprise"
shodan-query: title:"OmniPCX for Enterprise" shodan-query: title:"OmniPCX for Enterprise"
fofa-query: app="Alcatel_Lucent-OmniPCX-Enterprise"
tags: cve,cve2007,kev,rce,alcatel tags: cve,cve2007,kev,rce,alcatel
http: http:

View File

@ -13,13 +13,14 @@ info:
- https://www.exploit-db.com/exploits/4307 - https://www.exploit-db.com/exploits/4307
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36222 - https://exchange.xforce.ibmcloud.com/vulnerabilities/36222
- https://nvd.nist.gov/vuln/detail/CVE-2007-4504 - https://nvd.nist.gov/vuln/detail/CVE-2007-4504
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2007-4504 cve-id: CVE-2007-4504
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01677 epss-score: 0.02599
epss-percentile: 0.86314 epss-percentile: 0.90043
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -22,7 +22,7 @@ info:
cve-id: CVE-2007-4556 cve-id: CVE-2007-4556
cwe-id: NVD-CWE-Other cwe-id: NVD-CWE-Other
epss-score: 0.16469 epss-score: 0.16469
epss-percentile: 0.95533 epss-percentile: 0.95873
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-1059 cve-id: CVE-2008-1059
cwe-id: CWE-94 cwe-id: CWE-94
epss-score: 0.01493 epss-score: 0.01493
epss-percentile: 0.85524 epss-percentile: 0.86573
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -22,7 +22,7 @@ info:
cve-id: CVE-2008-2650 cve-id: CVE-2008-2650
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.06344 epss-score: 0.06344
epss-percentile: 0.92938 epss-percentile: 0.93486
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -14,13 +14,14 @@ info:
- http://securityreason.com/securityalert/4464 - http://securityreason.com/securityalert/4464
- https://nvd.nist.gov/vuln/detail/CVE-2008-4668 - https://nvd.nist.gov/vuln/detail/CVE-2008-4668
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45490 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45490
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:P/A:P
cvss-score: 9 cvss-score: 9
cve-id: CVE-2008-4668 cve-id: CVE-2008-4668
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01018 epss-score: 0.01018
epss-percentile: 0.82089 epss-percentile: 0.83418
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2008-4764 cve-id: CVE-2008-4764
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.02365 epss-score: 0.02365
epss-percentile: 0.88742 epss-percentile: 0.89577
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:* cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-6172 cve-id: CVE-2008-6172
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00509 epss-score: 0.00509
epss-percentile: 0.74088 epss-percentile: 0.76096
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:* cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -15,13 +15,14 @@ info:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45254 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45254
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45252 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45252
- https://nvd.nist.gov/vuln/detail/CVE-2008-6465 - https://nvd.nist.gov/vuln/detail/CVE-2008-6465
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3 cvss-score: 4.3
cve-id: CVE-2008-6465 cve-id: CVE-2008-6465
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.00421 epss-score: 0.00421
epss-percentile: 0.71537 epss-percentile: 0.73765
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:* cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2008-6668 cve-id: CVE-2008-6668
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00359 epss-score: 0.00359
epss-percentile: 0.6932 epss-percentile: 0.71607
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 2 max-request: 2

View File

@ -17,8 +17,8 @@ info:
cvss-score: 5.8 cvss-score: 5.8
cve-id: CVE-2008-7269 cve-id: CVE-2008-7269
cwe-id: CWE-20 cwe-id: CWE-20
epss-score: 0.01193 epss-score: 0.01425
epss-percentile: 0.83661 epss-percentile: 0.86241
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
metadata: metadata:
verified: "true" verified: "true"

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-0545 cve-id: CVE-2009-0545
cwe-id: CWE-20 cwe-id: CWE-20
epss-score: 0.97081 epss-score: 0.97081
epss-percentile: 0.99724 epss-percentile: 0.99755
cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:* cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-0932 cve-id: CVE-2009-0932
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.04048 epss-score: 0.04048
epss-percentile: 0.91213 epss-percentile: 0.919
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-1151 cve-id: CVE-2009-1151
cwe-id: CWE-94 cwe-id: CWE-94
epss-score: 0.79256 epss-score: 0.79256
epss-percentile: 0.97998 epss-percentile: 0.98197
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/8367 - https://www.exploit-db.com/exploits/8367
- https://nvd.nist.gov/vuln/detail/CVE-2009-1496 - https://nvd.nist.gov/vuln/detail/CVE-2009-1496
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2009-1496 cve-id: CVE-2009-1496
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00802 epss-score: 0.00802
epss-percentile: 0.79755 epss-percentile: 0.81288
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-1558 cve-id: CVE-2009-1558
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01101 epss-score: 0.01101
epss-percentile: 0.82907 epss-percentile: 0.84137
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:* cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -14,13 +14,14 @@ info:
- http://www.adobe.com/support/security/bulletins/apsb09-12.html - http://www.adobe.com/support/security/bulletins/apsb09-12.html
- http://www.dsecrg.com/pages/vul/show.php?id=122 - http://www.dsecrg.com/pages/vul/show.php?id=122
- https://nvd.nist.gov/vuln/detail/CVE-2009-1872 - https://nvd.nist.gov/vuln/detail/CVE-2009-1872
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3 cvss-score: 4.3
cve-id: CVE-2009-1872 cve-id: CVE-2009-1872
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.37553 epss-score: 0.37553
epss-percentile: 0.96847 epss-percentile: 0.97102
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2009-2015 cve-id: CVE-2009-2015
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01197 epss-score: 0.01197
epss-percentile: 0.83694 epss-percentile: 0.84862
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -12,13 +12,14 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/8946 - https://www.exploit-db.com/exploits/8946
- https://nvd.nist.gov/vuln/detail/CVE-2009-2100 - https://nvd.nist.gov/vuln/detail/CVE-2009-2100
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2009-2100 cve-id: CVE-2009-2100
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00629 epss-score: 0.00779
epss-percentile: 0.7675 epss-percentile: 0.80973
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,8 +20,8 @@ info:
cvss-score: 6.8 cvss-score: 6.8
cve-id: CVE-2009-3053 cve-id: CVE-2009-3053
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00367 epss-score: 0.00447
epss-percentile: 0.697 epss-percentile: 0.74489
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2009-3318 cve-id: CVE-2009-3318
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00706 epss-score: 0.00706
epss-percentile: 0.78314 epss-percentile: 0.79951
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2009-4679 cve-id: CVE-2009-4679
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.80104 epss-percentile: 0.81565
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:* cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2009-5114 - https://nvd.nist.gov/vuln/detail/CVE-2009-5114
- http://websecurity.com.ua/2628/ - http://websecurity.com.ua/2628/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74321 - https://exchange.xforce.ibmcloud.com/vulnerabilities/74321
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2009-5114 cve-id: CVE-2009-5114
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01329 epss-score: 0.01329
epss-percentile: 0.84559 epss-percentile: 0.85735
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0467 cve-id: CVE-2010-0467
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.06955 epss-score: 0.06955
epss-percentile: 0.93273 epss-percentile: 0.93792
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:* cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-0759 - https://nvd.nist.gov/vuln/detail/CVE-2010-0759
- http://www.exploit-db.com/exploits/11498 - http://www.exploit-db.com/exploits/11498
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56380 - https://exchange.xforce.ibmcloud.com/vulnerabilities/56380
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-0759 cve-id: CVE-2010-0759
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01326 epss-score: 0.01569
epss-percentile: 0.84547 epss-percentile: 0.86974
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0942 cve-id: CVE-2010-0942
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00477 epss-score: 0.00477
epss-percentile: 0.73222 epss-percentile: 0.75244
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-0944 cve-id: CVE-2010-0944
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00477 epss-score: 0.00477
epss-percentile: 0.73222 epss-percentile: 0.75244
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-0972 - https://nvd.nist.gov/vuln/detail/CVE-2010-0972
- http://www.exploit-db.com/exploits/11738 - http://www.exploit-db.com/exploits/11738
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56863 - https://exchange.xforce.ibmcloud.com/vulnerabilities/56863
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-0972 cve-id: CVE-2010-0972
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00813 epss-score: 0.00813
epss-percentile: 0.79885 epss-percentile: 0.81406
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:* cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1056 - https://nvd.nist.gov/vuln/detail/CVE-2010-1056
- http://www.rockettheme.com/extensions-updates/638-rokdownloads-10-released - http://www.rockettheme.com/extensions-updates/638-rokdownloads-10-released
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56898 - https://exchange.xforce.ibmcloud.com/vulnerabilities/56898
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8 cvss-score: 6.8
cve-id: CVE-2010-1056 cve-id: CVE-2010-1056
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.06484 epss-score: 0.06484
epss-percentile: 0.93019 epss-percentile: 0.93567
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1217 - https://nvd.nist.gov/vuln/detail/CVE-2010-1217
- http://www.packetstormsecurity.org/1003-exploits/joomlajetooltip-lfi.txt - http://www.packetstormsecurity.org/1003-exploits/joomlajetooltip-lfi.txt
- http://www.exploit-db.com/exploits/11814 - http://www.exploit-db.com/exploits/11814
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
cvss-score: 4.3 cvss-score: 4.3
cve-id: CVE-2010-1217 cve-id: CVE-2010-1217
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01155 epss-score: 0.01155
epss-percentile: 0.83281 epss-percentile: 0.84543
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1219 cve-id: CVE-2010-1219
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00813 epss-score: 0.00813
epss-percentile: 0.79932 epss-percentile: 0.81406
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -11,13 +11,14 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/11978 - https://www.exploit-db.com/exploits/11978
- https://nvd.nist.gov/vuln/detail/CVE-2010-1302 - https://nvd.nist.gov/vuln/detail/CVE-2010-1302
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1302 cve-id: CVE-2010-1302
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01204 epss-score: 0.01204
epss-percentile: 0.83694 epss-percentile: 0.84918
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -11,13 +11,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1304 - https://nvd.nist.gov/vuln/detail/CVE-2010-1304
- http://www.exploit-db.com/exploits/11998 - http://www.exploit-db.com/exploits/11998
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57483 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57483
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1304 cve-id: CVE-2010-1304
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.0045 epss-score: 0.0045
epss-percentile: 0.72402 epss-percentile: 0.74575
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1306 cve-id: CVE-2010-1306
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01242 epss-score: 0.01242
epss-percentile: 0.84048 epss-percentile: 0.85196
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -12,13 +12,14 @@ info:
- https://www.exploit-db.com/exploits/12066 - https://www.exploit-db.com/exploits/12066
- https://nvd.nist.gov/vuln/detail/CVE-2010-1308 - https://nvd.nist.gov/vuln/detail/CVE-2010-1308
- http://www.vupen.com/english/advisories/2010/0809 - http://www.vupen.com/english/advisories/2010/0809
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1308 cve-id: CVE-2010-1308
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01334 epss-score: 0.01334
epss-percentile: 0.84589 epss-percentile: 0.85765
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1314 cve-id: CVE-2010-1314
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00477 epss-score: 0.00477
epss-percentile: 0.73222 epss-percentile: 0.75244
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1315 - https://nvd.nist.gov/vuln/detail/CVE-2010-1315
- http://packetstormsecurity.org/1004-exploits/joomlaweberpcustomer-lfi.txt - http://packetstormsecurity.org/1004-exploits/joomlaweberpcustomer-lfi.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57482 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57482
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1315 cve-id: CVE-2010-1315
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.0087 epss-score: 0.0087
epss-percentile: 0.80553 epss-percentile: 0.82023
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -12,13 +12,14 @@ info:
- https://www.exploit-db.com/exploits/15453 - https://www.exploit-db.com/exploits/15453
- https://nvd.nist.gov/vuln/detail/CVE-2010-1345 - https://nvd.nist.gov/vuln/detail/CVE-2010-1345
- http://www.exploit-db.com/exploits/11785 - http://www.exploit-db.com/exploits/11785
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1345 cve-id: CVE-2010-1345
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00477 epss-score: 0.00477
epss-percentile: 0.73149 epss-percentile: 0.75244
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:* cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -12,13 +12,14 @@ info:
- https://www.exploit-db.com/exploits/12084 - https://www.exploit-db.com/exploits/12084
- https://nvd.nist.gov/vuln/detail/CVE-2010-1352 - https://nvd.nist.gov/vuln/detail/CVE-2010-1352
- http://packetstormsecurity.org/1004-exploits/joomlajukebox-lfi.txt - http://packetstormsecurity.org/1004-exploits/joomlajukebox-lfi.txt
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1352 cve-id: CVE-2010-1352
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00477 epss-score: 0.00477
epss-percentile: 0.73149 epss-percentile: 0.75244
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -14,13 +14,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1353 - https://nvd.nist.gov/vuln/detail/CVE-2010-1353
- http://www.vupen.com/english/advisories/2010/0808 - http://www.vupen.com/english/advisories/2010/0808
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57533 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57533
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1353 cve-id: CVE-2010-1353
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01751 epss-score: 0.01751
epss-percentile: 0.86604 epss-percentile: 0.87665
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -22,7 +22,7 @@ info:
cve-id: CVE-2010-1429 cve-id: CVE-2010-1429
cwe-id: CWE-264 cwe-id: CWE-264
epss-score: 0.00573 epss-score: 0.00573
epss-percentile: 0.7553 epss-percentile: 0.77469
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:* cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1469 - https://nvd.nist.gov/vuln/detail/CVE-2010-1469
- http://packetstormsecurity.org/1004-exploits/joomlajprojectmanager-lfi.txt - http://packetstormsecurity.org/1004-exploits/joomlajprojectmanager-lfi.txt
- http://www.exploit-db.com/exploits/12146 - http://www.exploit-db.com/exploits/12146
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8 cvss-score: 6.8
cve-id: CVE-2010-1469 cve-id: CVE-2010-1469
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00813 epss-score: 0.00813
epss-percentile: 0.79885 epss-percentile: 0.81406
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1470 - https://nvd.nist.gov/vuln/detail/CVE-2010-1470
- http://www.exploit-db.com/exploits/12166 - http://www.exploit-db.com/exploits/12166
- http://www.vupen.com/english/advisories/2010/0858 - http://www.vupen.com/english/advisories/2010/0858
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-1470 cve-id: CVE-2010-1470
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.04616 epss-score: 0.04616
epss-percentile: 0.91716 epss-percentile: 0.92373
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1471 cve-id: CVE-2010-1471
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.05684 epss-score: 0.05684
epss-percentile: 0.92598 epss-percentile: 0.93171
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1472 - https://nvd.nist.gov/vuln/detail/CVE-2010-1472
- http://www.exploit-db.com/exploits/12167 - http://www.exploit-db.com/exploits/12167
- http://www.vupen.com/english/advisories/2010/0859 - http://www.vupen.com/english/advisories/2010/0859
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-1472 cve-id: CVE-2010-1472
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.05684 epss-score: 0.05684
epss-percentile: 0.92564 epss-percentile: 0.93171
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1478 cve-id: CVE-2010-1478
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.80104 epss-percentile: 0.81565
cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1491 - https://nvd.nist.gov/vuln/detail/CVE-2010-1491
- http://packetstormsecurity.org/1004-exploits/joomlammsblog-lfi.txt - http://packetstormsecurity.org/1004-exploits/joomlammsblog-lfi.txt
- http://www.exploit-db.com/exploits/12318 - http://www.exploit-db.com/exploits/12318
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1491 cve-id: CVE-2010-1491
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00477 epss-score: 0.00477
epss-percentile: 0.73149 epss-percentile: 0.75244
cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1495 - https://nvd.nist.gov/vuln/detail/CVE-2010-1495
- http://www.vupen.com/english/advisories/2010/0929 - http://www.vupen.com/english/advisories/2010/0929
- http://packetstormsecurity.org/1004-exploits/joomlamatamko-lfi.txt - http://packetstormsecurity.org/1004-exploits/joomlamatamko-lfi.txt
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-1495 cve-id: CVE-2010-1495
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.04503 epss-score: 0.04503
epss-percentile: 0.91627 epss-percentile: 0.92278
cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:* cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -12,13 +12,14 @@ info:
- https://www.exploit-db.com/exploits/12118 - https://www.exploit-db.com/exploits/12118
- https://nvd.nist.gov/vuln/detail/CVE-2010-1532 - https://nvd.nist.gov/vuln/detail/CVE-2010-1532
- http://packetstormsecurity.org/1004-exploits/joomlapowermail-lfi.txt - http://packetstormsecurity.org/1004-exploits/joomlapowermail-lfi.txt
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1532 cve-id: CVE-2010-1532
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00477 epss-score: 0.00477
epss-percentile: 0.73149 epss-percentile: 0.75244
cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:* cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1533 cve-id: CVE-2010-1533
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00706 epss-score: 0.00706
epss-percentile: 0.78314 epss-percentile: 0.79951
cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -11,13 +11,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1534 - https://nvd.nist.gov/vuln/detail/CVE-2010-1534
- http://www.exploit-db.com/exploits/12067 - http://www.exploit-db.com/exploits/12067
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57534 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57534
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1534 cve-id: CVE-2010-1534
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01228 epss-score: 0.01385
epss-percentile: 0.83874 epss-percentile: 0.86058
cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -14,13 +14,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1602 - https://nvd.nist.gov/vuln/detail/CVE-2010-1602
- http://packetstormsecurity.org/1004-exploits/joomlazimbcomment-lfi.txt - http://packetstormsecurity.org/1004-exploits/joomlazimbcomment-lfi.txt
- http://www.vupen.com/english/advisories/2010/0932 - http://www.vupen.com/english/advisories/2010/0932
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-1602 cve-id: CVE-2010-1602
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03451 epss-score: 0.03451
epss-percentile: 0.90542 epss-percentile: 0.91267
cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2010-1603 cve-id: CVE-2010-1603
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03451 epss-score: 0.03451
epss-percentile: 0.90581 epss-percentile: 0.91267
cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:* cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1607 cve-id: CVE-2010-1607
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01726 epss-score: 0.01726
epss-percentile: 0.86557 epss-percentile: 0.87577
cpe: cpe:2.3:a:paysyspro:com_wmi:1.5.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:paysyspro:com_wmi:1.5.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2010-1653 cve-id: CVE-2010-1653
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03527 epss-score: 0.03527
epss-percentile: 0.90668 epss-percentile: 0.91355
cpe: cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:* cpe: cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2010-1657 cve-id: CVE-2010-1657
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01751 epss-score: 0.01751
epss-percentile: 0.86649 epss-percentile: 0.87665
cpe: cpe:2.3:a:recly:com_smartsite:1.0.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:recly:com_smartsite:1.0.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -14,13 +14,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1658 - https://nvd.nist.gov/vuln/detail/CVE-2010-1658
- http://www.vupen.com/english/advisories/2010/1007 - http://www.vupen.com/english/advisories/2010/1007
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58176 - https://exchange.xforce.ibmcloud.com/vulnerabilities/58176
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5 cvss-score: 5
cve-id: CVE-2010-1658 cve-id: CVE-2010-1658
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01751 epss-score: 0.01751
epss-percentile: 0.86604 epss-percentile: 0.87665
cpe: cpe:2.3:a:code-garage:com_noticeboard:1.3:*:*:*:*:*:*:* cpe: cpe:2.3:a:code-garage:com_noticeboard:1.3:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,15 @@ info:
- https://www.exploit-db.com/exploits/12291 - https://www.exploit-db.com/exploits/12291
- https://nvd.nist.gov/vuln/detail/CVE-2010-1717 - https://nvd.nist.gov/vuln/detail/CVE-2010-1717
- http://www.vupen.com/english/advisories/2010/0924 - http://www.vupen.com/english/advisories/2010/0924
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Live-Hack-CVE/CVE-2010-1717
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-1717 cve-id: CVE-2010-1717
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01733 epss-score: 0.01733
epss-percentile: 0.86527 epss-percentile: 0.87598
cpe: cpe:2.3:a:if_surfalert_project:if_surfalert:1.2:*:*:*:*:joomla\!:*:* cpe: cpe:2.3:a:if_surfalert_project:if_surfalert:1.2:*:*:*:*:joomla\!:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1718 cve-id: CVE-2010-1718
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.80104 epss-percentile: 0.81565
cpe: cpe:2.3:a:lispeltuut:com_archeryscores:1.0.6:*:*:*:*:*:*:* cpe: cpe:2.3:a:lispeltuut:com_archeryscores:1.0.6:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2010-1719 cve-id: CVE-2010-1719
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01671 epss-score: 0.01671
epss-percentile: 0.86348 epss-percentile: 0.87378
cpe: cpe:2.3:a:moto-treks:com_mtfireeagle:1.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:moto-treks:com_mtfireeagle:1.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1858 cve-id: CVE-2010-1858
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01155 epss-score: 0.01155
epss-percentile: 0.83338 epss-percentile: 0.84543
cpe: cpe:2.3:a:gelembjuk:com_smestorage:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:gelembjuk:com_smestorage:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -14,13 +14,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1878 - https://nvd.nist.gov/vuln/detail/CVE-2010-1878
- http://packetstormsecurity.org/1004-exploits/joomlaorgchart-lfi.txt - http://packetstormsecurity.org/1004-exploits/joomlaorgchart-lfi.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58031 - https://exchange.xforce.ibmcloud.com/vulnerabilities/58031
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-1878 cve-id: CVE-2010-1878
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.80059 epss-percentile: 0.81565
cpe: cpe:2.3:a:blueflyingfish.no-ip:com_orgchart:1.0.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:blueflyingfish.no-ip:com_orgchart:1.0.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1952 - https://nvd.nist.gov/vuln/detail/CVE-2010-1952
- http://www.exploit-db.com/exploits/12239 - http://www.exploit-db.com/exploits/12239
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57845 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57845
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-1952 cve-id: CVE-2010-1952
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01242 epss-score: 0.01242
epss-percentile: 0.83996 epss-percentile: 0.85196
cpe: cpe:2.3:a:cmstactics:com_beeheard:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:cmstactics:com_beeheard:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1953 - https://nvd.nist.gov/vuln/detail/CVE-2010-1953
- http://www.vupen.com/english/advisories/2010/0927 - http://www.vupen.com/english/advisories/2010/0927
- http://www.exploit-db.com/exploits/12288 - http://www.exploit-db.com/exploits/12288
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-1953 cve-id: CVE-2010-1953
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.05684 epss-score: 0.05684
epss-percentile: 0.92564 epss-percentile: 0.93171
cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_multimap:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_multimap:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1957 - https://nvd.nist.gov/vuln/detail/CVE-2010-1957
- http://packetstormsecurity.org/1004-exploits/joomlalovefactory-lfi.txt - http://packetstormsecurity.org/1004-exploits/joomlalovefactory-lfi.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57849 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57849
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-1957 cve-id: CVE-2010-1957
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01671 epss-score: 0.01671
epss-percentile: 0.86287 epss-percentile: 0.87378
cpe: cpe:2.3:a:thefactory:com_lovefactory:1.3.4:*:*:*:*:*:*:* cpe: cpe:2.3:a:thefactory:com_lovefactory:1.3.4:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1979 cve-id: CVE-2010-1979
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.80104 epss-percentile: 0.81565
cpe: cpe:2.3:a:affiliatefeeds:com_datafeeds:build_880:*:*:*:*:*:*:* cpe: cpe:2.3:a:affiliatefeeds:com_datafeeds:build_880:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1983 cve-id: CVE-2010-1983
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01815 epss-score: 0.01815
epss-percentile: 0.86892 epss-percentile: 0.87898
cpe: cpe:2.3:a:redcomponent:com_redtwitter:1.0b8:*:*:*:*:*:*:* cpe: cpe:2.3:a:redcomponent:com_redtwitter:1.0b8:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -11,15 +11,15 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/34006 - https://www.exploit-db.com/exploits/34006
- https://nvd.nist.gov/vuln/detail/CVE-2010-2035 - https://nvd.nist.gov/vuln/detail/CVE-2010-2035
- http://web.archive.org/web/20210615115919/https://www.securityfocus.com/bid/40244
- http://packetstormsecurity.org/1005-exploits/joomlaperchagl-lfi.txt - http://packetstormsecurity.org/1005-exploits/joomlaperchagl-lfi.txt
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2010-2035 cve-id: CVE-2010-2035
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00718 epss-score: 0.07071
epss-percentile: 0.78453 epss-percentile: 0.93832
cpe: cpe:2.3:a:percha:com_perchagallery:1.6:beta:*:*:*:*:*:* cpe: cpe:2.3:a:percha:com_perchagallery:1.6:beta:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-2122 cve-id: CVE-2010-2122
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01806 epss-score: 0.01806
epss-percentile: 0.86853 epss-percentile: 0.87868
cpe: cpe:2.3:a:joelrowley:com_simpledownload:0.9.5:*:*:*:*:*:*:* cpe: cpe:2.3:a:joelrowley:com_simpledownload:0.9.5:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-2307 cve-id: CVE-2010-2307
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00813 epss-score: 0.00813
epss-percentile: 0.79936 epss-percentile: 0.81409
cpe: cpe:2.3:h:motorola:surfboard_sbv6120e:sbv6x2x-1.0.0.5-scm-02-shpc:*:*:*:*:*:*:* cpe: cpe:2.3:h:motorola:surfboard_sbv6120e:sbv6x2x-1.0.0.5-scm-02-shpc:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-2507 cve-id: CVE-2010-2507
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01671 epss-score: 0.01671
epss-percentile: 0.86348 epss-percentile: 0.87378
cpe: cpe:2.3:a:masselink:com_picasa2gallery:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:masselink:com_picasa2gallery:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-2682 cve-id: CVE-2010-2682
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.80104 epss-percentile: 0.81565
cpe: cpe:2.3:a:realtyna:com_realtyna:1.0.15:*:*:*:*:*:*:* cpe: cpe:2.3:a:realtyna:com_realtyna:1.0.15:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -13,13 +13,14 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-2857 - https://nvd.nist.gov/vuln/detail/CVE-2010-2857
- http://www.exploit-db.com/exploits/14274 - http://www.exploit-db.com/exploits/14274
- https://exchange.xforce.ibmcloud.com/vulnerabilities/60195 - https://exchange.xforce.ibmcloud.com/vulnerabilities/60195
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8 cvss-score: 6.8
cve-id: CVE-2010-2857 cve-id: CVE-2010-2857
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.80059 epss-percentile: 0.81565
cpe: cpe:2.3:a:danieljamesscott:com_music:0.1:-:*:*:*:*:*:* cpe: cpe:2.3:a:danieljamesscott:com_music:0.1:-:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-2861 cve-id: CVE-2010-2861
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.97078 epss-score: 0.97078
epss-percentile: 0.99727 epss-percentile: 0.99753
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-2918 cve-id: CVE-2010-2918
cwe-id: CWE-94 cwe-id: CWE-94
epss-score: 0.02847 epss-score: 0.02847
epss-percentile: 0.89708 epss-percentile: 0.90478
cpe: cpe:2.3:a:visocrea:com_joomla_visites:1.1:rc2:*:*:*:*:*:* cpe: cpe:2.3:a:visocrea:com_joomla_visites:1.1:rc2:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-3426 cve-id: CVE-2010-3426
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00826 epss-score: 0.00826
epss-percentile: 0.80104 epss-percentile: 0.81565
cpe: cpe:2.3:a:4you-studio:com_jphone:1.0:alpha3:*:*:*:*:*:* cpe: cpe:2.3:a:4you-studio:com_jphone:1.0:alpha3:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-4231 cve-id: CVE-2010-4231
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01615 epss-score: 0.01615
epss-percentile: 0.86142 epss-percentile: 0.87178
cpe: cpe:2.3:a:camtron:cmnc-200_firmware:1.102a-008:*:*:*:*:*:*:* cpe: cpe:2.3:a:camtron:cmnc-200_firmware:1.102a-008:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,8 +20,8 @@ info:
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2010-4239 cve-id: CVE-2010-4239
cwe-id: CWE-20 cwe-id: CWE-20
epss-score: 0.04033 epss-score: 0.03038
epss-percentile: 0.9122 epss-percentile: 0.90751
cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.2:*:*:*:*:*:*:* cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.2:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-4719 cve-id: CVE-2010-4719
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.04503 epss-score: 0.04503
epss-percentile: 0.91627 epss-percentile: 0.92278
cpe: cpe:2.3:a:fxwebdesign:com_jradio:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:fxwebdesign:com_jradio:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-4977 cve-id: CVE-2010-4977
cwe-id: CWE-89 cwe-id: CWE-89
epss-score: 0.0016 epss-score: 0.0016
epss-percentile: 0.52502 epss-percentile: 0.51628
cpe: cpe:2.3:a:miniwork:com_canteen:1.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:miniwork:com_canteen:1.0:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2010-5278 cve-id: CVE-2010-5278
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.06122 epss-score: 0.06122
epss-percentile: 0.92816 epss-percentile: 0.93381
cpe: cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -12,13 +12,14 @@ info:
- https://www.exploit-db.com/exploits/34837 - https://www.exploit-db.com/exploits/34837
- https://nvd.nist.gov/vuln/detail/CVE-2010-5286 - https://nvd.nist.gov/vuln/detail/CVE-2010-5286
- http://packetstormsecurity.org/1010-exploits/joomlajstore-lfi.txt - http://packetstormsecurity.org/1010-exploits/joomlajstore-lfi.txt
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
cvss-score: 10 cvss-score: 10
cve-id: CVE-2010-5286 cve-id: CVE-2010-5286
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03802 epss-score: 0.07071
epss-percentile: 0.90974 epss-percentile: 0.93832
cpe: cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:* cpe: cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2011-2744 cve-id: CVE-2011-2744
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.01541 epss-score: 0.01541
epss-percentile: 0.85787 epss-percentile: 0.86842
cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2011-2780 cve-id: CVE-2011-2780
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.03327 epss-score: 0.03327
epss-percentile: 0.90416 epss-percentile: 0.91127
cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

View File

@ -12,13 +12,14 @@ info:
- https://www.exploit-db.com/exploits/36256 - https://www.exploit-db.com/exploits/36256
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm
- https://github.com/ARPSyndicate/kenzer-templates
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:N/A:N cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:N/A:N
cvss-score: 7.8 cvss-score: 7.8
cve-id: CVE-2011-3315 cve-id: CVE-2011-3315
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.86205 epss-score: 0.72021
epss-percentile: 0.98314 epss-percentile: 0.97988
cpe: cpe:2.3:h:cisco:unified_ip_interactive_voice_response:-:*:*:*:*:*:*:* cpe: cpe:2.3:h:cisco:unified_ip_interactive_voice_response:-:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1

Some files were not shown because too many files have changed in this diff Show More