Merge branch 'projectdiscovery:main' into main

patch-1
Rahul Maini 2023-10-26 21:28:03 +04:00 committed by GitHub
commit ef437b54ac
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2145 changed files with 6609 additions and 6306 deletions

View File

@ -26,14 +26,20 @@ http/cves/2017/CVE-2017-18562.yaml
http/cves/2017/CVE-2017-18564.yaml
http/cves/2017/CVE-2017-18565.yaml
http/cves/2017/CVE-2017-18566.yaml
http/cves/2023/CVE-2023-4582.yaml
http/cves/2023/CVE-2023-45852.yaml
http/cves/2023/CVE-2023-4966.yaml
http/exposed-panels/chronos-panel.yaml
http/exposed-panels/opentouch-multimediaservices-panel.yaml
http/exposed-panels/rcdevs-webadm-panel.yaml
http/exposed-panels/regify-panel.yaml
http/exposed-panels/solarwinds-arm-panel.yaml
http/exposed-panels/vinchin-panel.yaml
http/exposed-panels/webtitan-cloud-panel.yaml
http/misconfiguration/tiny-file-manager-unauth.yaml
http/misconfiguration/unauth-opache-control-panel.yaml
http/technologies/atlassian-connect-descriptor.yaml
http/technologies/orbit-telephone-detect.yaml
http/token-spray/api-onyphe.yaml
http/vulnerabilities/cisco/cisco-broadworks-log4j-rce.yaml
http/vulnerabilities/cisco/cisco-webex-log4j-rce.yaml
http/vulnerabilities/other/citrix-xenapp-log4j-rce.yaml

View File

@ -414,35 +414,35 @@
{"ID":"CVE-2017-17731","Info":{"Name":"DedeCMS 5.7 - SQL Injection","Severity":"critical","Description":"DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2017/CVE-2017-17731.yaml"}
{"ID":"CVE-2017-17736","Info":{"Name":"Kentico - Installer Privilege Escalation","Severity":"critical","Description":"Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 are susceptible to a privilege escalation attack. An attacker can obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2017/CVE-2017-17736.yaml"}
{"ID":"CVE-2017-18024","Info":{"Name":"AvantFAX 3.3.3 - Cross-Site Scripting","Severity":"medium","Description":"AvantFAX 3.3.3 contains a cross-site scripting vulnerability via an arbitrary parameter name submitted to the default URL, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1.","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18024.yaml"}
{"ID":"CVE-2017-18487","Info":{"Name":"AdPush \u003c 1.44 - Cross-Site Scripting","Severity":"medium","Description":"The adsense-plugin (aka Google AdSense) plugin before 1.44 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18487.yaml"}
{"ID":"CVE-2017-18490","Info":{"Name":"Contact Form Multi by BestWebSoft \u003c 1.2.1 - Cross-Site Scripting","Severity":"medium","Description":"The contact-form-multi plugin before 1.2.1 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18490.yaml"}
{"ID":"CVE-2017-18491","Info":{"Name":"Contact Form by BestWebSoft \u003c 4.0.6 - Cross-Site Scripting","Severity":"medium","Description":"The contact-form-plugin plugin before 4.0.6 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18491.yaml"}
{"ID":"CVE-2017-18492","Info":{"Name":"Contact Form to DB by BestWebSoft \u003c 1.5.7 - Cross-Site Scripting","Severity":"medium","Description":"The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18492.yaml"}
{"ID":"CVE-2017-18493","Info":{"Name":"Custom Admin Page by BestWebSoft \u003c 0.1.2 - Cross-Site Scripting","Severity":"medium","Description":"The custom-admin-page plugin before 0.1.2 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18493.yaml"}
{"ID":"CVE-2017-18494","Info":{"Name":"Custom Search by BestWebSoft \u003c 1.36 - Cross-Site Scripting","Severity":"medium","Description":"The custom-search-plugin plugin before 1.36 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18494.yaml"}
{"ID":"CVE-2017-18496","Info":{"Name":"Htaccess by BestWebSoft \u003c 1.7.6 - Cross-Site Scripting","Severity":"medium","Description":"The htaccess plugin before 1.7.6 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18496.yaml"}
{"ID":"CVE-2017-18500","Info":{"Name":"Social Buttons Pack by BestWebSof \u003c 1.1.1 - Cross-Site Scripting","Severity":"medium","Description":"The social-buttons-pack plugin before 1.1.1 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18500.yaml"}
{"ID":"CVE-2017-18501","Info":{"Name":"Social Login by BestWebSoft \u003c 0.2 - Cross-Site Scripting","Severity":"medium","Description":"The social-login-bws plugin before 0.2 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18501.yaml"}
{"ID":"CVE-2017-18502","Info":{"Name":"Subscriber by BestWebSoft \u003c 1.3.5 - Cross-Site Scripting","Severity":"medium","Description":"The subscriber plugin before 1.3.5 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18502.yaml"}
{"ID":"CVE-2017-18505","Info":{"Name":"BestWebSoft's Twitter \u003c 2.55 - Cross-Site Scripting","Severity":"medium","Description":"The twitter-plugin plugin before 2.55 for WordPress has XSS.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18505.yaml"}
{"ID":"CVE-2017-18516","Info":{"Name":"LinkedIn by BestWebSoft \u003c 1.0.5 - Cross-Site Scripting","Severity":"medium","Description":"The bws-linkedin plugin before 1.0.5 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18516.yaml"}
{"ID":"CVE-2017-18517","Info":{"Name":"Pinterest by BestWebSoft \u003c 1.0.5 - Cross-Site Scripting","Severity":"medium","Description":"The bws-pinterest plugin before 1.0.5 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18517.yaml"}
{"ID":"CVE-2017-18518","Info":{"Name":"SMTP by BestWebSoft \u003c 1.1.0 - Cross-Site Scripting","Severity":"medium","Description":"The bws-smtp plugin before 1.1.0 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18518.yaml"}
{"ID":"CVE-2017-18527","Info":{"Name":"Pagination by BestWebSoft \u003c 1.0.7 - Cross-Site Scripting","Severity":"medium","Description":"The pagination plugin before 1.0.7 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18527.yaml"}
{"ID":"CVE-2017-18528","Info":{"Name":"PDF \u0026 Print by BestWebSoft \u003c 1.9.4 - Cross-Site Scripting","Severity":"medium","Description":"The pdf-print plugin before 1.9.4 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18528.yaml"}
{"ID":"CVE-2017-18529","Info":{"Name":"PromoBar by BestWebSoft \u003c 1.1.1 - Cross-Site Scripting","Severity":"medium","Description":"The promobar plugin before 1.1.1 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18529.yaml"}
{"ID":"CVE-2017-18530","Info":{"Name":"Rating by BestWebSoft \u003c 0.2 - Cross-Site Scripting","Severity":"medium","Description":"The rating-bws plugin before 0.2 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18530.yaml"}
{"ID":"CVE-2017-18532","Info":{"Name":"Realty by BestWebSoft \u003c 1.1.0 - Cross-Site Scripting","Severity":"medium","Description":"The realty plugin before 1.1.0 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18532.yaml"}
{"ID":"CVE-2017-18487","Info":{"Name":"AdPush \u003c 1.44 - Cross-Site Scripting","Severity":"medium","Description":"The adsense-plugin (aka Google AdSense) plugin before 1.44 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18487.yaml"}
{"ID":"CVE-2017-18490","Info":{"Name":"Contact Form Multi by BestWebSoft \u003c 1.2.1 - Cross-Site Scripting","Severity":"medium","Description":"The contact-form-multi plugin before 1.2.1 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18490.yaml"}
{"ID":"CVE-2017-18491","Info":{"Name":"Contact Form by BestWebSoft \u003c 4.0.6 - Cross-Site Scripting","Severity":"medium","Description":"The contact-form-plugin plugin before 4.0.6 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18491.yaml"}
{"ID":"CVE-2017-18492","Info":{"Name":"Contact Form to DB by BestWebSoft \u003c 1.5.7 - Cross-Site Scripting","Severity":"medium","Description":"The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18492.yaml"}
{"ID":"CVE-2017-18493","Info":{"Name":"Custom Admin Page by BestWebSoft \u003c 0.1.2 - Cross-Site Scripting","Severity":"medium","Description":"The custom-admin-page plugin before 0.1.2 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18493.yaml"}
{"ID":"CVE-2017-18494","Info":{"Name":"Custom Search by BestWebSoft \u003c 1.36 - Cross-Site Scripting","Severity":"medium","Description":"The custom-search-plugin plugin before 1.36 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18494.yaml"}
{"ID":"CVE-2017-18496","Info":{"Name":"Htaccess by BestWebSoft \u003c 1.7.6 - Cross-Site Scripting","Severity":"medium","Description":"The htaccess plugin before 1.7.6 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18496.yaml"}
{"ID":"CVE-2017-18500","Info":{"Name":"Social Buttons Pack by BestWebSof \u003c 1.1.1 - Cross-Site Scripting","Severity":"medium","Description":"The social-buttons-pack plugin before 1.1.1 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18500.yaml"}
{"ID":"CVE-2017-18501","Info":{"Name":"Social Login by BestWebSoft \u003c 0.2 - Cross-Site Scripting","Severity":"medium","Description":"The social-login-bws plugin before 0.2 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18501.yaml"}
{"ID":"CVE-2017-18502","Info":{"Name":"Subscriber by BestWebSoft \u003c 1.3.5 - Cross-Site Scripting","Severity":"medium","Description":"The subscriber plugin before 1.3.5 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18502.yaml"}
{"ID":"CVE-2017-18505","Info":{"Name":"BestWebSoft's Twitter \u003c 2.55 - Cross-Site Scripting","Severity":"medium","Description":"The twitter-plugin plugin before 2.55 for WordPress has XSS.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18505.yaml"}
{"ID":"CVE-2017-18516","Info":{"Name":"LinkedIn by BestWebSoft \u003c 1.0.5 - Cross-Site Scripting","Severity":"medium","Description":"The bws-linkedin plugin before 1.0.5 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18516.yaml"}
{"ID":"CVE-2017-18517","Info":{"Name":"Pinterest by BestWebSoft \u003c 1.0.5 - Cross-Site Scripting","Severity":"medium","Description":"The bws-pinterest plugin before 1.0.5 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18517.yaml"}
{"ID":"CVE-2017-18518","Info":{"Name":"SMTP by BestWebSoft \u003c 1.1.0 - Cross-Site Scripting","Severity":"medium","Description":"The bws-smtp plugin before 1.1.0 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18518.yaml"}
{"ID":"CVE-2017-18527","Info":{"Name":"Pagination by BestWebSoft \u003c 1.0.7 - Cross-Site Scripting","Severity":"medium","Description":"The pagination plugin before 1.0.7 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18527.yaml"}
{"ID":"CVE-2017-18528","Info":{"Name":"PDF \u0026 Print by BestWebSoft \u003c 1.9.4 - Cross-Site Scripting","Severity":"medium","Description":"The pdf-print plugin before 1.9.4 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18528.yaml"}
{"ID":"CVE-2017-18529","Info":{"Name":"PromoBar by BestWebSoft \u003c 1.1.1 - Cross-Site Scripting","Severity":"medium","Description":"The promobar plugin before 1.1.1 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18529.yaml"}
{"ID":"CVE-2017-18530","Info":{"Name":"Rating by BestWebSoft \u003c 0.2 - Cross-Site Scripting","Severity":"medium","Description":"The rating-bws plugin before 0.2 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18530.yaml"}
{"ID":"CVE-2017-18532","Info":{"Name":"Realty by BestWebSoft \u003c 1.1.0 - Cross-Site Scripting","Severity":"medium","Description":"The realty plugin before 1.1.0 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18532.yaml"}
{"ID":"CVE-2017-18536","Info":{"Name":"WordPress Stop User Enumeration \u003c=1.3.7 - Cross-Site Scripting","Severity":"medium","Description":"WordPress Stop User Enumeration 1.3.7 and earlier are vulnerable to unauthenticated reflected cross-site scripting.","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18536.yaml"}
{"ID":"CVE-2017-18537","Info":{"Name":"Visitors Online by BestWebSoft \u003c 1.0.0 - Cross-Site Scripting","Severity":"medium","Description":"The visitors-online plugin before 1.0.0 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18537.yaml"}
{"ID":"CVE-2017-18542","Info":{"Name":"Zendesk Help Center by BestWebSoft \u003c 1.0.5 - Cross-Site Scripting","Severity":"medium","Description":"The zendesk-help-center plugin before 1.0.5 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18542.yaml"}
{"ID":"CVE-2017-18556","Info":{"Name":"Google Analytics by BestWebSoft \u003c 1.7.1 - Cross-Site Scripting","Severity":"medium","Description":"The bws-google-analytics plugin before 1.7.1 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18556.yaml"}
{"ID":"CVE-2017-18557","Info":{"Name":"Google Maps by BestWebSoft \u003c 1.3.6 - Cross-Site Scripting","Severity":"medium","Description":"The bws-google-maps plugin before 1.3.6 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18557.yaml"}
{"ID":"CVE-2017-18558","Info":{"Name":"Testimonials by BestWebSoft \u003c 0.1.9 - Cross-Site Scripting","Severity":"medium","Description":"The bws-testimonials plugin before 0.1.9 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18558.yaml"}
{"ID":"CVE-2017-18562","Info":{"Name":"Error Log Viewer by BestWebSoft \u003c 1.0.6 - Cross-Site Scripting","Severity":"medium","Description":"The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18562.yaml"}
{"ID":"CVE-2017-18564","Info":{"Name":"Sender by BestWebSoft \u003c 1.2.1 - Cross-Site Scripting","Severity":"medium","Description":"The sender plugin before 1.2.1 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18564.yaml"}
{"ID":"CVE-2017-18565","Info":{"Name":"Updater by BestWebSoft \u003c 1.35 - Cross-Site Scripting","Severity":"medium","Description":"The updater plugin before 1.35 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18565.yaml"}
{"ID":"CVE-2017-18566","Info":{"Name":"User Role by BestWebSoft \u003c 1.5.6 - Cross-Site Scripting","Severity":"medium","Description":"The user-role plugin before 1.5.6 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2017/CVE-2017-18566.yaml"}
{"ID":"CVE-2017-18537","Info":{"Name":"Visitors Online by BestWebSoft \u003c 1.0.0 - Cross-Site Scripting","Severity":"medium","Description":"The visitors-online plugin before 1.0.0 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18537.yaml"}
{"ID":"CVE-2017-18542","Info":{"Name":"Zendesk Help Center by BestWebSoft \u003c 1.0.5 - Cross-Site Scripting","Severity":"medium","Description":"The zendesk-help-center plugin before 1.0.5 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18542.yaml"}
{"ID":"CVE-2017-18556","Info":{"Name":"Google Analytics by BestWebSoft \u003c 1.7.1 - Cross-Site Scripting","Severity":"medium","Description":"The bws-google-analytics plugin before 1.7.1 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18556.yaml"}
{"ID":"CVE-2017-18557","Info":{"Name":"Google Maps by BestWebSoft \u003c 1.3.6 - Cross-Site Scripting","Severity":"medium","Description":"The bws-google-maps plugin before 1.3.6 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18557.yaml"}
{"ID":"CVE-2017-18558","Info":{"Name":"Testimonials by BestWebSoft \u003c 0.1.9 - Cross-Site Scripting","Severity":"medium","Description":"The bws-testimonials plugin before 0.1.9 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18558.yaml"}
{"ID":"CVE-2017-18562","Info":{"Name":"Error Log Viewer by BestWebSoft \u003c 1.0.6 - Cross-Site Scripting","Severity":"medium","Description":"The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18562.yaml"}
{"ID":"CVE-2017-18564","Info":{"Name":"Sender by BestWebSoft \u003c 1.2.1 - Cross-Site Scripting","Severity":"medium","Description":"The sender plugin before 1.2.1 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18564.yaml"}
{"ID":"CVE-2017-18565","Info":{"Name":"Updater by BestWebSoft \u003c 1.35 - Cross-Site Scripting","Severity":"medium","Description":"The updater plugin before 1.35 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18565.yaml"}
{"ID":"CVE-2017-18566","Info":{"Name":"User Role by BestWebSoft \u003c 1.5.6 - Cross-Site Scripting","Severity":"medium","Description":"The user-role plugin before 1.5.6 for WordPress has multiple XSS issues.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18566.yaml"}
{"ID":"CVE-2017-18598","Info":{"Name":"WordPress Qards - Cross-Site Scripting","Severity":"medium","Description":"WordPress Qards through 2017-10-11 contains a cross-site scripting vulnerability via a remote document specified in the URL parameter to html2canvasproxy.php.","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2017/CVE-2017-18598.yaml"}
{"ID":"CVE-2017-18638","Info":{"Name":"Graphite \u003c=1.1.5 - Server-Side Request Forgery","Severity":"high","Description":"Graphite's send_email in graphite-web/webapp/graphite/composer/views.py in versions up to 1.1.5 is vulnerable to server-side request forgery (SSR)F. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an email address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2017/CVE-2017-18638.yaml"}
{"ID":"CVE-2017-3506","Info":{"Name":"Oracle Fusion Middleware Weblogic Server - Remote OS Command Execution","Severity":"high","Description":"The Oracle WebLogic Server component of Oracle Fusion Middleware (Web Services) versions 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1 and 12.2.1.2 is susceptible to a difficult to exploit vulnerability that could allow unauthenticated attackers with network access via HTTP to compromise Oracle WebLogic Server.","Classification":{"CVSSScore":"7.4"}},"file_path":"http/cves/2017/CVE-2017-3506.yaml"}
@ -2175,10 +2175,10 @@
{"ID":"CVE-2023-4451","Info":{"Name":"Cockpit - Cross-Site Scripting","Severity":"medium","Description":"Cross-site Scripting (XSS) - Reflected in GitHub repository cockpit-hq/cockpit prior to 2.6.4.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4451.yaml"}
{"ID":"CVE-2023-4547","Info":{"Name":"SPA-Cart eCommerce CMS 1.9.0.3 - Cross-Site Scripting","Severity":"medium","Description":"A vulnerability was found in SPA-Cart eCommerce CMS 1.9.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /search. The manipulation of the argument filter[brandid]/filter[price] leads to cross site scripting. The attack may be launched remotely. VDB-238058 is the identifier assigned to this vulnerability.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4547.yaml"}
{"ID":"CVE-2023-4568","Info":{"Name":"PaperCut NG Unauthenticated XMLRPC Functionality","Severity":"medium","Description":"PaperCut NG allows for unauthenticated XMLRPC commands to be run by default. Versions 22.0.12 and below are confirmed to be affected, but later versions may also be affected due to lack of a vendor supplied patch.\n","Classification":{"CVSSScore":"6.5"}},"file_path":"http/cves/2023/CVE-2023-4568.yaml"}
{"ID":"CVE-2023-45852","Info":{"Name":"Viessmann Vitogate 300 - Remote Code Execution","Severity":"critical","Description":"In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-4582.yaml"}
{"ID":"CVE-2023-45852","Info":{"Name":"Viessmann Vitogate 300 - Remote Code Execution","Severity":"critical","Description":"In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-45852.yaml"}
{"ID":"CVE-2023-4634","Info":{"Name":"Media Library Assistant \u003c 3.09 - Remote Code Execution/Local File Inclusion","Severity":"critical","Description":"A vulnerability in the Wordpress Media-Library-Assistant plugins in version \u003c 3.09 is vulnerable to a local file inclusion which leading to RCE on default Imagegick installation/configuration.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-4634.yaml"}
{"ID":"CVE-2023-4714","Info":{"Name":"PlayTube 3.0.1 - Information Disclosure","Severity":"high","Description":"A vulnerability was found in PlayTube 3.0.1 and classified as problematic. This issue affects some unknown processing of the component Redirect Handler. The manipulation leads to information disclosure. The attack may be initiated remotely.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-4714.yaml"}
{"ID":"CVE-2023-4966","Info":{"Name":"Citrix Bleed - Leaking Session Tokens","Severity":"critical","Description":"Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA ?virtual?server.\n","Classification":{"CVSSScore":"9.4"}},"file_path":"http/cves/2023/CVE-2023-4966.yaml"}
{"ID":"CVE-2023-4966","Info":{"Name":"Citrix Bleed - Leaking Session Tokens","Severity":"high","Description":"Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA ?virtual?server.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-4966.yaml"}
{"ID":"CVE-2023-4974","Info":{"Name":"Academy LMS 6.2 - SQL Injection","Severity":"critical","Description":"A vulnerability was found in Academy LMS 6.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument price_min/price_max leads to sql injection. The attack may be launched remotely. VDB-239750 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-4974.yaml"}
{"ID":"CVE-2023-5074","Info":{"Name":"D-Link D-View 8 v2.0.1.28 - Authentication Bypass","Severity":"critical","Description":"Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-5074.yaml"}
{"ID":"CVE-2023-5244","Info":{"Name":"Microweber \u003c V.2.0 - Cross-Site Scripting","Severity":"medium","Description":"Reflected Cross-Site Scripting Vulnerability in types GET parameter on the /editor_tools/rte_image_editor endpoint.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-5244.yaml"}

View File

@ -1 +1 @@
319d0b18d478ad849a465a142f1862ec
24890c9d2be1afe9eeb58e1894081cd1

View File

@ -19,7 +19,7 @@ dns:
matchers:
- type: regex
regex:
- "IN\tCAA\\t(.+)$"
- "IN\\s+CAA\\s+(.+)"
extractors:
- type: regex
@ -28,5 +28,4 @@ dns:
- 'issue "(.*)"'
- 'issuewild "(.*)"'
- 'iodef "(.*)"'
# digest: 4a0a00473045022100ffd3189ffd53732db9f0027f4d2435adad24715cec685d4ece25c2eef614809a0220411506102311eeab96fe021444ea53d9cf2fd324049c678b4add33b6a1e457b0:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022023198a26073ed129fe588c545c89a003975219e7da0033744c267d99093324370221008a42dc42e882b45ff2f7ef81ffd916e41dab50a710deb2d0c7268bf9dec11e8f:922c64590222798bb761d5b6d8e72950

View File

@ -1 +1 @@
6.2.1
6.2.2

View File

@ -1 +1 @@
5.8.1
5.8.2

View File

@ -1 +1 @@
3.16.6
3.17.1

View File

@ -1 +1 @@
6.5.2
6.5.3

View File

@ -1 +1 @@
16.8.1
16.9.0

View File

@ -1 +1 @@
5.7
5.7.0.1

View File

@ -1 +1 @@
4.32.0
4.34.0

View File

@ -1 +1 @@
3.5.1
3.5.2

View File

@ -1 +1 @@
4.10.11
4.10.12

View File

@ -1 +1 @@
2.26.1
2.26.2

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2000-0114
cwe-id: NVD-CWE-Other
epss-score: 0.09258
epss-percentile: 0.9399
epss-percentile: 0.93993
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a0047304502201f63ac397a1e71eded581e99645541bae20b26cd9b0a52650dad53dbf303b381022100f26b41fb467bd1d8713ed8e680d5f648d1a962fd2a591417003bb7dd0bcbd238:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220635377d9db662e3b8caf20672369433508857de5db0a0309779213708d05deeb022100900ec2e5ad19f0665d9c791f7f8d1face74be920a29e460ae0d7c9948e991e6f:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2001-0537
cwe-id: CWE-287
epss-score: 0.88063
epss-percentile: 0.98317
epss-percentile: 0.9832
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
metadata:
verified: true
@ -48,4 +48,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100f3f98cc6805a18012729cb8c709805ded7c032a89f6ef8182b54f53d6c0c6308022100cd628c4d587a76aee21534145e5981cd06462589f0b28c1994a22f16731f82eb:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220778fc99d4dcd411bd95422ee0e6aa84a66da74dbe4d20a39f9c65404f6ca9c8202202cf11af1ad5576d39db7895def6fc4aaff914bca5137ef0d1fa49ff0dbcf5360:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2002-1131
cwe-id: CWE-80
epss-score: 0.06018
epss-percentile: 0.92643
epss-percentile: 0.92644
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
metadata:
max-request: 5
@ -54,4 +54,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100f9f1e2735ff529fa4e1b8bccbe0be775e30c11e2617bf0413b0aa6ad2be6f679022100ad83000fcb18197d54cf5bb4769f1c32bab7c30bd75a635adc058dbb1a34e2f3:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220723248c4a3df6d33d7731e6d5834b0205d8c110458cf79133bb20a55834b9801022100ad426296578c034b0a1e31ffb491d8255c374b7615f39f3e8c16ea718d1a865c:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2004-0519
cwe-id: NVD-CWE-Other
epss-score: 0.02285
epss-percentile: 0.88413
epss-percentile: 0.88417
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -47,4 +47,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100e48f2a3ab93123fd9c4c24145ee7571daa829660f6948fbbd5257aa764297464022018bedd4c2b86942d1420c78dfd506e956dd4118296e919e0cc494e66a05177d0:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100fc144f080dc8d415742a469bf8ef35e188bdec499de3cef7500a724d9c776a050220736296e3c5a94b3aecae9f4360ab4199c39fe8effeb21d8a410b5485d9091843:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2004-1965
cwe-id: NVD-CWE-Other
epss-score: 0.0113
epss-percentile: 0.83061
epss-percentile: 0.83072
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,4 +38,4 @@ http:
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
# digest: 490a0046304402205045e0e81c10b4b918188ae8aaae7b1af6b28b29deaf33f473aa615b91dded62022037b6ef07e93976af77a078837b582bc2a1d4d973e8fec0e6c0c3e0189836e394:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022067f56f32ad423c674650c9b6f7780231b63f5c929da5dd68be549cf897eeea450220435727e99d87120db48f6efb4fbbd9f4d267d866f470da400511449c88ca296f:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2005-2428
cwe-id: CWE-200
epss-score: 0.01188
epss-percentile: 0.83555
epss-percentile: 0.83563
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -43,4 +43,4 @@ http:
status:
- 200
# digest: 4a0a004730450221008ddb9c2ed32660d2e1b7b58036be02f2667176507014d85385d4341a55d12fbb02206a537ed56ed3134a7cf502f21a96fafb046f9845c50b878a94c58b6715b8dfea:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402204bfa833710e9a61b61820da0b1544007ce76f6c0c22ed61bb4d7ce51ff182b4a02203a17ab4a4cf5b2f555c59ee8e362f05ae9496ac1403cbd8fd971b0abf9c388d4:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2005-3344
cwe-id: NVD-CWE-Other
epss-score: 0.02158
epss-percentile: 0.88068
epss-percentile: 0.88073
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
metadata:
max-request: 2
@ -46,4 +46,4 @@ http:
status:
- 200
# digest: 4b0a004830460221009e0fff91a77e6df368096e47df58fb29c964f6ca33cb7a72550dd1c61ea68c7f022100aa534adf41734ec9a8f377c5f93de8c77a3cb5b8cf066d7f72c0f61918410f28:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100ece6424dbff270751851bb2515a6fccdf736ac8dc91e1b5be05e0086239fe30502205787832da44c3d002570eb8ef9ccb19a00ccff847a51705ad47162ede051f992:922c64590222798bb761d5b6d8e72950

View File

@ -21,7 +21,7 @@ info:
cve-id: CVE-2005-3634
cwe-id: NVD-CWE-Other
epss-score: 0.02843
epss-percentile: 0.89536
epss-percentile: 0.89538
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
# digest: 4b0a00483046022100d46d3b4e609c7eb510a4c89c281fed2885324ddbddd6b2e4265aba2fbd619049022100879e8ff60380458b0df146532c375b6ee62314a2cf9075806096d69b8b97b2bf:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402201b60d3f5a36e5de8b65f369538d16ca50757cd9bd89740aafa888f7d9e43db4b022030435b90324f5a56e5cfa1727252fe4ab4e3eb54d889ed53e03eb0397297aaa3:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2005-4385
cwe-id: NVD-CWE-Other
epss-score: 0.00294
epss-percentile: 0.65725
epss-percentile: 0.65741
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 490a004630440220028832cf4d6c873776cdfccbba4badc08acdc40008f2da7998d14528cceabd8802200796e5b86f9abddf960a3c938b518cdc9c7be4365e7b046a40fab751a112446b:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022001fb855e726e8115586bd11d094f942474f5feaa5decffc90f473f3a0836d4c5022100b5ed8160caf484d16b00120b0fa09252060dd4419a41221ed0437203584a6b70:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2006-1681
cwe-id: NVD-CWE-Other
epss-score: 0.01015
epss-percentile: 0.82067
epss-percentile: 0.82076
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -46,4 +46,4 @@ http:
status:
- 200
# digest: 4a0a0047304502203857826fc2c11e7d7a6fd5d922540a3340f1a537502ed9bb9719e85d214490da022100b269c754ec288a1254698045fc368f261ecd8e8c493fa06e3d67a26f7d81f6d1:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220052e637e67503ceb868b0d3bd95e9f8ebf125edabaaf2226b798be4164e25635022100f27514ec54f494d35629127e6018ac62a7893bfba7b0751bc635c66d2a463fdb:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2006-2842
cwe-id: CWE-22
epss-score: 0.2925
epss-percentile: 0.96352
epss-percentile: 0.96354
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -42,4 +42,4 @@ http:
status:
- 200
# digest: 4a0a00473045022001e89f7cc7dd32b63ee47ec2760bcaa05f299c9707501c2de6a880e1498e538c022100c9a98cd8eafde8774129532d9abe8e789db6b296111d35039abd5be3faffab9b:922c64590222798bb761d5b6d8e72950
# digest: 4b0a0048304602210098bb9f9c0b4fdc948f1440ee75cda9b2dbe221064f2085587ab889ceeeec88610221009569e8d484b88879a4d5a6d82c2808ddf6d82960dc74be631ac42a42ab3fbd60:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2007-0885
cwe-id: NVD-CWE-Other
epss-score: 0.0059
epss-percentile: 0.75817
epss-percentile: 0.7583
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -44,4 +44,4 @@ http:
status:
- 200
# digest: 490a004630440220538068b7ea5813a76ce99ece120d971b886fbb5fdb8d455a6145a581f6a5cec402207401b629d993694f3a1c9c7d039a12dda1156a9ff01a213aaf80916abd4b94da:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502207310f8f240111a171fc5cd27ec71b6ccbade8b60f8e5d3d195032d6b3234f441022100e03396d28d976b5cceed6efd97f6a394b6fb34a580e0128bac5e4ac35e8820d9:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2007-4504
cwe-id: CWE-22
epss-score: 0.01677
epss-percentile: 0.86253
epss-percentile: 0.86258
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100ca91884f4234058f8fd2cc20aa675f8e6e0cefed686fc0a9e1037408eb3d96b9022100d96cbd7bf93b8a7d3bbe6ce133f32b542b098b3e460d00adea1265877fee07ca:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022036ef6f1059a3eb0d4f08168be6b195e1b7932c3650190c7168d3bb0c76b717fb022100b8ff3e48865cf503666e7ee86d18cdeb0f6040cec28dfc40d873cb9fa8c13e93:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2007-4556
cwe-id: NVD-CWE-Other
epss-score: 0.19583
epss-percentile: 0.95719
epss-percentile: 0.95718
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -50,4 +50,4 @@ http:
status:
- 200
# digest: 4a0a004730450220453fcbfd7b2247f5654c2dc5a4a8615fec5456cd88bb46a59546505025d98e79022100f194982770ad9bf008160e20820d3ac0fb9293820a32b875af31b8e884795a8e:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100c17751720af000c8aa168cfbab92a3f84920f4fdca76beb6dc635c38d8f97cf0022066b72a898ade3d52d2d93abea9700eb7e222f07a90f77510fe6d308aee99ea30:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2007-5728
cwe-id: CWE-79
epss-score: 0.02361
epss-percentile: 0.88579
epss-percentile: 0.88583
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -51,4 +51,4 @@ http:
status:
- 200
# digest: 4a0a00473045022047f85c2902fee7a934a0b153a732dfc66c3b5f27184b0e633fe6d5582ea9a75d022100fb1c13ab0bd86f0367cfe54665ea802f9e67ea34ca3b43913b1a3e544161ec9f:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100ae707dc20b40b2c8d8a570637e0526e50963c7b87debf9064735dbf62e46c730022100b3c5904959e0e58eebaac59177e5a9f76837f8f27e5f6088abc58c2b93094d93:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-1059
cwe-id: CWE-94
epss-score: 0.01493
epss-percentile: 0.85394
epss-percentile: 0.85401
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -46,4 +46,4 @@ http:
status:
- 200
# digest: 4b0a004830460221009332201c12f719a3847de74a8ee8dd632abf399abab370062b1deaec99bfe51e022100d440d7bd3c3406ecdb8f29817b2663cbda7f286bf850641c096b40b5f946d562:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402204d06a906fd915c2721067236085f32139fdb65a667252703e455fe5d2e7492a902206c62ac95d6b3e7eb2cae574e064b56ea2f4b309e6b5c2e17e4a869e52f14e49b:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-1061
cwe-id: CWE-79
epss-score: 0.00938
epss-percentile: 0.81313
epss-percentile: 0.8132
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -49,4 +49,4 @@ http:
status:
- 200
# digest: 490a0046304402206b156d151a978c56d22c1254d62454d581f5ee5c8c7086e8feeca6c370404c1902204bdb2d6ec0a2df1d79800198d9f52ab9e5aedd1d2415a895116d02a74e8cbe73:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022063aa7c90a6dc7c8c23637b5ba71eb4bf65f91a7a947e0a001af9a16d57c32c2802205a463cd2cfd2c2a97f8c03dc49efc9eb1215394ad3119b3049a8c892a1548746:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2008-1547
cwe-id: CWE-601
epss-score: 0.03523
epss-percentile: 0.9048
epss-percentile: 0.90482
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
metadata:
max-request: 2
@ -41,4 +41,4 @@ http:
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 4b0a00483046022100c42b4f6da1b7a788b55abb40c5a88c4d89e073afa38fa15dadb62d66817f54af022100be1c0ed7b8f01b0a3135429252000c4503936d260eccfb1ae725065157cb9f86:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502210085c6d8d0d2deaf310e0e35e28adb18909693284818d2e63f66b9cd9efe8923af0220582a37771714b63689d5b81a38d8376cf4086f39ac07c8c1971458854a694ffe:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-2398
cwe-id: CWE-79
epss-score: 0.00329
epss-percentile: 0.67663
epss-percentile: 0.67685
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -46,4 +46,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100f82a3b0a9ed7102a6deac6b0fc823558975b7ab1089f0a21c4e194ad485b8826022100bef9aa4244ae9eccb2e209cf4c78fa701051e7b4eff244e92e11fc8ceecbfe70:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022026cf11f5aa12ef1ad880fa701332dca8b4af21334ec45685c3762e836902f24c0220420496cd74bcada7d80c5d303bc6a05c7a13c1b26ead58d58a7bf391c2f35d1d:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2008-2650
cwe-id: CWE-22
epss-score: 0.06344
epss-percentile: 0.92823
epss-percentile: 0.92825
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -46,4 +46,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100d452bda9ae2bbd8e1a8b4f607aef15e5af8442d3105e091c271c8649728540d502207e90cbc2d3d7f76c908ef3481fae31ea6d4707dc7f6be652bf6b3fc35fa43f3a:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220192ceb368b11dc35ce180448ad9f2046dc4ba662178ce84ab44a57c5f8c8bd9e022049dc837863aa4f8327ac2f996b64e398a0820ab094e3bf36f3aa5b65e8b0738c:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2008-4668
cwe-id: CWE-22
epss-score: 0.01018
epss-percentile: 0.82087
epss-percentile: 0.82096
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 4a0a00473045022068da4be622848d8e90fbbd5121f1a01d2d9af386eb40ca08158438599d52529e022100f6e17ca26da5ae8312fb41f788efa9546ac132ba613c8efb1f2d0e080507d8d4:922c64590222798bb761d5b6d8e72950
# digest: 4b0a004830460221009ff5bd8b89b082daa0c26ce7c3aa2e32b69591d68c97400c6053a21e374a6784022100f01a2cd9ce5e505d5e26265b4caa5023b547170e2297467232ed3d26a668edb1:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-4764
cwe-id: CWE-22
epss-score: 0.02365
epss-percentile: 0.88587
epss-percentile: 0.88591
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a004730450220279d9ec99d1a0998625c3223ef0e81de0e6ea8b512f0a7b90924088ef64d0593022100b9e94db852a643bc6d8c331a738237007f238e1d31d75fa09ec36b93530f41a8:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402207b6bab139389c4d4b40d161e095cd0b9d3eac40d83788b7d87f521b07d92514e0220084c18e371d5ad0792b7a9fef82892e2782c98b275a19b14706cb8b4764ee493:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2008-5587
cwe-id: CWE-22
epss-score: 0.02331
epss-percentile: 0.88504
epss-percentile: 0.88509
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -43,4 +43,4 @@ http:
status:
- 200
# digest: 490a00463044022026459db489e42e3e525ad7ef16ca115c090a585c931855d2435631cce756267d02203edae3bad928a9b48c1e9f93b344467941a557e5591fcacfc5d3ae70da877ceb:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100ad053ef2600aaec0d9d73f8443f9226c629aab753d4f8cd39ea1ff6355f1b20202204f8126f6180d95ad68e43eee1d76afe061d5fea2553ff062406962d04c793ba9:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-6080
cwe-id: CWE-22
epss-score: 0.00824
epss-percentile: 0.79985
epss-percentile: 0.79995
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a004730450221009a93c28b786b09aa3a14d05896b66a18c192a74bf2f385269f48199fc81dae5c0220363230840765085feb645eac5f4f44a4cc1b602ae6b0ace6410e3d203da7de65:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100d0395ea300f9395e6345aa0e75d01911661c290589d7e99fa8b98d5356a2103902204c73cb4b9a3347fca87c5732a2ebe0f6d4dae13ab10a8675ba6e748234130945:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-6172
cwe-id: CWE-22
epss-score: 0.00509
epss-percentile: 0.73858
epss-percentile: 0.73868
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a004730450221008877ae9a49f6a0cda67272ed0c23a0acc8ad2a75fe9c6570e240a3d9a62d8065022068d83ccbd76631543b8048045b4de50fdefc3494a94bf3e7d98d2833d454d00f:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402200ae0391d592f1302826e9268d33af84686d1172066b1d159d357283b85dad9c10220685353239689d8ea3c6bbe51348a4215b7d1f5b9ce774d4c94b235109615cfd4:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-6222
cwe-id: CWE-22
epss-score: 0.01029
epss-percentile: 0.82167
epss-percentile: 0.82175
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a0047304502201041b14b82127c13a4e400a737b7c644862d374292413b3d54d2426fa3e5634e022100a29593d2ada8d40946414e88548b6276f96e9b59a7e273235d0a1514629e45b9:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402207e8099ae7c2db736e076731d8f69339145827b9b9c651d0f2e9e9a24425fb0f4022069864008d18294f3c6e5c1fc64c29f6a25f941a4e07bc6180480588f35fefda1:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2008-6465
cwe-id: CWE-79
epss-score: 0.00421
epss-percentile: 0.71315
epss-percentile: 0.71325
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
metadata:
verified: true
@ -52,4 +52,4 @@ http:
status:
- 200
# digest: 490a00463044022040b2a9b76ac4aade97b1f968381e19aee2229dd82234bde9bd68a9390a29fee6022061504b7b7831d0ea1ecc82ed3e40e1593635150997a06f90fc990ea7c25f72e7:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502205da906ad3e5c690d360abb8236073baee2bcbd58726a239268d4f65e3ea126c802210093d528fa4916a1b28648e6b3dfc9bf8152abfbbdf196ab4cec7ead70c5cbc0da:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2008-6668
cwe-id: CWE-22
epss-score: 0.00359
epss-percentile: 0.68988
epss-percentile: 0.69004
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
metadata:
max-request: 2
@ -43,4 +43,4 @@ http:
status:
- 200
# digest: 4a0a0047304502205cf996a5d677243e686065098b6ea44b550f74f0d03f8c866ce94ead21c98abd022100b08c89ea4e17df7d4c7b1dc077edab23966abe7d2e28e70304545dd6e2f7b81d:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100b1aec8badf00e2f315627a9d2c27637b7fcdd103e6dc7b48ebe4bf4b01a0f3da022022e11aba09406d81b63e9003e87c254ae1a9acb1472ce8671a80e1b102ebe987:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2008-6982
cwe-id: CWE-79
epss-score: 0.0038
epss-percentile: 0.69871
epss-percentile: 0.69886
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
metadata:
verified: true
@ -49,4 +49,4 @@ http:
status:
- 500
# digest: 4a0a00473045022100de8ea647013a85fbb39e6074eb5e5349fc989c141cd495ec86f07adf61f8002802202025177e67eeb9071322483b5343f68f3f294836dc25419dca24d635fb6fc870:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402207251d7f4635e7125c81ac8e7d57a94f4ceb8b569da1f695dfe4c11456439216c022002a676f16674fbb5ab16dbd75699df60bf2f017684f3692cb844bfd84e6f684f:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2008-7269
cwe-id: CWE-20
epss-score: 0.01358
epss-percentile: 0.84717
epss-percentile: 0.84728
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
metadata:
verified: "true"
@ -38,4 +38,4 @@ http:
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 490a00463044022077908217c7bacb80b633395f2ef169f0f87dcfbc53b6787d5156951aee659b6b02207864c954ff5bb748eb7e42c55a856dffc2f0048ffd36bfd380b188e40ffc9957:922c64590222798bb761d5b6d8e72950
# digest: 4b0a0048304602210083e0246327dc8300a9484ef9721040412523832855d096027f464e2f47e4e10a0221008ea5423dfb096055a37bad4a4883f19eff1f320c6bfb2be6629c6eefb63f81d6:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2009-0347
cwe-id: CWE-59
epss-score: 0.10982
epss-percentile: 0.94481
epss-percentile: 0.94483
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 4b0a00483046022100bdfc38692c41c428338866cf2e060b1ab3e7b4430bd851d5216a717196152870022100cae80a372d65bf844969cd1ca8f8592622496104beb6813af509876fe874e1d1:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402205c1ad4d9e2a6c5ea7e2ebe28165f01cea6ad2e00e80fd61a17951dea321899260220203213dfb8b212d21cad7804bcc5f6b53023d0710305b25a77c24dbd83633440:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-0545
cwe-id: CWE-20
epss-score: 0.97252
epss-percentile: 0.99784
epss-percentile: 0.99785
cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,4 +38,4 @@ http:
regex:
- "root:.*:0:0:"
# digest: 4a0a0047304502203087986b5215d58e5a3e55b3729c869143018c636747768ff0300b048fab7e500221009e1612d5520398723586d8a61d9c2065a436a2803a4225bb217ef5dfb907dfe5:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100de909616aaa53364ca24038841b8acee5261b025a702b30a614273c2894a356e022100d8656dbecf2c1c8bf69ff09b6ecf8ce8ebc2520f6123980ff72f796020ff473d:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-0932
cwe-id: CWE-22
epss-score: 0.04048
epss-percentile: 0.91079
epss-percentile: 0.91084
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -42,4 +42,4 @@ http:
status:
- 200
# digest: 490a004630440220125b9a9d6cf793feeebdb90906331ccbdb34aa90ac5e29e87a6c1e88901dcc8002200d7cfbdf37435888f92b5a000a2b1ddbbfa3bc93a0d10ed6d031563d9b0fc0ed:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220363657860184fddc77e1ae4484a0ee173bfb2f070d42faba616cc66441d363f702204c719405f37863d9350b902ac4b3db20e4cb11bc69d6627a03afa6bf4c47174f:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-1151
cwe-id: CWE-94
epss-score: 0.79256
epss-percentile: 0.97915
epss-percentile: 0.97917
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -48,4 +48,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100abfd970f50963383a3752e5b4e655e64d5e24a9be8759b290c71b8c43f35fea2022028c0a99349bc1a5d7b8231568e9ffdfe9cdf154bd7ed0d7e26d8419463996483:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502204b6476ba835992488e51fe08ba78191a9f3d51b6a8a8505ab4342447e1bcbcff022100a1c02348eab1f4f68034dd2874984cfa244fcdbaddbb80057c774da30930d942:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2009-1496
cwe-id: CWE-22
epss-score: 0.00533
epss-percentile: 0.7446
epss-percentile: 0.7447
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 490a0046304402205dfe627123b0d4a95c173566ec93f62c7fa35de8c516441ecf08b646bc51c5090220599aa3fbc08cc15d749706785f40d3643fc1e4e0a20bb90a741946ec9f0df3cf:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022053da6d626b0cba950b01265f17c5890f23be36a9c6d49f55533f16a51b2c8f9402202740d2b64a1304df6b55a47cf197efd8039dd45135a95c023c0b6ae2d5a6cafd:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-1558
cwe-id: CWE-22
epss-score: 0.00883
epss-percentile: 0.80683
epss-percentile: 0.8069
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -42,4 +42,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100a9ed566dc7429ec96481a086d324097be5c591c17863b29b26cf372bd60cb731022100ebb4304f0c45dc1d30b2baf3f8164637c6cf81bc55dca21fb7cbc2a6c477e5c0:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100ceaa6fb53ad29a305d68cc4cd083405fe968b5af3b06fbd701775e38da96b34b02202852e88a11cb0a392c8cd2c10feeb4f5f80913df53ae8b6d2932e9b7a061bbdc:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2009-1872
cwe-id: CWE-79
epss-score: 0.40155
epss-percentile: 0.96851
epss-percentile: 0.96854
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata:
verified: true
@ -49,4 +49,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100a11099b17117929bac9c7103b4ff4de76d727ea1069b9a0cceeb9d1784a1a67302202f9a0479f7abb366e271596c2474fb29bde94bd2580ae140c81570826b64f30b:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220110cf1a571167684087c078086fde3554820ce76c50dda175eb05886d8edc701022100d8999a7e08ec375705a1f98617de639e04988d479c0116c16aec0dcc7acb1304:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2009-2015
cwe-id: CWE-22
epss-score: 0.00813
epss-percentile: 0.7985
epss-percentile: 0.79861
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a0047304502202ef0b145d959d59c58c2397efbd8a022bdd5e3350b782bad64bb9d9b3c8bbb930221009230c0d9c5ddb827b8f9f8f56ca5970f50c4f6c3e3e39276d6e00235191177dc:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100d5d43dce4bd9aa30477b15926cf0b33261afdc526cefea1ccf6b5ff452cfad59022035485534a44cff134f206793b5eef60a47d73ff9174295458ef28ee3ae7f3568:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2009-2100
cwe-id: CWE-22
epss-score: 0.00528
epss-percentile: 0.74352
epss-percentile: 0.74361
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100e3df5c87c9dbf9e394e75bca7ee4e8ccbd91df50311c04b094d46420d79f76bf02203414ba93dfecc87be8ac750691bc7a6dd4a2f562fe372c95c564cd7a756c551e:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100f75c63ebb3a274edfe0d2592aec8cd53932efed6f080c3b819a3c2a347b7e1e50220163830d2aeb6a2d3048692b00c1ba8df17bb3b2f14959227fece200fe99405a5:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2009-3053
cwe-id: CWE-22
epss-score: 0.00367
epss-percentile: 0.69375
epss-percentile: 0.69389
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100a4d0128e0e978f578cf856041204228eff848f3831ab5ca5addf0fdf3b1b1772022000926422ac4e990f1e75ae8d97e10c2292c11cda067c8a585e0bc3eea9e25081:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502203cc5a583b3087d6860c8a11f5af2c0e01398872f24c6b78160bd0ddf1fa9deef022100d071f9aba9a7579c53524afcdebff332206459b6d06c12f21848d8bebc23e23e:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2009-3318
cwe-id: CWE-22
epss-score: 0.00706
epss-percentile: 0.78157
epss-percentile: 0.78167
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a0047304502204082b3d74c9eecbb163a0882f83e4651fa21ff5b88a0bb352670001ab805cb11022100ff86f6429361555c5e6b8f96d3692087c0b38fae44b1993f0aa45758c4086a6d:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502210081d3d1ee30700a2d9be7df8f3cfcd0a4216582d84c144f68af8d7a122efd6bbf022045e1c00477bce649072752f3ac84ce830af89c728b3f290a5ad6c88327e6c19d:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2009-4202
cwe-id: CWE-22
epss-score: 0.01956
epss-percentile: 0.87381
epss-percentile: 0.87387
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 490a004630440220610626457b4099ed89e4cf33a091ea8079abb5853d1ba048f4a2672971697b7002203a3476b69a5d87c52029566af133c6415ce46e454f994f9b161a726624608b03:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100ddec54eea2c74028367512c24e0262f2dca63f1158090747c687573f83f389c302201f150d52ed245b9f32f418ebd663c187c3c2f2e6e3e59773142da788023b77d1:922c64590222798bb761d5b6d8e72950

View File

@ -19,7 +19,7 @@ info:
cve-id: CVE-2009-4223
cwe-id: CWE-94
epss-score: 0.01041
epss-percentile: 0.82291
epss-percentile: 0.823
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
metadata:
max-request: 1
@ -43,4 +43,4 @@ http:
status:
- 200
# digest: 4a0a00473045022073d1ef090f6d39a3f0f4d2239ae46b45b55f55e5de00325a2d9b30bfd6ae6e68022100fb0a7f3dddc0a529c818a65e922fffd4669dd9499464a1a9a1e33ffc5b0975aa:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100fb8defe90860afac5515855a56d7f3a82606aeca679937f24ce5a821ad66ce0502204c682f19878e121dd4380c9c828e405ad3a0553a0dafa78698c53a1349346b65:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2009-4679
cwe-id: CWE-22
epss-score: 0.00826
epss-percentile: 0.80012
epss-percentile: 0.80022
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100bd843f3d182c2b282d9730dd4214c3681562eced8f39441903e53d66f5f55fcb022072f2c1cbfb4ef3f5af6fd9ec9470f2f5a45a4100360a4c36a7fae59b53106daa:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100f84dffb9960bbf782bbd1dfb31f977ebe2c6c962cc6d9be18fadb860c6bc513002201d4321b7dc1dd3b0d271f79a03082a706dd21623efe03b044c0b096a1024c465:922c64590222798bb761d5b6d8e72950

View File

@ -15,7 +15,7 @@ info:
cve-id: CVE-2009-5020
cwe-id: CWE-20
epss-score: 0.00215
epss-percentile: 0.59256
epss-percentile: 0.59268
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
metadata:
max-request: 2
@ -36,4 +36,4 @@ http:
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
# digest: 490a0046304402205bf3ba1c5f896e7ed5c6453241ed06dea41f37d429a126bd9228cbefae6362c402203aede0803c239f8bd5b194e33f8a6262b8a4d5ff4bd6e11cc9d57aa83f750d37:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220583a2322ce2c0683aa88cb23bc82e91e67fa05850c3dd86d10ad43e2ade54d06022017975033077c37ba26088e5cc5fbae351f11ed6822dbd6e185da20a3a382b2cb:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2009-5114
cwe-id: CWE-22
epss-score: 0.02357
epss-percentile: 0.88565
epss-percentile: 0.8857
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 490a00463044022063d9c355926d7cfeacdd3879910ecdb142ec63ce9beee3f899ba1868e8e4f9e702205d348adbf1ca2d19eaf386b269aa5906641fb6096279eb4ced70ebf7a3c710d7:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502200ab8bc8f7caf7b16c9e4f38e1d13e275c22a78e863b3a8cb4cd7923dad187d0f022100f6c00ce621ef3fc0bb3821e2254e7a0cf2a0046e59467b5548a25abeca75b8db:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-0157
cwe-id: CWE-22
epss-score: 0.00826
epss-percentile: 0.80012
epss-percentile: 0.80022
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100950fa4a40d8a9bb62e57e7f581200046302ea6a7ef7ce20eda1fa41abef8899f02210083847c726e6c617a491da359937532e7e5efc03cec9a04dc1242bc15f34298c9:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022034c7e560e746cd40ca0c93104b7eefe82d0ff490dd9ed29d4e7d234cd5fa8f3f02205a09992a0593392abdb6aacde1efe652da7433e2fcc76f82855ee70a33624cda:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-0467
cwe-id: CWE-22
epss-score: 0.0586
epss-percentile: 0.92559
epss-percentile: 0.9256
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100b60640d3d9c3c754bdbe52455d59497aec8d585c5b406a3e1ee1b779813ca463022100a4dec002df889af911f3a14d3435fee6054b116249db3c239a73d7aee7ef5aa0:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100fd7401a8f8134037e62253da8e6ec06d8377ef9fc3e1273a147642c7edc8549802210092d6569696f7b0aab32a68506870b9e056ed9670d3647435db52666d4eeb63ec:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0696
cwe-id: CWE-22
epss-score: 0.62698
epss-percentile: 0.97457
epss-percentile: 0.97459
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4b0a004830460221008c2805575698de9ea00247d201f54ba28c73662473abdc4173cb718e62386a2d022100d0b7226f7e060cb00b514893764d7abbe7bdd205d0a18f7f9208a50913a67d65:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100c2e5af365d0afc264d20e0d54f8f095b969d0078318c2847b2e1c8fb2a65ab4802210084f3bba2584bca5c4fc93a2f53c14018b56ef5d596d25f95df54a7cb6b7748a1:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0759
cwe-id: CWE-22
epss-score: 0.01326
epss-percentile: 0.84518
epss-percentile: 0.84529
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 490a004630440220257e3a926ed1fc71c273f36615221c7dd3e2d460618ea7de4b8f274759401471022006dcee7c22cdc686d57b5d0f4422f9ea7bc8527559a79cedebde6d801eccc1cf:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502203acecf2e6ba2118cfe149f610d3f6454e307b88e464bf350ed69202c0c799f7e022100c6ca05ca118bf54d08c1884bacaa42446a5a80f17256b99e0b3acdbf48ed12f9:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0942
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73002
epss-percentile: 0.73014
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a0047304502203cf8aaf42dd413a52879f6955e02ae2cd47d8f26f14c6483098028a7dd26f3df022100f0b9faf5049befd71463c5c03e1483562066aa710d7fa636c72081c50d514f63:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220304f1c1d373043e16650c5efe8c9bf5436de9a3193c240b6077bdcb04d13a5c5022100aa10f07c51869c8078793d811c2a975cf942579c64fc424f41988e04dd6a283c:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0943
cwe-id: CWE-22
epss-score: 0.01155
epss-percentile: 0.83268
epss-percentile: 0.83276
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a0047304502201d39b3e4c78a16a231b14edf3ab9568809db8461bba3838086d25b7ebaac56ef022100be87c34b118dfe3cdef0f5cbb23d7af5e96e81846c862d12640c8c3a9aa0baf0:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402205366e5896a032da49ac12cbc5f8f029bb7e7ad1c4868309cb5ae3a030c13e8400220486c37ccd2bd07fcb9f05a872c472eb2a6fb9029613c460054b70f81821dd83c:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-0944
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73002
epss-percentile: 0.73014
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100babc370f6ea5fe468f54d5d131a285cf01763e6b78b0d064f4e659737642dc2c022030a497c992d3e47e7e48f52109a4b015bb8307501420cc6335b65ef1ae935925:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022029798198aaa214f346f29d4327af93e026fe52d7ac95ffceb30ea54a797a9227022100b133f6045b85f5d01e16433bf3c62e81ef5f53249864044725ae0093da0257c2:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0972
cwe-id: CWE-22
epss-score: 0.00813
epss-percentile: 0.7985
epss-percentile: 0.79861
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100eddce6d0ab7ab292c038d7b85eaa89187c9097067d2bfc6c6a8e730644975dc702207a3ba823e247161ae18d27ee42980a6c985cfd4dbf76c7b17a2beb497b6fbb1f:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100bffce4b5327dde301d6b0c3d53ec3d16c22223d93dcc9671475ea7822126329c02202703bca62a9215b63865668c8c4824aa5a33143bbdff9d32d7ba036fe034424f:922c64590222798bb761d5b6d8e72950

View File

@ -15,7 +15,7 @@ info:
cve-id: CVE-2010-0982
cwe-id: CWE-22
epss-score: 0.0087
epss-percentile: 0.80515
epss-percentile: 0.80525
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,4 +38,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100bef6dbb62c97bfe4c62a7fc160582828768ab8387db4a42e3b1adb8c7ca9ba060221009e1cfe248ec471fbc70dd99c7f0813c4f57a4043a3317f07843bf6d2cf6fce56:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022026bd27a2a3155c4f3ded1a160b62092143d0496e7a52c951d10de831bc45839e022045c88e63397f0bda3943731c9b2328f33a69ed10688479e22b694ed88dfd5ea8:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-0985
cwe-id: CWE-22
epss-score: 0.01222
epss-percentile: 0.83799
epss-percentile: 0.83809
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100e1aae4553c445459fd2282cfaf52c19cca1aba22d6df5fa69f9efe4554b0b25002202fb2838c0bf5062294cdf78ee369abbd24bbccbbb743599fcd1ca5e0d1145ab6:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502200608dd0f886c05c76ffc8aede86897f1a1b2a80159facfa3a837b0269a4af6d7022100d301d3a32bb32afa0fede86fbfd61ff2398481e12f2f42da8ca382b78acb5b25:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1056
cwe-id: CWE-22
epss-score: 0.06484
epss-percentile: 0.92907
epss-percentile: 0.92911
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 490a004630440220018c2af4e61b91442d709fb1268fafd657a56ff1faa017d47761a6bb86c9113002205b0547daaa1c4cba1ae86589151bfd94e4ea36d361ddde6b732c88f17d31ec64:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022002265e03b1c07b6494606b14f48a396380341a4a43e6333983e1f31719d2d26d02204979b21428b83374eb3ea253a704b36e8d892d1483c69f11dd7f038670c7cac6:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1081
cwe-id: CWE-22
epss-score: 0.0168
epss-percentile: 0.86257
epss-percentile: 0.86262
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 490a0046304402205e771211d7a1ea573565e628eefce017167cafc6e7012c5cd5e5e1949ae23788022057605ccf227358fea6ddedb7e213dfe036cb7d3abd3e3c8306f93c959b325519:922c64590222798bb761d5b6d8e72950
# digest: 4b0a0048304602210086b56dc6f635abe12d098c30e3c30bf41b2cdf7dfca0cc17f4a670a1ff92d449022100afa052809d3870e0c1c3ab0232cd00f16d6388b08a1a9309d119823c08fc254b:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1217
cwe-id: CWE-22
epss-score: 0.01155
epss-percentile: 0.83268
epss-percentile: 0.83276
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 490a004630440220460931be86e6750e80d5610f2c1c0b2c2522109ef718d1b5feced5f76f325d5602202cfa005553ce4ae0ce4ac4ceee2a947800ed12148e6489ab3b7f6317d5ad9e2c:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100f1cbc3a62ce3086adec96e876c82e27122d6666425d0e740e80b59ede3e545cb022100f412b920a2ad1aa213104ce5de01a8234039cad47737fb6125b3147e465cca13:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1219
cwe-id: CWE-22
epss-score: 0.00813
epss-percentile: 0.7985
epss-percentile: 0.79861
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 4a0a00473045022027bfa9e2bebeee496f954b3808141438299d9ffa260f32bec79e4af468839eea022100b38679f052c70b348fee3dd0ee76b18d5c62adb72ec7a4feef076df7dd28d8df:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100da0c1a5d2821611cf0cb46d5b25404ae9ababd0e4b2e991f06ad42d8f8a03e93022100e59adfb2ce9718640f49fb137c70d2d296c93098a83918b258c9d5d11550f0e8:922c64590222798bb761d5b6d8e72950

View File

@ -15,7 +15,7 @@ info:
cve-id: CVE-2010-1302
cwe-id: CWE-22
epss-score: 0.01204
epss-percentile: 0.8367
epss-percentile: 0.83678
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -38,4 +38,4 @@ http:
status:
- 200
# digest: 4b0a0048304602210098548affe0090e3174210c6dc51e8f450f435e94e93b836057113b47fce97ad6022100e5349b40e026f23d74b44ba80b50c9b2c13f1cfcc99d1874eefbf128660e79ed:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502201b9b4377bd1a9ecd8e1654eefb25d8d0b1818ac9703d619d39cb6035dce678dc022100e31b0b255c83dec1d9230391870ad9af869f833ab569ddf2ccfc48a7d24bfc6a:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1304
cwe-id: CWE-22
epss-score: 0.0045
epss-percentile: 0.72228
epss-percentile: 0.72239
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100eca70d8f5fbf4d7abbab39bb0036f30a3d0681d49dbf500c3e14b915e2d0a3e70221009d1653ca4fab50bbc58463f5f160c18b6559f9b94c982c91e9961b324e7780e2:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502202b69be427ab9780eeaf61e98815ff00a2aececff3607c59f08d0f04e7c98e94e0221009fa4e20ad360ec043f681c7e2a6ff442c5f3a27e0fed2ac8bd045ad75e01e3b6:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1305
cwe-id: CWE-22
epss-score: 0.03203
epss-percentile: 0.90079
epss-percentile: 0.90081
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 4a0a00473045022070c196dfbc76e21497ddb04451b94f66f19de4a1c560786dfcb99ea4f6b8d017022100a1543d91984fda34952f4751031a7df4b3bee640fae2810042405b6d49157491:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022005a8951112a5e63bca6e0070556c16e547dbc1e34c5fae10adfa97a381d8aee3022100827096cf8b61ed8d775d4acbdf4dd621137f5261bafc8dc1f79dc01dcbef99dd:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1306
cwe-id: CWE-22
epss-score: 0.01242
epss-percentile: 0.83966
epss-percentile: 0.83976
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100f333d42341eda9f4a38a17ff971b7f0b774b73c811c4d64d56f46bdad9abef37022100e6151f7cd62bbd26bca43ff1c26f26092979b42a83befc2e05cd5eae61afaf72:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100f99b7e7538f8a6bbb0df48ff09184affd5d2d3dcf99f9684cfead8d01328017f022100d4be500928c35391cabf774e614b8cc5e58960e7441db989657b668dced8085c:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1307
cwe-id: CWE-22
epss-score: 0.01751
epss-percentile: 0.8654
epss-percentile: 0.86543
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100e4c614bb52138a9133f9bfe395f6858ca749a1e5a8b2abee241dd081a4a1e9f1022100efc7535f851a17d9396fd29d6bea18536b4ec1430545966647235b9d98201fca:922c64590222798bb761d5b6d8e72950
# digest: 4b0a004830460221009b47ea6aff9bfd667c7c7ebcb3104d93e53977ee91a81ecd7b8e6e624c0a1940022100e080f1a31129e3739355f6c1445b480e053baeda9ddf1bda4764123f2857eef8:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1308
cwe-id: CWE-22
epss-score: 0.01334
epss-percentile: 0.84551
epss-percentile: 0.84563
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100b5b708ebfeaff085a7054f39ed423ecb8d7df7f6b68b20910d9114127f3fb9f802200e9c311a813cf9ad6f8bfd513fc12a1f18e86c618e0865139a441a2b4f09d416:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220202f6376d3009115b20f11aa8b9f4fd37ce15d2ba6b91a78be8611acf1f585800221009ea5f2b9d4369c7ad491076d18da25e3ad03b1c5a5cba1fd365122059015ad41:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1312
cwe-id: CWE-22
epss-score: 0.01155
epss-percentile: 0.83268
epss-percentile: 0.83276
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100a33371a1b8a523ace3527b67eb76b7ef31c1be8c53932cc8c65d83d5bdca48fc02202a1119d593f126e091de50adaaf9a54703a929a5eeebc0969159d8e226e710ee:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022013917a82861d254765477e563cf7b324a9e855e427c3338e345db7677f1e10dd022100fabc587393fabff08c90cee6f879e20135ecab9d2b8287e6e412574e56065c8a:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1313
cwe-id: CWE-22
epss-score: 0.0045
epss-percentile: 0.72228
epss-percentile: 0.72239
cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100e0672493f8685284775e9a89fb3f538e9d6542c18231a8bc2adfa6e962e87f380221008fba7a956d306427730cc87e5d88eec1bd3f14d81a7046ab949dccdd9e2a9179:922c64590222798bb761d5b6d8e72950
# digest: 4b0a004830460221009077b66396959256f0169a56ad9c97c4bc100d1f63dec95a896629b2a17bb802022100fe2a36c0573722d1170a56fa952bc333e60924253720f310bca973603a09fbb5:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1314
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73002
epss-percentile: 0.73014
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 4a0a0047304502203efed490b383134c8010c92870ae19e48f3c2e499cae7391fccaec82a75de3bc022100f8a95216113d7750b25581c175adcaa7c90e9c404ee753bed3b3cf1fe8d8af61:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022048370902bae0c8e914e23c16549a01abc7a2ac067e358c721d12447de6ce1efc02204b88997be1fd341ca54eb7940fcd363f0aaca6b212451eca68e19b0e56946295:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1315
cwe-id: CWE-22
epss-score: 0.0087
epss-percentile: 0.80515
epss-percentile: 0.80525
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 490a0046304402204244f42191651dfb9c9809725ee651f12f260153d5b288a75a80d3db78392973022018ec35620a2da3f8d6fbe6d972941105653ac57a2840ae8f09e709fe01a7e2d6:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100d1af8ae452a04180459a2899c07038462ee8db9664540732ea206accf6d12178022100cf2bdbb93429f01d26766ad9e9c4eb053a2ce45e3f770a83dbe346a5784ccd32:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1340
cwe-id: CWE-22
epss-score: 0.01155
epss-percentile: 0.83268
epss-percentile: 0.83276
cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100fe7d0053a5e66e153096ebda40c33834f6c0dddfe25d573cd2a9bc863548db6102204a6ffc6791c9f8cdd301cc4832840ddc90f2c3c07c1689c5824c4db16233cd67:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502202215a569dfe2e61e23b456d99b03e007ba14de53c8d8e04a1f4b5cb101d27977022100add3034997e110cddbbaa2ac843782e4695b3e14e1faf545b4b9934b1cfb0ebe:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1345
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73002
epss-percentile: 0.73014
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 490a0046304402201fc18bc0c1ee31bfe23597fb098fe69c79090d63931791e1ee413c8cd98ec7f90220745647bb66f0af91a63b66da233a0a8aa956e4eb8c106f261d06ffe80e700fd9:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450221009a92527de5cc62967c22251e4180e6748864dde49f4487f9d83319bb72691f4302201a58e68929a9c9a19bcd2286df524254375d71cce999658a328ea2fef3ac2d8f:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1352
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73002
epss-percentile: 0.73014
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100ed626a2b6c592a9f5f86ad4718bb09c5f40f820dd3a7fa24b6d5ac7ccfd8feb2022070221def9f3b68a2451c2bf73582d84df323b9fd4df8fb766926eb6109127aad:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502203d13b8cbf98490110d95fb6ac471f0d1e975809895288134271bce68e7040eeb022100a3cfd0f485228a76924cbd17da6a04a77b723d6f1949569feffbe96cd5c05823:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1353
cwe-id: CWE-22
epss-score: 0.01751
epss-percentile: 0.8654
epss-percentile: 0.86543
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 4b0a00483046022100ded7d5c95ddc68513f310ee2d1d91fa1a7adb355fa9ad9a97b487de412c13e95022100b4a906695adfec03b44b312aeb3b2bd9e630ec377307fb082d6b33460d17feb9:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502205790ce62c918f886089b72143abdee46f35b0b8aadb4d1fc7cf806af81255917022100ed1ef9da0b75c774092dd95d1397b341740f1b54630afa25bfb2766fcf74e98f:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1354
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73002
epss-percentile: 0.73014
cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a00473045022020cec573bdc129c14f0fe9ca14c2e64cb58a0c4fe1f2258a2976b39aead5d86e022100918481bc4fb0d928027d813bf25e7bcea7168f9fbe698d9deeae50ba20ba2dfa:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100f1d371db99d9785d635a81747e849ee8fa2e669a88fdd9c58b3f33037a43b70002204bea8a3d9fc904139f0d5f65c8098d111cbf938d49e210d37dcc57449485df0b:922c64590222798bb761d5b6d8e72950

View File

@ -20,7 +20,7 @@ info:
cve-id: CVE-2010-1429
cwe-id: CWE-264
epss-score: 0.00573
epss-percentile: 0.75409
epss-percentile: 0.7542
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
metadata:
verified: true
@ -48,4 +48,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100ddd0a1d13b4179c9b1acd43d34b26b72ca2b222a761ca2d47f119259bfc8b7d102207ac1bf2332b65e1fc49133edc0ca37c86e2076bfa06a9c3bf835a0749da6ace0:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100f0cf01c9e8d697f31e20b543ab0cf897753efe4a685881f13c3f3c4ce1ed13b70220034b88c5ad75d3dd8b26d738e4723e93bac676f4e11b463c0cf0c6f41e82eef2:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1461
cwe-id: CWE-22
epss-score: 0.00477
epss-percentile: 0.73002
epss-percentile: 0.73014
cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 4a0a0047304502205917eddb35cd731209be039115b48d93e149e47d0c558be6cf8b3b3cac50f4df022100e182400df070fb59e3ea4ccbb8d57161ead92ab8903274341b16ea8226e00733:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100db5f81b1fdccb1383376e81d546fa07a3d1a80d43c5fa1c7b169db76aa21a7b402206bfe845914ce2a86709624a6aed288541b006d11b20e94da5914ceec6f960996:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1469
cwe-id: CWE-22
epss-score: 0.00813
epss-percentile: 0.7985
epss-percentile: 0.79861
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 490a00463044022065100ec2519857682b9a875ddb1a7484d8dadddb8843cae77899baf57316f5b3022003a0d93be628431fb3e688310b629e3cc1e6c1c1dff803366f6d16a5c94b6f68:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100b7e2ebede509c5504e3a6e65e3abaa3e932f98d7d99a2dbd3eb5d1b865a1e13b022100bc2d82e10e76416ac99b1c189e7bfb233701361d72b9aee90fc7802d4af39958:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1470
cwe-id: CWE-22
epss-score: 0.04616
epss-percentile: 0.91605
epss-percentile: 0.91606
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 490a0046304402204add677bc44e9b8f4bc64410baa2d4521b48e6d81c5f9b1316994f38fddbbfe302206ec656be7a9e9da55a3a967399ccb582e8955eeef245c8fe0a174d9a265f1d29:922c64590222798bb761d5b6d8e72950
# digest: 4b0a004830460221008528b60ade946de29f68b7b95c155f4eb4dd35edfd47980c13e6bb94f737f5b2022100f1cbf64e902676e478ba78ab4c37cd4f5d4bb854a8f05f56037b9bc3042ccd48:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1471
cwe-id: CWE-22
epss-score: 0.05684
epss-percentile: 0.92459
epss-percentile: 0.9246
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 4a0a0047304502203530b73c6e92308ef46678d1743cd4f3733fce07970fcee8d95fca7590a469c50221009cc2aacc1d95cf1ea94074572ff5cd3ac67f9faa1ecf15e53d931553c1b4f942:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022004a64990fde1537b9c5fc17c39dfd6e7ea57774e53c6d6f58631b5b3f2f65854022100925fd76b8df02c3a651de51a1e544fb9287ab33e8dd626bff3a8e8be46d19447:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1472
cwe-id: CWE-22
epss-score: 0.05684
epss-percentile: 0.92459
epss-percentile: 0.9246
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 490a004630440220437e9da2c3df847982aad2e0eb31a31471366824dee57921a8fc5cde96b3d29b022012e2c1d736ac56bd2c57d16d1db0a39e4f073b99cf9d78f93c6646b26ba79e05:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402203f51b0d40f0f4615a818df486d13b0dc4bfadf4dc697b98cb45953f179464be702200c935d67485e204e687d596726ea05ab7bd49045cd1dcad24574715ff6a8c7d5:922c64590222798bb761d5b6d8e72950

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2010-1473
cwe-id: CWE-22
epss-score: 0.00826
epss-percentile: 0.80012
epss-percentile: 0.80022
cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -39,4 +39,4 @@ http:
status:
- 200
# digest: 490a0046304402204e89f16a5e2a7d7f54fc55f86b59a53a69e057fc1bc84b300d706c9b3ab2ad8602204cffc5724a390ec7038ee37d0134d212f32fce73fedddcf452142bc6fd519c4f:922c64590222798bb761d5b6d8e72950
# digest: 4b0a004830460221009011f4d037626e4d2b15493977c742bde7479c4c5cb89ac04fe2f1bd9c3f9d9a0221008b39add586185efd03377a5a587bef2b66ff491de3f77805fee24640f83c76f5:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1474
cwe-id: CWE-22
epss-score: 0.01242
epss-percentile: 0.83966
epss-percentile: 0.83976
cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 4a0a00473045022100c8f83c59f57d991645a9d551641133d9395cec68dc7eb843e7e1b6a40206c6320220214161bccd93f7b5d3cc724fadec2f8cf768c3204342015d79785b7001f31fbb:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402200e6457de9c374bd342a7c020e99c13ef6e026197613b2c09a068079260675ad502202a9beef981495bf21a1a62e40f8e632fdf8864cb943126fbb98d3ade0b3d5ef2:922c64590222798bb761d5b6d8e72950

View File

@ -18,7 +18,7 @@ info:
cve-id: CVE-2010-1475
cwe-id: CWE-22
epss-score: 0.01242
epss-percentile: 0.83966
epss-percentile: 0.83976
cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -41,4 +41,4 @@ http:
status:
- 200
# digest: 490a0046304402207c808f619b21a8994dd7e72917345720454e44dbc2cfb1c012dbf58d6a1d34ca02206e64962cc5434fc17d890f9eb782025293f77b1802f0b30c3635108960815364:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450220715659d1930d7f8ad0623123c22b7e5cd24fae40afb13d734c754ac7ad9b9924022100bec1154fecaa13f80fcbf85bff9b068c99bf4546e80f4286024129e24590e06f:922c64590222798bb761d5b6d8e72950

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2010-1476
cwe-id: CWE-22
epss-score: 0.03527
epss-percentile: 0.90486
epss-percentile: 0.90489
cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*
metadata:
max-request: 1
@ -40,4 +40,4 @@ http:
status:
- 200
# digest: 490a0046304402204489ab3ce5d6b268596689b4cba269cfb78a20136551262b3024345992f94af102200ed271054c5b7811cce9766750dd0af64e7b297b0f27e137cf0a0526db859f19:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402205fdf20a21e826f5555bab66f8418ae7cc5ae59664e1585c0c10647b74e24827c02202c87db22b4a038c30a27040fb4fd24445471490beec3975339768d31418bda34:922c64590222798bb761d5b6d8e72950

Some files were not shown because too many files have changed in this diff Show More